Fill in the blank: Service blades must be attached to a ________.
Correct Answer:
A
SmartEvent does NOT use which of the following procedures to identity events:
Correct Answer:
C
Which product correlates logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?
Correct Answer:
B
SmartEvent correlates logs from all Check Point enforcement points, including end-points, to identify suspicious activity from the clutter. Rapid data analysis and custom event logs immediately alert administrators to anomalous behavior such as someone attempting to use the same credential in multiple geographies simultaneously. Ref: https://www.checkpoint.com/products/smartevent/
When installing a dedicated R80 SmartEvent server, what is the recommended size of the root partition?
Correct Answer:
D
Most Check Point deployments use Gaia but which product deployment utilizes special Check Point code (with unification in R81.10)?
Correct Answer:
A