Fill in the blank: By default, the SIC certificates issued by R80 Management Server are based on the _______ algorithm.
Correct Answer:
A
Which of the following cannot be configured in an Access Role Object?
Correct Answer:
C
Access Role objects includes one or more of these objects: Networks.
Users and user groups. Computers and computer groups. Remote Access Clients.
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/T
Fill in the blanks: Gaia can be configured using _______ the ________.
Correct Answer:
A
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Gaia_AdminGuide/Topics-GAG/C
Fill in the blanks: The Application Layer Firewalls inspect traffic through ______ the layer(s) of the TCP/IP model and up to and including the ______ layer.
Correct Answer:
C
application firewalls, or application layer firewalls, use a series of configured policies to determine whether to block or allow communications to or from an app.
Fill in the blank: Once a certificate is revoked from the Security GateWay by the Security Management Server, the certificate information is _______.
Correct Answer:
D