1.
Which of the following is NOT a set of Regulatory Requirements related to Information Security?
2.
Which command is used to obtain the configuration lock in Gaia?
3.
Joey is using the computer with IP address 192.168.20.13. He wants to access web page www.CheckPoint.com, which is hosted on Web server with IP address 203.0.113.111. How many rules on Check Point Firewall are required for this connection?
4.
Fill in the blank: Licenses can be added to the License and Contract repository ________ .
5.
Fill in the blank: A(n) _____ rule is created by an administrator and is located before the first and before last rules in the Rule Base.
6.
Fill in the blank: The IPS policy for pre-R80 gateways is installed during the _______ .
7.
Fill in the blank: RADIUS Accounting gets ______ data from requests generated by the accounting client
8.
Fill in the blank: The R80 SmartConsole, SmartEvent GUI client, and _______ consolidate billions of logs and shows them as prioritized security events.
9.
Which Check Point software blade provides visibility of users, groups and machines while also providing access control through identity-based policies?
10.
How many users can have read/write access in Gaia at one time?