1.
As Security Administrator, you want to check the log for Application Control Database updates. Which of the predefined queries in SmartView Tracker would you use?
2.
A __________ is malicious software that invades your computer, taking control of it and connecting with criminal operations?
3.
Which of the following phrases describes a Botnet?
4.
Your company needs to allow contractor access on the network, but for security reasons they need to be authenticated, before they can access the Internet. How would you configure Identity Awareness on the firewall to meet this requirement? Enable Identity Awareness, turn on:
5.
When the gateway gets heavily loaded because of IPS inspection tasks, what are the choices an administrator may select?
6.
As an Administrator, you must enforce IP spoofing protection on your endpoints. What Identity Awareness solution allows packet tagging?
7.
Which of the following actions applies to a Risk Level of 4 High?
8.
During the Application Control Discovery process, what is the best source of information for decisions on blocking or not blocking an application?
9.
When the Application Control Blade discovers an application, it will provide information on that application's simple properties. Which is an example of a simple property?
10.
An Administrator would like to protect a network from Microsoft application vulnerability exploits. What Check Point blades would be needed to address this requirement?