Checkpoint 156-215.81 Practice Test - Questions Answers, Page 17
Related questions
Which one of the following is a way that the objects can be manipulated using the new API integration in R80 Management?
True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway
Which of the following is NOT an identity source used for Identity Awareness?
Fill in the blanks: Default port numbers for an LDAP server is ______ for standard connections and _______ SSL connections.
Which of the following is NOT supported by Bridge Mode Check Point Security Gateway
Which option, when applied to a rule, allows all encrypted and non-VPN traffic that matches the rule?
In which scenario is it a valid option to transfer a license from one hardware device to another?
Fill in the blanks: A ____ license requires an administrator to designate a gateway for attachment whereas a _____ license is automatically attached to a Security Gateway.
Which of the following is NOT a valid configuration screen of an Access Role Object?
What is the purpose of the Stealth Rule?
Question