Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! 156-315.77 has been withdrawn.

156-315.77 Practice Exam Questions with Answers Check Point Certified Security Expert Certification

Question # 6

If using AD Query for seamless identity data reception from Microsoft Active Directory (AD), which of the following methods is NOT Check Point recommended?

A.

Identity-based enforcement for non-AD users (non-Windows and guest users)

B.

Basic identity enforcement in the internal network

C.

Leveraging identity in Internet application control

D.

Identity-based auditing and logging

Full Access
Question # 7

Which two processes are responsible on handling Identity Awareness?

A.

pdp and lad

B.

pdp and pdp-11

C.

pep and lad

D.

pdp and pep

Full Access
Question # 8

Check Point recommends that you back up systems running Check Point products. Run your back ups during maintenance windows to limit disruptions to services, improve CPU usage, and simplify time allotment. Which back up method does Check Point recommend anytime outside a maintenance window?

A.

snapshot

B.

backup

C.

backup_export

D.

migrate export

Full Access
Question # 9

Which command would you use to save the interface information before upgrading a GAiA Gateway?

A.

save configuration

B.

cp /etc/sysconfig/network.C [location]

C.

netstat –rn > [filename].txt

D.

ifconfig > [filename].txt

Full Access
Question # 10

SmartProvisioning can provision the Operating System and network settings on which of the following?

A.

IPSO 4.2 Security Gateways

B.

Edge firmware 6.x and above

C.

R65 HFA 40 Security Gateways arid above

D.

NGX Security Appliances

Full Access
Question # 11

When upgrading to NGX R65, which Check Point products do not require a license upgrade to be current?

A.

VPN-1 NGX (R64) and later

B.

VPN-1 NGX (R60) and later

C.

VPN-1 NG with Application Intelligence (R54) and later

D.

None, all versions require a license upgrade

Full Access
Question # 12

SSL termination takes place:

A.

In a LAN deployment on a Security Gateway

B.

In a DMZ and LAN deployment scenario on a Security Gateway

C.

In a DMZ and LAN deployment scenario on a Connecter Gateway

D.

In a DMZ deployment on a Connecter Gateway

Full Access
Question # 13

Fill in the blank.

Type the command and syntax you would use to verify that your Check Point cluster is functioning correctly.

Full Access
Question # 14

Which command will only show the number of entries in the connection table?

A.

fw tab -t connections -s

B.

fw tab -t connections -u

C.

fw tab -t connections

D.

fw tab

Full Access
Question # 15

Which of the following functions CANNOT be performed in Client Info on computer information collected?

A.

Copy the contents of the selected cells.

B.

Save the information in the active tab to an .exe file.

C.

Enter new credential for accessing the computer information.

D.

Run Google.com search using the contents of the selected cell.

Full Access
Question # 16

Which of the following components contains the Events Data Base?

A.

SmartEvent Data Server

B.

SmartEvent Server

C.

SmartEvent Correlation Unit

D.

SmartEvent Client

Full Access
Question # 17

For proper system operation, the Administrator has to configure the DLP Portal and define its DNS name for which of the following conditions?

A.

If the DLP Policy is applied to HTTP traffic.

B.

If there are one or more Inform Rules.

C.

If there are one or more Ask User rules.

D.

If the action of all rules is Detect and no Data Owners are configured.

Full Access
Question # 18

True or false? After creating a snapshot of a Windows 2003 SP2 Security Management Server, you can restore it on a Secure Platform R76 Security Management Server, except you must load interface information manually.

A.

True, but only when the snapshot file is restored to a Secure Platform system running R76.20.

B.

False, you cannot run the Check Point snapshot utility on a Windows gateway.

C.

True, but only when the snapshot file is restored to a Secure Platform system running R76.10.

D.

False, all configuration information conveys to the new system, including the interface configuration settings.

Full Access
Question # 19

You must set up SIP with a proxy for your network. IP phones are in the 172.16.100.0 network.

The Registrar and proxy are installed on host 172.16.100.100.

To allow handover enforcement for outbound calls from SIP-net to network Net_B on the Internet, you have defined the following objects:

Network object: SIP-net: 172.16.100.0/24

SIP-gateway: 172.16.100.100

VoIP Domain object: VolP_domain_A

1.Endpoint domain: SIP-net

2.VoIP gateway installed at: SIP-gateway host object

How would you configure the rule?

A.

SIP- G ateway/N et_B/s i p_a ny/a c c e pt

B.

VolP_domain_A/Net_B/sip/accept

C.

SIP-Gateway/Net_B/sip/accept

D.

VolP_domain_A/Net_B/sip_any, and sip/accept

E.

VolP_Gateway_MJet_B/sip_any/accept

Full Access
Question # 20

While using the SmartProvisioning Wizard to create a new profile, you cannot continue because there are no devices to select. What is a possible reason for this?

i) All devices already have a profile assigned to them

ii) Provisioning Blade is not enabled on the devices

iii) No UTM- 1/Power- 1/Secure Platform devices are defined in Smart Dashboard

iv) SIC is not established on the devices.

A.

(ii), (iii) or (iv)

B.

(ii) only

C.

(iii) or (iv)

D.

(i) or (iii)

Full Access
Question # 21

What is the consequence of clearing the "Log VoIP Connection" box in Global Properties?

A.

Dropped VoIP traffic is logged, but accepted VoIP traffic is not logged.

B.

VoIP protocol-specific log fields are not included in SmartView Tracker entries.

C.

The log field setting in rules for VoIP protocols are ignored.

D.

IP addresses are used, instead of object names, in log entries that reference VoIP Domain objects.

E.

The SmartCenter Server stops importing logs from VoIP servers.

Full Access
Question # 22

What firewall kernel table stores information about port allocations for Hide NAT connections?

A.

NAT_dst_any_list

B.

NAT_alloc

C.

NAT_src_any_list

D.

fwx_alloc

Full Access
Question # 23

Organizations are sometimes faced with the need to locate cluster members in different geographic locations that are distant from each other. A typical example is replicated data centers whose location is widely separated for disaster recovery purposes. What are the restrictions of this solution?

A.

There are two restrictions: 1. The synchronization network must guarantee no more than 100ms latency and no more than 5% packet loss. 2. The synchronization network may only include switches and hubs.

B.

There is one restriction: The synchronization network must guarantee no more than 150 ms latency (ITU Standard G.114).

C.

There is one restriction: The synchronization network must guarantee no more than 100 ms latency.

D.

There are no restrictions.

Full Access
Question # 24

If the number of kernel instances for CoreXL shown is 6, how many cores are in the physical machine?

A.

6

B.

8

C.

3

D.

4

Full Access
Question # 25

The set of rules that governs the types of objects in the directory and their associated attributes is called the:

A.

Schema

B.

SmartDatabase

C.

Access Control List

D.

LDAP Policy

Full Access
Question # 26

The SmartEvent Client:

A.

adds events to the events database.

B.

analyzes each IPS log entry as it enters the Log server.

C.

assigns a severity level to an event.

D.

displays the received events.

Full Access
Question # 27

Which of the following does NOT happen when using Pivot Mode in ClusterXL?

A.

The Pivot forwards the packet to the appropriate cluster member.

B.

The Pivot’s Load Sharing decision function decides which cluster member should handle the packet.

C.

The Security Gateway analyzes the packet and forwards it to the Pivot.

D.

The packet is forwarded through the same physical interface from which it originally came, not on the sync interface.

Full Access
Question # 28

Fill in the blank. The command that typically generates the firewall application, operating system, and hardware specific drivers is _____.

Full Access
Question # 29

What can you do to see the current number of kernel instances in a system with CoreXL enabled?

A.

Only Check Point support personnel can access that information.

B.

Run command cpconfig.

C.

Execute SmartDashboard client.

D.

Browse to Secure Platform Web GUI.

Full Access
Question # 30

How are cached usernames and passwords cleared from the memory of a Security Gateway?

A.

By using the Clear User Cache button in SmartDashboard

B.

Usernames and passwords only clear from memory after they time out

C.

By retrieving LDAP user information using the command fw fetchldap

D.

By installing a Security Policy

Full Access
Question # 31

When a failed cluster member recovers, which of the following actions is NOT taken by the recovering member?

A.

It will not check for any updated policy and load the last installed policy with a warning message indicating that the Security Policy needs to be installed from the Security Management Server.

B.

It will try to take the policy from one of the other cluster members.

C.

It compares its local policy to the one on the Security Management Server.

D.

If the Security Management Server has a newer policy, it will be retrieved, else the local policy will be loaded.

Full Access
Question # 32

What is the SmartEvent Analyzer's function?

A.

Generate a threat analysis report from the Analyzer database.

B.

Display received threats and tune the Events Policy.

C.

Assign severity levels to events.

D.

Analyze log entries, looking for Event Policy patterns.

Full Access
Question # 33

Anytime a client initiates a connection to a server, the firewall kernel signals the FWD process using a trap. FWD spawns the _____ child service, which runs the security server.

A.

FWSD

B.

FWD

C.

In.httpd

D.

FWSSD

Full Access
Question # 34

How could you compare the Fingerprint shown to the Fingerprint on the server? Run cpconfig and select:

Exhibit:

156-315.77 question answer

A.

the Certificate Authority option and view the fingerprint.

B.

the GUI Clients option and view the fingerprint.

C.

the Certificate's Fingerprint option and view the fingerprint.

D.

the Server Fingerprint option and view the fingerprint.

Full Access
Question # 35

Fill in the blank.

MultiCorp is located in Atlanta. It has a branch office in Europe, Asia, and Africa. Each location has its own AD controller for local user login. How many ADqueries have to be configured?

Full Access
Question # 36

When troubleshooting user authentication, you may see the following entries in a debug of the user authentication process. In which order are these messages likely to appear?

A.

make_au, au_auth, au_fetchuser, au_auth_auth, cpLdapCheck, cpLdapGetUser

B.

make_au, au_auth, au_fetchuser, cpLdapGetUser, cpLdapCheck, au_auth_auth

C.

cpLdapGetUser, au_fetchuser, cpLdapCheck, make_au, au_auth, au_auth_auth

D.

au_fetchuser, make_au, au_auth, cpLdapGetUser, au_auth_auth, cpLdapCheck

Full Access
Question # 37

The process _____ is responsible for the authentication for Remote Access clients.

A.

fwm

B.

vpnd

C.

cvpnd

D.

cpd

Full Access
Question # 38

The process that performs the authentication for SSL VPN Users is:

A.

cpd

B.

cvpnd

C.

fwm

D.

vpnd

Full Access
Question # 39

Security server configuration settings are stored in _____.

A.

$FWDIR/conf/fwauthd.conf

B.

$FWDIR/conf/AMT.conf

C.

$FWDIR/conf/fwopsec.conf

D.

$FWDIR/conf/Fwauth.c

Full Access
Question # 40

The process that performs the authentication for legacy session authentication is:

A.

cvpnd

B.

fwm

C.

vpnd

D.

fwssd

Full Access
Question # 41

Which of the following is a valid Active Directory designation for user Jane Doe in the MIS department of AcmeCorp.com?

A.

Cn=jane_doe,ou=MIS,dc=acmecorp,dc=com

B.

Cn= jane_doe,ou=MIS,cn=acmecorp,dc=com

C.

Cn= jane_doe,ca=MIS,dc=acmecorp,dc=com

D.

Cn= jane_doe,ca=MIS,cn=acmecorp,dc=com

Full Access
Question # 42

When using a template to define a user in SmartDirectory, the user’s password should be defined in the _____ object.

A.

VPN Community

B.

LDAP

C.

Template

D.

User

Full Access
Question # 43

How is SmartWorkflow enabled?

A.

In SmartView Monitor, click on Smart Workflow/ Enable SmartWorkflow. The Enabling SmartWorkflow wizard launches and prompts for SmartWorkflow Operation Mode. Once a mode is selected, the wizard finishes.

B.

In SmartViewTracker, click on Smart Workflow/ Enable SmartWorkflow. The Enabling SmartWorkflow wizard launches and prompts for SmartWorkflow Operation Mode Once a mode is selected, the wizard finishes.

C.

In SmartDashboard, click on Smart Workflow/ Enable SmartWorkflow. The Enabling SmartWorkflow wizard launches and prompts for SmartWorkflow Operation Mode. Once a mode is selected, the wizard finishes.

D.

In SmartEvent, click on Smart Workflow/ Enable SmartWorkflow. The Enabling SmartWorkflow wizard launches and prompts for SmartWorkflow Operation Mode. Once a mode is selected, the wizard finishes.

Full Access
Question # 44

How is change approved for implementation in SmartWorkflow?

A.

The change is submitted for approval and is automatically installed by the approver once Approve is clicked.

B.

The change is submitted for approval and is automatically installed by the original submitter the next time he logs in after approval of the change.

C.

The change is submitted for approval and is manually installed by the original submitter the next time he logs in after approval of the change.

D.

The change is submitted for approval and is manually installed by the approver once Approve is clicked.

Full Access
Question # 45

What could the following regular expression be used for in a DLP rule?

\$([0-9]*,[0-9] [0-9] [0-9]. [0-9] [0-9]

Select the best answer.

A.

As a Data Type to prevent programmers from leaking code outside the company

B.

As a compound data type representation.

C.

As a Data Type to prevent employees from sending an email that contains a complete price-list of nine products.

D.

As a Data Type to prevent the Finance Department from leaking salary information to employees

Full Access
Question # 46

In ClusterXL, _______ is defined by default as a critical device.

A.

fw.d

B.

protect.exe

C.

PROT_SRV.EXE

D.

Filter

Full Access
Question # 47

How can you verify that SecureXL is running?

A.

cpstat os

B.

fw ver

C.

fwaccel stat

D.

securexl stat

Full Access
Question # 48

What is not available for Express Reports compared to Standard Reports?

A.

Filter

B.

Period

C.

Content

D.

Schedule

Full Access
Question # 49

A Smart ProvisioningGateway could be a member of which VPN communities?

(i) Center In Star Topology

(ii) Satellite in Star Topology

(iii) Carter in Remote Access Community

(iv) Meshed Community

A.

(ii) and (iii)

B.

All

C.

(i), (ii) and (iii)

D.

(ii) only

Full Access
Question # 50

Typically, when you upgrade the Security Management Server, you install and configure a fresh R76 installation on a new computer and then migrate the database from the original machine.

Which of the following statements are TRUE?

A.

Both machines must have the same number of interfaces installed and configured before migration can be attempted.

B.

The new machine may not have more Check Point products installed than the original Security Management Server.

C.

All product databases are included in the migration.

D.

The Security Management Server on the new machine must be the same or greater than the version on the original machine.

Full Access
Question # 51

What is the command to enter the router shell?

A.

gated

B.

routerd

C.

clirouter

D.

router

Full Access
Question # 52

You want to verify that your Check Point cluster is working correctly.

Which command line tool can you use?

A.

cphastart -status

B.

cphainfo -s

C.

cphaprob state

D.

cphaconf state

Full Access
Question # 53

How would you set the debug buffer size to 1024?

A.

Run fw ctl kdebug 1024

B.

Run fw ctl set buf 1024

C.

Run fw ctl set int print_cons 1024

D.

Run fw ctl debug -buf 1024

Full Access
Question # 54

Fred is troubleshooting a NAT issue and wants to check to see if the inbound connection from this internal network is being translated across the interface in the firewall correctly. He decides to use the fw monitor to capture the traffic from the source 192.168.3.5 or the destination of 10.1.1.25 on his Security Gateway. Green that has an IP of 192.168.4.5. What command captures this traffic in a file that he can download and review with WireShark?

A.

Expert@Green# fwmonitor –e “accept src=192.168.3.5 and dst=10.1.1.25;” –o monitor.out

B.

Expert@Green# fw monitor –e “accept src=192.168.3.5 and dst=10.1.1.25;” –o monitor.out

C.

Expert@Green# fwmonitor –e “accept src=192.168.3.5 or dst=10.1.1.25;” –o monitor.out

D.

Expert@Green# fw monitor –e “accept src=192.168.3.5 or dst=10.1.1.25;” –o monitor.out

Full Access
Question # 55

Fill in the blank.

Type the command and syntax to view critical devices on a cluster member in a ClusterXL environment.

Full Access
Question # 56

Check Point support has asked Tony for a firewall capture of accepted packets. What would be the correct syntax to create a capture file to a filename called monitor.out?

A.

Run fw monitor -e "accept;" -f monitor.out

B.

Run fw monitor -e "accept;" -c monitor.out

C.

Run fw monitor -e "accept;" -o monitor.out

D.

Run fw monitor -e "accept;" -m monitor.out

Full Access
Question # 57

Jon is explaining how the inspection module works to a colleague. If a new connection passes through the inspection module and the packet matches the rule, what is the next step in the process?

A.

Verify if another rule exists.

B.

Verify if any logging or alerts are defined.

C.

Verify if the packet should be moved through the TCP/IP stack.

D.

Verify if the packet should be rejected.

Full Access
Question # 58

Steve is troubleshooting a connection problem with an internal application. If he knows the source IP address is 192.168.4.125, how could he filter this traffic?

A.

Run fw monitor -e "accept src-ip=192.168.4.125;"

B.

Run fw monitor -e "accept src=192.168.4.125;"

C.

Run fw monitor -e "accept dst-ip=192.168.4.125;"

D.

Run fw monitor -e "accept ip=192.168.4.125;"

Full Access
Question # 59

_____ is the called process that starts when opening SmartView Tracker application.

A.

FWM

B.

CPLMD

C.

logtrackerd

D.

fwlogd

Full Access
Question # 60

Which Check Point tool allows you to open a debug file and see the VPN packet exchange details.

A.

PacketDebug.exe

B.

VPNDebugger.exe

C.

IkeView.exe

D.

IPSECDebug.exe

Full Access
Question # 61

Regarding QoS guarantees and limits, which of the following statements is FALSE?

A.

If both a limit and a guarantee per rule are defined in a QoS rule, then the limit must be smaller than the guarantee.

B.

If both a rule limit and a per connection limit are defined for a rule, the per connection limit must not be greater than the rule limit.

C.

A rule guarantee must not be less than the sum the guarantees defined in its sub-rules.

D.

If a guarantee is defined in a sub-rule, then a guarantee must be defined for the rule above it.

Full Access
Question # 62

VPN access control would fall under which VPN component?

A.

QoS

B.

Performance

C.

Management

D.

Security

Full Access
Question # 63

Even after configuring central logging on Connecter, Connecterlogs are not displaying in Smart View Tracker. What could be the cause of this problem?

A.

You must reestablish logging from Connecter to the Management Server, using a dummy log-server object.

B.

R70 does not support a host object with the same IP address as a Management Server used as secondary log server or management station.

C.

You must install the Management Server database.

D.

You must install the Security Policy, and try again.

Full Access
Question # 64

With is the SmartEvent Correlation Unit's function?

A.

Assign severity levels to events.

B.

Display received threats and tune the Events Policy

C.

Invoke and define automatic reactions and add events to the database.

D.

Analyze log entries, looking for Event Policy patterns.

Full Access
Question # 65

You need to completely reboot the Operating System after making which of the following changes on the Security Gateway? (i.e. the command cprestart is not sufficient.)

1. Adding a hot-swappable NIC to the Operating System for the first time.

2. Uninstalling the R75 Power/UTM package.

3. Installing the R75 Power/UTM package.

4. Re-establishing SIC to the Security Management Server.

5. Doubling the maximum number of connections accepted by the Security Gateway.

A.

2, 3 only

B.

3 only

C.

3, 4, and 5 only

D.

1, 2, 3, 4, and 5

Full Access
Question # 66

When deploying a dedicated DLP Gateway behind a perimeter firewall on an interface leading to the internal network (there is only one internal network):

A.

The DLP Gateway can inspect SMTP traffic if a MS Exchange server is located on the internal network, and it either sends e-mails directly to the Internet using SMTP or sends e-mails to the Internet in SMTP via a mail relay that is located on the perimeter's firewall DMZ network.

B.

The DLP Gateway can inspect internal e-mails (e-mails between two users on the internal network) if the organization's internal mail server is located in the internal network and users are configured to send e-mails to this mail server using SMTP.

C.

User's HTTPS and FTP traffic can be inspected by the R71 DLP Gateway.

D.

The DLP Gateway can inspect e-mails (e-mails between two users on an internal or external network) if the organization's internal mail server is located on another network (not the internal network; for instance the DMZ or a different internal network) and users are configured to send e- mails to this mail server using SMTP.

Full Access
Question # 67

Which command would you use to save the interface information before upgrading a Windows Gateway?

A.

cp /etc/sysconfig/network.C [location]

B.

ipconfig -a > [filename].txt

C.

ifconfig > [filename].txt

D.

netstat -m > [filename].txt

Full Access
Question # 68

Before upgrading SecurePlatform, you should create a backup.

To save time, many administrators use the command backup.

This creates a backup of the Check Point configuration as well as the system configuration.

An administrator has installed the latest HFA on the system for fixing traffic problems after creating a backup file. There is a mistake in the very complex static routing configuration.

The Check Point configuration has not been changed.

Can the administrator use a restore to fix the errors in static routing?

A.

The restore is not possible because the backup file does not have the same build number (version).

B.

The restore is done by selecting Snapshot Management from the SecurePlatform boot menu.

C.

The restore can be done easily by the command restore and selecting the appropriate backup file.

D.

A back up cannot be restored, because the binary files are missing.

Full Access
Question # 69

The Security Gateway is installed on SecurePlatform R77. The default port for the Web User Interface is ____________.

A.

TCP 443

B.

TCP 4433

C.

TCP 18211

D.

TCP 257

Full Access
Question # 70

What Shell is required in Gaia to use WinSCP?

A.

UNIX

B.

CPShell

C.

CLISH

D.

Bash

Full Access
Question # 71

When, during policy installation, does the atomic load task run?

A.

Immediately after fwm load runs on the SmartCenter.

B.

Before CPD runs on the Gateway.

C.

It is the last task during policy installation.

D.

It is the first task during policy installation.

Full Access
Question # 72

You are preparing computers for a new ClusterXL deployment. For your cluster, you plan to use three machines with the following configurations:

Cluster Member 1: OS - GAiA; NICs - QuadCard; Memory - 1 GB; Security Gateway - version: R71 and primary Security Management Server installed, version: R77

Cluster Member 2: OS - GAiA; NICs - 4 Intel 3Com; Memory - 1 GB; Security Gateway only, version: R77

Cluster Member 3: OS - GAiA; NICs - 4 other manufacturers; Memory - 512 MB; Security Gateway only, version: R77

Are these machines correctly configured for a ClusterXL deployment?

A.

No, Cluster Member 3 does not have the required memory.

B.

Yes, these machines are configured correctly for a ClusterXL deployment.

C.

No, the Security Management Server is not running the same operating system as the cluster members.

D.

No, the Security Gateway cannot be installed on the Security Management Server.

Full Access
Question # 73

Fill in the blank with a numeric value. The default port number for standard TCP connections with the LDAP server is

Full Access
Question # 74

During a Security Management Server migrate export, the system:

A.

Creates a backup file that includes the SmartEvent database.

B.

Creates a backup archive for all the Check Point configuration settings.

C.

Saves all system settings and Check Point product configuration settings to a file.

D.

Creates a backup file that includes the SmartReporter database.

Full Access
Question # 75

You are preparing computers for a new ClusterXL deployment. For your cluster, you plan to use four machines with the following configurations:

Cluster Member 1: OS - GAiA; NICs - QuadCard; Memory - 1 GB; Security Gateway only, version: R77

Cluster Member 2: OS - GAiA; NICs - 4 Intel 3Com; Memory - 1 GB; Security Gateway only, version: R77

Cluster Member 3: OS - GAiA; NICs - 4 other manufacturers; Memory: 512 MB; Security Gateway only, version: R77

Security Management Server: MS Windows 2008; NIC - Intel NIC (1); Security Gateway and primary Security Management Server installed, version: R77

Are these machines correctly configured for a ClusterXL deployment?

A.

No, Cluster Member 3 does not have the required memory.

B.

No, the Security Gateway cannot be installed on the Security Management Pro Server.

C.

No, the Security Management Server is not running the same operating system as the cluster members.

D.

Yes, these machines are configured correctly for a ClusterXL deployment.

Full Access
Question # 76

The process _____ is responsible for GUI Client communication with the SmartCenter.

A.

CPGUI

B.

CPD

C.

FWD

D.

FWM

Full Access
Question # 77

Which of the following is the preferred method for adding static routes in GAiA?

A.

In the CLI with the command “route add”

B.

In Web Portal, under Network Management > IPv4 Static Routes

C.

In the CLI via sysconfig

D.

In SmartDashboard under Gateway Properties > Topology

Full Access
Question # 78

When using Captive Portal to send unidentified users to a Web portal for authentication, which of the following is NOT a recommended use for this method?

A.

For deployment of Identity Agents

B.

Identity-based enforcement for non-AD users (non-Windows and guest users)

C.

Leveraging identity in Internet application control

D.

Basic identity enforcement in the internal network

Full Access
Question # 79

Paul has just joined the MegaCorp security administration team. Natalie, the administrator, creates a new administrator account for Paul in SmartDashboard and installs the policy. When Paul tries to login it fails. How can Natalie verify whether Paul’s IP address is predefined on the security management server?

A.

Login to Smart Dashboard, access Properties of the SMS, and verify whether Paul’s IP address is listed.

B.

Type cpconfig on the Management Server and select the option “GUI client List” to see if Paul’s IP address is listed.

C.

Login in to Smart Dashboard, access Global Properties, and select Security Management, to verify whether Paul’s IP address is listed.

D.

Access the WEBUI on the Security Gateway, and verify whether Paul’s IP address is listed as a GUI client.

Full Access
Question # 80

MultiCorp is running Smartcenter R71 on an IPSO platform and wants to upgrade to a new Appliance with R77. Which migration tool is recommended?

A.

Download Migration Tool R77 for IPSO and Splat/Linux from Check Point website.

B.

Use already installed Migration Tool.

C.

Use Migration Tool from CD/ISO

D.

Fetch Migration Tool R71 for IPSO and Migration Tool R77 for Splat/Linux from CheckPoint website

Full Access
Question # 81

Where do you define NAT properties so that NAT is performed either client side or server side? In SmartDashboard under:

A.

Gateway Setting

B.

NAT Rules

C.

Global Properties > NAT definition

D.

Implied Rules

Full Access
Question # 82

The “MAC Magic” value must be modified under the following condition:

A.

There is more than one cluster connected to the same VLAN

B.

A firewall cluster is configured to use Multicast for CCP traffic

C.

There are more than two members in a firewall cluster

D.

A firewall cluster is configured to use Broadcast for CCP traffic

Full Access
Question # 83

What is the proper CLISH syntax to configure a default route via 192.168.255.1 in GAiA?

A.

set static-route default nexthop gateway address 192.168.255.1 priority 1 on

B.

set static-route 192.168.255.0/24 nexthop gateway logical ethl on

C.

set static-route 192.168.255.0/24 nexthop gateway address 192.168.255.1 priority 1 on

D.

set static-route nexthop default gateway logical 192.168.255.1 priority 1 on

Full Access
Question # 84

You are the MegaCorp Security Administrator. This company uses a firewall cluster, consisting of two cluster members. The cluster generally works well but one day you find that the cluster is behaving strangely. You assume that there is a connectivity problem with the cluster synchronization link (cross-over cable). Which of the following commands is the BEST for testing the connectivity of the crossover cable?

A.

ifconfig -a

B.

arping

C.

telnet

D.

ping

Full Access
Question # 85

What is used to validate a digital certificate?

A.

IPsec

B.

CRL

C.

PKCS

D.

S/MIME

Full Access
Question # 86

What is the most common cause for a Quick mode packet 1 failing with the error “No Proposal Chosen” error?

A.

The encryption strength and hash settings of one peer does not match the other.

B.

The previously established Permanent Tunnel has failed.

C.

There is a network connectivity issue.

D.

The OS and patch level of one gateway does not match the other.

Full Access
Question # 87

Fill in the blank.

To remove site-to-site IKE and IPSEC keys you would enter command _____ _____ and select the option to delete all IKE and IPSec SA’s.

Full Access
Question # 88

Which of the following is TRUE concerning unnumbered VPN Tunnel Interfaces (VTIs)?

A.

Local IP addresses are not configured, remote IP addresses are configured

B.

VTIs cannot be assigned a proxy interface

C.

VTI specific additional local and remote IP addresses are not configured

D.

VTIs are only supported on SecurePlatform

Full Access
Question # 89

Remote clients are using SSL VPN to authenticate via LDAP server to connect to the organization. Which gateway process is responsible for the authentication?

A.

vpnd

B.

cvpnd

C.

fwm

D.

fwd

Full Access
Question # 90

Katie has enabled User Directory and applied the license to Security Management Server, Green. Her supervisor has asked her to configure the Password Strength options of the least one digit, one symbol, 8 characters long and include an uppercase character. How should she accomplish this?

A.

Open the SmartDashboard, Select Global properties, select Identity Awareness; check the boxes for Password must include an upper character, Password must include a digit, Password must include a symbol and change the password length to 8 characters.

B.

Open the SmartDashboard, Select Global properties, select User Authority; check the boxes for Password must include an upper character, Password must include a digit and Password must include a symbol.

C.

Open the SmartDashboard, Select Global Properties, select User Directory, check the boxes for Password must include an uppercase character, Password must include a digit, and Password must include a symbol.

D.

Open the SmartDashboard, Select Global Properties, select User Directory, check the boxes for Password must include an uppercase character, Password must include a digit, Password must include a symbol and change the password length to 8 characters.

Full Access
Question # 91

MicroCorp experienced a security appliance failure. (LEDs of all NICs are off.) The age of the unit required that the RMA-unit be a different model. Will a revert to an existing snapshot bring the new unit up and running?

A.

There is no dynamic update at reboot.

B.

No. The revert will most probably not match to hard disk.

C.

Yes. Everything is dynamically updated at reboot.

D.

No. At installation the necessary hardware support is selected. The snapshot saves this state.

Full Access
Question # 92

How does Check Point recommend that you secure the sync interface between gateways?

A.

Use a dedicated sync network.

B.

Configure the sync network to operate within the DMZ.

C.

Secure each sync interface in a cluster with Endpoint.

D.

Encrypt all sync traffic between cluster members.

Full Access
Question # 93

In GAiA, if one is unsure about a possible command, what command lists all possible commands.

A.

show all |grep commands

B.

show configuration

C.

show commands

D.

get all commands

Full Access
Question # 94

You configure a Check Point QoS Rule Base with two rules: an HTTP rule with a weight of 40, and the Default Rule with a weight of 10. If the only traffic passing through your QoS Module is HTTP traffic, what percent of bandwidth will be allocated to the HTTP traffic?

A.

80%

B.

50%

C.

40%

D.

100%

Full Access
Question # 95

Lilly has generated an IKE debug on her Security Gateway. She has asked Jack to transfer the file to Support. Where is the file located?

A.

$FWDIR/log/ike.elg

B.

$FWDIR/opt/vpnd.elg

C.

$FWDIR/opt/ike.elg

D.

$FWDIR/log/vpnd.elg

Full Access
Question # 96

How do you verify the Check Point kernel running on a firewall?

A.

fw ver -k

B.

fw ctl pstat

C.

fw ctl get kernel

D.

fw kernel

Full Access
Question # 97

CPD is a core Check Point process that does all of the following EXCEPT:

A.

AMON status pull from the Gateway

B.

Management High Availability (HA) sync

C.

SIC (Secure Internal Communication) functions

D.

Policy installation

Full Access
Question # 98

In Gaia, the operating system can be changed to 32-bit or 64-bit, provided the processor supports 64-bit. What command toggles to 64-bit.

A.

set bitrate 64

B.

set edition default 64

C.

configure edition 64-bit

D.

set edition default 64-bit

Full Access
Question # 99

Frank is concerned with performance and wants to configure the affinities settings. His gateway does not have the Performance pack running. What would Frank need to perform in order configure those settings?

A.

Edit affinity.conf and change the settings

B.

Run fw affinity and change the settings

C.

Edit $FWDIR/conf/fwaffinity.conf and change the settings

D.

Run sim affinity and change the settings

Full Access