Which of the following technologies extracts detailed information from packets and stores that information in state tables?
Answer : B
Which of the following is NOT a policy type available for each policy package?
Answer : A
What is a role of Publishing?
Answer : A
You are the Check Point administrator for Alpha Corp. You received a call that one of the users is unable to browse the Internet on their new tablet which is connected to the company wireless, which goes through a Check Point Gateway. How would you review the logs to see what is blocking this traffic?
Answer : D
Examine the sample Rule Base.
What will be the result of a verification of the policy from SmartConsole?
Answer : C
What is the purpose of a Stealth Rule?
Answer : C
An Endpoint identity agent uses a ___________ for user authentication.
Answer : C