Which of these is an implicit MEP option?
Using Threat Emulation technologies, what is the best way to block .exe and .bat file types?
Using ClusterXL, what statement is true about the Sticky Decision Function?
Which Remote Access Client does not provide an Office-Mode Address?
Which of the following is NOT a component of Check Point Capsule?
Which command shows the current connections distributed by CoreXL FW instances?
Which Check Point daemon monitors the other daemons?
Which one of the following is true about Threat Extraction?
What processes does CPM control?
An administrator would like to troubleshoot why templating is not working for some traffic. How can he determine at which rule templating is disabled?
What is the difference between SSL VPN and IPSec VPN?
What scenario indicates that SecureXL is enabled?
When installing a dedicated R81 SmartEvent server. What is the recommended size of the root partition?
You are asked to check the status of several user-mode processes on the management server and gateway. Which of the following processes can only be seen on a Management Server?
In SmartEvent, what are the different types of automatic reactions that the administrator can configure?
How often does Threat Emulation download packages by default?
You are investigating issues with to gateway cluster members are not able to establish the first initial cluster synchronization. What service is used by the FWD daemon to do a Full Synchronization?
What is a best practice before starting to troubleshoot using the “fw monitor” tool?
As an administrator, you may be required to add the company logo to reports. To do this, you would save the logo as a PNG file with the name ‘cover-company-logo.png’ and then copy that image file to which directory on the SmartEvent server?
What is the most recommended way to install patches and hotfixes?
Which directory below contains log files?
Under which file is the proxy arp configuration stored?
Which one of the following is true about Capsule Connect?
You want to store the GAIA configuration in a file for later reference. What command should you use?
Which of the following describes how Threat Extraction functions?
Which statement is true about ClusterXL?
Which of the following will NOT affect acceleration?
Can multiple administrators connect to a Security Management Server at the same time?
Which process is available on any management product and on products that require direct GUI access, such as SmartEvent and provides GUI client communications, database manipulation, policy compilation and Management HA synchronization?
You need to see which hotfixes are installed on your gateway, which command would you use?
What is the command to check the status of the SmartEvent Correlation Unit?
What is the name of the secure application for Mail/Calendar for mobile devices?
Both ClusterXL and VRRP are fully supported by Gaia R81.20 and available to all Check Point appliances. Which the following command is NOT related to redundancy and functions?
What is mandatory for ClusterXL to work properly?
The following command is used to verify the CPUSE version:
John is using Management HA. Which Smartcenter should be connected to for making changes?
What information is NOT collected from a Security Gateway in a Cpinfo?
Which GUI client is supported in R81?
Which configuration file contains the structure of the Security Server showing the port numbers, corresponding protocol name, and status?
Which of the following is NOT a type of Check Point API available in R81.x?
As a valid Mobile Access Method, what feature provides Capsule Connect/VPN?
What is the protocol and port used for Health Check and State Synchronization in ClusterXL?
For Management High Availability, which of the following is NOT a valid synchronization status?
Which statements below are CORRECT regarding Threat Prevention profiles in Smart Dashboard?
To accelerate the rate of connection establishment, SecureXL groups all connection that match a particular service and whose sole differentiating element is the source port. The type of grouping enables even the very first packets of a TCP handshake to be accelerated. The first packets of the first connection on the same service will be forwarded to the Firewall kernel which will then create a template of the connection. Which of the these is NOT a SecureXL template?
When setting up an externally managed log server, what is one item that will not be configured on the R81 Security Management Server?
What is the main difference between Threat Extraction and Threat Emulation?
What does it mean if Deyra sees the gateway status? (Choose the BEST answer.)
On what port does the CPM process run?
Vanessa is firewall administrator in her company. Her company is using Check Point firewall on a central and several remote locations which are managed centrally by R77.30 Security Management Server. On central location is installed R77.30 Gateway on Open server. Remote locations are using Check Point UTM-1570 series appliances with R75.30 and some of them are using a UTM-1-Edge-X or Edge-W with latest available firmware. She is in process of migrating to R81.
What can cause Vanessa unnecessary problems, if she didn’t check all requirements for migration to R81?
Which Check Point feature enables application scanning and the detection?
What will be the effect of running the following command on the Security Management Server?
Which of the following is NOT a VPN routing option available in a star community?
One of major features in R81 SmartConsole is concurrent administration.
Which of the following is NOT possible considering that AdminA, AdminB and AdminC are editing the same Security Policy?
You notice that your firewall is under a DDoS attack and would like to enable the Penalty Box feature, which command you use?
What is the SandBlast Agent designed to do?
Check Point APIs allow system engineers and developers to make changes to their organization’s security policy with CLI tools and Web Services for all the following except:
During the Check Point Stateful Inspection Process, for packets that do not pass Firewall Kernel Inspection and are rejected by the rule definition, packets are:
The SmartEvent R81 Web application for real-time event monitoring is called:
What is the order of NAT priorities?
What is UserCheck?
You want to verify if your management server is ready to upgrade to R81.20. What tool could you use in this process?
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ________ .
SandBlast agent extends 0 day prevention to what part of the network?
You need to change the number of firewall Instances used by CoreXL. How can you achieve this goal?
How many layers make up the TCP/IP model?
How many policy layers do Access Control policy support?
What is the most ideal Synchronization Status for Security Management Server High Availability deployment?
In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?
Which file gives you a list of all security servers in use, including port number?
In which formats can Threat Emulation forensics reports be viewed in?
Which of the following commands shows the status of processes?
When SecureXL is enabled, all packets should be accelerated, except packets that match the following conditions:
The essential means by which state synchronization works to provide failover in the event an active member goes down, ____________ is used specifically for clustered environments to allow gateways to report their own state and learn about the states of other members in the cluster.
Vanessa is a Firewall administrator. She wants to test a backup of her company’s production Firewall cluster Dallas_GW. She has a lab environment that is identical to her production environment. She decided to restore production backup via SmartConsole in lab environment.
Which details she need to fill in System Restore window before she can click OK button and test the backup?
Tom has connected to the R81 Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored shortly afterward.
What will happen to the changes already made?
What must you do first if “fwm sic_reset” could not be completed?
Which Check Point software blade provides Application Security and identity control?
Pamela is Cyber Security Engineer working for Global Instance Firm with large scale deployment of Check Point Enterprise Appliances using GAiA/R81.20. Company’s Developer Team is having random access issue to newly deployed Application Server in DMZ’s Application Server Farm Tier and blames DMZ Security Gateway as root cause. The ticket has been created and issue is at Pamela’s desk for an investigation. Pamela decides to use Check Point’s Packet Analyzer Tool-fw monitor to iron out the issue during approved Maintenance window.
What do you recommend as the best suggestion for Pamela to make sure she successfully captures entire traffic in context of Firewall and problematic traffic?
Which process handles connection from SmartConsole R81?
Which SmartConsole tab is used to monitor network and security performance?
You can access the ThreatCloud Repository from:
Which of the following technologies extracts detailed information from packets and stores that information in state tables?
Which of the following is NOT an option to calculate the traffic direction?
Please choose the path to monitor the compliance status of the Check Point R81.20 based management.
SmartEvent provides a convenient way to run common command line executables that can assist in investigating events. Right-clicking the IP address, source or destination, in an event provides a list of default and customized commands. They appear only on cells that refer to IP addresses because the IP address of the active cell is used as the destination of the command when run. The default commands are:
Office mode means that:
With SecureXL enabled, accelerated packets will pass through the following:
When using CPSTAT, what is the default port used by the AMON server?
What statement best describes the Proxy ARP feature for Manual NAT in R81.20?
GAiA Software update packages can be imported and installed offline in situation where:
Which of the following Windows Security Events will not map a username to an IP address in Identity Awareness?
What is not a purpose of the deployment of Check Point API?
Which path below is available only when CoreXL is enabled?
You plan to automate creating new objects using new R81 Management API. You decide to use GAIA CLI for this task.
What is the first step to run management API commands on GAIA’s shell?
Which one of the following is NOT a configurable Compliance Regulation?
Secure Configuration Verification (SCV), makes sure that remote access client computers are configured in accordance with the enterprise Security Policy. Bob was asked by Alice to implement a specific SCV configuration but therefore Bob needs to edit and configure a specific Check Point file. Which location file and directory is true?
By default how often updates are checked when the CPUSE Software Updates Policy is set to Automatic?
Fill in the blank: __________ information is included in “Full Log” tracking option, but is not included in “Log” tracking option?
The log server sends what to the Correlation Unit?
What is false regarding a Management HA environment?
Fill in the blank: A ________ VPN deployment is used to provide remote users with secure access to internal corporate resources by authenticating the user through an internet browser.
Fill in the blank: Permanent VPN tunnels can be set on all tunnels in the community, on all tunnels for specific gateways, or ______ .
Which command is used to add users to or from existing roles?
How can you see historical data with cpview?
According to out of the box SmartEvent policy, which blade will automatically be correlated into events?
Which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?
IF the first packet of an UDP session is rejected by a rule definition from within a security policy (not including the clean up rule), what message is sent back through the kernel?
Which is the correct order of a log flow processed by SmartEvent components?
Packet acceleration (SecureXL) identifies connections by several attributes. Which of the attributes is NOT used for identifying connection?
Which option, when applied to a rule, allows traffic to VPN gateways in specific VPN communities?
Firewall polices must be configured to accept VRRP packets on the GAiA platform if it Firewall software. The Multicast destination assigned by the internet Assigned Number Authority (IANA) for VRRP is:
What is required for a site-to-site VPN tunnel that does not use certificates?
What command is used to manually failover a cluster during a zero-downtime upgrade?
What mechanism can ensure that the Security Gateway can communicate with the Management Server with ease in situations with overwhelmed network resources?
Alice knows about the Check Point Management HA installation from Bob and needs to know which Check Point Security Management Server is currently capable of issuing and managing certificate. Alice uses the Check Point command "cpconfig'' to run the Check Point Security Management Server configuration tool on both Check Point Management HA instances "Primary & Secondary" Which configuration option does she need to look for:
Fill in the blank RADIUS protocol uses_____to communicate with the gateway
How is communication between different Check Point components secured in R81? As with all questions, select the BEST answer.
CoreXL is NOT supported when one of the following features is enabled: (Choose three)
When running a query on your logs, to find records for user Toni with machine IP of 10.0.4.210 but exclude her tablet IP of 10.0.4.76, which of the following query syntax would you use?
After verifying that API Server is not running, how can you start the API Server?
Which is the lowest gateway version supported by R81.20 management server?
What is the main objective when using Application Control?
What does the "unknown" SIC status shown on SmartConsole mean?
Rugged appliances are small appliances with ruggedized hardware and like Quantum Spark appliance they use which operating system?
Bob is asked by Alice to disable the SecureXL mechanism temporary tor further diagnostic by their Check Point partner. Which of the following Check Point Command is true:
Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?
What is required for a certificate-based VPN tunnel between two gateways with separate management systems?
In R81.20 a new feature dynamic log distribution was added. What is this for?
By default, the R81 web API uses which content-type in its response?
Which firewall daemon is responsible for the FW CLI commands?
What API command below creates a new host object with the name "My Host" and IP address of "192 168 0 10"?
SmartEvent uses it's event policy to identify events. How can this be customized?
Packet acceleration (SecureXL) identities connections by several attributes. Which of the attributes is NOT used for identifying connection?
What are not possible commands to acquire the lock in order to make changes in Clish or Web GUI?
Aaron is a Syber Security Engineer working for Global Law Firm with large scale deployment of Check Point Enterprise Appliances running GAiA R81.X The Network Security Developer Team is having an issue testing the API with a newly deployed R81.X Security Management Server Aaron wants to confirm API services are working properly. What should he do first?
What a valid SecureXL paths in R81.20?
After finishing installation admin John likes to use top command in expert mode. John has to set the expert-password and was able to use top command. A week later John has to use the top command again, He detected that the expert password is no longer valid. What is the most probable reason for this behavior?
Which component is NOT required to communicate with the Web Services API?
Alice wants to upgrade the current security management machine from R80.40 to R81.20 and she wants to check the Deployment Agent status over the GAIA CLISH. Which of the following GAIACLISH command is true?
Which of these statements describes the Check Point ThreatCloud?
The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?
What SmartEvent component creates events?
In a Client to Server scenario, which inspection point is the first point immediately following the tables and rule base check of a packet coming from outside of the network?
To help SmartEvent determine whether events originated internally or externally you must define using the Initial Settings under General Settings in the Policy Tab. How many options are available to calculate the traffic direction?
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?
Fill in the blank: The R81 feature _____ permits blocking specific IP addresses for a specified time period.
Which features are only supported with R81.20 Gateways but not R77.x?
Selecting an event displays its configurable properties in the Detail pane and a description of the event in the Description pane. Which is NOT an option to adjust or configure?
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.
What are the three components for Check Point Capsule?
Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.
To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot:
Which of the SecureXL templates are enabled by default on Security Gateway?
Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?
Which view is NOT a valid CPVIEW view?
What is not a component of Check Point SandBlast?
Which command collects diagnostic data for analyzing customer setup remotely?
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?
You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?
Which of the following statements is TRUE about R81 management plug-ins?
Identify the API that is not supported by Check Point currently.
How many images are included with Check Point TE appliance in Recommended Mode?
What is true about VRRP implementations?
Which command can you use to verify the number of active concurrent connections?
R81.20 management server can manage gateways with which versions installed?
Where you can see and search records of action done by R81 SmartConsole administrators?
What Factor preclude Secure XL Templating?
The Firewall kernel is replicated multiple times, therefore:
What is the correct command to observe the Sync traffic in a VRRP environment?
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?
On R81.20 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:
Which method below is NOT one of the ways to communicate using the Management API’s?
What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?
What happen when IPS profile is set in Detect Only Mode for troubleshooting?
Which statement is correct about the Sticky Decision Function?
Which statement is true regarding redundancy?
Session unique identifiers are passed to the web api using which http header option?
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidated management console. It empowers the migration from legacy Client-side logic to Server-side logic. The cpm process:
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?
What is true about the IPS-Blade?
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?
SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?
Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?
To fully enable Dynamic Dispatcher on a Security Gateway:
In R81 spoofing is defined as a method of:
In R81, how do you manage your Mobile Access Policy?