To add a file to the Threat Prevention Whitelist, you need two items:
B. Object Name and MD5 signature
You need the Object Name to identify the file or object you want to whitelist, and the MD5 signature to specify the unique hash value of that file. The MD5 signature ensures that the specific file you want to whitelist is identified accurately.
References: Check Point Certified Security Expert R81 Study Guide, Threat Prevention Administration Guide.
Question 93
Which one of the following is true about Threat Extraction?
Options:
A.
Always delivers a file to user
B.
Works on all MS Office, Executables, and PDF files
Threat Extraction is a software blade that always delivers a file to user. Threat Extraction removes or sanitizes the active content from the files and converts them to PDF format, which is safer and more compatible. Threat Extraction can also work together with Threat Emulation to provide both clean and original files to the users. Threat Extraction works on MS Office, PDF, and archive files, but not on executables. Threat Extraction can take up to 3 minutes to complete, depending on the file size and complexity. References: Check Point Security Expert R81 Course, Threat Extraction Administration Guide
Miriam
Highly recommended Dumps. 100% authentic and reliable. Passed my exam with wonderful score.
Milan(not set)
I see. Thanks for the information. I'll definitely keep Cramkey in mind for my next exam.
Ilyas
Definitely. I felt much more confident and prepared because of the Cramkey Dumps. I was able to answer most of the questions with ease and I think that helped me to score well on the exam.
Saoirse(not set)
That's amazing. I'm glad you found something that worked for you. Maybe I should try them out for my next exam.
Cody
I used Cramkey Dumps to prepare and a lot of the questions on the exam were exactly what I found in their study materials.
Eric(not set)
Really? That's great to hear! I used Cramkey Dumps too and I had the same experience. The questions were almost identical.
Anaya
I found so many of the same questions on the real exam that I had already seen in the Cramkey Dumps. Thank you so much for making exam so easy for me. I passed it successfully!!!
Nina(not set)
It's true! I felt so much more confident going into the exam because I had already seen and understood the questions.
Question 94
Which of the following describes how Threat Extraction functions?
Options:
A.
Detect threats and provides a detailed report of discovered threats.
B.
Proactively detects threats.
C.
Delivers file with original content.
D.
Delivers PDF versions of original files with active content removed.
Threat Extraction is a software blade that delivers PDF versions of original files with active content removed. Active content, such as macros, scripts, or embedded objects, can be used by attackers to deliver malware or exploit vulnerabilities. Threat Extraction removes or sanitizes the active content from the files and converts them to PDF format, which is safer and more compatible. Threat Extraction can also work together with Threat Emulation to provide both clean and original files to the users. References: Check Point Security Expert R81 Course, Threat Extraction Administration Guide
Question 95
What is Dynamic Balancing?
Options:
A.
It is a ClusterXL feature that switches an HA cluster into an LS cluster if required to maximize throughput
B.
It is a feature that uses a daemon to balance the required number of firewall instances and SNDs based on the current load
C.
It is a new feature that is capable of dynamically reserve the amount of Hash kernel memory to reflect the resource usage necessary for maximizing the session rate.
D.
It is a CoreXL feature that assigns the SND to network interfaces to balance the RX Cache of the interfaces
Dynamic Balancing is a feature that uses a daemon to balance the required number of firewall instances and SNDs based on the current load. It dynamically changes the split between CoreXL SNDs and CoreXL Firewalls and does not require a reboot or cause an outage. It monitors the system and makes changes as needed to optimize the performance of the Security Gateway. It is supported on Check Point Appliances with R80.40 and higher versions. References: Dynamic Balancing for CoreXL - Check Point Software, Dynamic Balancing available on R80.40 - Check Point CheckMates, CLI R81.20 Reference Guide - Check Point Software, Performance Tuning R81.20 Administration Guide - Check Point Software