00:00

QUESTION 61

Which one of the following is TRUE?

Correct Answer: C

QUESTION 62

Which message indicates IKE Phase 2 has completed successfully?

Correct Answer: A

QUESTION 63

Which product correlates logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?

Correct Answer: B
SmartEvent correlates logs from all Check Point enforcement points, including end-points, to identify suspicious activity from the clutter. Rapid data analysis and custom event logs immediately alert administrators to anomalous behavior such as someone attempting to use the same credential in multiple geographies simultaneously. Ref: https://www.checkpoint.com/products/smartevent/

QUESTION 64

Name the utility that is used to block activities that appear to be suspicious.

Correct Answer: C
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_CLI_ReferenceGuide/Topics-CLIG

QUESTION 65

Which policy type is used to enforce bandwidth and traffic control rules?

Correct Answer: D
https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_QoS_AdminGuide/html_fram