What protocol is specifically used for clustered environments?
Correct Answer:
D
What are the three components for Check Point Capsule?
Correct Answer:
D
Which Identity Source(s) should be selected in Identity Awareness for when there is a requirement for a higher level of security for sensitive servers?
Correct Answer:
C
Endpoint Identity Agents and Browser-Based Authentication - When a high level of security is necessary.
Captive Portal is used for distributing the Endpoint Identity Agent. IP Spoofing protection can be set to prevent packets from being IP spoofed.
Fill in the blank: In order to install a license, it must first be added to the ______.
Correct Answer:
B
What kind of NAT enables Source Port Address Translation by default?
Correct Answer:
C
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide