Checkpoint 156-215.81 Practice Test - Questions Answers, Page 29

List of questions
Question 281

What are the Threat Prevention software components available on the Check Point Security Gateway?
Question 282

You have enabled 'Extended Log' as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?
Question 283

Identity Awareness allows easy configuration for network access and auditing based on what three items?
Question 284

What are the three deployment options available for a security gateway?
Question 285

In which scenario will an administrator need to manually define Proxy ARP?
Question 286

Which of the following is NOT a component of a Distinguished Name?
Question 287

A network administrator has informed you that they have identified a malicious host on the network, and instructed you to block it. Corporate policy dictates that firewall policy changes cannot be made at this time. What tool can you use to block this traffic?
Question 288

What command from the CLI would be used to view current licensing?
Question 289

In a Distributed deployment, the Security Gateway and the Security Management software are installed on what platforms?
Question 290

Which of the following licenses are considered temporary?
Question