When the IPS ‘Bypass under Load’ mechanism detects that the certain CPU and memory usage thresholds have been reached, which of the following occurs?
You have just taken over as a firewall administrator. Your company is using Geo Protections on your gateway, but you want to verify that the protections are up-to-date. How can you see when these were updated?
Which of the following CANNOT be used as a source/destination for an IPS network exception?
Where do you run the command get_ips_statistics.sh from?
When viewing a NAT Table, What represents the second hexadecimal number of the 6-tuple:
Remote VPN clients can initiate connections with internal hosts, but internal hosts are unable to initiate connections with the remote VPN clients, even though the policy is configured to allow it. You think that this is caused by NAT. What command can you run to see if NAT is occurring on a packet?
While troubleshooting a DHCP relay issue, you run a fw ctl zdebug drop and see the following output:
;[cpu_1];[fw_0];fw_log_drop: Packet proto=17 10.216.14.108:67 > 172.31.2.1:67 dropped by fw_handle_first_packet Reason: fwconn_init_links (INBOUND) failed;
Where 10.216.14.108 is the IP address of the DHCP server and 172.31.2.1 is the VIP of the Cluster. What is the most likely cause of this drop?
How do you set up Port Address Translation?
Which of the following commands shows the high watermark threshold for triggering the cluster under load mechanism in R77?
What are the kernel parameters that control “Magic MACs”?
What is the function of the setting "no_hide_services_ports" in the tables.def files?
With the default ClusterXL settings what will be the state of an active gateway upon using the command ClusterXL_admin up?
The command that lists the firewall kernel modules on a Security Gateway is:
When you perform an install database, the status window is filled with large amounts of text. What could be the cause?
Which process should you debug when SmartDashboard authentication is rejected?
John is a Security Administrator of a Check Point platform. He has a mis-configuration issue that points to the Rule Base. To obtain information about the issue, John runs the command:
You have a user-defined SMTP trap configured to send an alert to your mail server, and you also have SmartView Monitor configured to trigger the alert whenever policy is pushed to your gateway. However, you are not getting any mails even when you test for pushing policy. What process should you troubleshoot on the Management Server?
What will be the outcome if you set the kernel parameters cphwd_nat_templates_enabled and cphwd_nat_templates_support?
what command other than fw ctl pstat, will display your peak concurrent connections?
Which command will NOT display information related to memory usage?
What command should a firewall administrator use to begin debugging SecureXL?
Look at the follow Rule Base display. Rule 5 contains a TIME object. What is the effect on the following rules?
In order to perform some connection troubleshooting, you run the command fw monitor –e accept dport = 443. You do NOT see the TCP ACK packet. Why is this?
When optimizing a customer firewall Rule Base, what is the BEST way to start the analysis?
You are experiencing an issue where Endpoint Connect client connects successfully however, it disconnects every 20 seconds. What is the most likely cause of this issue?
Which command displays compression/decompression statistics?
You are attempting to establish a VPN tunnel between a Check Point gateway and a 3rd party vendor. When attempting to send traffic to the peer gateway it is failing. You look in SmartView Tracker and see that the failure is due to “Encryption failure: no response from peer”. After running a VPN debug on the problematic gateway, what is one of the files you would want to analyze?
You want to run VPN debug that will generate both ike.elg and vpn.elg files. What is the best command that can be used to achieve this goal?
Which of these commands can be used to display the IPv6 routes?
Which of these commands can be used to display the IPv6 status?
You enabled IPv6 in your environment and would like to erase all IPv6 connection tables. How can you do it?
How do you disable IPv6 on an IPSO gateway?
What is the best way to see how a firewall is performing while processing packets in the firewall path, including resource usage?
How does the Check Point Security Administrator enable NAT Templates?
Misha is working on a stand-by firewall and deletes the connections table in error. He finds that now the table is out of sync with the Active member. to get them completely synced again, Mish should run the command pair ____________ and __________ .
ACME Corp has a cluster consisting of two 13500 appliances. As the Firewall Administrator, you notice that on an output of top, you are seeing high CPU usage of the cores assigned as SNDs, but low CPU usage on cores assigned to individual fw_worker_X processes. What command should you run next to performance tune your cluster?
Which Dynamic Routing Protocols are supported in GAiA in a Route-based VPN configuration?
You are having issues with dynamic routing after a failover. The traffic is now coming from the backup and is being dropped as out of state. What is the BEST configuration to avoid stateful inspection dropping your dynamic routing traffic?
What utility would you use to configure route-based VPNs?
In the gateway object, under topology you select the “Get All Members Interfaces with Topology” option and your newly configured unnumbered VTIs are not populated. Why is this information missing?
A Security Administrator wants to increase the amount of processing cores on a Check Point Security Gateway. He starts by increasing the number of cores, however the number of kernel instances remain the same way. What is the correct process to increase the number of kernel instances?
Where would you go to adjust the number of Kernels in CoreXL?
What does the output of the commands fw ctl multik stat and fw6ctl multik stat show?
CoreXL on IPSO R77.20 does NOT support which of the following features?