Question 131

Fill in the blank: The command ___________________ provides the most complete restoration of a R80 configuration.
  • Question 132

    During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?
  • Question 133

    Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
  • Question 134

    Which web services protocol is used to communicate to the Check Point R80 Identity Awareness Web API?
  • Question 135

    What command verifies that the API server is responding?