1.
Where do you create and modify the Mobile Access policy in R80?
2.
Customer's R80 management server needs to be upgraded to R80.10. What is the best upgrade method when the management server is not connected to the Internet?
3.
CPD is a core Check Point process that does all of the following EXCEPT:
4.
What processes does CPM control?
5.
What is true of the API server on R80.10?
6.
How many images are included with Check Point TE appliance in Recommended Mode?
7.
Which deployment methods can an administrator choose when deploying the Sandblast agent?
8.
Which Check Point software blades could be enforced under Threat Prevention profile using Check Point R80.10 SmartConsole application?
9.
What's true about Troubleshooting option in the IPS profile properties?
10.
What is the mechanism behind Threat Extraction?