Question 66

Which Check Point software blade provides protection from zero-day and undiscovered threats?
  • Question 67

    Which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?
  • Question 68

    What are the steps to configure the HTTPS Inspection Policy?
  • Question 69

    You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don't have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?
  • Question 70

    What is the main objective when using Application Control?