Check Point APIs allow system engineers and developers to make changes to their organization’s security policy with CLI tools and Web Services. Which of the following is NOT a possible use case?
Check Point APIs allow system engineers and developers to make changes to their organization’s security policy with CLI tools and Web Services. Which of the following is NOT a possible use case?
Check Point APIs are primarily designed to interact with and enhance Check Point solutions or to integrate with third-party solutions for security management and automation. Creating new dashboards to manage third-party tasks is outside the typical use cases for Check Point APIs as they are not intended for directly managing third-party tasks, but rather for enhancing security policy management within the realm of Check Point and integrating third-party solutions into Check Point's ecosystem.
from CCSE R80 guide: Check Point APIs allow system engineers and developers to make changes to their organization’s Security Policy with CLI tools and Web Services. An API can be used to: • Execute an automated script to perform common tasks. • Integrate Check Point products with 3rd party solutions. • Create products that use and enhance the Check Point solution so correct answer is A
Based on the output , the correct answer should be B
Answer is B