1.
Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?
2.
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or ______ action for the file types.
3.
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
4.
On R80.10 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:
5.
How many images are included with Check Point TE appliance in Recommended Mode?
6.
What is the least amount of CPU cores required to enable CoreXL?
7.
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?
8.
Which of the following authentication methods ARE NOT used for Mobile Access?
9.
What has to be taken into consideration when configuring Management HA?
10.
What is the difference between an event and a log?