3 Months Free Update
3 Months Free Update
3 Months Free Update
Consider the Global Properties following settings:
The selected option “Accept Domain Name over UDP (Queries)” means:
Both major kinds of NAT support Hide and Static NAT. However, one offers more flexibility. Which statement is true?
Fill in the blank: The_____is used to obtain identification and security information about network users.
After a new Log Server is added to the environment and the SIC trust has been established with the SMS what will the gateways do?
A layer can support different combinations of blades What are the supported blades:
Traffic from source 192.168.1.1 is going to www.google.com. The Application Control Blade on the gateway is inspecting the traffic. Assuming acceleration is enable which path is handling the traffic?
Fill in the blanks: The _______ collects logs and sends them to the _______.
True or False: The destination server for Security Gateway logs depends on a Security Management Server configuration.
Which of the following is considered a "Subscription Blade", requiring renewal every 1-3 years?
What needs to be configured if the NAT property ‘Translate destination on client side’ is not enabled in Global properties?
Which tool allows for the automatic updating of the Gaia OS and Check Point products installed on the Gaia OS?
Which Threat Prevention Software Blade provides protection from malicious software that can infect your network computers? (Choose the best answer.)
You had setup the VPN Community NPN-Stores' with 3 gateways. There are some issues with one remote gateway(l .1.1.1) and an your local gateway. What will be the best log filter to see only the IKE Phase 2 agreed networks for both gateways.
A stateful inspection firewall works by registering connection data and compiling this information. Where is the information stored?
In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?
Which option will match a connection regardless of its association with a VPN community?
In Unified SmartConsole Gateways and Servers tab you can perform the following functions EXCEPT ________.
True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway
An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office. Both offices are protected by Check Point Security Gateway managed by the same Security Management Server (SMS). While configuring the VPN community to specify the pre-shared secret, the administrator did not find a box to input the pre-shared secret. Why does it not allow him to specify the pre-shared secret?
SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day Protection?
True or False: In R80, more than one administrator can login to the Security Management Server with write permission at the same time.
Fill in the blank: In order to install a license, it must first be added to the ____________.
Which of the following is NOT an option to calculate the traffic direction?
Vanessa is attempting to log into the Gaia Web Portal. She is able to login successfully. Then she tries the same username and password for SmartConsole but gets the message in the screenshot image below. She has checked that the IP address of the Server is correct and the username and password she used to login into Gaia is also correct.
What is the most likely reason?
Using ClusterXL, what statement is true about the Sticky Decision Function?
You are the Check Point administrator for Alpha Corp. You received a call that one of the users is unable to browse the Internet on their new tablet which is connected to the company wireless, which goes through a Check Point Gateway. How would you review the logs to see what is blocking this traffic?
Rugged appliances are small appliances with ruggedized hardware and like Quantum Spark appliance they use which operating system?
The “Hit count” feature allows tracking the number of connections that each rule matches. Will the Hit count feature work independently from logging and Track the hits even if the Track option is set to “None”?
Which of the following log queries would show only dropped packets with source address of 192.168.1.1 and destination address of 172.26.1.1?
When a Security Gateway communicates about its status to an IP address other than its own, which deployment option was chosen?
When installing a dedicated R80 SmartEvent server, what is the recommended size of the root partition?
The competition between stateful inspection and proxies was based on performance, protocol support, and security. Considering stateful Inspections and Proxies, which statement is correct?
Which application is used for the central management and deployment of licenses and packages?
Identity Awareness allows the Security Administrator to configure network access based on which of the following?
Which Check Point software blade provides Application Security and identity control?
In order to see real-time and historical graph views of Security Gateway statistics in SmartView Monitor, what feature needs to be enabled on the Security Gateway?
You are the Check Point administrator for Alpha Corp with an R80 Check Point estate. You have received a call by one of the management users stating that they are unable to browse the Internet with their new tablet connected to the company Wireless. The Wireless system goes through the Check Point Gateway. How do you review the logs to see what the problem may be?
In which scenario will an administrator need to manually define Proxy ARP?
When you upload a package or license to the appropriate repository in SmartUpdate. where is the package or license stored?
What object type would you use to grant network access to an LDAP user group?
When a Security Gateways sends its logs to an IP address other than its own, which deployment option is installed?
One of major features in R80.x SmartConsole is concurrent administration. Which of the following is NOT possible considering that AdminA, AdminB, and AdminC are editing the same Security Policy?
In order to modify Security Policies, the administrator can use which of the following tools? (Choose the best answer.)
Fill in the blank RADIUS Accounting gets_____data from requests generated by the accounting client
Fill in the blank When LDAP is integrated with Check Point Security Management it is then referred to as_____
Which of the following is NOT supported by Bridge Mode Check Point Security Gateway
When comparing Stateful Inspection and Packet Filtering, what is a benefit that Stateful Inspection offers over Packer Filtering?
What are valid authentication methods for mutual authenticating the VPN gateways?
After the initial installation on Check Point appliance, you notice that the Management interface and default gateway are incorrect. Which commands could you use to set the IP to 192.168.80.200/24 and default gateway to 192.168.80.1.
Which information is included in the “Extended Log” tracking option, but is not included in the “Log” tracking option?
What are two basic rules Check Point recommending for building an effective security policy?
If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsible, which of these steps should NOT be performed:
Fill in the blank: Permanent VPN tunnels can be set on all tunnels in the community, on all tunnels for specific gateways, or__________.
Can multiple administrators connect to a Security Management Server at the same time?
Fill in the blank: ____________ is the Gaia command that turns the server off.
In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?
What type of NAT is a one-to-one relationship where each host is translated to a unique address?
In SmartConsole, objects are used to represent physical and virtual network components and also some logical components. These objects are divided into several categories. Which of the following is NOT an objects category?
An administrator wishes to use Application objects in a rule in their policy but there are no Application objects listed as options to add when clicking the"+" to add new items to the "Services & Applications" column of a rule. What should be done to fix this?
Which is a main component of the Check Point security management architecture?
Identity Awareness allows easy configuration for network access and auditing based on what three items?
Identity Awareness lets an administrator easily configure network access and auditing based on three items Choose the correct statement.
To quickly review when Threat Prevention signatures were last updated, which Threat Tool would an administrator use?
Fill in the blanks: The Application Layer Firewalls inspect traffic through the ______ layer(s) of the TCP/IP model and up to and including the ______ layer.
In which deployment is the security management server and Security Gateway installed on the same appliance?
If there are two administrators logged in at the same time to the SmartConsole, and there are objects locked for editing, what must be done to make them available to other administrators? Choose the BEST answer
While enabling the Identity Awareness blade the Identity Awareness wizard does not automatically detect the windows domain Why does it not detect the windows domain?
When a gateway requires user information for authentication, what order does it query servers for user information?
Fill in the blank: A(n)_____rule is created by an administrator and configured to allow or block traffic based on specified criteria.
Which single Security Blade can be turned on to block both malicious files from being downloaded as well as block websites known to host malware?
Which Security Blade needs to be enabled in order to sanitize and remove potentially malicious content from files, before those files enter the network?
Session unique identifiers are passed to the web api using which http header option?
How is communication between different Check Point components secured in R80? As with all questions, select the best answer.
To increase security, the administrator has modified the Core protection ‘Host Port Scan’ from ‘Medium’ to ‘High’ Predefined Sensitivity. Which Policy should the administrator install after Publishing the changes?
To ensure that VMAC mode is enabled, which CLI command you should run on all cluster members? Choose the best answer.
SmartConsole provides a consolidated solution for everything that is necessary for the security of an organization, such as the following
Fill in the blank Once a license is activated, a___________should be installed.
Which type of Endpoint Identity Agent includes packet tagging and computer authentication?
Which of the following statements about Site-to-Site VPN Domain-based is NOT true?
Route-based— The Security Gateways will have a Virtual Tunnel Interface (VTI) for each VPN Tunnel with a peer VPN Gateway. The Routing Table can have routes to forward traffic to these VTls. Any traffic routed through a VTI is automatically identified as VPN Traffic and is passed through the VPN Tunnel associated with the VTI.
Most Check Point deployments use Gaia but which product deployment utilizes special Check Point code (with unification in R81.10)?