1.
You are the Check Point administrator for Alpha Corp with an R80 Check Point estate. You have received a call by one of the management users stating that they are unable to browse the Internet with their new tablet connected to the company Wireless. The Wireless system goes through the Check Point Gateway. How do you review the logs to see what the problem may be?
2.
What are the advantages of a shared policy in R80?
3.
To view statistics on detected threats, which Threat Tool would an administrator use?
4.
What is the purpose of a Clean-up Rule?
5.
Vanessa is attempting to log into the Gaia Web Portal. She is able to login successfully. Then she tries the same username and password for SmartConsole but gets the message in the screenshot image below. She has checked that the IP address of the Server is correct and the username and password she used to login into Gaia is also correct. What is the most likely reason?
6.
What is the most complete definition of the difference between the Install Policy button on the SmartConsoles tab, and the Install Policy within a specific policy?
7.
Which of the following is used to initially create trust between a Gateway and Security Management Server?
8.
Which icon indicates that read/write access is enabled?
9.
Which of the following Windows Security Events will NOT map a username to an IP address in Identity Awareness?
10.
Fill in the blank: Permanent VPN tunnels can be set on all tunnels in the community, on all tunnels for specific gateways, or__________.