What is the benefit of Manual NAT over Automatic NAT?
How would you deploy TE250X Check Point appliance just for email traffic and in-line mode without a Check Point Security Gateway?
You believe Phase 2 negotiations are failing while you are attempting to configure a site-to-site VPN with one of your firm's business partners. Which SmartConsole application should you use to confirm your suspicious?
There are 4 ways to use the Management API for creating host object with R80 Management API. Which one is NOT correct?
Which of these statements describes the Check Point ThreatCloud?
MegaCorp's security infrastructure separates Security Gateways geographically. You must request a central license for one remote Security Gateway.
How do you apply the license?
Which of these attributes would be critical for a site-to-site VPN?
A digital signature:
A client has created a new Gateway object that will be managed at a remote location. When the client attempts to install the Security Policy to the new Gateway object, the object does not appear in the Install On check box. What should you look for?
Which of the following firewall modes DOES NOT allow for Identity Awareness to be deployed?
What component of R80 Management is used for indexing?
What is the Manual Client Authentication TELNET port?
You have two rules, ten users, and two user groups in a Security Policy. You create database version 1 for this configuration. You then delete two existing users and add a new user group. You modify one rule and add two new rules to the Rule Base. You save the Security Policy and create database version 2. After a while, you decide to roll back to version 1 to use the Rule Base, but you want to keep your user database. How can you do this?
How do you configure the Security Policy to provide uses access to the Captive Portal through an external (Internet) interface?
Which is the correct order of a log flow processed by SmartEvent components:
When defining QoS global properties, which option below is not valid?
The system administrator of a company is trying to find out why acceleration is not working for the traffic. The traffic is allowed according to the rule base and checked for viruses. But it is not accelerated. What is the most likely reason that the traffic is not accelerated?
Packet acceleration (SecureXL) identifies connections by several attributes. Which of the attributes is NOT used for identifying connection?
Which of the below is the MOST correct process to reset SIC from SmartDashboard?
Which of the following statements is TRUE about R80 management plug-ins?
Web Control Layer has been set up using the settings in the following dialogue:
Consider the following policy and select the BEST answer.
In R80 spoofing is defined as a method of:
Fill in the blank: Gaia can be configured using the _______ or ______ .
Fill in the blank: The __________ is used to obtain identification and security information about network users.
While enabling the Identity Awareness blade the Identity Awareness wizard does not automatically detect the windows domain. Why does it not detect the windows domain?
When attempting to start a VPN tunnel, in the logs the error 'no proposal chosen' is seen numerous times. No other VPN-related log entries are present. Which phase of the VPN negotiations has failed?
With which command can you view the running configuration of Gaia-based system.
Which of the following is NOT a component of a Distinguished Name?
Fill in the blank: The command __________ provides the most complete restoration of a R80 configuration.
In R80, Unified Policy is a combination of
What is the purpose of Captive Portal?
Fill in the blank: A new license should be generated and installed in all of the following situations EXCEPT when ________.
Which of the following commands can be used to remove site-to-site IPSEC Security Associations (SA)?
Which of the following ClusterXL modes uses a non-unicast MAC address for the cluster IP address?
Which one of the following is the preferred licensing model? Select the Best answer.
Fill in the blanks: The _________ collects logs and sends them to the _________ .
Fill in the blank: RADIUS protocol uses ______ to communicate with the gateway.
The security Gateway is installed on GAiA R80 The default port for the WEB User Interface is _______ .
Which default user has full read/write access?
Which of the following Windows Security Events will NOT map a username to an IP address in Identity Awareness?
You are the Check Point administrator for Alpha Corp with an R80 Check Point estate. You have received a call by one of the management users stating that they are unable to browse the Internet with their new tablet connected to the company Wireless. The Wireless system goes through the Check Point Gateway. How do you review the logs to see what the problem may be?
In Unified SmartConsole Gateways and Servers tab you can perform the following functions EXCEPT ________.
The CDT utility supports which of the following?
You want to store the GAiA configuration in a file for later reference. What command should you use?
What is the purpose of a Stealth Rule?
In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?
Which of the following technologies extracts detailed information from packets and stores that information in state tables?
Which of the following is NOT a tracking log option in R80.x?
One of major features in R80.x SmartConsole is concurrent administration. Which of the following is NOT possible considering that AdminA, AdminB, and AdminC are editing the same Security Policy?
Vanessa is attempting to log into the Gaia Web Portal. She is able to login successfully. Then she tries the same username and password for SmartConsole but gets the message in the screenshot image below. She has checked that the IP address of the Server is correct and the username and password she used to login into Gaia is also correct.
What is the most likely reason?
What licensing feature is used to verify licenses and activate new licenses added to the License and Contracts repository?
To ensure that VMAC mode is enabled, which CLI command you should run on all cluster members? Choose the best answer.
What is a role of Publishing?
Which of the following commands is used to monitor cluster members?
You are going to perform a major upgrade. Which back up solution should you use to ensure your database can be restored on that device?
What is the purpose of the CPCA process?
What Check Point technologies deny or permit network traffic?
Which option, when applied to a rule, allows traffic to VPN gateways in specific VPN communities?
What is the purpose of the Stealth Rule?
Fill in the blanks: A Check Point software license consists of a _______ and _______ .
Study the Rule base and Client Authentication Action properties screen.
After being authenticated by the Security Gateways, a user starts a HTTP connection to a Web site. What happens when the user tries to FTP to another site using the command line? The:
Which of these components does NOT require a Security Gateway R77 license?
The default method for destination NAT is _____________, where NAT occurs on the Inbound interface closest to the client.
Mesh and Star are two types of VPN topologies. Which statement below is TRUE about these types of communities?
Which authentication scheme requires a user to possess a token?
AdminA and AdminB are both logged in on SmartConsole. What does it mean if AdminB sees a locked icon on a rule? Choose the BEST answer.
Fill in the blank: Once a license is activated, a ________ should be installed.
Which Check Point software blade provides visibility of users, groups and machines while also providing access control through identity-based policies?
Can a Check Point gateway translate both source IP address and destination IP address in a given packet?
Fill in the blank: The ________ feature allows administrators to share a policy with other policy packages.
Which SmartConsole component can Administrators use to track changes to the Rule Base?
R80 Security Management Server can be installed on which of the following operating systems?
You are going to upgrade from R77 to R80. Before the upgrade, you want to back up the system so that, if there are any problems, you can easily restore to the old version with all configuration and management files intact. What is the BEST backup method in this scenario?
Choose what BEST describes a Session.
Which of the following is NOT defined by an Access Role object?
To install a brand new Check Point Cluster, the MegaCorp IT department bought 1 Smart-1 and 2 Security Gateway Appliances to run a cluster. Which type of cluster is it?
Your bank's distributed R77 installation has Security Gateways up for renewal. Which SmartConsole application will tell you which Security Gateways have licenses that will expire within the next 30 days?