QUESTION
NO: 1
Which
of these statements describes the Check Point IPS software blade?
A.
Blocks or limits usage of web applications
B.
A worldwide collaborative security network
C.
Prevents vulnerability exploits
D.
Controls access to web sites based on category
Answer:
C
QUESTION
NO: 2
Which
of these statements describes the Check Point ThreatCloud?
A.
A worldwide collaborative security network
B.
Prevents vulnerability exploits
C.
Controls access to web sites based on category
D.
Blocks or limits usage of web applications
Answer:
A
QUESTION
NO: 3
Which
TCP ports allow LDAP users to communicate with the Account Unit?
A.
689 clear, or 336 encrypted
B.
636 clear, or 389 encrypted
C.
336 clear, or 689 encrypted
D.
389 clear, or 636 encrypted
Answer:
D
QUESTION
NO: 4
Check
Point Intrusion Prevention System (IPS) is available in two deployment methods,
as a blade and also a dedicated appliance. What is the dedicated appliance
called?
A.
InterSpect Appliance
B.
IPS-1 Sensor
C.
Smart-1 Appliance
D.
Power-1 Appliance
Answer:
B
QUESTION
NO: 5
What
is the minimum amount of RAM needed for a Threat Prevention Appliance?
A.
4 GB
B.
It depends on the number of software blades enabled.
C.
2 GB with GAiA in 32-bit mode, 4 GB with GAiA in 64-bit mode
D.
6 GB
Answer:
A
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home