Question 131

After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?
  • Question 132

    Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?
  • Question 133

    Which of the below is the MOST correct process to reset SIC from SmartDashboard?
  • Question 134

    Which type of Endpoint Identity Agent includes packet tagging and computer authentication?
  • Question 135

    Which of the following is NOT a back up method?