Question 121

Which application is used for the central management and deployment of licenses and packages?
  • Question 122

    What are the Threat Prevention software components available on the Check Point Security Gateway?
  • Question 123

    When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?
  • Question 124

    What is the potential downside or drawback to choosing the Standalone deployment option instead of the Distributed deployment option?
  • Question 125

    How do logs change when the "Accounting" tracking option is enabled on a traffic rule?