You are the Check Point administrator for Alpha Corp. You received a call that one of the users is unable to browse the Internet on their new tablet which is connected to the company wireless, which goes through a Check Point Gateway. How would you review the logs to see what is blocking this traffic?
Which single Security Blade can be turned on to block both malicious files from being downloaded as well as block websites known to host malware?
Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?
How do logs change when the "Accounting" tracking option is enabled on a traffic rule?
Fill in the blanks: A Check Point software license consists of a__________ and _______.