Checkpoint 156-215.81 Practice Test - Questions Answers, Page 29
List of questions
Question 281
What are the Threat Prevention software components available on the Check Point Security Gateway?
Question 282
You have enabled 'Extended Log' as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?
Question 283
Identity Awareness allows easy configuration for network access and auditing based on what three items?
Question 284
What are the three deployment options available for a security gateway?
Question 285
In which scenario will an administrator need to manually define Proxy ARP?
Question 286
Which of the following is NOT a component of a Distinguished Name?
Question 287
A network administrator has informed you that they have identified a malicious host on the network, and instructed you to block it. Corporate policy dictates that firewall policy changes cannot be made at this time. What tool can you use to block this traffic?
Question 288
What command from the CLI would be used to view current licensing?
Question 289
In a Distributed deployment, the Security Gateway and the Security Management software are installed on what platforms?
Question 290
Which of the following licenses are considered temporary?
Question