1.
What API command below creates a new host with the name "New Host" and IP address of "192.168.0.10"?
2.
What are types of Check Point APIs available currently as part of R80.10 code?
3.
Which of the following is NOT an internal/native Check Point command?
4.
Which one of the following is true about Threat Emulation?
5.
What are the minimum open server hardware requirements for a Security Management Server/Standalone in R80.10?
6.
The "MAC magic" value must be modified under the following condition:
7.
The Correlation Unit performs all but which of the following actions:
8.
The following command is used to verify the CPUSE version:
9.
Which statement is true regarding redundancy?
10.
Vanessa is expecting a very important Security Report. The Document should be sent as an attachment via e-mail. An e-mail with Security_ report.pdf file was delivered to her e-mail inbox. When she opened the PDF file, she noticed that the file is basically empty and only few lines of text are in it. The report is missing some graphs, tables and links. Which component of SandBlast protection is her company using on a Gateway?