Free 156-587 Exam Braindumps (page: 11)

Page 10 of 29

Check Point Access Control Daemons contains several daemons for Software Blades and features.
Which Daemon is used for Application & Control URL Filtering?

  1. pdpd
  2. rad
  3. cprad
  4. pepd

Answer(s): B



Packet processing infrastructure consists of the following components EXCEPT:

  1. Observers
  2. Manager
  3. Client
  4. Classifiers

Answer(s): C



What does CMI stand for in relation to the Access Control Policy?

  1. Context Manipulation Interface
  2. Context Management Infrastructure
  3. Content Management Interface
  4. Content Matching Infrastructure

Answer(s): B

Explanation:

CMI stands for Context Management Infrastructure, which is a component of the Access Control Policy that enables the Security Gateway to inspect traffic based on the context of the connection. Context includes information such as user identity, application, location, time, and device. CMI allows the Security Gateway to apply different security rules and actions based on the context of the traffic, and to dynamically update the context as it changes. CMI consists of three main elements:
Unified Policy, Identity Awareness, and Content Awareness.



What is the kernel process for Content Awareness that collects the data from the contexts received from the CMI and decides if the file is matched by a data type?

  1. cntawmod
  2. cntmgr
  3. dlpda
  4. dlpu

Answer(s): A






Post your Comments and Discuss Checkpoint 156-587 exam with other Community members:

Exam Discussions & Posts