Question 131
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?
Question 132
Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?
Question 133
Which of the below is the MOST correct process to reset SIC from SmartDashboard?
Question 134
Which type of Endpoint Identity Agent includes packet tagging and computer authentication?
Question 135
Which of the following is NOT a back up method?