156-315-75CheckPointCheck Point Certified Security Expert(R) (CCSE) R75 Certification
C. Starts a packet capture at the time of policy install to capture all of the traffic until this protection is hit. D. Collects all of the logs for packets that have matched this protection within the last 30 days Answer: B QUESTION: 611 When deploying a dedicated DLP Gateway behind a perimeter firewall on an interface leading to the internal network (there is only one internal network): A. The DLP Gateway can inspect SMTP traffic if a MS Exchange server is located on the internal network, and it either sends e-mails directly to the Internet using SMTP or sends e-mails to the Internet in SMTP via a mail relay that is located on the perimeter's firewall DMZ network. B. The DLP Gateway can inspect internal e-mails (e-mails between two users on the internal network) if the organization's internal mail server is located in the internal network and users are configured to send e-mails to this mail server using SMTP. C. User's HTTPS and FTP traffic can be inspected by the R71 DLP Gateway. D. The DLP Gateway can inspect e-mails (e-mails between two users on an internal or external network) if the organization's internal mail server is located on another network (not the internal network; for instance the DMZ or a different internal network) and users are configured to send e- mails to this mail server using SMTP. Answer: A QUESTION: 612 For proper system operation, the Administrator has to configure the DLP Portal and define its DNS name for which of the following conditions? A. If the DLP Policy is applied to HTTP traffic. B. If there are one or more Inform Rules. C. If there are one or more Ask User rules. D. If the action of all rules is Detect and no Data Owners are configured.