1.
What are the three types of UserCheck messages?
2.
What two ordered layers make up the Access Control Policy Layer?
3.
Which statement is TRUE of anti-spoofing?
4.
Fill in the blank: The position of an implied rule is manipulated in the __________________ window.
5.
How can the changes made by an administrator before publishing the session be seen by a superuser administrator?
6.
Which Check Point software blade monitors Check Point devices and provides a picture of network and security performance?
7.
Your internal networks 10.1.1.0/24, 10.2.2.0/24 and 192.168.0.0/16 are behind the Internet Security Gateway. Considering that Layer 2 and Layer 3 setup is correct, what are the steps you will need to do in SmartConsole in order to get the connection working?
8.
True or False: The destination server for Security Gateway logs depends on a Security Management Server configuration.
9.
Consider the Global Properties following settings:
The selected option Accept Domain Name over UDP (Queries) means:
10.
How is communication between different Check Point components secured in R80? As with all questions, select the best answer.