A customer does not own Check Point Gateways, but he wants to use Threat Emulation Service to detect SMTP Zero-Day vulnerabilities. What is his option? A. Use MTA plug-in on his exchange server. B. Needs to buy a Check Point…

SmartLog displays: A. Information about known threats and provides steps for remediation B. Events in chart format, with detailed data about threats C. Real time data, to help identify ongoing threats D. Historic data that can be used for research…

SmartLog can be used to identify which of the following: A. Security Policy version control information B. A list of currently connected users C. The country of origin of specific traffic displayed on a map D. The top destination IP…