The Online Activation method is available for Check Point manufactured appliances. How does the administrator use the Online Activation method?
Correct Answer:
C
"Online activation: this method of activation is available for Check Point manufactured appliances. These appliances should be configured to have internet connectivity during the completion of the First Time Configuration Wizard for software version R77 and below. Customers using R80 and higher will be able to use this feature during or after the completion of the First Time Configuration Wizard."
https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=s
Which is NOT an encryption algorithm that can be used in an IPSEC Security Association (Phase 2)?
Correct Answer:
B
Choose what BEST describes the reason why querying logs now is very fast.
Correct Answer:
B
Ref: https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_LoggingAndMonitoring_Ad
A Check Point Software license consists of two components, the Software Blade and the Software Container. There are _____ types of Software Containers: _________ .
Correct Answer:
C
There are three types of Software Containers: Security Management, Security Gateway, and Endpoint Security. Ref: https://downloads.checkpoint.com/dc/download.htm?ID=11608
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ________ .
Correct Answer:
A
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/T