Check Point Access Control Daemons contains several daemons for Software Blades and features. Which Daemon is used for Application & Control URL Filtering?
Correct : B
Start a Discussions
Packet processing infrastructure consists of the following components EXCEPT:
Correct : C
Start a Discussions
What does CMI stand for in relation to the Access Control Policy?
Correct : B
CMI stands for Context Management Infrastructure, which is a component of the Access Control Policy that enables the Security Gateway to inspect traffic based on the context of the connection. Context includes information such as user identity, application, location, time, and device. CMI allows the Security Gateway to apply different security rules and actions based on the context of the traffic, and to dynamically update the context as it changes. CMI consists of three main elements: Unified Policy, Identity Awareness, and Content Awareness.
Start a Discussions
What is the kernel process for Content Awareness that collects the data from the contexts received from the CMI and decides if the file is matched by a data type?
Correct : A
Start a Discussions
What is correct about the Resource Advisor (RAD) service on the Security Gateways?
Correct : D
The Resource Advisor (RAD) service on the Security Gateways is responsible for online categorization of URLs and resources for Application Control and Threat Prevention blades. RAD has two components: a kernel module and a user space module. The kernel module looks up the kernel cache for URLs and resources, notifies the client about hits and misses, and forwards asynchronous requests to the user space module. The user space module handles the communication with the Check Point online web service and updates the kernel cache with the results. RAD can operate in three modes: hold, background, and custom, depending on the configuration of the blades and the policy.Reference:
Solved: Re: RAD's high utilization- Post by @PhoneBoy
Check Point Certified Troubleshooting Expert (CCTE)- Exam Topics - Module 5: Advanced Access Control
Start a Discussions