What command syntax would you use to turn on PDP logging in a distributed environment?
How do you configure the Security Policy to provide user access to the Captive Portal through an external (Internet) interface?
You are troubleshooting a HTTP connection problem. You've started fw monitor -o http.pcap. When you open http.pcap with Wireshark there is only one line. What is the most likely reason?
Which of the following CLISH commands would you use to set the admin user's shell to bash?
Which of the following commands can provide the most complete restoration of a R77 configuration?
Your company is running Security Management Server R77 on GAiA, which has been migrated through each version starting from Check Point 4.1. How do you add a new administrator account?
All R77 Security Servers can perform authentication with the exception of one. Which of the Security Servers can NOT perform authentication?
The technical-support department has a requirement to access an intranet server. When configuring a User Authentication rule to achieve this, which of the following should you remember?
Where is it necessary to configure historical records in SmartView Monitor to generate Express reports in SmartReporter?
If Jack was concerned about the number of log entries he would receive in the SmartReporter system, which policy would he need to modify?
Assume you are a Security Administrator for ABCTech. You have allowed authenticated access to users from Mkting_net to Finance_net. But in the user’s properties, connections are only permitted within Mkting_net. What is the BEST way to resolve this conflict?
You find that Users are not prompted for authentication when they access their Web servers, even though you have created an HTTP rule via User Authentication. Choose the BEST reason why.
Which of the following is a CLI command for Security Gateway R77?
Which command would provide the most comprehensive diagnostic information to Check Point Technical Support?
Which command line interface utility allows the administrator to verify the Security Policy name and timestamp currently installed on a firewall module?
Before upgrading SecurePlatform to GAiA, you should create a backup. To save time, many administrators use the command backup. This creates a backup of the Check Point configuration as well as the system configuration.
An administrator has installed the latest HFA on the system for fixing traffic problem after creating a backup file. There is a mistake in the very complex static routing configuration. The Check Point configuration has not been changed. Can the administrator use a restore to fix the errors in static routing?
Match the ClusterXL modes with their configurations.
Exhibit:
Fill in the blank.
In New Mode HA, the internal cluster IP VIP address is 10.4.8.3. The internal interfaces on two members are 10.4.8.1 and 10.4.8.2 Internal host 10.4.8.108 pings 10.4.8.3, and receives replies. Review the ARP table from the internal Windows host 10.4.8.108. According to the output, which member is the standby machine?
Complete this statement from the options provided. Using Captive Portal, unidentified users may be either; blocked, allowed to enter required credentials, or required to download the _____________.
The Identity Agent is a lightweight endpoint agent that authenticates securely with Single Sign-On (SSO). What is not a recommended usage of this method?
Which process should you debug if SmartDashboard login fails?
The connection to the ClusterXL member ‘A’ breaks. The ClusterXL member ‘A’ status is now ‘down’. Afterwards the switch admin set a port to ClusterXL member ‘B’ to ‘down’. What will happen?
Which of the following allows administrators to allow or deny traffic to or from a specific network based on the user’s credentials?
What happens if the identity of a user is known?
How granular may an administrator filter an Access Role with identity awareness? Per:
Which of the following is NOT defined by an Access Role object?
Fill in the blank. The command that typically generates the firewall application, operating system, and hardware specific drivers is _________ .
Fill in the blank. The user wants to replace a failed Windows-based firewall with a new server running GAiA. For the most complete restore of an GAiA configuration, he or she will use the command
Which Check Point tool allows you to open a debug file and see the VPN packet exchange details.
You want VPN traffic to match packets from internal interfaces. You also want the traffic to exit the Security Gateway bound for all site-to-site VPN Communities, including Remote Access Communities. How should you configure the VPN match rule?