Question 66
Which Check Point software blade provides protection from zero-day and undiscovered threats?
Question 67
Which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?
Question 68
What are the steps to configure the HTTPS Inspection Policy?
Question 69
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don't have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?
Question 70
What is the main objective when using Application Control?
