Question 131
Fill in the blank: The command ___________________ provides the most complete restoration of a R80 configuration.
Question 132
During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?
Question 133
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
Question 134
Which web services protocol is used to communicate to the Check Point R80 Identity Awareness Web API?
Question 135
What command verifies that the API server is responding?