Question 131
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.
Question 132
The back end database for Check Point R80 Management uses:
Question 133
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?
Question 134
Which command will allow you to see the interface status?
Question 135
Which of the following is NOT a VPN routing option available in a star community?