<< Prev Question Next Question >>

Question 3/30

Order the steps to bypass the IPS for specific protection:
a. Open the SmartDashboard
b. Find the protection you want to bypass
c. Add the exception for this specific protection
d. Go to Network Exception tab
e. Click New.
f. Go to Protections view
g. Install Security policy
h. Go to IPS tab

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (30q)
Question 1: Which of the following is a searchable database of all known...
Question 2: Joey is the MegaCorp Firewall administrator. Which options d...
Question 3: Order the steps to bypass the IPS for specific protection: a...
Question 4: If a bot is detected on your network, which of the following...
Question 5: This graphic shows traffic being blocked from certain countr...
Question 6: You just enabled the IPS blade, and have downloaded the late...
Question 7: What is the most common way a computer can become infected w...
Question 8: When the feature ______________ is ON, the Gateway does not ...
Question 9: Check Point's IPS blade provides two pre-defined profiles. W...
Question 10: When adding IPS to a gateway, which profile will be set?...
Question 11: When pushing the Threat Prevention policy, which of the foll...
Question 12: John is troubleshooting a dropped traffic issue. Looking in ...
Question 13: Damage from a bot attack can take place after the bot compro...
Question 14: IPS is primarily a __________-based engine....
Question 15: SmartEvent has several components that work together to help...
Question 16: SmartEvent &gt; Events &gt; Predefined: in which section can...
Question 17: What filters can be used in Check Point ThreatWiki (either v...
Question 18: An end-user calls the helpdesk, complaining that he cannot a...
Question 19: How can SmartEvent be launched out of SmartDashboard?...
Question 20: A customer does not own Check Point Gateways, but he wants t...
Question 21: Check Point Signature teams are constantly monitoring the th...
Question 22: What is the minimum software version required for a Threat E...
Question 23: What advantage does the Recommended_Profile provide over the...
Question 24: What is the name of the Check Point cloud-driven Knowledgeba...
Question 25: Bots and viruses appear as __________ in the reporting blade...
Question 26: _______________ enforces or monitors traffic, based on the s...
Question 27: A customer does not own Check Point Gateways, but he wants t...
Question 28: Looking at these logs, what happened at 10:55? (Exhibit)...
Question 29: IPS can assist in the discovery of unknown buffer overflow a...
Question 30: In SmartViewTracker, you see a log record of type "control" ...