How can you configure an application to automatically launch on the Security Management Server when traffic is
How can you configure an application to automatically launch on the Security Management Server when traffic is dropped or accepted by a rule in the Security Policy?
Which Security Servers can perform authentication tasks, but CANNOT perform content security tasks?
Which Security Servers can perform authentication tasks, but CANNOT perform content security tasks?
What occurs with the remote Gateway after reboot?
Your Security Management Server fails and does not reboot. One of your remote Security Gateways managed by the Security Management Server reboots. What occurs with the remote Gateway after reboot?
Antivirus protection on a Check Point Gateway is available for all of the following protocols, EXCEPT:
Antivirus protection on a Check Point Gateway is available for all of the following protocols, EXCEPT:
Which feature or command provides the easiest path for Security Administrators to revert to earlier versions o
[tagged]
Which feature or command provides the easiest path for Security Administrators to revert to earlier versions of the same Security Policy and objects configuration?
Which IPS setting will allow the Security Gateway to prevent this error page from displaying information about
A security audit has determined that your unpatched Web application server is accessing a SQL server. Which IPS setting will allow the Security Gateway to prevent this error page from displaying information about the SQL server in your DMZ?
How can you do this?
You have two rules, ten users, and two user groups in a Security Policy. You create database version 1 for this configuration. You then delete two existing users and add a new user group. You modify one rule and add two new rules to the Rule Base. You save the Security Policy and create database version 2. After awhile, you decide to roll back to version 1 to use the Rule Base, but you want to keep your user database. How can you do this?
What rules send log information to Dshield.org when Storm Center is configured?
What rules send log information to Dshield.org when Storm Center is configured?
Which command allows verification of the Security Policy name and install date on a Security Gateway?
Which command allows verification of the Security Policy name and install date on a Security Gateway?
Which type of resource could a Security Administrator use to control access to specific file shares on target
Which type of resource could a Security Administrator use to control access to specific file shares on target machines?