Fill in the blank: With the User Directory Software Blade, you can create user definitions on a(n) ___________ Server.
What are the types of Software Containers?
SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day Protection?
Which of the following is NOT supported by Bridge Mode on the Check Point Security Gateway?
Which Check Point software blade monitors Check Point devices and provides a picture of network and security performance?
Identity Awareness allows the Security Administrator to configure network access based on which of the following?
Customer’s R80 management server needs to be upgraded to R80.10. What is the best upgrade method when the management server is not connected to the Internet?
Which back up method uses the command line to create an image of the OS?
What are valid authentication methods for mutual authenticating the VPN gateways?
When URL Filtering is set, what identifying data gets sent to the Check Point Online Web Service?
If an administrator wants to restrict access to a network resource only allowing certain users to access it, and only when they are on a specific network what is the best way to accomplish this?
Choose what BEST describes a Session
When a Security Gateways sends its logs to an IP address other than its own, which deployment option is installed?
Which tool allows you to monitor the top bandwidth on smart console?
When configuring LDAP with User Directory integration, changes applied to a User Directory template are:
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?
Which method below is NOT one of the ways to communicate using the Management API’s?
In the Check Point three-tiered architecture, which of the following is NOT a function of the Security Management Server?
Which option, when applied to a rule, allows all encrypted and non-VPN traffic that matches the rule?
An administrator wishes to enable Identity Awareness on the Check Point firewalls. However they allow users to use company issued or personal laptops. Since the administrator cannot manage the personal laptops, which of the following methods would BEST suit this company?
Which is a main component of the Check Point security management architecture?
The Network Operations Center administrator needs access to Check Point Security devices mostly for troubleshooting purposes. You do not want to give her access to the expert mode, but she still should be able to run tcpdump. How can you achieve this requirement?
Which of the following is used to enforce changes made to a Rule Base?
Fill in the blank: The_____is used to obtain identification and security information about network users.
Which of the following is NOT a component of Check Point Capsule?
When configuring LDAP User Directory integration, Changes applied to a User Directory template are:
Which of the following describes how Threat Extraction functions?
An administrator wishes to use Application objects in a rule in their policy but there are no Application objects listed as options to add when clicking the"+" to add new items to the "Services & Applications" column of a rule. What should be done to fix this?
Which of the following are types of VPN communities?
R80 is supported by which of the following operating systems:
In order to see real-time and historical graph views of Security Gateway statistics in SmartView Monitor, what feature needs to be enabled on the Security Gateway?
How Capsule Connect and Capsule Workspace differ?
The Gateway Status view in SmartConsole shows the overall status of Security Gateways and Software Blades. What does the Status Attention mean?
Fill in the blank: ____________ is the Gaia command that turns the server off.
Check Point licenses come in two forms. What are those forms?
Which of the following methods can be used to update the trusted log server regarding the policy and configuration changes performed on the Security Management Server?
Which of the following blades is NOT subscription-based and therefore does not have to be renewed on a regular basis?
You want to store the GAiA configuration in a file for later reference. What command should you use?
Your internal networks 10.1.1.0/24, 10.2.2.0/24 and 192.168.0.0/16 are behind the Internet Security Gateway. Considering that Layer 2 and Layer 3 setup is correct, what are the steps you will need to do in SmartConsole in order to get the connection working?
Which of the following is considered to be the more secure and preferred VPN authentication method?
Stateful Inspection compiles and registers connections where?
Which key is created during Phase 2 of a site-to-site VPN?
Which default Gaia user has full read/write access?
Identity Awareness lets an administrator easily configure network access and auditing based on three items Choose the correct statement.
Which of the following commands is used to verify license installation?
Which Check Point software blade prevents malicious files from entering a network using virus signatures and anomaly-based protections from ThreatCloud?
Which of the following is NOT a valid deployment option for R80?
What is the main objective when using Application Control?
What is the purpose of a Clean-up Rule?
When using Automatic Hide NAT, what is enabled by default?
Which command is used to add users to or from existing roles?
Rugged appliances are small appliances with ruggedized hardware and like Quantum Spark appliance they use which operating system?
Name the pre-defined Roles included in Gaia OS.
Choose what BEST describes the reason why querying logs now are very fast.
What are the two elements of address translation rules?
What SmartEvent component creates events?
Which GUI tool can be used to view and apply Check Point licenses?
Which of the following situations would not require a new license to be generated and installed?
Fill in the blank: In Security Gateways R75 and above, SIC uses ______________ for encryption.
When changes are made to a Rule base, it is important to _______________ to enforce changes.
Which of the following is NOT a valid deployment option for R80?
Which repositories are installed on the Security Management Server by SmartUpdate?
A stateful inspection firewall works by registering connection data and compiling this information. Where is the information stored?
Choose what BEST describes the reason why querying logs now is very fast.
A layer can support different combinations of blades What are the supported blades:
What are the steps to configure the HTTPS Inspection Policy?
The purpose of the Communication Initialization process is to establish a trust between the Security Management Server and the Check Point gateways. Which statement best describes this Secure Internal
Communication (SIC)?
SmartConsole provides a consolidated solution for everything that is necessary for the security of an organization, such as the following
What is the main difference between Static NAT and Hide NAT?
You have successfully backed up your Check Point configurations without the OS information. What command would you use to restore this backup?
From SecureXL perspective, what are the tree paths of traffic flow:
You are the Check Point administrator for Alpha Corp. You received a call that one of the users is unable to browse the Internet on their new tablet which is connected to the company wireless, which goes through a Check Point Gateway. How would you review the logs to see what is blocking this traffic?
Fill in the blanks: There are ________ types of software containers ________.
What default layers are included when creating a new policy layer?
Fill in the blank: The position of an implied rule is manipulated in the __________________ window.
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
John is using Management HA. Which Smartcenter should be connected to for making changes?
What is the purpose of a Stealth Rule?
You have created a rule at the top of your Rule Base to permit Guest Wireless access to the Internet. However, when guest users attempt to reach the Internet, they are not seeing the splash page to accept your Terms of Service, and cannot access the Internet. How can you fix this?
Which option, when applied to a rule, allows traffic to VPN gateways in specific VPN communities?
What key is used to save the current CPView page in a filename format cpview_“cpview process ID”. cap”number of captures”?
True or False: In R80, more than one administrator can login to the Security Management Server with write permission at the same time.
Fill in the blank: An LDAP server holds one or more ______________.
What needs to be configured if the NAT property ‘Translate destination on client side’ is not enabled in Global properties?
What kind of NAT enables Source Port Address Translation by default?
When should you generate new licenses?
Which Check Point Software Wade provides visibility of users, groups and machines while also providing access control through identity-based policies?
A security zone is a group of one or more network interfaces from different centrally managed gateways. What is considered part of the zone?
R80.10 management server can manage gateways with which versions installed?
What are the two types of NAT supported by the Security Gateway?
When installing a dedicated R80 SmartEvent server, what is the recommended size of the root partition?
Fill in the blanks: A Check Point software license consists of a__________ and _______.
What is the main difference between Threat Extraction and Threat Emulation?
To view statistics on detected threats, which Threat Tool would an administrator use?
View the rule below. What does the pen-symbol in the left column mean?
True or False: The destination server for Security Gateway logs depends on a Security Management Server configuration.
In HTTPS Inspection policy, what actions are available in the "Actions" column of a rule?
In SmartEvent, a correlation unit (CU) is used to do what?
What is a role of Publishing?
Which of the following is NOT a component of a Distinguished Name?
To provide updated malicious data signatures to all Threat Prevention blades, the Threat Prevention gateway does what with the data?
An administrator can use section titles to more easily navigate between large rule bases. Which of these statements is FALSE?
Consider the Global Properties following settings:
The selected option “Accept Domain Name over UDP (Queries)” means:
Security Gateway software blades must be attached to what?
The CDT utility supports which of the following?
In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?
CPU-level of your Security gateway is peaking to 100% causing problems with traffic. You suspect that the problem might be the Threat Prevention settings.
The following Threat Prevention Profile has been created.
How could you tune the profile in order to lower the CPU load still maintaining security at good level? Select the BEST answer.
An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office. Both offices are protected by Check Point Security Gateway managed by the same Security Management Server (SMS). While configuring the VPN community to specify the pre-shared secret, the administrator did not find a box to input the pre-shared secret. Why does it not allow him to specify the pre-shared secret?
In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?
Which command shows detailed information about VPN tunnels?
Of all the Check Point components in your network, which one changes most often and should be backed up most frequently?
What is UserCheck?
Which of the following is the most secure means of authentication?
The SmartEvent R80 Web application for real-time event monitoring is called:
Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?
What is the Transport layer of the TCP/IP model responsible for?
Vanessa is attempting to log into the Gaia Web Portal. She is able to login successfully. Then she tries the same username and password for SmartConsole but gets the message in the screenshot image below. She has checked that the IP address of the Server is correct and the username and password she used to login into Gaia is also correct.
What is the most likely reason?
Which of the following is NOT a policy type available for each policy package?
What does it mean if Deyra sees the gateway status:
Choose the BEST answer.
Which of the following is NOT supported by Bridge Mode Check Point Security Gateway