156-215.80 Exam Question 1
What is the BEST method to deploy Identity Awareness for roaming users?
156-215.80 Exam Question 2
Which Check Point software blade prevents malicious files from entering a network using virus signatures and anomaly-based protections from ThreatCloud?
156-215.80 Exam Question 3
Fill in the blank: Service blades must be attached to a ______________.
156-215.80 Exam Question 4
Fill in the blank: Gaia can be configured using the _______ or ______ .
156-215.80 Exam Question 5
Which Identity Source(s) should be selected in Identity Awareness for when there is a requirement for a higher level of security for sensitive servers?