1.
How often does Threat Emulation download packages by default?
2.
You are investigating issues with to gateway cluster members are not able to establish the first initial cluster synchronization. What service is used by the PWO daemon to do a Full Synchronization?
3.
Which command shows detailed information about VPN tunnels?
4.
Which Check Point software blades could be enforced under Threat Prevention profile using Check Point R80.10 SmartConsole application?
5.
When gathering information about a gateway using CPINFO, what information is included or excluded when using the "-x" parameter?
6.
What component of R80 Management is used for indexing?
7.
After making modifications to the $CVPNDIR/conf/cvpnd.C file, how would you restart the daemon?
8.
SandBlast has several functional components that work together to ensure that attacks are prevented in real-time. Which the following is NOT part of the SandBlast component?
9.
With Mobile Access enabled, administrators select the web-based and native applications that can be accessed by remote users and define the actions that users can perform the applications. Mobile Access encrypts all traffic using:
10.
What is the benefit of "tw monitor" over "tcpdump"?