CCSE Flashcards
In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?
Install policy
Name the file that is an electronically signed file used by Check Point to translate the features in the license into a code?
cp.macro
Which two Identity Awareness daemons are used to support identity sharing?
Policy Decision Point (PDP) and Policy Enforcement Point (PEP)
In which scenario will an administrator need to manually define Proxy ARP?
A. When they configure an “Automatic Static NAT” which translates to an IP address that does not belong to one of the firewall’s interfaces.
B. When they configure an “Automatic Hide NAT” which translates to an IP address that does not belong to one of the firewall’s interfaces.
C. When they configure a “Manual Static NAT” which translates to an IP address that does not belong to one of the firewall’s interfaces.
D. When they configure a “Manual Hide NAT” which translates to an IP address that belongs to one of the firewall’s interfaces.
C. When they configure a “Manual Static NAT” which translates to an IP address that does not belong to one of the firewall’s interfaces.
Rugged appliances are small appliances with ruggedized hardware and like Quantum Spark appliance they use which operating system?
A. Centos Linux
B. Gaia embedded.
C. Gaia
D. Red Hat Enterprise Linux version 5
B. Gaia embedded.
For Automatic Hide NAT rules created by the administrator what is a TRUE statement?
A. Source Port Address Translation (PAT) is enabled by default.
B. Automatic NAT rules are supported for Network objects only.
C. Automatic NAT rules are supported for Host objects only.
D. Source Port Address Translation (PAT) is disabled by default.
A. Source Port Address Translation (PAT) is enabled by default.
What technologies are used to deny or permit network traffic?
A. Stateful Inspection, Firewall Blade, and URL/Application Blade
B. Packet Filtering, Stateful Inspection, and Application Layer Firewall
C. Firewall Blade, URL/Application Blade, and IPS
D. Stateful Inspection, URL/Application Blade, and Threat Prevention
B. Packet Filtering, Stateful Inspection, and Application Layer Firewall
Identity Awareness allows easy configuration for network access and auditing based on what three items?
A. Client machine IP address.
B. Network location, the identity of a user and the identity of a machine.
C. Log server IP address.
D. Gateway proxy IP address.
B. Network location, the identity of a user and the identity of a machine.
Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?
A. Windows Management Instrumentation (WMI)
B. Hypertext Transfer Protocol Secure (HTTPS)
C. Lightweight Directory Access Protocol (LDAP)
D. Remote Desktop Protocol (RDP)
Windows Management Instrumentation (WMI)
What are the types of Software Containers?
A. Smart Console, Security Management, and Security Gateway
B. Security Management, Security Gateway, and Endpoint Security
C. Security Management, Log & Monitoring, and Security Policy
D. Security Management, Standalone, and Security Gateway
B. Security Management, Security Gateway, and Endpoint Security
What are the Threat Prevention software components available on the Check Point Security Gateway?
A. IPS, Threat Emulation and Threat Extraction
B. IPS, Anti-Bot, Anti-Virus, SandBlast and Macro Extraction
C. IPS, Anti-Bot, Anti-Virus, Threat Emulation and Threat Extraction
D. IDS, Forensics, Anti-Virus, Sandboxing
C. IPS, Anti-Bot, Anti-Virus, Threat Emulation and Threat Extraction
When using Automatic Hide NAT, what is enabled by default?
Source Port Address Translation (PAT)
In which deployment is the security management server and Security Gateway installed on the same appliance?
Standalone
What is the main objective when using Application Control?
A. To filter out specific content.
B. To assist the firewall blade with handling traffic.
C. To see what users are doing.
D. Ensure security and privacy of information.
A. To filter out specific content.
Gaia has two default user accounts that cannot be deleted. What are those user accounts?
Admin and Monitor
When changes are made to a Rule base, It is important to __________ to enforce changes.
Install policy
Why is a Central License the preferred and recommended method of licensing?
A. Central Licensing actually not supported with Gaia.
B. Central Licensing is the only option when deploying Gala.
C. Central Licensing ties to the IP address of a gateway and can be changed to any gateway if needed.
D. Central Licensing ties to the IP address of the management server and is not dependent on the IP of any gateway in the event it changes.
D. Central Licensing ties to the IP address of the management server and is not dependent on the IP of any gateway in the event it changes.
What does the “unknown” SIC status shown on SmartConsole mean?
A. SIC activation key requires a reset
B. Administrator input the wrong SIC key
C. The management can contact the Security Gateway but cannot establish Secure Internal Communication
D. There is no connection between the Security Gateway and Security Management Server
D. There is no connection between the Security Gateway and Security Management Server
What are valid authentication methods for mutual authenticating the VPN gateways?
A. PKI Certificates and Kerberos Tickets
B. PKI Certificates and DynamicID OTP
C. Pre-Shared Secrets and Kerberos Ticket
D. Pre-shared Secret and PKI Certificates
D. Pre-shared Secret and PKI Certificates
What are the correct steps upgrading a HA cluster (M1 is active, M2 is passive) using Multi-Version Cluster(MVC)Upgrade?
A. 1) Enable the MVC mechanism on both cluster members #cphaprob mvc on
2) Upgrade the passive node M2 to R81.10
3) In SmartConsole, change the version of the cluster object
4) Install the Access Control Policy and make sure that the installation will not stop if installation on one cluster member fails
5) After examine the cluster states upgrade node M1 to R81.10
6) On each Cluster Member, disable the MVC mechanism
B. 1) Enable the MVC mechanism on both cluster members #cphaprob mvc on
2) Upgrade the passive node M2 to R81.10
3) In SmartConsole, change the version of the cluster object
4) Install the Access Control Policy
5) After examine the cluster states upgrade node M1 to R81.10
6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy
C. 1) In SmartConsole, change the version of the cluster object
2) Upgrade the passive node M2 to R81.10
3) Enable the MVC mechanism on the upgraded R81.10 Cluster Member M2 #cphaconf mvc on
4) Install the Access Control Policy and make sure that the installation will not stop if installation on one cluster member fails
5) After examine the cluster states upgrade node M1 to R81.10
6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy SmartConsole, change the version of the cluster object
D. 1) Upgrade the passive node M2 to R81.10
2) Enable the MVC mechanism on the upgraded R81.10 Cluster Member M2 #cphaconf mvc on
3) In SmartConsole, change the version of the cluster object
4) Install the Access Control Policy
5) After examine the cluster states upgrade node M1 to R81.10
6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy upgrade the passive node M2 to R81.10
C. 1) In SmartConsole, change the version of the cluster object
2) Upgrade the passive node M2 to R81.10
3) Enable the MVC mechanism on the upgraded R81.10 Cluster Member M2 #cphaconf mvc on
4) Install the Access Control Policy and make sure that the installation will not stop if installation on one cluster member fails
5) After examine the cluster states upgrade node M1 to R81.10
6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy SmartConsole, change the version of the cluster object
Which Operating Systems are supported for the Endpoint Security VPN?
A. Windows and x86 Solaris
B. Windows and macOS computers
C. Windows and SPARC Solaris
D. Windows and Red Hat Linux
B. Windows and macOS computers
What are the three SecureXL Templates available in R81.10?
A. PEP Templates, QoS Templates, VPN Templates
B. Accept Templates, Drop Templates, NAT Templates
C. Accept Templates, Drop Templates, Reject Templates
D. Accept Templates, PDP Templates, PEP Templates
B. Accept Templates, Drop Templates, NAT Templates
Which Queue in the Priority Queue has the maximum priority?
A. High Priority
B. Control
C. Routing
D. Heavy Data Queue
C. Routing
Which upgrade method you should use upgrading from R80.40 to R81.10 to avoid any downtime?
A. Zero Downtime Upgrade (ZDU)
B. Connectivity Upgrade (CU)
C. Minimal Effort Upgrade (ME)
D. Multi-Version Cluster Upgrade (MVC)
Multi-Version Cluster Upgrade (MVC)
The Check Point installation history feature in provides the following:
A. View install changes and install specific version
B. Policy Installation Date only
C. Policy Installation Date, view install changes and install specific version
D. View install changes
C. Policy Installation Date, view install changes and install specific version
What is the SOLR database for?
A. Writes data to the database and full text search
B. Enables powerful matching capabilities and writes data to the database
C. Serves GUI responsible to transfer request to the DLEserver
D. Used for full text search and enables powerful matching capabilities
D. Used for full text search and enables powerful matching capabilities
Which command lists firewall chain?
fw ctl chain
Sand Blast appliances can be deployed in the following modes:
A. as a Mail Transfer Agent and as part of the we traffic flow only
B. using a SPAN port to receive a copy of the traffic only
C. detect only
D. inline/prevent or detect
D. inline/prevent or detect
Which SmartEvent component is responsible to collect the logs from different Log Servers?
SmartEvent Correlation Unit
How can you switch the active log file?
A. Run fw logswitch on the gateway
B. Run fwm logswitch on the Management Server
C. Run fwm logswitch on the gateway
D. Run fw logswitch on the Management Server
Run fw logswitch on the Management Server
What is the purpose of the command “ps aux | grep fwd”?
A. You can check the Process ID and the processing time of the fwd process.
B. You can convert the log file into Post Script format.
C. You can list all Process IDs for all running services.
D. You can check whether the IPS default setting is set to Detect or Prevent mode.
You can check the Process ID and the processing time of the fwd process.
What is the command switch to specify the Gaia API context?
A. You have to specify it in the YAML file api.yml which is located underneath the /etc directory of the security management server
B. You have to change to the zsh-Shell which defaults to the Gaia API context.
C. No need to specify a context, since it defaults to the Gaia API context.
D. mgmt_cli –context gaia_api <command></command>
D. mgmt_cli –context gaia_api <command></command>
What are the two types of tests when using the Compliance blade?
A. Policy-based tests and Global properties
B. Global tests and Object-based tests
C. Access Control policy analysis and Threat Prevention policy analysis
D. Tests conducted based on the IoC XML file and analysis of SOLR documents
Global tests and Object-based tests
Besides fw monitor, what is another command that can be used to capture packets?
tcpdump
When performing a minimal effort upgrade, what will happen to the network traffic?
A. All connections that were initiated before the upgrade will be dropped, causing network downtime.
B. All connections that were initiated before the upgrade will be handled by the active gateway
C. All connections that were initiated before the upgrade will be handled normally
D. All connections that were initiated before the upgrade will be handled by the standby gateway
A. All connections that were initiated before the upgrade will be dropped, causing network downtime.
Using fw monitor you see the following inspection point notion E and i what does that mean?
A. E shows the packet before the VPN encryption, i after the inbound firewall VM
B. E shows the packet reaching the external interface, i leaving the internal interface
C. E shows the packet after the VPN encryption, i before the inbound firewall VM
D. E shows the packet leaving the external interface, i reaching the internal interface
C. E shows the packet after the VPN encryption, i before the inbound firewall VM
You have used the SmartEvent GUI to create a custom Event policy. What is the best way to display the correlated Events generated by SmartEvent Policies?
A. Open SmartView Monitor and select the SmartEvent Window from the main menu.
B. In the SmartConsole / Logs & Monitor –> open the Logs View and use type:Correlated as query filter.
C. In the SmartConsole / Logs & Monitor -> open a new Tab and select External Apps / SmartEvent.
D. Select the Events tab in the SmartEvent GUI or use the Events tab in the SmartView web interface.
B. In the SmartConsole / Logs & Monitor –> open the Logs View and use type:Correlated as query filter.
What is the biggest benefit of policy layers?
A. To break one policy into several virtual policies
B. Policy Layers and Sub-Policies enable flexible control over the security policy
C. They improve the performance on OS kernel version 3.0
D. To include Threat Prevention as a sub policy for the firewall policy
B. Policy Layers and Sub-Policies enable flexible control over the security policy
Which packet info is masked with Session Rate Acceleration?
A. same info from Packet Acceleration is used
B. source port ranges
C. source port
D. source ip
source port
What does Backward Compatibility mean when upgrading the Management Server and how can you check it?
A. The Management Server is able to manage older Gateways. The lowest supported version is documented in the Installation and Upgrade Guide
B. The Management Server is able to manage older Gateways. The lowest supported version is documented in the Release Notes
C. You will be able to connect to older Management Server with the SmartConsole. The lowest supported version is documented in the Installation and Upgrade Guide
D. You will be able to connect to older Management Server with the SmartConsole. The lowest supported version is documented in the Release Notes
B. The Management Server is able to manage older Gateways. The lowest supported version is documented in the Release Notes
Bob is going to prepare the import of the exported R81.10 management database. Now he wants to verify that the installed tools on the new target security management machine are able to handle the R81.10 release. Which of the following Check Point command is true?
A. $FWDIR/scripts/migrate_server print_installed_tools -v R77.30
B. $CPDIR/scripts/migrate_server print_installed_tools -v R81.10
C. $FWDIR/scripts/migrate_server print_installed_tools -v R81.10
D. $FWDIR/scripts/migrate_server print_uninstalled_tools -v R81.10
C. $FWDIR/scripts/migrate_server print_installed_tools -v R81.10
What a valid SecureXL paths in R81.10?
A. F2F (Slow path), Templated Path, PQX and F2V
B. F2F (Slow path), PXL, QXL and F2V
C. F2F (Slow path), Accelerated Path, PQX and F2V
D. F2F (Slow path), Accelerated Path, Medium Path and F2V
D. F2F (Slow path), Accelerated Path, Medium Path and F2V
Alice was asked by Bob to implement the Check Point Mobile Access VPN blade – therefore are some basic configuration steps required – which statement about the configuration steps is true?
A. 1. Enable Mobile Access blade on the Security Gateway object and complete the wizard
2. Configure Mobile Access parameters in Security Gateway object
3. Add a rule in the Access Control Policy and install policy
4. Connect to the Mobile Access Portal
B. 1. Configure Mobile Access parameters in Security Gateway object
2. Enable Mobile Access blade on the Security Gateway object and complete the wizard
3. Add a rule in the Access Control Policy and install policy
4. Connect to the Mobile Access Portal
C. 1. Connect to the Mobile Access Portal
2. Enable Mobile Access blade on the Security Gateway object and complete the wizard
3. Configure Mobile Access parameters in Security Gateway object
4. Add a rule in the Access Control Policy and install policy
D. 1. Add a rule in the Access Control Policy and install policy
2. Configure Mobile Access parameters in Security Gateway object
3. Enable Mobile Access blade on the Security Gateway object and complete the wizard
4. Connect to the Mobile Access Portal
A. 1. Enable Mobile Access blade on the Security Gateway object and complete the wizard
2. Configure Mobile Access parameters in Security Gateway object
3. Add a rule in the Access Control Policy and install policy
4. Connect to the Mobile Access Portal
What are not possible commands to acquire the lock in order to make changes in Clish or Web GUI?
A. set config-lock on override
B. Click the Lock icon in the WebUI
C. “set rbac rw = 1”
D. lock database override
C. “set rbac rw = 1”
The customer has about 150 remote access user with a Windows laptop. Not more than 50 Clients will be connected at the same time. The customer wants to use multiple VPN Gateways as entry point and a personal firewall. What will be the best license for him?
A. He will need Capsule Connect using MEP (multiple entry points).
B. Because the customer uses only Windows clients SecuRemote will be sufficient and no additional license is needed.
C. He will need Harmony Endpoint because of the personal firewall.
D. Mobile Access license because he needs only a 50 user license, license count is per concurrent user.
C. He will need Harmony Endpoint because of the personal firewall.
SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?
A. Application and Client Service
B. Network and Layers
C. Virtual Adapter and Mobile App
D. Network and Application
Network and Application
The admin is connected via ssh to the management server. He wants to run a mgmt_cli command but got an Error 404 message. To check the listening ports on the management he runs netstat with the results shown below. What can be the cause for the issue?
[Expert@SMS:0]# mgmt_cli show service-tcp name FTP
Username: admin -
Password:
message: “Error 404. The Management API service is not available. Please check that the Management API server is up and running.” code: “generic_error”
[Expert@SMS:0]# netstat -anp | grep http
tcp00 0.0.0.0:800.0.0.0:LISTEN18114/httpd
tcp00127.0.0.1:810.0.0.0:LISTEN18114/httpd
tcp00 0.0.0.0:44340.0.0.0:LISTEN9019/httpd2
tcp00 0.0.0.0:4430.0.0.0:LISTEN 18114/httpd
A. Wrong Management API Access settings for the client IP. To correct it go to SmartConsole / Management & Settings / Blades / Management API and press ‘Advanced Settings…’ and choose GUI clients or ALL IP’s.
B. The API didn’t run on the default port check it with ‘api status’ and add ‘–port 4434’ to the mgmt_cli command.
C. The management permission in the user profile is missing. Go to SmartConsole / Management & Settings / Permissions & Administrators / Permission Profiles. Select the profile of the user and enable ‘Management API Login’ under Management Permissions.
D. The API is not running, the services shown by netstat are the Gaia services. To start the API run ‘api start’.
C. The management permission in the user profile is missing. Go to SmartConsole / Management & Settings / Permissions & Administrators / Permission Profiles. Select the profile of the user and enable ‘Management API Login’ under Management Permissions.
From SecureXL perspective, what are the three paths of traffic flow:
A. Initial Path; Medium Path; Accelerated Path
B. Layer Path; Blade Path; Rule Path
C. Firewall Path; Accelerated Path; Medium Path
D. Firewall Path; Accept Path; Drop Path
Firewall Path; Accelerated Path; Medium Path
What are the services used for Cluster Synchronization?
A. 256/TCP for Full Sync and 8116/UDP for Delta Sync
B. 8116/UDP for Full Sync and Delta Sync
C. TCP/256 for Full Sync and Delta Sync
D. No service needed when using Broadcast Mode
A. 256/TCP for Full Sync and 8116/UDP for Delta Sync
Using Web Services to access the API, which Header Name-Value had to be in the HTTP Post request after the login?
A. X-chkp-sid Session Unique Identifier
B. API-Key
C. user-uid
D. uuid Universally Unique Identifier
A. X-chkp-sid Session Unique Identifier
Which two Cluster Solutions are available under R81.10?
A. ClusterXL and NSRP
B. VRRP and HSRP
C. VRRP and IP Clustering
D. ClusterXL and VRRP
ClusterXL and VRRP
Alice & Bob are going to deploy Management Data Plane Separation (MDPS) for all their Check Point Security Gateway(s)/Cluster(s). Which of the following statement is true?
A. Each network environment is dependent and includes interfaces, routes, sockets, and processes
B. Management Plane – To access, provision and monitor the Security Gateway
C. Data Plane – To access, provision and monitor the Security Gateway
D. Management Plane – for all other network traffic and processing
B. Management Plane – To access, provision and monitor the Security Gateway
When URL Filtering is set, what identifying data gets sent to the Check Point Online Web Service?
A. The URL and server certificate are sent to the Check Point Online Web Service.
B. The full URL, including page data, is sent to the Check Point Online Web Service.
C. The host part of the URL is sent to the Check Point Online Web Service.
D. The URL and IP address are sent to the Check Point Online Web Service.
C. The host part of the URL is sent to the Check Point Online Web Service.
How do logs change when the “Accounting” tracking option is enabled on a traffic rule?
A. Involved traffic logs will be forwarded to a log server.
B. Provides log details view email to the Administrator.
C. Involved traffic logs are updated every 10 minutes to show how much data has passed on the connection.
D. Provides additional information to the connected user.
C. Involved traffic logs are updated every 10 minutes to show how much data has passed on the connection.
To increase security, the administrator has modified the Core protection ‘Host Port Scan’ from ‘Medium’ to ‘High’ Predefined Sensitivity. Which Policy should the administrator install after Publishing the changes?
A. The Access Control and Threat Prevention Policies.
B. The Access Control Policy.
C. The Access Control & HTTPS Inspection Policy.
D. The Threat Prevention Policy.
The Access Control Policy.
Which Check Point process provides logging services, such as forwarding logs from Gateway to Log Server providing Log Export API (LEA) & Event Logging API (ELA) services?
A. DASSERVICE
B. FWD
C. CPVIEWD
D. CPD
B. FWD
What mechanism can ensure that the Security Gateway can communicate with the Management Server with ease in situations with overwhelmed network resources?
A. The corresponding feature is new to R81.10 and is called “Management Data Plane Separation”
B. The corresponding feature is called “Dynamic Dispatching”
C. There is a feature for ensuring stable connectivity to the management server and is done via Priority Queuing
D. The corresponding feature is called “Dynamic Split”
A. The corresponding feature is new to R81.10 and is called “Management Data Plane Separation”
According to the policy installation flow the transfer state (CPTA) is responsible for the code generated by the FWM. On the Security Gateway side, a process receives them and first stores them into a temporary directory. Which process is true for receiving these files:
A. FWD
B. CPD
C. FWM
D. RAD
CPD
What is the amount of Priority Queues by default?
A. There are 8 priority queues and this number cannot be changed.
B. There is no distinct number of queues since it will be changed in a regular basis based on its system requirements.
C. There are 7 priority queues by default and this number cannot be changed.
D. There are 8 priority queues by default, and up to 8 additional queues can be manually configured
D. There are 8 priority queues by default, and up to 8 additional queues can be manually configured
In R81.10 a new feature dynamic log distribution was added. What is this for?
A. Configure the Security Gateway to distribute logs between multiple active Log Servers to support a better rate of Logs and Log Servers redundancy
B. In case of a Management High Availability the management server stores the logs dynamically on the member with the most available disk space in /var/log
C. Synchronize the log between the primary and secondary management server in case of a Management High Availability
D. To save disk space in case of a firewall cluster local logs are distributed between the cluster members
A. Configure the Security Gateway to distribute logs between multiple active Log Servers to support a better rate of Logs and Log Servers redundancy
What could NOT be a reason for synchronization issues in a Management HA environment?
A. Accidentally, you have configured unique IP addresses per Management Server which invalidates the CA Certificate
B. There is a network connectivity failure between the servers
C. Servers are in Collision Mode. Two servers, both in active state cannot be synchronized either automatically or manually.
D. The products installed on the servers do not match: one device is a Standalone Server while the other is only a Security Management server.
A. Accidentally, you have configured unique IP addresses per Management Server which invalidates the CA Certificate
What is the correct Syntax for adding an access-rule via R80 API?
A. add access-rule layer “Network” action “Allow”
B. add access-rule layer “Network” position 1 name “Rule 1” service.1 “SMTP” service.2 “http”
C. add access-rule and follow the wizard
D. add rule position 1 name “Rule 1” policy-package “Standard” add service “http”
B. add access-rule layer “Network” position 1 name “Rule 1” service.1 “SMTP” service.2 “http”
Secure Configuration Verification (SCV), makes sure that remote access client computers are configured in accordance with the enterprise Security Policy. Bob was asked by Alice to implement a specific SCV configuration but therefore Bob needs to edit and configure a specific Check Point file. Which location file and directory are true?
A. $FWDIR/conf/client.scv
B. $CPDIR/conf/local.scv
C. $CPDIR/conf/client.scv
D. $FWDIR/conf/local.scv
D. $FWDIR/conf/local.scv
What feature allows Remote-access VPN users to access resources across a site-to-site VPN tunnel?
A. Network Access VPN Domain
B. Remote Access VPN Switch
C. Community Specific VPN Domain
D. Mobile Access VPN Domain
Community Specific VPN Domain
Main Mode in IKEv1 uses how many packages for negotiation?
A. 4
B. depends on the make of the peer gateway
C. 3
D. 6
D. 6
To ensure that VMAC mode is enabled, which CLI command you should run on all cluster members?
A. fw ctl set int fwha vmac global param enabled
B. cphaprob -a if
C. fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1
D. fw ctl get int fwha vmac global param enabled; result of command should return value 1
C. fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1
Can multiple administrators connect to a Security Management Server at the same time?
A. Yes, all administrators can modify a network object at the same time.
B. No, only one can be connected.
C. Yes, every administrator has their own username, and works in a session that is independent of other administrators.
D. Yes, but only one has the right to write.
C. Yes, every administrator has their own username, and works in a session that is independent of other administrators.
You have used the “set inactivity-timeout 120” command to prevent the session to be disconnected after 10 minutes of inactivity. However, the Web session is being disconnected after 10 minutes. Why?
A. The idle timeout for the web session is specified with the “set web session-timeout” command.
B. The number specified is the amount of the idle timeout in seconds rather than in minutes. So you have to use the command “set inactivity-timeout 600” instead.
C. Probably, you have forgotten to make sure that nobody is accessing the management server via the SmartConsole which locks the management database.
D. The number of minutes is correct. Probably, you have forgotten to save this setting with the “save config” command.
A. The idle timeout for the web session is specified with the “set web session-timeout” command.
Your manager asked you to check the status of SecureXL, and its enabled templates and features. What command will you use to provide such information to manager?
A. fw acces stats
B. fw accel stat
C. fwaccel stats
D. fwaccel stat
D. fwaccel stat
What command lists all interfaces using Multi-Queue?
A. show multiqueue all
B. cpmq set
C. mq_mng –show
D. show interface all
C. mq_mng –show
There are 4 ways to use the Management API for creating host object with the Management API. Which one is NOT correct?
A. Using SmartConsole GUI console
B. Using CLISH
C. Using Web Services
D. Using cpconfig
Using cpconfig
Which 3 types of tracking are available for Threat Prevention Policy?
A. Syslog, None, User-defined scripts
B. Alert, SNMP trap, Mail
C. None, Log, Syslog
D. SMS Alert, Log, SNMP alert
Alert, SNMP trap, Mail
Bob is asked by Alice to disable the SecureXL mechanism temporary for further diagnostic by their Check Point partner. Which of the following Check Point Command is true?
A. fwaccel suspend
B. fwaccel standby
C. fwaccel off
D. fwaccel templates
C. fwaccel off
What are the attributes that SecureXL will check after the connection is allowed by Security Policy?
A. Source address, Destination address, Destination port, Protocol
B. Source MAC address, Destination MAC address, Source port, Destination port, Protocol
C. Source address, Destination address, Source port, Destination port, Protocol
D. Source address, Destination address, Source port, Destination port
A. Source address, Destination address, Destination port, Protocol
The VPN Link Selection will perform the following if the primary VPN link goes down?
A. The Firewall will drop the packets
B. The Firewall will inform the client that the tunnel is down
C. The Firewall will send out the packet on all interfaces
D. The Firewall can update the Link Selection entries to start using a different link for the same tunnel
D. The Firewall can update the Link Selection entries to start using a different link for the same tunnel
In CoreXL, the Firewall kernel is replicated multiple times. Each replicated copy or instance can perform the following:
A. The Firewall can run different policies per core
B. The Firewall can run the same policy on all cores
C. The Firewall kernel is replicated only with new connections and deletes itself once the connection times out
D. The Firewall kernel only touches the packet if the connection is accelerated
B. The Firewall can run the same policy on all cores
What is FALSE regarding a Management HA environment?
A. Only one Management Server should be active, while any others be in standby mode.
B. It is not necessary to establish SIC between the primary and secondary management server, since the latter gets the exact same copy of the management database from the prior.
C. SmartConsole can connect to any management server in ReadOnly mode.
D. Synchronization will occur automatically with each Publish event if the Standby servers are available.
B. It is not necessary to establish SIC between the primary and secondary management server, since the latter gets the exact same copy of the management database from the prior.
Which command will allow you to see the interface status?
A. cphaprob interface
B. cphaprob stat
C. cphaprob -a if
D. cphaprob -l interface
C. cphaprob -a if
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
A. Asymmetric routing
B. Anti-Spoofing
C. Failovers
D. Symmetric routing
Asymmetric routing
Matt wants to upgrade his old Security Management Server to R80.x using the Advanced Upgrade with Database Migration. What is one of the requirements for a successful upgrade?
A. Size of the /var/log folder of the target machine must be at least 25% of the size of the /var/log directory on the source machine
B. Size of the /var/log folder of the source machine must be at least 25% of the size of the /var/log directory on the target machine
C. Size of the /var/log folder of the target machine must be 25GB or more
D. Size of the $FWDIR/log folder of the target machine must be at least 25% of the size of the $FWDIR/log directory on the source machine
A. Size of the /var/log folder of the target machine must be at least 25% of the size of the /var/log directory on the source machine
Which of the following is NOT a type of Check Point API available in R80.x?
A. Management
B. OPSEC SDK
C. Identity Awareness Web Services
D. Mobile Access
Mobile Access
How many versions, besides the destination version, are supported in a Multi-Version Cluster Upgrade?
A. 4
B. 3
C. 1
D. 2
C. 1
What are the blades of Threat Prevention?
A. DLP, AntiVirus, QoS, AntiBot, Threat Emulation, Threat Extraction
B. IPS, QoS, AntiVirus, AntiBot, Threat Emulation, Threat Extraction
C. IPS, AntiVirus, AntiBot, Threat Emulation, Threat Extraction
D. IPS, AntiVirus, AntiBot
C. IPS, AntiVirus, AntiBot, Threat Emulation, Threat Extraction
How long may verification of one file take for Sandblast Threat Emulation?
up to 3 minutes
How do you enable virtual mac (VMAC) on-the-fly on a cluster member?
A. fw ctl set int fwha_vmac_global_param_enabled 1
B. clusterXL set int fwha_vmac_global_param_enabled 1
C. cphaprob set int fwha_vmac_global_param_enabled 1
D. cphaconf set int fwha_vmac_global_param_enabled 1
A. fw ctl set int fwha_vmac_global_param_enabled 1
What component of Management is used for indexing?
A. DBSync
B. API Server
C. fwm
D. SOLR
SOLR
Which process is used mainly for backward compatibility of gateways in R80.x? It provides communication with GUI-client, database manipulation, policy compilation and Management HA synchronization.
fwm
Which command shows actual allowed connections in state table?
A. fw tab -t connection
B. fw tab connections
C. fw tab -t connections
D. fw tab -t StateTable
C. fw tab -t connections
Which one is not a valid Package Option in the Web GUI for CPUSE?
A. Clean Install
B. Export Package
C. Upgrade
D. Database Conversion to R81.10 only
D. Database Conversion to R81.10 only
What is the minimum number of CPU cores required to enable CoreXL?
A. 1
B. 6
C. 2
D. 4
C. 2
The system administrator of a company is trying to find out why acceleration is not working for the traffic. The traffic is allowed according to the rule base and checked for viruses. But it is not accelerated. What is the most likely reason that the traffic is not accelerated?
The connection required a Security server
Which command shows only the table names of all kernel tables?
A. fw tab -t
B. fw tab -k
C. fw tab -n
D. fw tab -s
D. fw tab -s
If a “ping”-packet is dropped by FW1 Policy – on how many inspection Points do you see this packet in “fw monitor”?
A. “i” only
B. “i”, “l” and “o”
C. “i” and “l”
D. I don’t see it in fw monitor
A. “i” only
Which of the following is NOT an attribute of packet acceleration?
VLAN tag
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?
TCP port 256
Which statement is WRONG regarding the usage of the Central Deployment in SmartConsole?
A. You can install Hotfixes with the Central Deployment in SmartConsole.
B. You can install Jumbo Hotfix accumulators with the Central Deployment in SmartConsole.
C. Only Hotfixes can be installed with the Central Deployment in SmartConsole.
D. You can upgrade your cluster without user intervention with the Central Deployment in SmartConsole from R80.40 to R81.10.
C. Only Hotfixes can be installed with the Central Deployment in SmartConsole.
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
A. Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.
B. Configure rules to limit the available network bandwidth for specified users or groups.
C. Detects and blocks malware by correlating multiple detection engines before users are affected.
D. Use UserCheck to help users understand that certain websites are against the company’s security policy.
C. Detects and blocks malware by correlating multiple detection engines before users are affected.
Aaron is a Cyber Security Engineer working for Global Law Firm with large scale deployment of Check Point Enterprise Appliances running GAiA R80.X. The Network Security Developer Team is having an issue testing the API with a newly deployed R80.X Security Management Server. Aaron wants to confirm API services are working properly. What should he do first?
A. Aaron should check API Server status with “cpm api status” from Expert mode. If services are stopped, he should start them with “cpi api start”.
B. Aaron should check API Server status with “api status” from Expert mode. If services are stopped, he should start them with “api start”.
C. Aaron should check API Server status with “fwm api status” from Expert mode. If services are stopped, he should start them with “fwm api start”.
D. Aaron should check API Server status with “cpapi status” from Expert mode. If services are stopped, he should start them with “cpapi start”.
B. Aaron should check API Server status with “api status” from Expert mode. If services are stopped, he should start them with “api start”.
What is required for a site-to-site VPN tunnel that does not use certificates?
A. Pre-Shared Secret
B. RSA Token
C. Unique Passwords
D. SecureID
A. Pre-Shared Secret
The Compliance Blade allows you to search for text strings in many windows and panes, to search for a value in a field, what would your syntax be?
A. name_field:string
B. field_name:string
C. field name:string
D. name field:string
B. field_name:string
What is the correct order of the default “fw monitor” inspection points?
A. i, o, l, O
B. i, l, o, O
C. 1, 2, 3, 4
D. l, i, O, o
B. i, l, o, O
Bob works for a big security outsourcing provider company and as he receives a lot of change requests per day, he wants to use for scripting daily tasks the API services from Check Point for the GAIA API. Firstly, he needs to be aware if the API services are running for the GAIA operating system. Which of the following Check Point Command is true:
A. gaia_clish status
B. status gaia_api
C. api_gaia status
D. gaia_api status
D. gaia_api status
What is the recommended way to have a redundant Sync connection between the cluster nodes?
A. In the SmartConsole / Gateways & Servers -> select Cluster Properties / Network Management and define two Sync interfaces per node. Connect both Sync interfaces without using a switch.
B. Use a group of bonded interfaces. In the SmartConsole / Gateways & Servers -> select Cluster Properties / Network Management and define a Virtual IP for the Sync interface.
C. In the SmartConsole / Gateways & Servers -> select Cluster Properties / Network Management and define two Sync interfaces per node. Use two different Switches to connect both Sync interfaces.
D. Use a group of bonded interfaces connected to different switches. Define a dedicated sync interface, only one interface per node using the SmartConsole / Gateways & Servers -> select Cluster Properties / Network Management.
D. Use a group of bonded interfaces connected to different switches. Define a dedicated sync interface, only one interface per node using the SmartConsole / Gateways & Servers -> select Cluster Properties / Network Management.
To fully enable Dynamic Dispatcher on a Security Gateway:
A. Edit /proc/interrupts to include multik set_mode 1 at the bottom of the file, save, and reboot.
B. Using cpconfig, update the Dynamic Dispatcher value to “full” under the CoreXL menu.
C. Run fw ctl multik set_mode 1 in Expert mode and then reboot.
D. Run “fw ctl multik dynamic_dispatching on” and then reboot.
D. Run “fw ctl multik dynamic_dispatching on” and then reboot.
Which Remote Access Client does not provide an Office-Mode Address?
A. Check Point Mobile
B. SecuRemote
C. Endpoint Security Suite
D. Endpoint Security VPN
B. SecuRemote
What command verifies that the API server is responding?
A. api stat
B. api_get_status
C. api status
D. show api_status
C. api status
Which command shows the current Security Gateway Firewall chain?
A. show current chain
B. show firewall chain
C. fw ctl chain
D. fw ctl firewall-chain
C. fw ctl chain
By default, the web API uses which content-type in its response?
A. Java Script
B. XML
C. JSON
D. Text
C. JSON
What is Dynamic Balancing?
A. It is a ClusterXL feature that switches an HA cluster into an LS cluster if required to maximize throughput.
B. It is a feature that uses a daemon to balance the required number of firewall instances and SNDs based on the current load.
C. It is a new feature that is capable of dynamically reserve the amount of Hash kernel memory to reflect the resource usage necessary for maximizing the session rate.
D. It is a CoreXL feature that assigns the SND to network interfaces to balance the RX Cache of the interfaces.
B. It is a feature that uses a daemon to balance the required number of firewall instances and SNDs based on the current load.
What command can you use to have cpinfo display all installed hotfixes?
cpinfo -y all
What are the available options for downloading Check Point hotfixes in Gala WebUI (CPUSE)?
A. Manually, Scheduled, Enabled
B. Manually, Scheduled, Automatic
C. Manually, Scheduled, Disabled
D. Manually, Automatic, Disabled
B. Manually, Scheduled, Automatic
What is the most Ideal Synchronization Status for Security Management Server High Availability deployment?
Synchronized
Which statements below are CORRECT regarding Threat Prevention profiles in SmartConsole?
A. You can assign only one profile per gateway and a profile can be assigned to one or more rules.
B. You can assign only one profile per gateway and a profile can be assigned to one rule Only.
C. You can assign multiple profiles per gateway and a profile can be assigned to one rule only.
D. You can assign multiple profiles per gateway and a profile can be assigned to one or more rules.
D. You can assign multiple profiles per gateway and a profile can be assigned to one or more rules.
fwssd is a child process of which of the following Check Point daemons?
A. fwd
B. cpwd
C. fwm
D. cpd
A. fwd
Which command shows the current connections distributed by CoreXL FW instances?
A. fw ctl instances -v
B. fw ctl multik stat
C. fw ctl affinity -l
D. fw ctl iflist
B. fw ctl multik stat
After having saved the Clish Configuration with the “save configuration config.txt” command, where can you find the config.txt file?
A. You will find it in the home directory of your user account (e.g. /home/admin/).
B. You can locate the file via SmartConsole > Command Line.
C. You have to launch the WebUI and go to “Config” -> “Export Config File” and specify the destination directory of your local file system.
D. You cannot locate the file in the file system since Clish does not have any access to the bash file system.
A. You will find it in the home directory of your user account (e.g. /home/admin/).
What state is the Management HA in when both members have different policies/databases?
A. Never been synchronized
B. Synchronized
C. Lagging
D. Collision
D. Collision
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _______ or _______ action for the file types.
A. Detect/Bypass
B. Prevent/Bypass
C. Inspect/Prevent
D. Inspect/Bypass
D. Inspect/Bypass
When running a query on your logs, to find records for user Toni with machine IP of 10.0.4.210 but exclude her tablet IP of 10.0.4.76, which of the following query syntax would you use?
A. To AND 10.0.4.210 NOT 10.0.4.76
B. Toni? AND 10.0.4.210 NOT 10.0.4.76
C. “Toni” AND 10.0.4.210 NOT 10.0.4.76
D. Ton* AND 10.0.4.210 NOT 10.0.4.75
C. “Toni” AND 10.0.4.210 NOT 10.0.4.76
What happen when IPS profile is set in Detect Only Mode for troubleshooting?
A. It will not block malicious traffic
B. Automatically uploads debugging logs to Check Point Support Center
C. It will generate Geo-Protection traffic
D. Bypass licenses requirement for Geo-Protection control
A. It will not block malicious traffic
How would you enable VMAC Mode in ClusterXL?
A. Cluster Object -> Edit -> Cluster Members -> Edit -> Use Virtual MAC
B. fw ctl set int vmac_mode 1
C. cphaconf vmac_mode set 1
D. Cluster Object -> Edit -> ClusterXL and VRRP -> Use Virtual MAC
D. Cluster Object -> Edit -> ClusterXL and VRRP -> Use Virtual MAC
The Log server sends what to the Correlation Unit?
A. Event Policy
B. Authentication requests
C. CPMI dbsync
D. Logs
D. Logs
In SmartConsole, where do you manage your Mobile Access Policy?
A. Through the Mobile Console
B. Smart Dashboard
C. Shared Gateways Policy
D. From the Dedicated Mobility Tab
B. Smart Dashboard
What is NOT a Cluster Mode?
A. Load Sharing Unicast
B. Load Sharing Multicast
C. Active-Active
D. High Availability Multicast
D. High Availability Multicast
What is the command used to activate Multi-Version Cluster mode?
A. set cluster member mvc on in Clish
B. set cluster mvc on in Expert Mode
C. set cluster MVC on in Expert Mode
D. set mvc on in Clish
A. set cluster member mvc on in Clish
Which TCP port does the CPM process listen on?
A. 18191
B. 19009
C. 8983
D. 18190
B. 19009
Bob needs to know if Alice was configuring the new virtual cluster interface correctly. Which of the following Check Point commands is true?
A. cphaprob -a if
B. cphaprob state
C. cphaprob list
D. probcpha -a if
A. cphaprob -a if
CPM process stores objects, policies, users, administrators, licenses and management data in a database. This database is:
A. SOLR
B. MariaDB
C. PostgreSQL
D. MySQL
C. PostgreSQL
What is the correct description for the Dynamic Balancing / Split feature?
A. Dynamic Balancing / Split dynamically change the number of SND’s and firewall instances based on the current load. It is only available on Quantum Appliances and Open Server (not on Quantum Spark)
B. Dynamic Balancing / Split dynamically distribute the traffic from one network interface to multiple SND’s. The interface must support Multi-Queue. It is only available on Quantum Appliances and Open Server (not on Quantum Spark)
C. Dynamic Balancing / Split dynamically distribute the traffic from one network interface to multiple SND’s. The interface must support Multi-Queue. It is only available on Quantum Appliances (not on Quantum Spark or Open Server)
D. Dynamic Balancing / Split dynamically change the number of SND’s and firewall instances based on the current load. It is only available on Quantum Appliances (not on Quantum Spark or Open Server)
D. Dynamic Balancing / Split dynamically change the number of SND’s and firewall instances based on the current load. It is only available on Quantum Appliances (not on Quantum Spark or Open Server)
You want to allow your Mobile Access Users to connect to an internal file share. Adding the Mobile Application ‘File Share’ to your Access Control Policy in the SmartConsole didn’t work. You will be only allowed to select Services for the ‘Service & Application’ column. How to fix it?
A. A Quantum Spark Appliance is selected as Installation Target for the policy.
B. The Mobile Access Blade is not enabled for the Access Control Layer of the policy.
C. The Mobile Access Policy Source under Gateway properties is set to Legacy Policy and not to Unified Access Policy.
D. The Mobile Access Blade is not enabled under Gateway properties.
C. The Mobile Access Policy Source under Gateway properties is set to Legacy Policy and not to Unified Access Policy.
Please choose the path to monitor the compliance status of the Check Point Security Management.
A. Logs Monitor -> New Tab -> Open compliance View
B. Gateways Servers -> Compliance View
C. Security Policies -> New Tab -> Compliance View
D. Compliance blade not available under R80.10
A. Logs Monitor -> New Tab -> Open compliance View
In a client to server scenario, which inspection point is the first point immediately following the tables and rule base check of a packet coming from outside of the network?
A. Big I
B. Big O
C. Little i
D. Little o
A. Big I
When defining QoS global properties, which option below is not valid?
A. Schedule
B. Weight
C. Rate
D. Authenticated timeout
A. Schedule
Alice & Bob are going to use Management Data Plane Separation and therefore the routing separation needs to be enabled. Which of the following command is true for enabling the Management Data Plane Separation (MDPS):
A. set mdps split brain on
B. set mdps split plane on
C. set mdps mgmt plane on
D. set mdps data plane off
C. set mdps mgmt plane on
What is the command to check the status of Check Point processes?
A. cpwd_admin list
B. cptop
C. cphaprob list
D. top
A. cpwd_admin list
What API command below creates a new host object with the name “My Host” and IP address of “192.168.0.10”?
A. set host name “My Host” ip-address “192.168.0.10”
B. new host name “My Host” ip-address “192.168.0.10”
C. create host name “My Host” ip-address “192.168.0.10”
D. mgmt_cli -m add host name “My Host” ip-address “192.168.0.10”
D. mgmt_cli -m add host name “My Host” ip-address “192.168.0.10”
What command would show the API server status?
A. show api status
B. api restart
C. api status
D. cpm status
C. api status