1.
In a Client to Server scenario, which represents that the packet has already checked against the tables and the Rule Base?
2.
What is the mechanism behind Threat Extraction?
3.
You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?
4.
Which view is NOT a valid CPVIEW view?
5.
Which of the following is a new R80.10 Gateway feature that had not been available in R77.X and older?
6.
fwssd is a child process of which of the following Check Point daemons?
7.
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
8.
CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is:
9.
If you needed the Multicast MAC address of a cluster, what command would you run?
10.
Which is NOT an example of a Check Point API?