156-215.80 Exam Question 336

What are the three essential components of the Check Point Security Management Architecture?
  • 156-215.80 Exam Question 337

    Which Threat Prevention Profile is not included by default in R80 Management?
  • 156-215.80 Exam Question 338

    When a policy package is installed, ________ are also distributed to the target installation Security Gateways.
  • 156-215.80 Exam Question 339

    Which type of Endpoint Identity Agent includes packet tagging and computer authentication?
  • 156-215.80 Exam Question 340

    Which of the following ClusterXL modes uses a non-unicast MAC address for the cluster IP address.