Question 56
Which blades and or features are not supported in R80?
Question 57
Which command collects diagnostic data for analyzing customer setup remotely?
Question 58
What is the recommended number of physical network interfaces in a Mobile Access cluster deployment?
Question 59
Within the Check Point Firewall Kernel resides Chain Modules, which are individually responsible for the inspection of a specific blade or feature that has been enabled in the configuration of the gateway. For Wire mode configuration, chain modules marked with _______ will not apply.
Question 60
When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?