Question 13

To add a file to the Threat Prevention Whitelist, what two items are needed?

Correct Answer:B

Question 14

You have a Geo-Protection policy blocking Australia and a number of other countries. Your network now requires a Check Point Firewall to be installed in Sydney, Australia.
What must you do to get SIC to work?

Correct Answer:C

Question 15

What is the default size of NAT table fwx_alloc?

Correct Answer:C

Question 16

The system administrator of a company is trying to find out why acceleration is not working for the traffic. The traffic is allowed according to the rule base and checked for viruses. But it is not accelerated.
What is the most likely reason that the traffic is not accelerated?

Correct Answer:D

Question 17

Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidated management console. It empowers the migration from legacy Client-side logic to Server-side logic. The cpm process:

Correct Answer:C

Question 18

True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway.

Correct Answer:D

START 156-315.80 EXAM