Which of the following is the preferred method for adding static routes in GAiA?
You are preparing computers for a new ClusterXL deployment. For your cluster, you plan to use three machines with the following configurations:
Cluster Member 1: OS - GAiA; NICs - QuadCard; Memory - 1 GB; Security Gateway - version: R71 and primary Security Management Server installed, version: R77
Cluster Member 2: OS - GAiA; NICs - 4 Intel 3Com; Memory - 1 GB; Security Gateway only, version: R77
Cluster Member 3: OS - GAiA; NICs - 4 other manufacturers; Memory - 512 MB; Security Gateway only, version: R77
Are these machines correctly configured for a ClusterXL deployment?
MegaCorp has two different types of hardware with Check Point GAiA installed and set up as gateways. The Administrator wants to provide redundancy in case one of them fails. Choose the best approach.
Which protocol can be used to provide logs to third-party reporting?
When using migrate to upgrade a Secure Management Server, which of the following is included in the migration?
During a Security Management Server migrate export, the system:
The process _____ is responsible for GUI Client communication with the SmartCenter.
A snapshot delivers a complete backup of GAiA. How do you restore a local snapshot named MySnapshot.tgz?
Typically, when you upgrade the Security Management Server, you install and configure a fresh R77 installation on a new computer and then migrate the database from the original machine.
What is the correct order of the steps below to successfully complete this procedure?
1) Export databases from source.
2) Connect target to network.
3) Prepare the source machine for export.
4) Import databases to target.
5) Install new version on target.
6) Test target deployment.
What is the correct policy installation process order?
1) Verification
2) Code generation and compilation
3) Initiation
4) Commit
5) Conversion
6) CPTA
Public keys and digital certificates provide which of the following? Select three.
If a digital signature is used to achieve both data-integrity checking and verification of sender, digital signatures are only used when implementing:
For a dedicated DLP Gateway that runs in inline bridge mode, why is it important to properly define the topology?
Network applications accessed using SSL Network Extender have been found to fail after one of their TCP connections has been left idle for more than one hour.
You determine that you must enable sending reset (RST) packets upon TCP time-out expiration.
Where is it necessary to change the setting?
You need to verify the effectiveness of your IPS configuration for your Web server farm.
You have a colleague run penetration tests to confirm that the Web servers are secure against traffic hijacks.
Of the following, which would be the best configuration to protect from a traffic hijack attempt?
Which changes are tracked by SmartWorkflow?
What command will stop all (and only) Management Portal services?
When upgrading to NGX R65, which Check Point products do not require a license upgrade to be current?
Which of the following can NOT be done on the Management Portal?
What is the bit size of DES?
MultiCorp is running Smartcenter R71 on an IPSO platform and wants to upgrade to a new Appliance with R77. Which migration tool is recommended?
MegaCorp is running Smartcenter R70, some Gateways at R65 and some other Gateways with R60. Management wants to upgrade to the most comprehensive IPv6 support. What should the administrator do first?
Paul has just joined the MegaCorp security administration team. Natalie, the administrator, creates a new administrator account for Paul in SmartDashboard and installs the policy. When Paul tries to login it fails. How can Natalie verify whether Paul’s IP address is predefined on the security management server?
Fill in the blank.
In Load Sharing Unicast mode, the internal cluster IP address is 10.4.8.3. The internal interfaces on two members are 10.4.8.1 and 10.4.8.2. Internal host 10.4.8.108 Pings 10.4.8.3, and receives replies. The following is the ARP table from the internal Windows host 10.4.8.108.
Review the exhibit and type the IP address of the member serving as the pivot machine in the space below.
Fill in the blank.
Write the full fw command and syntax that you would use to troubleshoot ClusterXL sync issues.
Jon is explaining how the inspection module works to a colleague. If a new connection passes through the inspection module and the packet matches the rule, what is the next step in the process?
Fill in the blank.
Type the command and syntax that you would use to view the virtual cluster interfaces of a ClusterXL environment.
Fill in the blank.
The command useful for debugging by capturing packet information, including verifying LDAP authentication on all Check Point platforms is _____
Fill in the blank.
In New Mode HA, the internal cluster IP VIP address is 10.4.8.3. An internal host 10.4.8.108 successfully pings its Cluster and receives replies.
Review the ARP table from the internal Windows host 10.4.8.108. Based on this information, what is the active cluster member’s IP address?
Fill in the blank.
In New Mode HA, the internal cluster IP VIP address is 10.4.8.3. The internal interfaces on two members are 10.4.8.1 and 10.4.8.2 Internal host 10.4.8.108 pings 10.4.8.3, and receives replies.
Review the ARP table from the internal Windows host 10.4.8.108. According to the output, which member is the standby machine?
Which of the following is a CLI command for Security Gateway R77?
You intend to upgrade a Check Point Gateway from R65 to R76.
To avoid problems, you decide to back up the Gateway.
Which approach allows the Gateway configuration to be completely backed up into a manageable size in the least amount of time?
Your primary SmartCenter Server is installed on a Secure PlatformPro machine, which is also a VPN-1 Pro Gateway. You want to implement Management High Availability (HA). You have a spare machine to configure as the secondary SmartCenter Server. How do you configure the new machine to be the standby SmartCenter Server, without making any changes to the existing primary SmartCenter Server? (Changes can include uninstalling and reinstalling.)
Which task will ThreatSpect Engine NOT do?
In Company XYZ, the DLP Administrator defined a new template Data Type that is based on an empty PDF form for an insurance claim.
Which of the following statements about this new data type are CORRECT?
John is the Security Administrator in his company. He installs a new R77 Security Management Server and a new R77 Gateway. He now wants to establish SIC between them. After entering the activation key, he gets the following message in SmartDashboard - "Trust established" SIC still does not seem to work because the policy won't install and interface fetching does not work. What might be a reason for this?
The TotallyCoolSecurity Company has a large security staff. Bob configured a new IPS Chicago_Profile for fw-chicago using Detect mode. After reviewing logs, Matt noticed that fw-Chicago is not detecting any of the IPS protections that Bob had previously setup.
Analyze the output below and determine how Matt can correct the problem.
Jack needs to configure CoreXL on his Red Security Gateway. What are the correct steps to enable CoreXL?
You have installed a R77 Security Gateway on GAiA. To manage the Gateway from the enterprise Security Management Server, you create a new Gateway object and Security Policy.
When you install the new Policy from the Policy menu, the Gateway object does not appear in the Install Policy window as a target. What is the problem?
Which of the following commands can be used to stop Management portal services?
For Management High Availability, if an Active SMS goes down, does the Standby SMS automatically take over?
In Management High Availability, what is an Active SMS?
What configuration change must you make to change an existing ClusterXL cluster object from Multicast to Unicast mode?
When a packet is flowing through the security gateway, which one of the following is a valid inspection path?
Which method of load balancing describes “Round Robin”?
What SmartConsole application allows you to change the SmartReporter Policy?
You are reviewing computer information collected in ClientInfo. You can NOT:
How can you disable SecureXL via the command line (it does not need to survive a reboot)?
Fill in the blank. The command that typically generates the firewall application, operating system, and hardware specific drivers is _____.
_____ manages Standard Reports and allows the administrator to specify automatic uploads of reports to a central FTP server.
The process that performs the authentication for SSL VPN Users is:
Which process should you debug if SmartDashboard login fails?
Control connections between the Security Management Server and the Gateway are not encrypted by the VPN Community. How are these connections secured?
When configuring an LDAP Group object, select option _____ if you want the gateway to reference a specific group defined on the LDAP server for authentication purposes.
What is the proper command for importing users into the R77 User Database?
Which of the following is a valid Active Directory designation for user Jane Doe in the MIS department of AcmeCorp.com?
User definitions are stored in _____.
Fill in the blank.
MultiCorp is located in Atlanta. It has a branch office in Europe, Asia, and Africa. Each location has its own AD controller for local user login. How many ADqueries have to be configured?
When an Endpoint user is able to authenticate but receives a message from the client that it is unable to enforce the desktop policy, what is the most likely scenario?
The process _____ is responsible for the authentication for Remote Access clients.
What does the command vpn crl_zap do?
Which graded parameters help determine the protections to activate for security and which can be safely deactivated? Select the most correct answer.
Katie has enabled User Directory and applied the license to Security Management Server, Green. Her supervisor has asked her to configure the Password Strength options of the least one digit, one symbol, 8 characters long and include an uppercase character. How should she accomplish this?
In GAiA, if one is unsure about a possible command, what command lists all possible commands.
Lilly has generated an IKE debug on her Security Gateway. She has asked Jack to transfer the file to Support. Where is the file located?
Which of the following is NOT an internal/native Check Point command?
In Gaia, the operating system can be changed to 32-bit or 64-bit, provided the processor supports 64-bit. What command toggles to 64-bit.
Fill in the blank.
You can set Acceleration to ON or OFF using command syntax _____.
How do you verify the Check Point kernel running on a firewall?
Frank is concerned with performance and wants to configure the affinities settings. His gateway does not have the Performance pack running. What would Frank need to perform in order configure those settings?
Where do you define NAT properties so that NAT is performed either client side or server side? In SmartDashboard under:
The “MAC Magic” value must be modified under the following condition:
What firewall kernel table stores information about port allocations for Hide NAT connections?
What is the proper CLISH syntax to configure a default route via 192.168.255.1 in GAiA?
You are the MegaCorp Security Administrator. This company uses a firewall cluster, consisting of two cluster members. The cluster generally works well but one day you find that the cluster is behaving strangely. You assume that there is a connectivity problem with the cluster synchronization link (cross-over cable). Which of the following commands is the BEST for testing the connectivity of the crossover cable?
Which is NOT a method through which Identity Awareness receives its identities?
Which of the following access options would you NOT use when configuring Captive Portal?
When using Captive Portal to send unidentified users to a Web portal for authentication, which of the following is NOT a recommended use for this method?
Which two processes are responsible on handling Identity Awareness?
In the following cluster configuration; if you reboot sglondon_1 which device will be active when sglondon_1 is back up and running? Why?
You want to upgrade a cluster with two members to VPN-1 NGX. The Smart CenterServer and both members are version VPN-1/Firewall-1 NG FP3, with the latest Hotfix.
What is the correct upgrade procedure?
1. Change the version, in the General Properties of the gateway-cluster object.
2. Upgrade the Smart CenterServer, and reboot after upgrade.
3. Run cpstop on one member, while leaving the other member running. Upgrade one member at a time, and reboot after upgrade.
4. Reinstall the Security Policy.
A Smart ProvisioningGateway could be a member of which VPN communities?
(i) Center In Star Topology
(ii) Satellite in Star Topology
(iii) Carter in Remote Access Community
(iv) Meshed Community
Match the Best Management High Availability synchronization-status descriptions for your Security Management Server (SMS):
Based on the following information, which of the statements below is FALSE?
A DLP Rule Base has the following conditions:
Data Type =Password Protected File
Source=My Organization
Destination=Outside My Organization
Protocol=Any
Action=Ask User
Exception: Data Type=Any,
Source=Research and Development (R&D)
Destination=Pratner1.com
Protocol=Any
All other rules are set to Detect. User Check is enabled and installed on all client machines.
In Company XYZ, the DLP Administrator defined a new Keywords Data Type that contains a list of secret project names; i.e., Ayalon, Yarkon, Yarden. The threshold is set to At least 2 keywords or phrases. Based on this information, which of the following scenarios will be a match to the Rule Base?
What command will allow you to disable sync on a cluster firewall member?
What is the lowest possible version a Security Gateway may be running in order to use it as an LSM enabled Gateway?
Match the SmartDashboard session status icons with the appropriate SmartWorkflow session status:
What Smart Console application allows you to change the Log Consolidation Policy?
Which technology is responsible for assembling packet streams and passing ordered data to the protocol parsers in IPS?
You are trying to configure Directional VPN Rule Match in the Rule Base. But the Match column does not have the option to see the Directional Match. You see the following window. What must you enable to see the Directional Match?
Exhibit:
What is the command to show OSPF adjacencies?
A VPN Tunnel Interface (VTI) is defined on GAiA as:
vpn shell interface add numbered 10.10.0.1 10.10.0.2 madrid.cp
What do you know about this VTI?
Review the following list of actions that Security Gateway R75 can take when it controls packets. The Policy Package has been configured for Simplified Mode VPN. Select the response below that includes the available actions:
What type of object may be explicitly defined as a MEP VPN?
Which of the following statements is TRUE concerning MEP VPN’s?
Which type of VPN routing relies on a VPN Tunnel Interface (VTI) to route traffic?
Which of the following is TRUE concerning numbered VPN Tunnel Interfaces (VTIs)?
There are times when you want to use Link Selection to manage high-traffic VPN connections. With Link Selection you can:
When configuring numbered VPN Tunnel Interfaces (VTIs) in a clustered environment, what issues need to be considered?
1) Each member must have a unique source IP address.
2) Every interface on each member requires a unique IP address.
3) All VTI's going to the same remote peer must have the same name.
4) Cluster IP addresses are required.