1.
What are the two high availability modes?
2.
Fill in the blank: The R80 feature ________ permits blocking specific IP addresses for a specified time period.
3.
Which Threat Prevention Software Blade provides comprehensive against malicious and unwanted network traffic, focusing on application and server vulnerabilities?
4.
What is the purpose of Captive Portal?
5.
While enabling the Identity Awareness blade the Identity Awareness wizard does not automatically detect the windows domain. Why does it not detect the windows domain?
6.
Which policy type is used to enforce bandwidth and traffic control rules?
7.
Bob and Joe both have Administrator Roles on their Gaia Platform. Bob logs in on the WebUI and then Joe logs in through CLI. Choose what BEST describes the following scenario, where Bob and Joe are both logged in:
8.
Fill in the blank: When LDAP is integrated with Check Point Security Management, it is then referred to as _______
9.
Which Check Point software blade provides protection from zero-day and undiscovered threats?
10.
Which of the completed statements is NOT true? The WebUI can be used to manage user accounts and: