Check Point Certified Security Principles Associate (CCSPA)
Check Point Certified PenTesting Associate
Check Point Certified PenTesting Expert-Infrastructure Hacking (CCPE-I)
Check Point Certified PenTesting Expert-Web Hacking (CCPE-W)
Check Point Certified Automation Specialist
Check Point Certified Maestro Expert
Check Point Jump Start
Check Point Certified Virtual System Exchange (VSX) Specialist
Check Point Certified Cloud Specialist (CCCS)
Check Point Certified PenTesting Expert-AppSec for Developers (CCPE-A)
Which of the following is NOT an advantage to using multiple LDAP servers?
You achieve a faster access time by placing LDAP servers containing the database at remote sites
Information on a user is hidden, yet distributed across several servers
You achieve compartmentalization by allowing a large number of users to be distributed across several servers
You gain High Availability by replicating the same information on several servers
Which statement is NOT TRUE about Delta synchronization?
Using UDP Multicast or Broadcast on port 8161
Using UDP Multicast or Broadcast on port 8116
Quicker than Full sync
Transfers changes in the Kernel tables between cluster members
You have discovered suspicious activity in your network. What is the BEST immediate action to take?
Create a policy rule to block the traffic.
Create a suspicious action rule to block that traffic.
Wait until traffic has been identified before making any changes.
Contact ISP to block the traffic.