10/448 questions · Unlock full access
Q1

In which formats can Threat Emulation forensics reports be viewed in?

Q2

Identify the API that is not supported by Check Point currently.

Q3

SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud- based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?

Q4

What are the different command sources that allow you to communicate with the API server?

Q5

What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?

Q6

Which TCP-port does CPM process listen to?

Q7

Which method below is NOT one of the ways to communicate using the Management API’s?

Q8

Your manager asked you to check the status of SecureXL, and its enabled templates and features. What command will you use to provide such information to manager?

Q9

SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?

Q10

Which command would disable a Cluster Member permanently?