Checkpoint 156-315.81 Practice Test - Questions Answers, Page 28
List of questions
Related questions
Vanessa is a Firewall administrator. She wants to test a backup of her company's production Firewall cluster Dallas_GW. She has a lab environment that is identical to her production environment. She decided to restore production backup via SmartConsole in lab environment.
Which details she need to fill in System Restore window before she can click OK button and test the backup?
What are the types of Software Containers?
Which of the following technologies extracts detailed information from packets and stores that information in state tables?
Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?
Which Check Point software blade provides Application Security and identity control?
What is UserCheck?
Which of the following is NOT an alert option?
What does it mean if Deyra sees the gateway status? (Choose the BEST answer.)
When using the Mail Transfer Agent, where are the debug logs stored?
UserCheck objects in the Application Control and URL Filtering rules allow the gateway to communicate with the users. Which action is not supported in UserCheck objects?
Question