<< Prev Question Next Question >>

Question 56/112

With MTA (Mail Transfer Agent) enabled the gateways manages SMTP traffic and holds external email with potentially malicious attachments. What is required in order to enable MTA (Mail Transfer Agent) functionality in the Security Gateway?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (112q)
1 commentQuestion 1: Which Check Point daemon monitors the other daemons?...
Question 2: Which directory below contains log files?...
Question 3: SandBlast offers flexibility in implementation based on thei...
Question 4: How often does Threat Emulation download packages by default...
Question 5: What is the correct command to observe the Sync traffic in a...
Question 6: For best practices, what is the recommended time for automat...
Question 7: Which statement is most correct regarding about "CoreXL Dyna...
Question 8: What are the different command sources that allow you to com...
Question 9: Which command gives us a perspective of the number of kernel...
Question 10: Which of the following describes how Threat Extraction funct...
Question 11: The fwd process on the Security Gateway sends logs to the fw...
Question 12: What are the steps to configure the HTTPS Inspection Policy?...
Question 13: How would you deploy TE250X Check Point appliance just for e...
Question 14: What is the difference between SSL VPN and IPSec VPN?...
Question 15: Which remote Access Solution is clientless?...
Question 16: What is the command to check the status of the SmartEvent Co...
Question 17: NAT rules are prioritized in which order? 1. Automatic Stati...
Question 18: Fill in the blank: The tool ________ generates a R80 Securit...
Question 19: What is the command to see cluster status in cli expert mode...
Question 20: Which of the following process pulls application monitoring ...
Question 21: What API command below creates a new host with the name "New...
Question 22: To ensure that VMAC mode is enabled, which CLI command shoul...
Question 23: In R80 spoofing is defined as a method of:...
Question 24: In Logging and Monitoring, the tracking options are Log, Det...
Question 25: SecureXL improves non-encrypted firewall traffic throughput ...
Question 26: What is a feature that enables VPN connections to successful...
Question 27: How do Capsule Connect and Capsule Workspace differ?...
Question 28: Which statement is true regarding redundancy?...
Question 29: On what port does the CPM process run?...
Question 30: Connections to the Check Point R80 Web API use what protocol...
Question 31: What scenario indicates that SecureXL is enabled?...
Question 32: To accelerate the rate of connection establishment, SecureXL...
Question 33: What kind of information would you expect to see using the s...
Question 34: Which one of the following is true about Capsule Connect?...
Question 35: How many images are included with Check Point TE appliance i...
Question 36: In SmartEvent, what are different types of automatic reactio...
Question 37: The Security Gateway is installed on GAIA R80. The default p...
Question 38: Which two of these Check Point Protocols are used by SmartEv...
Question 39: What are the blades of Threat Prevention?...
Question 40: To add a file to the Threat Prevention Whitelist, what two i...
Question 41: When gathering information about a gateway using CPINFO, wha...
Question 42: Sticky Decision Function (SDF) is required to prevent which ...
Question 43: SSL Network Extender (SNX) is a thin SSL VPN on-demand clien...
Question 44: Which file gives you a list of all security servers in use, ...
Question 45: What is the purpose of Priority Delta in VRRP?...
Question 46: Which is not a blade option when configuring SmartEvent?...
Question 47: The Firewall Administrator is required to create 100 new hos...
Question 48: When doing a Stand-Alone Installation, you would install the...
1 commentQuestion 49: What are the main stages of a policy installations?...
Question 50: John detected high load on sync interface. Which is most rec...
Question 51: Check Point Management (cpm) is the main management process ...
Question 52: Which view is NOT a valid CPVIEW view?...
Question 53: How do you enable virtual mac (VMAC) on-the-fly on a cluster...
Question 54: You notice that your firewall is under a DDoS attack and wou...
Question 55: The Correlation Unit performs all but the following actions:...
Question 56: With MTA (Mail Transfer Agent) enabled the gateways manages ...
Question 57: In the Firewall chain mode FFF refers to:...
Question 58: Which web services protocol is used to communicate to the Ch...
Question 59: Which command can you use to verify the number of active con...
Question 60: What is the main difference between Threat Extraction and Th...
Question 61: Fill in the blank: The command ___________ provides the most...
Question 62: If you needed the Multicast MAC address of a cluster, what c...
Question 63: Using mgmt_cli, what is the correct syntax to import a host ...
Question 64: Which is NOT an example of a Check Point API?...
Question 65: Both ClusterXL and VRRP are fully supported by Gaia R80.10 a...
Question 66: What is correct statement about Security Gateway and Securit...
Question 67: Customer's R80 management server needs to be upgraded to R80...
Question 68: What cloud-based SandBlast Mobile application is used to reg...
Question 69: Which TCP-port does CPM process listen to?...
Question 70: When SecureXL is enabled, all packets should be accelerated,...
Question 71: Fill in the blank. The R80 feature ___________________ permi...
Question 72: The SmartEvent R80 Web application for real-time event monit...
Question 73: When Dynamic Dispatcher is enabled, connections are assigned...
Question 74: SmartEvent has several components that function together to ...
Question 75: Automatic affinity means that if SecureXL is running, the af...
Question 76: What is the limitation of employing Sticky Decision Function...
Question 77: Fill in the blank: The "fw monitor" tool can be best used to...
Question 78: Which of the following statements is TRUE about R80 manageme...
Question 79: Which of the following will NOT affect acceleration?...
Question 80: During inspection of your Threat Prevention logs you find fo...
Question 81: You are investigating issues with to gateway cluster members...
Question 82: Please choose the path to monitor the compliance status of t...
Question 83: Which command would you use to set the network interfaces' a...
Question 84: What is the mechanism behind Threat Extraction?...
Question 85: Can multiple administrators connect to a Security Management...
Question 86: Using ClusterXL, what statement is true about the Sticky Dec...
Question 87: Which of the following is NOT a type of Check Point API avai...
Question 88: Which command would disable a Cluster Member permanently?...
Question 89: The Firewall kernel is replicated multiple times, therefore:...
Question 90: With Mobile Access enabled, administrators select the web-ba...
Question 91: When simulating a problem on ClusterXL cluster with cphaprob...
Question 92: Which one of these features is NOT associated with the Check...
Question 93: SandBlast appliances can be deployed in the following modes:...
Question 94: You have existing dbedit scripts from R77. Can you use them ...
Question 95: Which statements below are CORRECT regarding Threat Preventi...
Question 96: Automation and Orchestration differ in that:...
Question 97: Tom has been tasked to install Check Point R80 in a distribu...
Question 98: Where do you create and modify the Mobile Access policy in R...
Question 99: Which method below is NOT one of the ways to communicate usi...
Question 100: The CPD daemon is a Firewall Kernel Process that does NOT do...
Question 101: CPM process stores objects, policies, users, administrators,...
Question 102: What command can you use to have cpinfo display all installe...
Question 103: Which encryption algorithm is the least secured?...
Question 104: What is the least amount of CPU cores required to enable Cor...
Question 105: What is true of the API server on R80.10?...
Question 106: Security Checkup Summary can be easily conducted within:...
Question 107: Full synchronization between cluster members is handled by F...
Question 108: What information is NOT collected from a Security Gateway in...
Question 109: What is the responsibility of SOLR process on R80.10 managem...
Question 110: John is using Management HA. Which Smartcenter should be con...
Question 111: SmartConsole R80 requires the following ports to be open for...
Question 112: What is considered Hybrid Emulation Mode?...