Which one of the following is TRUE?
Correct Answer:
C
Which message indicates IKE Phase 2 has completed successfully?
Correct Answer:
A
Which product correlates logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?
Correct Answer:
B
SmartEvent correlates logs from all Check Point enforcement points, including end-points, to identify suspicious activity from the clutter. Rapid data analysis and custom event logs immediately alert administrators to anomalous behavior such as someone attempting to use the same credential in multiple geographies simultaneously. Ref: https://www.checkpoint.com/products/smartevent/
Name the utility that is used to block activities that appear to be suspicious.
Correct Answer:
C
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_CLI_ReferenceGuide/Topics-CLIG
Which policy type is used to enforce bandwidth and traffic control rules?
Correct Answer:
D
https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_QoS_AdminGuide/html_fram