Question 131

You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.
  • Question 132

    The back end database for Check Point R80 Management uses:
  • Question 133

    Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?
  • Question 134

    Which command will allow you to see the interface status?
  • Question 135

    Which of the following is NOT a VPN routing option available in a star community?