Search Header Logo

CHKP 301 - 341

Authored by Joder Lapolla

Computers

1st Grade

Used 2+ times

CHKP 301 - 341
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

44 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

Which of these statements describes the Check Point ThreatCloud?

Blocks or limits usage of web applications

Prevents or controls access to web sites based on category

Prevents Cloud vulnerability exploits

A worldwide collaborative security network

2.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

What are possible Automatic Reactions in SmartEvent?

Mail, SNMP Trap, Block Source, Block Event Activity, External Script

Web Mail, Block Destination, SNMP Trap, SmartTask

Web Mail, Block Service, SNMP Trap, SmartTask, Geo Protection

Web Mail, Forward to SandBlast Appliance, SNMP Trap, External Script

3.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

Which of the following Check Point commands is true to enable Multi-Version Cluster (MVC)?

Check Point Security Management HA (Secondary): set cluster member mvc on

Check Point Security Gateway Only: set cluster member mvc on

Check Point Security Management HA (Primary): set cluster member mvc on

Check Point Security Gateway Cluster Member: set cluster member mvc on

4.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

Hit Count is a feature to track the number of connections that each rule matches, which one is not a benefit of Hit Count.

Better understand the behavior of the Access Control Policy

Improve Firewall performance - You can move a rule that has a high hit count to a higher position in the Rule Base

Automatically rearrange Access Control Policy based on Hit Count Analysis.

Analyze a Rule Base - You can delete rules that have no matching connections

5.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

Which Correction mechanisms are available with ClusterXL under R81.10?

Correction Mechanisms are only available of Maestro Hyperscale Orchestrators

Pre-Correction and SDF (Sticky Decision Function)

SDF (Sticky Decision Function) and Flush and ACK

Dispatcher (Early Correction) and Firewall (Late Correction)

6.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

What are the methods of SandBlast Threat Emulation deployment?

Cloud, Appliance and Private

Cloud, Appliance and Hybrid

Cloud, Smart-1 and Hybrid

Cloud, OpenServer and Vmware

7.

MULTIPLE CHOICE QUESTION

2 mins • 2 pts

By default, what information is NOT collected from a Security Gateway in a CPINFO?

OS and Network Statistics

System message logs

Configuration and database files

Firewall logs

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?