Question 56

Which blades and or features are not supported in R80?
  • Question 57

    Which command collects diagnostic data for analyzing customer setup remotely?
  • Question 58

    What is the recommended number of physical network interfaces in a Mobile Access cluster deployment?
  • Question 59

    Within the Check Point Firewall Kernel resides Chain Modules, which are individually responsible for the inspection of a specific blade or feature that has been enabled in the configuration of the gateway. For Wire mode configuration, chain modules marked with _______ will not apply.
  • Question 60

    When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?