Which of the following cannot be configured in an Access Role Object?
Correct Answer:C
Access Role objects includes one or more of these objects: Networks.
Users and user groups. Computers and computer groups. Remote Access Clients.
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/T
Which of these is NOT a feature or benefit of Application Control?
Correct Answer:C
File scanning is a job for ThreatCloud and it sandboxes/scrubs files.
Which of the following is NOT a valid deployment option for R80?
Correct Answer:D
When an encrypted packet is decrypted, where does this happen?
Correct Answer:A
Your internal networks 10.1.1.0/24, 10.2.2.0/24 and 192.168.0.0/16 are behind the Internet Security Gateway. Considering that Layer 2 and Layer 3 setup is correct, what are the steps you will need to do in SmartConsole in order to get the connection working?
Correct Answer:C
URL Filtering cannot be used to:
Correct Answer:D
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide