3 Months Free Update
3 Months Free Update
3 Months Free Update
You want to verify if there are unsaved changes in GAiA that will be lost with a reboot. What command can be used?
R80.10 management server can manage gateways with which versions installed?
The ______ software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware.
Fill in the bank: In Office mode, a Security Gateway assigns a remote client to an IP address once___________.
Fill in the blank: With the User Directory Software Blade, you can create user definitions on a(n) ___________ Server.
Fill in the blank Once a license is activated, a___________should be installed.
You want to store the GAiA configuration in a file for later reference. What command should you use?
You are asked to check the status of several user-mode processes on the management server and gateway. Which of the following processes can only be seen on a Management Server?
Identify the ports to which the Client Authentication daemon listens on by default?
One of major features in R80.x SmartConsole is concurrent administration. Which of the following is NOT possible considering that AdminA, AdminB, and AdminC are editing the same Security Policy?
The “Hit count” feature allows tracking the number of connections that each rule matches. Will the Hit count feature work independently from logging and Track the hits even if the Track option is set to “None”?
SmartConsole provides a consolidated solution for everything that is necessary for the security of an organization, such as the following
The SmartEvent R80 Web application for real-time event monitoring is called:
Which deployment adds a Security Gateway to an existing environment without changing IP routing?
Using ClusterXL, what statement is true about the Sticky Decision Function?
Fill in the blanks: The _______ collects logs and sends them to the _______.
Which is a main component of the Check Point security management architecture?
Name the utility that is used to block activities that appear to be suspicious.
What is the user ID of a user that have all the privileges of a root user?
Which of the following commands is used to monitor cluster members in CLI?
Fill in the blank: Back up and restores can be accomplished through_________.
Fill in the blank: The position of an implied rule is manipulated in the __________________ window.
From the Gaia web interface, which of the following operations CANNOT be performed on a Security Management Server?
SmartEvent does NOT use which of the following procedures to identity events:
Fill in the blank: The _____ feature allows administrators to share a policy with other policy packages.
In order to modify Security Policies, the administrator can use which of the following tools? (Choose the best answer.)
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?
Fill in the blank: Permanent VPN tunnels can be set on all tunnels in the community, on all tunnels for specific gateways, or__________.
Which of the following is considered to be the more secure and preferred VPN authentication method?
Which Threat Prevention Profile is not included by default in R80 Management?
Fill in the blanks: A Check Point software license consists of a__________ and _______.
Which backup utility captures the most information and tends to create the largest archives?
When a Security Gateways sends its logs to an IP address other than its own, which deployment option is installed?
Fill in the blank When LDAP is integrated with Check Point Security Management it is then referred to as_____
Which SmartConsole application shows correlated logs and aggregated data to provide an overview of potential threats and attack patterns?
Fill in the blank: ____________ is the Gaia command that turns the server off.
To quickly review when Threat Prevention signatures were last updated, which Threat Tool would an administrator use?
In order to see real-time and historical graph views of Security Gateway statistics in SmartView Monitor, what feature needs to be enabled on the Security Gateway?
When a SAM rule is required on Security Gateway to quickly block suspicious connections which are not restricted by the Security Policy, what actions does the administrator need to take?
Of all the Check Point components in your network, which one changes most often and should be backed up most frequently?
True or False: More than one administrator can log into the Security Management Server with SmartConsole with write permission at the same time.
When changes are made to a Rule base, it is important to _______________ to enforce changes.
Access roles allow the firewall administrator to configure network access according to:
Tom has connected to the Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored shortly afterward. What will happen to the changes already made?
Identity Awareness allows easy configuration for network access and auditing based on what three items?
When connected to the Check Point R80 Management Server using the SmartConsole the first administrator to connect has a lock on:
If an administrator wants to restrict access to a network resource only allowing certain users to access it, and only when they are on a specific network what is the best way to accomplish this?
Which of the following situations would not require a new license to be generated and installed?
How many users can have read/write access in Gaia Operating System at one time?
Which two Identity Awareness commands are used to support identity sharing?
You are the Check Point administrator for Alpha Corp. You received a call that one of the users is unable to browse the Internet on their new tablet which is connected to the company wireless, which goes through a Check Point Gateway. How would you review the logs to see what is blocking this traffic?
You had setup the VPN Community NPN-Stores' with 3 gateways. There are some issues with one remote gateway(l .1.1.1) and an your local gateway. What will be the best log filter to see only the IKE Phase 2 agreed networks for both gateways.
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ___________.
Which of the following is NOT an option to calculate the traffic direction?
Which information is included in the “Extended Log” tracking option, but is not included in the “Log” tracking option?
Fill in the blank: An Endpoint identity agent uses a ___________ for user authentication.
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?
When configuring Anti-Spoofing, which tracking options can an Administrator select?
SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day Protection?
Which of the following is NOT an identity source used for Identity Awareness?
What key is used to save the current CPView page in a filename format cpview_“cpview process ID”. cap”number of captures”?
Which of the following is considered a "Subscription Blade", requiring renewal every 1-3 years?
Your internal networks 10.1.1.0/24, 10.2.2.0/24 and 192.168.0.0/16 are behind the Internet Security Gateway. Considering that Layer 2 and Layer 3 setup is correct, what are the steps you will need to do in SmartConsole in order to get the connection working?
Which product correlates logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?
What type of NAT is a one-to-one relationship where each host is translated to a unique address?
Identity Awareness lets an administrator easily configure network access and auditing based on three items Choose the correct statement.
Rugged appliances are small appliances with ruggedized hardware and like Quantum Spark appliance they use which operating system?
Which repositories are installed on the Security Management Server by SmartUpdate?
An administrator wishes to enable Identity Awareness on the Check Point firewalls. However they allow users to use company issued or personal laptops. Since the administrator cannot manage the personal laptops, which of the following methods would BEST suit this company?
Which Check Point software blade monitors Check Point devices and provides a picture of network and security performance?
When installing a dedicated R80 SmartEvent server, what is the recommended size of the root partition?