Customer’s R80 management server needs to be upgraded to R80.10. What is the best upgrade method when the management server is not connected to the Internet?
You had setup the VPN Community NPN-Stores' with 3 gateways. There are some issues with one remote gateway(l .1.1.1) and an your local gateway. What will be the best log filter to see only the IKE Phase 2 agreed networks for both gateways.
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?
A network administrator has informed you that they have identified a malicious host on the network, and instructed you to block it. Corporate policy dictates that firewall policy changes cannot be made at this time. What tool can you use to block this traffic?
Which method below is NOT one of the ways to communicate using the Management API’s?
When a Security Gateway sends its logs to an IP address other than its own, which deployment option is installed?
Which Check Point software blade provides Application Security and identity control?
An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office. Both offices are protected by Check Point Security Gateway managed by the same Security Management Server (SMS). While configuring the VPN community to specify the pre-shared secret, the administrator did not find a box to input the pre-shared secret. Why does it not allow him to specify the pre-shared secret?
Fill in the blanks: The Application Layer Firewalls inspect traffic through the ______ layer(s) of the TCP/IP model and up to and including the ______ layer.
Which option will match a connection regardless of its association with a VPN community?
Which one of the following is a way that the objects can be manipulated using the new API integration in R80 Management?
One of major features in R80.x SmartConsole is concurrent administration. Which of the following is NOT possible considering that AdminA, AdminB, and AdminC are editing the same Security Policy?
After a new Log Server is added to the environment and the SIC trust has been established with the SMS what will the gateways do?
In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?
In which scenario is it a valid option to transfer a license from one hardware device to another?
Which of the following is considered a "Subscription Blade", requiring renewal every 1-3 years?
When a gateway requires user information for authentication, what order does it query servers for user information?
Name the utility that is used to block activities that appear to be suspicious.
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
When logging in for the first time to a Security management Server through SmartConsole, a fingerprint is saved to the:
What are the three main components of Check Point security management architecture?
Fill in the blank: When a policy package is installed, ________ are also distributed to the target installation Security Gateways.
To view statistics on detected threats, which Threat Tool would an administrator use?
In the Check Point three-tiered architecture, which of the following is NOT a function of the Security Management Server?
When configuring LDAP with User Directory integration, changes applied to a User Directory template are:
Which of the following Windows Security Events will NOT map a username to an IP address in Identity Awareness?
Fill in the blank: By default, the SIC certificates issued by R80 Management Server are based on the ____________ algorithm.
What are two basic rules Check Point recommending for building an effective security policy?
With URL Filtering, what portion of the traffic is sent to the Check Point Online Web Service for analysis?
Session unique identifiers are passed to the web api using which http header option?
Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?
Which type of Check Point license ties the package license to the IP address of the Security Management Server?
Identity Awareness allows easy configuration for network access and auditing based on what three items?
In order to see real-time and historical graph views of Security Gateway statistics in SmartView Monitor, what feature needs to be enabled on the Security Gateway?
You want to set up a VPN tunnel to a external gateway. You had to make sure that the IKE P2 SA will only be established between two subnets and not all subnets defined in the default VPN domain of your gateway.
Which of the following is NOT an authentication scheme used for accounts created through SmartConsole?
What needs to be configured if the NAT property ‘Translate destination on client side’ is not enabled in Global properties?
Fill in the blank: Permanent VPN tunnels can be set on all tunnels in the community, on all tunnels for specific gateways, or__________.
To ensure that VMAC mode is enabled, which CLI command you should run on all cluster members? Choose the best answer.
Fill in the blank: An identity server uses a ___________ for user authentication.
What data MUST be supplied to the SmartConsole System Restore window to restore a backup?
Can multiple administrators connect to a Security Management Server at the same time?
Which Identity Source(s) should be selected in Identity Awareness for when there is a requirement for a higher level of security for sensitive servers?
Fill in the blanks: A Security Policy is created in_____, stored in the_____ and Distributed to the various
You are the Check Point administrator for Alpha Corp. You received a call that one of the users is unable to browse the Internet on their new tablet which is connected to the company wireless, which goes through a Check Point Gateway. How would you review the logs to see what is blocking this traffic?
To increase security, the administrator has modified the Core protection ‘Host Port Scan’ from ‘Medium’ to ‘High’ Predefined Sensitivity. Which Policy should the administrator install after Publishing the changes?
What licensing feature is used to verify licenses and activate new licenses added to the License and Contracts repository?
Which of the following is NOT a valid configuration screen of an Access Role Object?
A layer can support different combinations of blades What are the supported blades:
What is the BEST command to view configuration details of all interfaces in Gaia CLISH?
An administrator wishes to enable Identity Awareness on the Check Point firewalls. However they allow users to use company issued or personal laptops. Since the administrator cannot manage the personal laptops, which of the following methods would BEST suit this company?
SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day Protection?
In a Distributed deployment, the Security Gateway and the Security Management software are installed on what platforms?
You are the Check Point administrator for Alpha Corp with an R80 Check Point estate. You have received a call by one of the management users stating that they are unable to browse the Internet with their new tablet connected to the company Wireless. The Wireless system goes through the Check Point Gateway. How do you review the logs to see what the problem may be?
Identify the ports to which the Client Authentication daemon listens on by default?
An administrator can use section titles to more easily navigate between large rule bases. Which of these statements is FALSE?
Which deployment adds a Security Gateway to an existing environment without changing IP routing?
Fill in the blank RADIUS Accounting gets_____data from requests generated by the accounting client
If there are two administrators logged in at the same time to the SmartConsole, and there are objects locked for editing, what must be done to make them available to other administrators? Choose the BEST answer
Which option in tracking allows you to see the amount of data passed in the connection?
Which tool allows for the automatic updating of the Gaia OS and Check Point products installed on the Gaia OS?
To view the policy installation history for each gateway, which tool would an administrator use?
Is it possible to have more than one administrator connected to a Security Management Server at once?
Which application is used for the central management and deployment of licenses and packages?
Phase 1 of the two-phase negotiation process conducted by IKE operates in ______ mode.
The Network Operations Center administrator needs access to Check Point Security devices mostly for troubleshooting purposes. You do not want to give her access to the expert mode, but she still should be able to run tcpdump. How can you achieve this requirement?
Fill in the blank: With the User Directory Software Blade, you can create user definitions on a(n) ___________ Server.
Which one of the following is the preferred licensing model? Select the BEST answer
Which software blade enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine?
In which deployment is the security management server and Security Gateway installed on the same appliance?
SmartConsole provides a consolidated solution for everything that is necessary for the security of an organization, such as the following
CCSA R81 |