: 131
Which command is used to display status information for various components?
When gathering information about a gateway using CPINFO, what information is included or excluded when using the “-x” parameter?
An administrator would like to troubleshoot why templating is not working for some traffic. How can he determine at which rule templating is disabled?
You are investigating issues with to gateway cluster members are not able to establish the first initial cluster synchronization. What service is used by the FWD daemon to do a Full Synchronization?
How would you deploy TE250X Check Point appliance just for email traffic and in-line mode without a Check Point Security Gateway?
Both ClusterXL and VRRP are fully supported by Gaia R81.20 and available to all Check Point appliances. Which the following command is NOT related to redundancy and functions?
Which process is available on any management product and on products that require direct GUI access, such as SmartEvent and provides GUI client communications, database manipulation, policy compilation and Management HA synchronization?
You find one of your cluster gateways showing “Down” when you run the “cphaprob stat” command. You then run the “clusterXL_admin up” on the down member but unfortunately the member continues to show down. What command do you run to determine the cause?
Traffic from source 192.168.1.1 is going to www.google.com. The Application Control Blade on the gateway is inspecting the traffic. Assuming acceleration is enabled which path is handling the traffic?
Can multiple administrators connect to a Security Management Server at the same time?
Which command shows the current connections distributed by CoreXL FW instances?
What are the different command sources that allow you to communicate with the API server?
Customer’s R81 management server needs to be upgraded to R81.20. What is the best upgrade method when the management server is not connected to the Internet?
To help SmartEvent determine whether events originated internally or externally you must define using the Initial Settings under General Settings in the Policy Tab. How many options are available to calculate the traffic direction?
Check Pont Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster Members over Check Point SIC _______ .
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?
For Management High Availability, which of the following is NOT a valid synchronization status?
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
How many images are included with Check Point TE appliance in Recommended Mode?
In a Client to Server scenario, which inspection point is the first point immediately following the tables and rule base check of a packet coming from outside of the network?
The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?
Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.
What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?
Where you can see and search records of action done by R81 SmartConsole administrators?
You want to store the GAIA configuration in a file for later reference. What command should you use?
During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?
If you needed the Multicast MAC address of a cluster, what command would you run?
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidated management console. It empowers the migration from legacy Client-side logic to Server-side logic. The cpm process:
Which method below is NOT one of the ways to communicate using the Management API’s?
You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?
Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.
What is the port used for SmartConsole to connect to the Security Management Server?
You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?
In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?
Fill in the blank: Identity Awareness AD-Query is using the Microsoft _______________ API to learn users from AD.
Which file contains the host address to be published, the MAC address that needs to be associated with the IP Address, and the unique IP of the interface that responds to ARP request?
One of major features in R81 SmartConsole is concurrent administration.
Which of the following is NOT possible considering that AdminA, AdminB and AdminC are editing the same Security Policy?
With MTA (Mail Transfer Agent) enabled the gateways manages SMTP traffic and holds external email with potentially malicious attachments. What is required in order to enable MTA (Mail Transfer Agent) functionality in the Security Gateway?
Fill in the blank. Once a certificate is revoked from the Security Gateway by the Security Management Server, the certificate information is ________ .
What is the most ideal Synchronization Status for Security Management Server High Availability deployment?
You are asked to check the status of several user-mode processes on the management server and gateway. Which of the following processes can only be seen on a Management Server?
To ensure that VMAC mode is enabled, which CLI command should you run on all cluster members?
Fill in the blank: The R81 SmartConsole, SmartEvent GUI client, and _______ consolidate billions of logs and shows then as prioritized security events.
Pamela is Cyber Security Engineer working for Global Instance Firm with large scale deployment of Check Point Enterprise Appliances using GAiA/R81.20. Company’s Developer Team is having random access issue to newly deployed Application Server in DMZ’s Application Server Farm Tier and blames DMZ Security Gateway as root cause. The ticket has been created and issue is at Pamela’s desk for an investigation. Pamela decides to use Check Point’s Packet Analyzer Tool-fw monitor to iron out the issue during approved Maintenance window.
What do you recommend as the best suggestion for Pamela to make sure she successfully captures entire traffic in context of Firewall and problematic traffic?
Which web services protocol is used to communicate to the Check Point R81 Identity Awareness Web API?
In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies the type of traffic applicable to the chain module. For Stateful Mode configuration, chain modules marked with __________________ will not apply.
Please choose correct command to add an “emailserver1” host with IP address 10.50.23.90 using GAiA management CLI?
SmartEvent provides a convenient way to run common command line executables that can assist in investigating events. Right-clicking the IP address, source or destination, in an event provides a list of default and customized commands. They appear only on cells that refer to IP addresses because the IP address of the active cell is used as the destination of the command when run. The default commands are:
You need to change the number of firewall Instances used by CoreXL. How can you achieve this goal?
What is the name of the secure application for Mail/Calendar for mobile devices?
Check Point APIs allow system engineers and developers to make changes to their organization’s security policy with CLI tools and Web Services for all the following except:
The system administrator of a company is trying to find out why acceleration is not working for the traffic. The traffic is allowed according to the rule base and checked for viruses. But it is not accelerated.
What is the most likely reason that the traffic is not accelerated?
When simulating a problem on ClusterXL cluster with cphaprob –d STOP -s problem -t 0 register, to initiate a failover on an active cluster member, what command allows you remove the problematic state?
Which Check Point software blade provides Application Security and identity control?
With Mobile Access enabled, administrators select the web-based and native applications that can be accessed by remote users and define the actions that users can perform the applications. Mobile Access encrypts all traffic using:
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?
Which of the following technologies extracts detailed information from packets and stores that information in state tables?
What kind of information would you expect to see using the sim affinity command?
During the Check Point Stateful Inspection Process, for packets that do not pass Firewall Kernel Inspection and are rejected by the rule definition, packets are:
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ________ .
What will be the effect of running the following command on the Security Management Server?
In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?
If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsive, which if these steps should NOT be performed:
Within the Check Point Firewall Kernel resides Chain Modules, which are individually responsible for the
inspection of a specific blade or feature that has been enabled in the configuration of the gateway. For Wire
mode configuration, chain modules marked with _______ will not apply.
When running a query on your logs, to find records for user Toni with machine IP of 10.0.4.210 but exclude her tablet IP of 10.0.4.76, which of the following query syntax would you use?
View the rule below. What does the lock-symbol in the left column mean? (Choose the BEST answer.)
The admin lost access to the Gaia Web Management Interface but he was able to connect via ssh. How can you check if the web service is enabled, running and which port is used?
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server, where it is forwarded to___________via____________
Which VPN routing option uses VPN routing for every connection a satellite gateway handles?
After replacing a faulty Gateway the admin installed the new Hardware and want to push the policy. Installing the policy using the SmartConsole he got an Error for the Threat Prevention Policy. There is no error for the Access Control Policy. What will be the most common cause for the issue?
You want to allow your Mobile Access Users to connect to an internal file share. Adding the Mobile Application 'File Share' to your Access Control Policy in the SmartConsole didn't work. You will be only allowed to select Services for the 'Service & Application' column How to fix it?
What are the correct sleps upgrading a HA cluster (Ml is active. M2 is passive) using Multi-Version Cluster(MVC) Upgrade?
You had setup the VPN Community VPN-Stores'with 3 gateways. There are some issues with one remote gateway(1.1.1.1) and an your local gateway. What will be the best log filter to see only the IKE Phase 2 agreed networks for both gateways
You plan to automate creating new objects using new R81 Management API. You decide to use GAIA CLI for this task.
What is the first step to run management API commands on GAIA’s shell?
Which of the following statements about Site-to-Site VPN Domain-based is NOT true?
Sieve is a Cyber Security Engineer working for Global Bank with a large scale deployment of Check Point Enterprise Appliances Steve's manager. Diana asks him to provide firewall connection table details from one of the firewalls for which he is responsible. Which of these commands may impact performance briefly and should not be used during heavy traffic times of day?
Which is the command to identify the NIC driver before considering about the employment of the Multi-Queue feature?
Packet acceleration (SecureXL) identities connections by several attributes. Which of the attributes is NOT used for identifying connection?
A user complains that some Internet resources are not available. The Administrator is having issues seeing it packets are being dropped at the firewall (not seeing drops in logs). What is the solution to troubleshoot the issue?
Which is the command to identify the NIC driver before considering about the employment of the Multi-Queue feature?
Can Check Point and Third-party Gateways establish a certificate-based Site-to-Site VPN tunnel?
Fill in the blank: A new license should be generated and installed in all of the following situations EXCEPT when ________ .
Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?
What are valid authentication methods for mutual authenticating the VPN gateways?
What command is used to manually failover a cluster during a zero-downtime upgrade?
Gaia has two default user accounts that cannot be deleted. What are those user accounts?
In which deployment is the security management server and Security Gateway installed on the same appliance?
Which configuration file contains the structure of the Security Server showing the port numbers, corresponding protocol name, and status?
What is the protocol and port used for Health Check and State Synchronization in ClusterXL?
CCSE R81 |