In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?
Correct Answer:
C
What are the three components for Check Point Capsule?
Correct Answer:
D
On what port does the CPM process run?
Correct Answer:
D
Which command gives us a perspective of the number of kernel tables?
Correct Answer:
B
During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?
Correct Answer:
D