Which of the following are valid Boolean search terms that can be used in custom SmartLog queries?
SmartLog can be used to identify which of the following:
What is the result?
What is the minimum software version required for a Threat Emulation deployment?
A customer does not own Check Point Gateways, but he wants to use Threat Emulation Service to detect
SMTP Zero-Day vulnerabilities. What is his option?
Joey is the MegaCorp Firewall administrator. Which options does he have for the configuration of the
Threat Emulation Analysis Location on his gateway?
Bots and viruses appear as __________ in the reporting blade.
What is the most common way a computer can become infected with a bot?
When the feature ______________ is ON, the Gateway does not block DNS requests that were identified
as malicious. Instead it sends a false response with a bogus IP address to the client.
When pushing the Threat Prevention policy, which of the following blades will NOT get updated?