What is the minimum amount of RAM needed for a Threat Prevention Appliance?
A. 4 GB
B. It depends on the number of software blades enabled.
C. 2 GB with GAiA in 32-bit mode, 4 GB with GAiA in 64-bit mode
D. 6 GB
Which software blades are characteristic to a Threat Prevention Appliance?
A. Anti-Virus, Anti-Bot, IPS, Identity Awareness
B. Anti-Virus, Anti-Bot, IPS, URL Filtering, Identity Awareness
C. Anti-Virus, Anti-Bot, IPS, Application Control, URL Filtering, Identity Awareness
D. Anti-Virus, Anti-Bot, IPS, URL Filtering, Identity Awareness, SmartEvent
What is the name of Check Point collaborative network that delivers real-time dynamic security intelligence to Check Point threat prevention blades?
A. ThreatSpect
B. ThreatWiki
C. ThreatCloud
D. ThreatEmulator
Which of the following is information shared via ThreatCloud?
A. Sensitive Corporate Data
B. Bot and virus signatures
C. Anticipated Attack Methods
D. Compromised Machine IP Addresses
Check Point Signature teams are constantly monitoring the threat space.
A. True, twenty four hours a day, everyday
B. True, except for major holidays
C. True, from Sunday through Thursday
D. False
IPS is primarily a __________-based engine.
A. Signature
B. Difference
C. Action
D. Anomaly
IPS can assist in the discovery of unknown buffer overflow attacks without any pre-defined signatures.
A. False, only the Threat Emulator blade can discover unknown attacks.
B. True, if Zero-Day vulnerability is enabled.
C. False, IPS needs predefined signatures for all functions.
D. True, if Malicious Code Protector is enabled in IPS.
John is troubleshooting a dropped traffic issue. Looking in SmartViewTracker, he cannot find anything related to it. What CLI command might help him in this situation where he suspects a possible problem with IPS?
A. All of the information is visible in SmartViewTracker without additional commands.
B. fw ctl pstat
C. fw logexport ¦ grep drop
D. fw ctl zdebug drop
_______________ enforces or monitors traffic, based on the source or destination IP address of the country.
A. IPS Recommended_Protections Profile
B. Geo-protection
C. Secure Web Gateway
D. ThreatCloud
Which of the following are valid Boolean search terms that can be used in custom SmartLog queries?
A. And, or, with
B. And, or, not
C. None, Boolean search terms cannot be used in SmartLog.
D. And, or, not, with