CCSE Flashcards

1
Q

In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?

A

Install policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the file that is an electronically signed file used by Check Point to translate the features in the license into a code?

A

cp.macro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which two Identity Awareness daemons are used to support identity sharing?

A

Policy Decision Point (PDP) and Policy Enforcement Point (PEP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In which scenario will an administrator need to manually define Proxy ARP?

A. When they configure an “Automatic Static NAT” which translates to an IP address that does not belong to one of the firewall’s interfaces.

B. When they configure an “Automatic Hide NAT” which translates to an IP address that does not belong to one of the firewall’s interfaces.

C. When they configure a “Manual Static NAT” which translates to an IP address that does not belong to one of the firewall’s interfaces.

D. When they configure a “Manual Hide NAT” which translates to an IP address that belongs to one of the firewall’s interfaces.

A

C. When they configure a “Manual Static NAT” which translates to an IP address that does not belong to one of the firewall’s interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rugged appliances are small appliances with ruggedized hardware and like Quantum Spark appliance they use which operating system?

A. Centos Linux
B. Gaia embedded.
C. Gaia
D. Red Hat Enterprise Linux version 5

A

B. Gaia embedded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For Automatic Hide NAT rules created by the administrator what is a TRUE statement?

A. Source Port Address Translation (PAT) is enabled by default.
B. Automatic NAT rules are supported for Network objects only.
C. Automatic NAT rules are supported for Host objects only.
D. Source Port Address Translation (PAT) is disabled by default.

A

A. Source Port Address Translation (PAT) is enabled by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What technologies are used to deny or permit network traffic?

A. Stateful Inspection, Firewall Blade, and URL/Application Blade
B. Packet Filtering, Stateful Inspection, and Application Layer Firewall
C. Firewall Blade, URL/Application Blade, and IPS
D. Stateful Inspection, URL/Application Blade, and Threat Prevention

A

B. Packet Filtering, Stateful Inspection, and Application Layer Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identity Awareness allows easy configuration for network access and auditing based on what three items?

A. Client machine IP address.
B. Network location, the identity of a user and the identity of a machine.
C. Log server IP address.
D. Gateway proxy IP address.

A

B. Network location, the identity of a user and the identity of a machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?

A. Windows Management Instrumentation (WMI)
B. Hypertext Transfer Protocol Secure (HTTPS)
C. Lightweight Directory Access Protocol (LDAP)
D. Remote Desktop Protocol (RDP)

A

Windows Management Instrumentation (WMI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the types of Software Containers?

A. Smart Console, Security Management, and Security Gateway
B. Security Management, Security Gateway, and Endpoint Security
C. Security Management, Log & Monitoring, and Security Policy
D. Security Management, Standalone, and Security Gateway

A

B. Security Management, Security Gateway, and Endpoint Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the Threat Prevention software components available on the Check Point Security Gateway?

A. IPS, Threat Emulation and Threat Extraction
B. IPS, Anti-Bot, Anti-Virus, SandBlast and Macro Extraction
C. IPS, Anti-Bot, Anti-Virus, Threat Emulation and Threat Extraction
D. IDS, Forensics, Anti-Virus, Sandboxing

A

C. IPS, Anti-Bot, Anti-Virus, Threat Emulation and Threat Extraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When using Automatic Hide NAT, what is enabled by default?

A

Source Port Address Translation (PAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In which deployment is the security management server and Security Gateway installed on the same appliance?

A

Standalone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the main objective when using Application Control?

A. To filter out specific content.
B. To assist the firewall blade with handling traffic.
C. To see what users are doing.
D. Ensure security and privacy of information.

A

A. To filter out specific content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Gaia has two default user accounts that cannot be deleted. What are those user accounts?

A

Admin and Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When changes are made to a Rule base, It is important to __________ to enforce changes.

A

Install policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why is a Central License the preferred and recommended method of licensing?

A. Central Licensing actually not supported with Gaia.
B. Central Licensing is the only option when deploying Gala.
C. Central Licensing ties to the IP address of a gateway and can be changed to any gateway if needed.
D. Central Licensing ties to the IP address of the management server and is not dependent on the IP of any gateway in the event it changes.

A

D. Central Licensing ties to the IP address of the management server and is not dependent on the IP of any gateway in the event it changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the “unknown” SIC status shown on SmartConsole mean?

A. SIC activation key requires a reset
B. Administrator input the wrong SIC key
C. The management can contact the Security Gateway but cannot establish Secure Internal Communication
D. There is no connection between the Security Gateway and Security Management Server

A

D. There is no connection between the Security Gateway and Security Management Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are valid authentication methods for mutual authenticating the VPN gateways?

A. PKI Certificates and Kerberos Tickets
B. PKI Certificates and DynamicID OTP
C. Pre-Shared Secrets and Kerberos Ticket
D. Pre-shared Secret and PKI Certificates

A

D. Pre-shared Secret and PKI Certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the correct steps upgrading a HA cluster (M1 is active, M2 is passive) using Multi-Version Cluster(MVC)Upgrade?

A. 1) Enable the MVC mechanism on both cluster members #cphaprob mvc on
2) Upgrade the passive node M2 to R81.10
3) In SmartConsole, change the version of the cluster object
4) Install the Access Control Policy and make sure that the installation will not stop if installation on one cluster member fails
5) After examine the cluster states upgrade node M1 to R81.10
6) On each Cluster Member, disable the MVC mechanism

B. 1) Enable the MVC mechanism on both cluster members #cphaprob mvc on
2) Upgrade the passive node M2 to R81.10
3) In SmartConsole, change the version of the cluster object
4) Install the Access Control Policy
5) After examine the cluster states upgrade node M1 to R81.10
6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy

C. 1) In SmartConsole, change the version of the cluster object
2) Upgrade the passive node M2 to R81.10
3) Enable the MVC mechanism on the upgraded R81.10 Cluster Member M2 #cphaconf mvc on
4) Install the Access Control Policy and make sure that the installation will not stop if installation on one cluster member fails
5) After examine the cluster states upgrade node M1 to R81.10
6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy SmartConsole, change the version of the cluster object

D. 1) Upgrade the passive node M2 to R81.10
2) Enable the MVC mechanism on the upgraded R81.10 Cluster Member M2 #cphaconf mvc on
3) In SmartConsole, change the version of the cluster object
4) Install the Access Control Policy
5) After examine the cluster states upgrade node M1 to R81.10
6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy upgrade the passive node M2 to R81.10

A

C. 1) In SmartConsole, change the version of the cluster object
2) Upgrade the passive node M2 to R81.10
3) Enable the MVC mechanism on the upgraded R81.10 Cluster Member M2 #cphaconf mvc on
4) Install the Access Control Policy and make sure that the installation will not stop if installation on one cluster member fails
5) After examine the cluster states upgrade node M1 to R81.10
6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy SmartConsole, change the version of the cluster object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which Operating Systems are supported for the Endpoint Security VPN?

A. Windows and x86 Solaris
B. Windows and macOS computers
C. Windows and SPARC Solaris
D. Windows and Red Hat Linux

A

B. Windows and macOS computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the three SecureXL Templates available in R81.10?

A. PEP Templates, QoS Templates, VPN Templates
B. Accept Templates, Drop Templates, NAT Templates
C. Accept Templates, Drop Templates, Reject Templates
D. Accept Templates, PDP Templates, PEP Templates

A

B. Accept Templates, Drop Templates, NAT Templates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which Queue in the Priority Queue has the maximum priority?

A. High Priority
B. Control
C. Routing
D. Heavy Data Queue

A

C. Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which upgrade method you should use upgrading from R80.40 to R81.10 to avoid any downtime?

A. Zero Downtime Upgrade (ZDU)
B. Connectivity Upgrade (CU)
C. Minimal Effort Upgrade (ME)
D. Multi-Version Cluster Upgrade (MVC)

A

Multi-Version Cluster Upgrade (MVC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The Check Point installation history feature in provides the following:
A. View install changes and install specific version
B. Policy Installation Date only
C. Policy Installation Date, view install changes and install specific version
D. View install changes

A

C. Policy Installation Date, view install changes and install specific version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the SOLR database for?
A. Writes data to the database and full text search
B. Enables powerful matching capabilities and writes data to the database
C. Serves GUI responsible to transfer request to the DLEserver
D. Used for full text search and enables powerful matching capabilities

A

D. Used for full text search and enables powerful matching capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which command lists firewall chain?

A

fw ctl chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Sand Blast appliances can be deployed in the following modes:

A. as a Mail Transfer Agent and as part of the we traffic flow only
B. using a SPAN port to receive a copy of the traffic only
C. detect only
D. inline/prevent or detect

A

D. inline/prevent or detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which SmartEvent component is responsible to collect the logs from different Log Servers?

A

SmartEvent Correlation Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

How can you switch the active log file?

A. Run fw logswitch on the gateway
B. Run fwm logswitch on the Management Server
C. Run fwm logswitch on the gateway
D. Run fw logswitch on the Management Server

A

Run fw logswitch on the Management Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the purpose of the command “ps aux | grep fwd”?

A. You can check the Process ID and the processing time of the fwd process.
B. You can convert the log file into Post Script format.
C. You can list all Process IDs for all running services.
D. You can check whether the IPS default setting is set to Detect or Prevent mode.

A

You can check the Process ID and the processing time of the fwd process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the command switch to specify the Gaia API context?

A. You have to specify it in the YAML file api.yml which is located underneath the /etc directory of the security management server
B. You have to change to the zsh-Shell which defaults to the Gaia API context.
C. No need to specify a context, since it defaults to the Gaia API context.
D. mgmt_cli –context gaia_api <command></command>

A

D. mgmt_cli –context gaia_api <command></command>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are the two types of tests when using the Compliance blade?

A. Policy-based tests and Global properties
B. Global tests and Object-based tests
C. Access Control policy analysis and Threat Prevention policy analysis
D. Tests conducted based on the IoC XML file and analysis of SOLR documents

A

Global tests and Object-based tests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Besides fw monitor, what is another command that can be used to capture packets?

A

tcpdump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

When performing a minimal effort upgrade, what will happen to the network traffic?

A. All connections that were initiated before the upgrade will be dropped, causing network downtime.
B. All connections that were initiated before the upgrade will be handled by the active gateway
C. All connections that were initiated before the upgrade will be handled normally
D. All connections that were initiated before the upgrade will be handled by the standby gateway

A

A. All connections that were initiated before the upgrade will be dropped, causing network downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Using fw monitor you see the following inspection point notion E and i what does that mean?

A. E shows the packet before the VPN encryption, i after the inbound firewall VM
B. E shows the packet reaching the external interface, i leaving the internal interface
C. E shows the packet after the VPN encryption, i before the inbound firewall VM
D. E shows the packet leaving the external interface, i reaching the internal interface

A

C. E shows the packet after the VPN encryption, i before the inbound firewall VM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

You have used the SmartEvent GUI to create a custom Event policy. What is the best way to display the correlated Events generated by SmartEvent Policies?

A. Open SmartView Monitor and select the SmartEvent Window from the main menu.
B. In the SmartConsole / Logs & Monitor –> open the Logs View and use type:Correlated as query filter.
C. In the SmartConsole / Logs & Monitor -> open a new Tab and select External Apps / SmartEvent.
D. Select the Events tab in the SmartEvent GUI or use the Events tab in the SmartView web interface.

A

B. In the SmartConsole / Logs & Monitor –> open the Logs View and use type:Correlated as query filter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the biggest benefit of policy layers?

A. To break one policy into several virtual policies
B. Policy Layers and Sub-Policies enable flexible control over the security policy
C. They improve the performance on OS kernel version 3.0
D. To include Threat Prevention as a sub policy for the firewall policy

A

B. Policy Layers and Sub-Policies enable flexible control over the security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which packet info is masked with Session Rate Acceleration?

A. same info from Packet Acceleration is used
B. source port ranges
C. source port
D. source ip

A

source port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What does Backward Compatibility mean when upgrading the Management Server and how can you check it?

A. The Management Server is able to manage older Gateways. The lowest supported version is documented in the Installation and Upgrade Guide

B. The Management Server is able to manage older Gateways. The lowest supported version is documented in the Release Notes

C. You will be able to connect to older Management Server with the SmartConsole. The lowest supported version is documented in the Installation and Upgrade Guide

D. You will be able to connect to older Management Server with the SmartConsole. The lowest supported version is documented in the Release Notes

A

B. The Management Server is able to manage older Gateways. The lowest supported version is documented in the Release Notes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Bob is going to prepare the import of the exported R81.10 management database. Now he wants to verify that the installed tools on the new target security management machine are able to handle the R81.10 release. Which of the following Check Point command is true?

A. $FWDIR/scripts/migrate_server print_installed_tools -v R77.30
B. $CPDIR/scripts/migrate_server print_installed_tools -v R81.10
C. $FWDIR/scripts/migrate_server print_installed_tools -v R81.10
D. $FWDIR/scripts/migrate_server print_uninstalled_tools -v R81.10

A

C. $FWDIR/scripts/migrate_server print_installed_tools -v R81.10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What a valid SecureXL paths in R81.10?

A. F2F (Slow path), Templated Path, PQX and F2V
B. F2F (Slow path), PXL, QXL and F2V
C. F2F (Slow path), Accelerated Path, PQX and F2V
D. F2F (Slow path), Accelerated Path, Medium Path and F2V

A

D. F2F (Slow path), Accelerated Path, Medium Path and F2V

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Alice was asked by Bob to implement the Check Point Mobile Access VPN blade – therefore are some basic configuration steps required – which statement about the configuration steps is true?

A. 1. Enable Mobile Access blade on the Security Gateway object and complete the wizard
2. Configure Mobile Access parameters in Security Gateway object
3. Add a rule in the Access Control Policy and install policy
4. Connect to the Mobile Access Portal

B. 1. Configure Mobile Access parameters in Security Gateway object
2. Enable Mobile Access blade on the Security Gateway object and complete the wizard
3. Add a rule in the Access Control Policy and install policy
4. Connect to the Mobile Access Portal

C. 1. Connect to the Mobile Access Portal
2. Enable Mobile Access blade on the Security Gateway object and complete the wizard
3. Configure Mobile Access parameters in Security Gateway object
4. Add a rule in the Access Control Policy and install policy

D. 1. Add a rule in the Access Control Policy and install policy
2. Configure Mobile Access parameters in Security Gateway object
3. Enable Mobile Access blade on the Security Gateway object and complete the wizard
4. Connect to the Mobile Access Portal

A

A. 1. Enable Mobile Access blade on the Security Gateway object and complete the wizard
2. Configure Mobile Access parameters in Security Gateway object
3. Add a rule in the Access Control Policy and install policy
4. Connect to the Mobile Access Portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What are not possible commands to acquire the lock in order to make changes in Clish or Web GUI?

A. set config-lock on override
B. Click the Lock icon in the WebUI
C. “set rbac rw = 1”
D. lock database override

A

C. “set rbac rw = 1”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

The customer has about 150 remote access user with a Windows laptop. Not more than 50 Clients will be connected at the same time. The customer wants to use multiple VPN Gateways as entry point and a personal firewall. What will be the best license for him?

A. He will need Capsule Connect using MEP (multiple entry points).
B. Because the customer uses only Windows clients SecuRemote will be sufficient and no additional license is needed.
C. He will need Harmony Endpoint because of the personal firewall.
D. Mobile Access license because he needs only a 50 user license, license count is per concurrent user.

A

C. He will need Harmony Endpoint because of the personal firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?

A. Application and Client Service
B. Network and Layers
C. Virtual Adapter and Mobile App
D. Network and Application

A

Network and Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

The admin is connected via ssh to the management server. He wants to run a mgmt_cli command but got an Error 404 message. To check the listening ports on the management he runs netstat with the results shown below. What can be the cause for the issue?
[Expert@SMS:0]# mgmt_cli show service-tcp name FTP

Username: admin -
Password:
message: “Error 404. The Management API service is not available. Please check that the Management API server is up and running.” code: “generic_error”
[Expert@SMS:0]# netstat -anp | grep http
tcp00 0.0.0.0:800.0.0.0:LISTEN18114/httpd
tcp00127.0.0.1:810.0.0.0:
LISTEN18114/httpd
tcp00 0.0.0.0:44340.0.0.0:LISTEN9019/httpd2
tcp00 0.0.0.0:4430.0.0.0:
LISTEN 18114/httpd

A. Wrong Management API Access settings for the client IP. To correct it go to SmartConsole / Management & Settings / Blades / Management API and press ‘Advanced Settings…’ and choose GUI clients or ALL IP’s.
B. The API didn’t run on the default port check it with ‘api status’ and add ‘–port 4434’ to the mgmt_cli command.
C. The management permission in the user profile is missing. Go to SmartConsole / Management & Settings / Permissions & Administrators / Permission Profiles. Select the profile of the user and enable ‘Management API Login’ under Management Permissions.
D. The API is not running, the services shown by netstat are the Gaia services. To start the API run ‘api start’.

A

C. The management permission in the user profile is missing. Go to SmartConsole / Management & Settings / Permissions & Administrators / Permission Profiles. Select the profile of the user and enable ‘Management API Login’ under Management Permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

From SecureXL perspective, what are the three paths of traffic flow:

A. Initial Path; Medium Path; Accelerated Path
B. Layer Path; Blade Path; Rule Path
C. Firewall Path; Accelerated Path; Medium Path
D. Firewall Path; Accept Path; Drop Path

A

Firewall Path; Accelerated Path; Medium Path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What are the services used for Cluster Synchronization?

A. 256/TCP for Full Sync and 8116/UDP for Delta Sync
B. 8116/UDP for Full Sync and Delta Sync
C. TCP/256 for Full Sync and Delta Sync
D. No service needed when using Broadcast Mode

A

A. 256/TCP for Full Sync and 8116/UDP for Delta Sync

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Using Web Services to access the API, which Header Name-Value had to be in the HTTP Post request after the login?

A. X-chkp-sid Session Unique Identifier
B. API-Key
C. user-uid
D. uuid Universally Unique Identifier

A

A. X-chkp-sid Session Unique Identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Which two Cluster Solutions are available under R81.10?
A. ClusterXL and NSRP
B. VRRP and HSRP
C. VRRP and IP Clustering
D. ClusterXL and VRRP

A

ClusterXL and VRRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Alice & Bob are going to deploy Management Data Plane Separation (MDPS) for all their Check Point Security Gateway(s)/Cluster(s). Which of the following statement is true?

A. Each network environment is dependent and includes interfaces, routes, sockets, and processes
B. Management Plane – To access, provision and monitor the Security Gateway
C. Data Plane – To access, provision and monitor the Security Gateway
D. Management Plane – for all other network traffic and processing

A

B. Management Plane – To access, provision and monitor the Security Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

When URL Filtering is set, what identifying data gets sent to the Check Point Online Web Service?

A. The URL and server certificate are sent to the Check Point Online Web Service.
B. The full URL, including page data, is sent to the Check Point Online Web Service.
C. The host part of the URL is sent to the Check Point Online Web Service.
D. The URL and IP address are sent to the Check Point Online Web Service.

A

C. The host part of the URL is sent to the Check Point Online Web Service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

How do logs change when the “Accounting” tracking option is enabled on a traffic rule?

A. Involved traffic logs will be forwarded to a log server.
B. Provides log details view email to the Administrator.
C. Involved traffic logs are updated every 10 minutes to show how much data has passed on the connection.
D. Provides additional information to the connected user.

A

C. Involved traffic logs are updated every 10 minutes to show how much data has passed on the connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

To increase security, the administrator has modified the Core protection ‘Host Port Scan’ from ‘Medium’ to ‘High’ Predefined Sensitivity. Which Policy should the administrator install after Publishing the changes?

A. The Access Control and Threat Prevention Policies.
B. The Access Control Policy.
C. The Access Control & HTTPS Inspection Policy.
D. The Threat Prevention Policy.

A

The Access Control Policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which Check Point process provides logging services, such as forwarding logs from Gateway to Log Server providing Log Export API (LEA) & Event Logging API (ELA) services?

A. DASSERVICE
B. FWD
C. CPVIEWD
D. CPD

A

B. FWD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What mechanism can ensure that the Security Gateway can communicate with the Management Server with ease in situations with overwhelmed network resources?

A. The corresponding feature is new to R81.10 and is called “Management Data Plane Separation”
B. The corresponding feature is called “Dynamic Dispatching”
C. There is a feature for ensuring stable connectivity to the management server and is done via Priority Queuing
D. The corresponding feature is called “Dynamic Split”

A

A. The corresponding feature is new to R81.10 and is called “Management Data Plane Separation”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

According to the policy installation flow the transfer state (CPTA) is responsible for the code generated by the FWM. On the Security Gateway side, a process receives them and first stores them into a temporary directory. Which process is true for receiving these files:

A. FWD
B. CPD
C. FWM
D. RAD

A

CPD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is the amount of Priority Queues by default?

A. There are 8 priority queues and this number cannot be changed.
B. There is no distinct number of queues since it will be changed in a regular basis based on its system requirements.
C. There are 7 priority queues by default and this number cannot be changed.
D. There are 8 priority queues by default, and up to 8 additional queues can be manually configured

A

D. There are 8 priority queues by default, and up to 8 additional queues can be manually configured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

In R81.10 a new feature dynamic log distribution was added. What is this for?

A. Configure the Security Gateway to distribute logs between multiple active Log Servers to support a better rate of Logs and Log Servers redundancy
B. In case of a Management High Availability the management server stores the logs dynamically on the member with the most available disk space in /var/log
C. Synchronize the log between the primary and secondary management server in case of a Management High Availability
D. To save disk space in case of a firewall cluster local logs are distributed between the cluster members

A

A. Configure the Security Gateway to distribute logs between multiple active Log Servers to support a better rate of Logs and Log Servers redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What could NOT be a reason for synchronization issues in a Management HA environment?

A. Accidentally, you have configured unique IP addresses per Management Server which invalidates the CA Certificate
B. There is a network connectivity failure between the servers
C. Servers are in Collision Mode. Two servers, both in active state cannot be synchronized either automatically or manually.
D. The products installed on the servers do not match: one device is a Standalone Server while the other is only a Security Management server.

A

A. Accidentally, you have configured unique IP addresses per Management Server which invalidates the CA Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is the correct Syntax for adding an access-rule via R80 API?

A. add access-rule layer “Network” action “Allow”
B. add access-rule layer “Network” position 1 name “Rule 1” service.1 “SMTP” service.2 “http”
C. add access-rule and follow the wizard
D. add rule position 1 name “Rule 1” policy-package “Standard” add service “http”

A

B. add access-rule layer “Network” position 1 name “Rule 1” service.1 “SMTP” service.2 “http”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Secure Configuration Verification (SCV), makes sure that remote access client computers are configured in accordance with the enterprise Security Policy. Bob was asked by Alice to implement a specific SCV configuration but therefore Bob needs to edit and configure a specific Check Point file. Which location file and directory are true?

A. $FWDIR/conf/client.scv
B. $CPDIR/conf/local.scv
C. $CPDIR/conf/client.scv
D. $FWDIR/conf/local.scv

A

D. $FWDIR/conf/local.scv

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What feature allows Remote-access VPN users to access resources across a site-to-site VPN tunnel?

A. Network Access VPN Domain
B. Remote Access VPN Switch
C. Community Specific VPN Domain
D. Mobile Access VPN Domain

A

Community Specific VPN Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Main Mode in IKEv1 uses how many packages for negotiation?

A. 4
B. depends on the make of the peer gateway
C. 3
D. 6

A

D. 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

To ensure that VMAC mode is enabled, which CLI command you should run on all cluster members?

A. fw ctl set int fwha vmac global param enabled
B. cphaprob -a if
C. fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1
D. fw ctl get int fwha vmac global param enabled; result of command should return value 1

A

C. fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Can multiple administrators connect to a Security Management Server at the same time?

A. Yes, all administrators can modify a network object at the same time.
B. No, only one can be connected.
C. Yes, every administrator has their own username, and works in a session that is independent of other administrators.
D. Yes, but only one has the right to write.

A

C. Yes, every administrator has their own username, and works in a session that is independent of other administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

You have used the “set inactivity-timeout 120” command to prevent the session to be disconnected after 10 minutes of inactivity. However, the Web session is being disconnected after 10 minutes. Why?

A. The idle timeout for the web session is specified with the “set web session-timeout” command.

B. The number specified is the amount of the idle timeout in seconds rather than in minutes. So you have to use the command “set inactivity-timeout 600” instead.

C. Probably, you have forgotten to make sure that nobody is accessing the management server via the SmartConsole which locks the management database.

D. The number of minutes is correct. Probably, you have forgotten to save this setting with the “save config” command.

A

A. The idle timeout for the web session is specified with the “set web session-timeout” command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Your manager asked you to check the status of SecureXL, and its enabled templates and features. What command will you use to provide such information to manager?

A. fw acces stats
B. fw accel stat
C. fwaccel stats
D. fwaccel stat

A

D. fwaccel stat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What command lists all interfaces using Multi-Queue?

A. show multiqueue all
B. cpmq set
C. mq_mng –show
D. show interface all

A

C. mq_mng –show

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

There are 4 ways to use the Management API for creating host object with the Management API. Which one is NOT correct?

A. Using SmartConsole GUI console
B. Using CLISH
C. Using Web Services
D. Using cpconfig

A

Using cpconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Which 3 types of tracking are available for Threat Prevention Policy?

A. Syslog, None, User-defined scripts
B. Alert, SNMP trap, Mail
C. None, Log, Syslog
D. SMS Alert, Log, SNMP alert

A

Alert, SNMP trap, Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Bob is asked by Alice to disable the SecureXL mechanism temporary for further diagnostic by their Check Point partner. Which of the following Check Point Command is true?

A. fwaccel suspend
B. fwaccel standby
C. fwaccel off
D. fwaccel templates

A

C. fwaccel off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What are the attributes that SecureXL will check after the connection is allowed by Security Policy?

A. Source address, Destination address, Destination port, Protocol
B. Source MAC address, Destination MAC address, Source port, Destination port, Protocol
C. Source address, Destination address, Source port, Destination port, Protocol
D. Source address, Destination address, Source port, Destination port

A

A. Source address, Destination address, Destination port, Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

The VPN Link Selection will perform the following if the primary VPN link goes down?

A. The Firewall will drop the packets
B. The Firewall will inform the client that the tunnel is down
C. The Firewall will send out the packet on all interfaces
D. The Firewall can update the Link Selection entries to start using a different link for the same tunnel

A

D. The Firewall can update the Link Selection entries to start using a different link for the same tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

In CoreXL, the Firewall kernel is replicated multiple times. Each replicated copy or instance can perform the following:

A. The Firewall can run different policies per core
B. The Firewall can run the same policy on all cores
C. The Firewall kernel is replicated only with new connections and deletes itself once the connection times out
D. The Firewall kernel only touches the packet if the connection is accelerated

A

B. The Firewall can run the same policy on all cores

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What is FALSE regarding a Management HA environment?

A. Only one Management Server should be active, while any others be in standby mode.
B. It is not necessary to establish SIC between the primary and secondary management server, since the latter gets the exact same copy of the management database from the prior.
C. SmartConsole can connect to any management server in ReadOnly mode.
D. Synchronization will occur automatically with each Publish event if the Standby servers are available.

A

B. It is not necessary to establish SIC between the primary and secondary management server, since the latter gets the exact same copy of the management database from the prior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Which command will allow you to see the interface status?

A. cphaprob interface
B. cphaprob stat
C. cphaprob -a if
D. cphaprob -l interface

A

C. cphaprob -a if

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.

A. Asymmetric routing
B. Anti-Spoofing
C. Failovers
D. Symmetric routing

A

Asymmetric routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Matt wants to upgrade his old Security Management Server to R80.x using the Advanced Upgrade with Database Migration. What is one of the requirements for a successful upgrade?

A. Size of the /var/log folder of the target machine must be at least 25% of the size of the /var/log directory on the source machine

B. Size of the /var/log folder of the source machine must be at least 25% of the size of the /var/log directory on the target machine

C. Size of the /var/log folder of the target machine must be 25GB or more

D. Size of the $FWDIR/log folder of the target machine must be at least 25% of the size of the $FWDIR/log directory on the source machine

A

A. Size of the /var/log folder of the target machine must be at least 25% of the size of the /var/log directory on the source machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Which of the following is NOT a type of Check Point API available in R80.x?

A. Management
B. OPSEC SDK
C. Identity Awareness Web Services
D. Mobile Access

A

Mobile Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

How many versions, besides the destination version, are supported in a Multi-Version Cluster Upgrade?

A. 4
B. 3
C. 1
D. 2

A

C. 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

What are the blades of Threat Prevention?

A. DLP, AntiVirus, QoS, AntiBot, Threat Emulation, Threat Extraction
B. IPS, QoS, AntiVirus, AntiBot, Threat Emulation, Threat Extraction
C. IPS, AntiVirus, AntiBot, Threat Emulation, Threat Extraction
D. IPS, AntiVirus, AntiBot

A

C. IPS, AntiVirus, AntiBot, Threat Emulation, Threat Extraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

How long may verification of one file take for Sandblast Threat Emulation?

A

up to 3 minutes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

How do you enable virtual mac (VMAC) on-the-fly on a cluster member?

A. fw ctl set int fwha_vmac_global_param_enabled 1
B. clusterXL set int fwha_vmac_global_param_enabled 1
C. cphaprob set int fwha_vmac_global_param_enabled 1
D. cphaconf set int fwha_vmac_global_param_enabled 1

A

A. fw ctl set int fwha_vmac_global_param_enabled 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

What component of Management is used for indexing?
A. DBSync
B. API Server
C. fwm
D. SOLR

A

SOLR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Which process is used mainly for backward compatibility of gateways in R80.x? It provides communication with GUI-client, database manipulation, policy compilation and Management HA synchronization.

A

fwm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Which command shows actual allowed connections in state table?

A. fw tab -t connection
B. fw tab connections
C. fw tab -t connections
D. fw tab -t StateTable

A

C. fw tab -t connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Which one is not a valid Package Option in the Web GUI for CPUSE?

A. Clean Install
B. Export Package
C. Upgrade
D. Database Conversion to R81.10 only

A

D. Database Conversion to R81.10 only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

What is the minimum number of CPU cores required to enable CoreXL?

A. 1
B. 6
C. 2
D. 4

A

C. 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

The system administrator of a company is trying to find out why acceleration is not working for the traffic. The traffic is allowed according to the rule base and checked for viruses. But it is not accelerated. What is the most likely reason that the traffic is not accelerated?

A

The connection required a Security server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Which command shows only the table names of all kernel tables?

A. fw tab -t
B. fw tab -k
C. fw tab -n
D. fw tab -s

A

D. fw tab -s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

If a “ping”-packet is dropped by FW1 Policy – on how many inspection Points do you see this packet in “fw monitor”?

A. “i” only
B. “i”, “l” and “o”
C. “i” and “l”
D. I don’t see it in fw monitor

A

A. “i” only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Which of the following is NOT an attribute of packet acceleration?

A

VLAN tag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?

A

TCP port 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Which statement is WRONG regarding the usage of the Central Deployment in SmartConsole?

A. You can install Hotfixes with the Central Deployment in SmartConsole.

B. You can install Jumbo Hotfix accumulators with the Central Deployment in SmartConsole.

C. Only Hotfixes can be installed with the Central Deployment in SmartConsole.

D. You can upgrade your cluster without user intervention with the Central Deployment in SmartConsole from R80.40 to R81.10.

A

C. Only Hotfixes can be installed with the Central Deployment in SmartConsole.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?

A. Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.

B. Configure rules to limit the available network bandwidth for specified users or groups.

C. Detects and blocks malware by correlating multiple detection engines before users are affected.

D. Use UserCheck to help users understand that certain websites are against the company’s security policy.

A

C. Detects and blocks malware by correlating multiple detection engines before users are affected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Aaron is a Cyber Security Engineer working for Global Law Firm with large scale deployment of Check Point Enterprise Appliances running GAiA R80.X. The Network Security Developer Team is having an issue testing the API with a newly deployed R80.X Security Management Server. Aaron wants to confirm API services are working properly. What should he do first?

A. Aaron should check API Server status with “cpm api status” from Expert mode. If services are stopped, he should start them with “cpi api start”.

B. Aaron should check API Server status with “api status” from Expert mode. If services are stopped, he should start them with “api start”.

C. Aaron should check API Server status with “fwm api status” from Expert mode. If services are stopped, he should start them with “fwm api start”.

D. Aaron should check API Server status with “cpapi status” from Expert mode. If services are stopped, he should start them with “cpapi start”.

A

B. Aaron should check API Server status with “api status” from Expert mode. If services are stopped, he should start them with “api start”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

What is required for a site-to-site VPN tunnel that does not use certificates?

A. Pre-Shared Secret
B. RSA Token
C. Unique Passwords
D. SecureID

A

A. Pre-Shared Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

The Compliance Blade allows you to search for text strings in many windows and panes, to search for a value in a field, what would your syntax be?

A. name_field:string
B. field_name:string
C. field name:string
D. name field:string

A

B. field_name:string

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

What is the correct order of the default “fw monitor” inspection points?

A. i, o, l, O
B. i, l, o, O
C. 1, 2, 3, 4
D. l, i, O, o

A

B. i, l, o, O

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Bob works for a big security outsourcing provider company and as he receives a lot of change requests per day, he wants to use for scripting daily tasks the API services from Check Point for the GAIA API. Firstly, he needs to be aware if the API services are running for the GAIA operating system. Which of the following Check Point Command is true:

A. gaia_clish status

B. status gaia_api

C. api_gaia status

D. gaia_api status

A

D. gaia_api status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

What is the recommended way to have a redundant Sync connection between the cluster nodes?

A. In the SmartConsole / Gateways & Servers -> select Cluster Properties / Network Management and define two Sync interfaces per node. Connect both Sync interfaces without using a switch.

B. Use a group of bonded interfaces. In the SmartConsole / Gateways & Servers -> select Cluster Properties / Network Management and define a Virtual IP for the Sync interface.

C. In the SmartConsole / Gateways & Servers -> select Cluster Properties / Network Management and define two Sync interfaces per node. Use two different Switches to connect both Sync interfaces.

D. Use a group of bonded interfaces connected to different switches. Define a dedicated sync interface, only one interface per node using the SmartConsole / Gateways & Servers -> select Cluster Properties / Network Management.

A

D. Use a group of bonded interfaces connected to different switches. Define a dedicated sync interface, only one interface per node using the SmartConsole / Gateways & Servers -> select Cluster Properties / Network Management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

To fully enable Dynamic Dispatcher on a Security Gateway:

A. Edit /proc/interrupts to include multik set_mode 1 at the bottom of the file, save, and reboot.
B. Using cpconfig, update the Dynamic Dispatcher value to “full” under the CoreXL menu.
C. Run fw ctl multik set_mode 1 in Expert mode and then reboot.
D. Run “fw ctl multik dynamic_dispatching on” and then reboot.

A

D. Run “fw ctl multik dynamic_dispatching on” and then reboot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Which Remote Access Client does not provide an Office-Mode Address?

A. Check Point Mobile
B. SecuRemote
C. Endpoint Security Suite
D. Endpoint Security VPN

A

B. SecuRemote

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

What command verifies that the API server is responding?

A. api stat
B. api_get_status
C. api status
D. show api_status

A

C. api status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Which command shows the current Security Gateway Firewall chain?

A. show current chain
B. show firewall chain
C. fw ctl chain
D. fw ctl firewall-chain

A

C. fw ctl chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

By default, the web API uses which content-type in its response?

A. Java Script
B. XML
C. JSON
D. Text

A

C. JSON

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

What is Dynamic Balancing?

A. It is a ClusterXL feature that switches an HA cluster into an LS cluster if required to maximize throughput.

B. It is a feature that uses a daemon to balance the required number of firewall instances and SNDs based on the current load.

C. It is a new feature that is capable of dynamically reserve the amount of Hash kernel memory to reflect the resource usage necessary for maximizing the session rate.

D. It is a CoreXL feature that assigns the SND to network interfaces to balance the RX Cache of the interfaces.

A

B. It is a feature that uses a daemon to balance the required number of firewall instances and SNDs based on the current load.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

What command can you use to have cpinfo display all installed hotfixes?

A

cpinfo -y all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

What are the available options for downloading Check Point hotfixes in Gala WebUI (CPUSE)?

A. Manually, Scheduled, Enabled
B. Manually, Scheduled, Automatic
C. Manually, Scheduled, Disabled
D. Manually, Automatic, Disabled

A

B. Manually, Scheduled, Automatic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

What is the most Ideal Synchronization Status for Security Management Server High Availability deployment?

A

Synchronized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Which statements below are CORRECT regarding Threat Prevention profiles in SmartConsole?

A. You can assign only one profile per gateway and a profile can be assigned to one or more rules.

B. You can assign only one profile per gateway and a profile can be assigned to one rule Only.

C. You can assign multiple profiles per gateway and a profile can be assigned to one rule only.

D. You can assign multiple profiles per gateway and a profile can be assigned to one or more rules.

A

D. You can assign multiple profiles per gateway and a profile can be assigned to one or more rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

fwssd is a child process of which of the following Check Point daemons?

A. fwd
B. cpwd
C. fwm
D. cpd

A

A. fwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Which command shows the current connections distributed by CoreXL FW instances?

A. fw ctl instances -v
B. fw ctl multik stat
C. fw ctl affinity -l
D. fw ctl iflist

A

B. fw ctl multik stat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

After having saved the Clish Configuration with the “save configuration config.txt” command, where can you find the config.txt file?

A. You will find it in the home directory of your user account (e.g. /home/admin/).

B. You can locate the file via SmartConsole > Command Line.

C. You have to launch the WebUI and go to “Config” -> “Export Config File” and specify the destination directory of your local file system.

D. You cannot locate the file in the file system since Clish does not have any access to the bash file system.

A

A. You will find it in the home directory of your user account (e.g. /home/admin/).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

What state is the Management HA in when both members have different policies/databases?

A. Never been synchronized
B. Synchronized
C. Lagging
D. Collision

A

D. Collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _______ or _______ action for the file types.

A. Detect/Bypass
B. Prevent/Bypass
C. Inspect/Prevent
D. Inspect/Bypass

A

D. Inspect/Bypass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

When running a query on your logs, to find records for user Toni with machine IP of 10.0.4.210 but exclude her tablet IP of 10.0.4.76, which of the following query syntax would you use?

A. To AND 10.0.4.210 NOT 10.0.4.76

B. Toni? AND 10.0.4.210 NOT 10.0.4.76

C. “Toni” AND 10.0.4.210 NOT 10.0.4.76

D. Ton* AND 10.0.4.210 NOT 10.0.4.75

A

C. “Toni” AND 10.0.4.210 NOT 10.0.4.76

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

What happen when IPS profile is set in Detect Only Mode for troubleshooting?

A. It will not block malicious traffic
B. Automatically uploads debugging logs to Check Point Support Center
C. It will generate Geo-Protection traffic
D. Bypass licenses requirement for Geo-Protection control

A

A. It will not block malicious traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

How would you enable VMAC Mode in ClusterXL?

A. Cluster Object -> Edit -> Cluster Members -> Edit -> Use Virtual MAC
B. fw ctl set int vmac_mode 1
C. cphaconf vmac_mode set 1
D. Cluster Object -> Edit -> ClusterXL and VRRP -> Use Virtual MAC

A

D. Cluster Object -> Edit -> ClusterXL and VRRP -> Use Virtual MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

The Log server sends what to the Correlation Unit?

A. Event Policy
B. Authentication requests
C. CPMI dbsync
D. Logs

A

D. Logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

In SmartConsole, where do you manage your Mobile Access Policy?

A. Through the Mobile Console
B. Smart Dashboard
C. Shared Gateways Policy
D. From the Dedicated Mobility Tab

A

B. Smart Dashboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

What is NOT a Cluster Mode?

A. Load Sharing Unicast
B. Load Sharing Multicast
C. Active-Active
D. High Availability Multicast

A

D. High Availability Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

What is the command used to activate Multi-Version Cluster mode?

A. set cluster member mvc on in Clish
B. set cluster mvc on in Expert Mode
C. set cluster MVC on in Expert Mode
D. set mvc on in Clish

A

A. set cluster member mvc on in Clish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Which TCP port does the CPM process listen on?

A. 18191
B. 19009
C. 8983
D. 18190

A

B. 19009

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Bob needs to know if Alice was configuring the new virtual cluster interface correctly. Which of the following Check Point commands is true?

A. cphaprob -a if
B. cphaprob state
C. cphaprob list
D. probcpha -a if

A

A. cphaprob -a if

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

CPM process stores objects, policies, users, administrators, licenses and management data in a database. This database is:

A. SOLR
B. MariaDB
C. PostgreSQL
D. MySQL

A

C. PostgreSQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

What is the correct description for the Dynamic Balancing / Split feature?

A. Dynamic Balancing / Split dynamically change the number of SND’s and firewall instances based on the current load. It is only available on Quantum Appliances and Open Server (not on Quantum Spark)

B. Dynamic Balancing / Split dynamically distribute the traffic from one network interface to multiple SND’s. The interface must support Multi-Queue. It is only available on Quantum Appliances and Open Server (not on Quantum Spark)

C. Dynamic Balancing / Split dynamically distribute the traffic from one network interface to multiple SND’s. The interface must support Multi-Queue. It is only available on Quantum Appliances (not on Quantum Spark or Open Server)

D. Dynamic Balancing / Split dynamically change the number of SND’s and firewall instances based on the current load. It is only available on Quantum Appliances (not on Quantum Spark or Open Server)

A

D. Dynamic Balancing / Split dynamically change the number of SND’s and firewall instances based on the current load. It is only available on Quantum Appliances (not on Quantum Spark or Open Server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

You want to allow your Mobile Access Users to connect to an internal file share. Adding the Mobile Application ‘File Share’ to your Access Control Policy in the SmartConsole didn’t work. You will be only allowed to select Services for the ‘Service & Application’ column. How to fix it?

A. A Quantum Spark Appliance is selected as Installation Target for the policy.

B. The Mobile Access Blade is not enabled for the Access Control Layer of the policy.

C. The Mobile Access Policy Source under Gateway properties is set to Legacy Policy and not to Unified Access Policy.

D. The Mobile Access Blade is not enabled under Gateway properties.

A

C. The Mobile Access Policy Source under Gateway properties is set to Legacy Policy and not to Unified Access Policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Please choose the path to monitor the compliance status of the Check Point Security Management.

A. Logs Monitor -> New Tab -> Open compliance View
B. Gateways Servers -> Compliance View
C. Security Policies -> New Tab -> Compliance View
D. Compliance blade not available under R80.10

A

A. Logs Monitor -> New Tab -> Open compliance View

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

In a client to server scenario, which inspection point is the first point immediately following the tables and rule base check of a packet coming from outside of the network?

A. Big I
B. Big O
C. Little i
D. Little o

A

A. Big I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

When defining QoS global properties, which option below is not valid?

A. Schedule
B. Weight
C. Rate
D. Authenticated timeout

A

A. Schedule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Alice & Bob are going to use Management Data Plane Separation and therefore the routing separation needs to be enabled. Which of the following command is true for enabling the Management Data Plane Separation (MDPS):

A. set mdps split brain on
B. set mdps split plane on
C. set mdps mgmt plane on
D. set mdps data plane off

A

C. set mdps mgmt plane on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

What is the command to check the status of Check Point processes?

A. cpwd_admin list
B. cptop
C. cphaprob list
D. top

A

A. cpwd_admin list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

What API command below creates a new host object with the name “My Host” and IP address of “192.168.0.10”?

A. set host name “My Host” ip-address “192.168.0.10”
B. new host name “My Host” ip-address “192.168.0.10”
C. create host name “My Host” ip-address “192.168.0.10”
D. mgmt_cli -m add host name “My Host” ip-address “192.168.0.10”

A

D. mgmt_cli -m add host name “My Host” ip-address “192.168.0.10”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

What command would show the API server status?

A. show api status
B. api restart
C. api status
D. cpm status

A

C. api status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

You find one of your cluster gateways showing “Down” when you run the “cphaprob stat” command. You then run the “clusterXL_admin up” on the down member but unfortunately the member continues to show down. What command do you run to determine the cause?

A. cpstat -f all
B. cphaprob -d -s report
C. cphaprob -f register
D. cphaprob list

A

D. cphaprob list

139
Q

Which User-mode process is responsible for the FW CLI commands?

A. cpm
B. fwm
C. cpd
D. fwd

A

D. fwd

140
Q

What are the different command sources that allow you to communicate with the API server?

A. API_cli Tool, Gaia CLI, Web Services

B. SmartConsole GUI Console, API_cli Tool, Gaia CLI, Web Services

C. SmartView Monitor, API_cli Tool, Gaia CLI, Web Services

D. SmartConsole GUI Console, mgmt_cli Tool, Gaia CLI, Web Services

A

D. SmartConsole GUI Console, mgmt_cli Tool, Gaia CLI, Web Services

141
Q

What is the difference between SSL VPN and IPSec VPN?

A. IPSec VPN requires installation of a resident VPN client and SSL VPN requires only an installed Browser

B. SSL VPN and IPSec VPN are the same

C. SSL VPN requires installation of a resident VPN client

D. IPSec VPN does not require installation of a resident VPN client

A

A. IPSec VPN requires installation of a resident VPN client and SSL VPN requires only an installed Browser

142
Q

What is the command to see cluster status in cli expert mode?

A. fw ctl stat
B. clusterXL stat
C. clusterXL status
D. cphaprob stat

A

D. cphaprob stat

143
Q

Which of the following is NOT supported by CPUSE?

A. Automatic download of full installation and upgrade packages
B. Offline installations
C. Automatic download of hotfixes
D. Installation of private hotfixes

A

A. Automatic download of full installation and upgrade packages

144
Q

Choose the correct syntax to add a new host named “emailserver1” with IP address 10.50.23.90 using GAIA Management CLI?

A. mgmt_cli add host “emailserver1” address 10.50.23.90

B. mgmt_cli add host name “myHost12 ip” address 10.50.23.90

C. mgmt_cli add host name ip-address 10.50.23.90

D. mgmt_cli add host name “emailserver1” ip-address 10.50.23.90

A

D. mgmt_cli add host name “emailserver1” ip-address 10.50.23.90

145
Q

Which one of the following is true about Threat Extraction?

A. Delivers file only if no threats found
B. Can take up to 3 minutes to complete
C. Works on all MS Office, Executables, and PDF files
D. Always delivers a file to user

A

D. Always delivers a file to user

146
Q

Which statement is most correct regarding “CoreXL Dynamic Dispatcher”?

A. The CoreXL FW instances assignment mechanism is based on the utilization of CPU cores.

B. The CoreXL FW instances assignment mechanism is based on Source IP addresses, Destination IP-addresses, and the IP ‘Protocol’ type.

C. The CoreXL FW instances assignment mechanism is based on Source MAC addresses, Destination MAC addresses.

D. The CoreXL FW instances assignment mechanism is based on IP Protocol type.

A

A. The CoreXL FW instances assignment mechanism is based on the utilization of CPU cores.

147
Q

Where can you see and search records of action done by R80 SmartConsole administrators?

A. In the Logs & Monitor, logs, select “Audit Log View”
B. In Smartlog, all logs
C. In SmartView Tracker, open active log
D. In SmartAudit Log View

A

A. In the Logs & Monitor, logs, select “Audit Log View”

148
Q

You have successfully backed up your Management Server database without the OS information. What command would you use to restore this backup?

A. restore_backup
B. migrate_server import
C. import backup
D. cp_merge

A

B. migrate_server import

149
Q

Which of the following is NOT a valid type of SecureXL template?

A. Drop Template
B. NAT Template
C. Deny Template
D. Accept Template

A

C. Deny Template

150
Q

Capsule Connect and Capsule Workspace both offer secured connection for remote users who are using their mobile devices. However, there are differences between the two. Which of the following statements correctly identify each product’s capabilities?

A. Workspace can support any application, whereas Connect has a limited number of application types which it will support.

B. For credential protection, Connect uses One-time Password login support, but has no SSO support, whereas Workspace offers both One-Time Password login support as well as SSO for specific applications.

C. For compliance/host checking, Workspace offers the MDM cooperative enforcement, whereas Connect offers both jailbreak/root detection and MDM cooperative enforcement.

D. Workspace supports iOS, Android, and WP8, whereas Connect supports iOS and Android only.

A

B. For credential protection, Connect uses One-time Password login support, but has no SSO support, whereas Workspace offers both One-Time Password login support as well as SSO for specific applications.

151
Q

What destination versions are supported for a Multi-Version Cluster Upgrade?

A. R80.10 and Later
B. R77.30 and Later
C. R76 and Later
D. R70 and Later

A

A. R80.10 and Later

152
Q

Which command can you use to verify the number of active concurrent connections?

A. fw ctl pstat
B. show connections
C. show all connections
D. fw conn all

A

A. fw ctl pstat

153
Q

Automation and Orchestration differ in that:

A. Orchestration relates to codifying tasks, whereas automation relates to codifying processes.

B. Orchestration is concerned with executing a single task, whereas automation takes a series of tasks and puts them all together into a process workflow.

C. Automation involves the process of coordinating an exchange of information through web service interactions such as XML and JSON, but orchestration does not involve processes.

D. Automation relates to codifying tasks, whereas orchestration relates to codifying processes.

A

D. Automation relates to codifying tasks, whereas orchestration relates to codifying processes.

154
Q

CoreXL is NOT supported when one of the following features is enabled:

A. Route-based VPN
B. IPS
C. IPv6
D. Overlapping NAT

A

D. Overlapping NAT

155
Q

Vanessa is expecting a very important Security Report. The Document should be sent as an attachment via e-mail. An e-mail with Security_report.pdf file was delivered to her e-mail inbox. When she opened the PDF file, she noticed that the file is basically empty and only few lines of text are in it. The report is missing some graphs, tables and links. Which component of SandBlast protection is her company using on a Gateway?

A. SandBlast Agent
B. SandBlast Threat Extraction
C. Check Point Protect
D. SandBlast Threat Emulation

A

B. SandBlast Threat Extraction

156
Q

In terms of “Order of Rule Enforcement”. When a packet arrives at the gateway, the gateway checks it against the rules in the top Policy Layer, sequentially from top to bottom. Which Statement is correct?

A. If the rule does not match in the Network policy it will continue to other enabled polices.
B. If the Action of the matching rule is Drop, the gateway continues to check rules in the next Policy Layer down.
C. If the Action of the matching rule is Accept, the gateway will drop the packet.
D. If the Action of the matching rule is Drop, the gateway stops matching against later rules in the Policy Rule Base and drops the packet.

A

D. If the Action of the matching rule is Drop, the gateway stops matching against later rules in the Policy Rule Base and drops the packet.

157
Q

SecureXL is able to accelerate the Connection Rate using templates. Which attributes are used in the template to identify the connection?

A. Source address, Destination address, Source port, Destination port
B. Source address, Destination address, Destination port
C. Source address, Destination address, Destination port, Protocol
D. Source address, Destination address, Source port, Destination port, Protocol

A

C. Source address, Destination address, Destination port, Protocol

158
Q

Using Threat Emulation technologies, what is the best way to block .exe and .bat file types?

A. create FW rule for particular protocol
B. tecli advanced attributes set prohibited_file_types.exe.bat
C. Enable .exe bat protection in IPS Policy
D. enable DLP and select .exe and .bat file type

A

B. tecli advanced attributes set prohibited_file_types.exe.bat

159
Q

In which formats can Threat Emulation forensics reports be viewed in?

A. PDF and HTML
B. PDF and TXT
C. TXT, XML and CSV
D. PDF, HTML, and XML

A

A. PDF and HTML

160
Q

In ClusterXL Load Sharing Multicast Mode:

A. every member of the cluster received all of the packets sent to the cluster IP address.
B. only the secondary member receives packets sent to the cluster IP address.
C. packets sent to the cluster IP address are distributed equally between all members of the cluster.
D. only the primary member received packets sent to the cluster IP address.

A

A. every member of the cluster received all of the packets sent to the cluster IP address.

161
Q

Which process handles connections from SmartConsole R80?
A. cpmd
B. fwd
C. cpm
D. cpd

A

cpm

162
Q

Which of the following is NOT a component of Check Point Capsule?

A. Capsule Cloud
B. Capsule Docs
C. Capsule Enterprise
D. Capsule Workspace

A

C. Capsule Enterprise

163
Q

Alice & Bob are concurrently logged in via SSH on the same Check Point Security Gateway as user “admin” however Bob was first logged in and acquired the lock. Alice is not aware that Bob is also logged in to the same Security Management Server as she is but she needs to perform very urgent configuration changes - which of the following GAIA clish command is true for overriding Bobs configuration database lock:

A. lock database override
B. unlock override database
C. unlock database override
D. database unlock override

A

A. lock database override

164
Q

What is not a component of Check Point SandBlast?

A. Threat Simulator
B. Threat Extraction
C. Threat Emulation
D. Threat Cloud

A

A. Threat Simulator

165
Q

You pushed a policy to your gateway and you cannot access the gateway remotely any more. What command should you use to remove the policy from the gateway by logging in through console access?

A. “fw cpstop”
B. “fw unloadlocal”
C. “fw undo”
D. “fw unloadpolicy”

A

B. “fw unloadlocal”

166
Q

How to can you make sure that the old logs will be available after updating the Management to version R81.10 using the Advanced Upgrade Method?

A. Use the WebUI -> Maintenance > System Backup and store the backup on a remote FTP server

B. The logs will be included running $FWDIR/scripts/migrate_server export -v R81.10

C. Use the WebUI to save a snapshot before updating the Management -> Maintenance > Snapshot Management

D. Use the migrate_server tool with the option ‘-l’ for the logs and ‘-x’ for the index

A

D. Use the migrate_server tool with the option ‘-l’ for the logs and ‘-x’ for the index

167
Q

Bob has finished provisioning a secondary security management server. Now he wants to check if the provisioning is correct. Which of the following Check Point commands can be used to check if the security management server has been installed as a primary or a secondary security management server?

A. cpprod_util MgmtIsPrimary
B. cpprod_util FwIsSecondary
C. cpprod_util MgmtIsSecondary
D. cpprod_util FwIsPrimary

A

D. cpprod_util FwIsPrimary

168
Q

For Management High Availability, which of the following is NOT a valid synchronization status?

A. Lagging
B. Collision
C. Never been synchronized
D. Down

A

D. Down

169
Q

In what way are SSL VPN and IPSec VPN different?

A. SSL VPN is using HTTPS in addition to IKE, whereas IPSec VPN is clientless.

B. SSL VPN adds an extra VPN header to the packet, IPSec VPN does not.

C. IPSec VPN does not support authentication, SSL VPN does support this.

D. IPSec VPN uses an additional virtual adapter; SSL VPN uses the client network adapter only.

A

D. IPSec VPN uses an additional virtual adapter; SSL VPN uses the client network adapter only.

170
Q

Which statement is FALSE in respect of the SmartConsole after upgrading the management server to R81.10?

A. Yes. You can download the SmartConsole directly from the Download Center.
B. As far as you use version R80.40, no upgrade is needed due to compatibility mode.
C. Yes, using CPUSE you can make the installer available in the Web Portal of the Management Server.
D. Yes, the SmartConsole Upgrade package can be installed using CPUSE.

A

B. As far as you use version R80.40, no upgrade is needed due to compatibility mode.

171
Q

Alice works for a big security outsourcing provider company and as she receives a lot of change requests per day she wants to use for scripting daily tasks the API services from Check Point for the Management API. Firstly, she needs to be aware if the API services are running for the management. Which of the following Check Point Command is true:

A. api mgmt status
B. api status
C. status api
D. status mgmt api

A

B. api status

172
Q

Aggressive Mode in IKEv1 uses how many packages for negotiation?

A. 6
B. 5
C. depends on the make of the peer gateway
D. 3

A

D. 3

173
Q

What is correct statement about Security Gateway and Security Management Server failover in Check Point R80.X in terms of Check Point Redundancy driven solutions?

A. Security Gateway failover is a manual procedure but Security Management Server failover is an automatic procedure.

B. Security Gateway failover as well as Security Management Server failover is a manual procedure.

C. Security Gateway failover is an automatic procedure but Security Management Server failover is a manual procedure.

D. Security Gateway failover as well as Security Management Server failover is an automatic procedure.

A

C. Security Gateway failover is an automatic procedure but Security Management Server failover is a manual procedure.

174
Q

What is a possible command to delete all of the SSH connections of a gateway?

A. fw sam -l dport 22
B. fw ctl conntab -x -dport=22
C. fw tab -t connections -x -e 00000016
D. fwaccel dos config set dport ssh

A

B. fw ctl conntab -x -dport=22

175
Q

Where is the license for Check Point Mobile users installed?

A. The Security Management Server
B. The Primary Gateway
C. The Standby Gateway
D. The Endpoint Server

A

B. The Primary Gateway

176
Q

What is mandatory for ClusterXL to work properly?

A. The number of cores must be the same on every participating cluster node.

B. If you have “Non-monitored Private” interfaces, the number of those interfaces must be the same on all cluster members.

C. The Sync interface must not have an IP address configured.

D. The Magic MAC number must be unique per cluster node.

A

A. The number of cores must be the same on every participating cluster node.

177
Q

Which of the following authentication methods ARE NOT used for Mobile Access?

A. RADIUS server
B. SecurID
C. Username and password (internal, LDAP)
D. TACACS+

A

D. TACACS+

178
Q

Alice wants to upgrade the current security management machine from R80.40 to R81.10 and she wants to check the Deployment Agent status over the GAIA CUSH. Which of the following GAIA CUSH command is true?

A. show agent status
B. show uninstaller status
C. show installer packages
D. show installer status

A

D. show installer status

179
Q

When detected, an event can activate an Automatic Reaction. The SmartEvent administrator can create and configure one Automatic Reaction, or many, according to the needs of the system Which of the following statement is false and NOT part of possible automatic reactions:

A. Syslog
B. SNMP Trap
C. Block Source
D. Mail

A

A. Syslog

180
Q

What are scenarios supported by the Central Deployment in SmartConsole?

A. Installation of Jumbo Hotfix on a ClusterXL environment in High Availability Mode
B. Upgrading a Standalone environment
C. Upgrading a Dedicated SmartEvent Server
D. Upgrading a Dedicated Log Server to R81.10

A

A. Installation of Jumbo Hotfix on a ClusterXL environment in High Availability Mode

181
Q

Which view is NOT a valid CPVIEW view?

A. IDA
B. DLP
C. VPN
D. PDP

A

D. PDP

182
Q

After verifying that API Server is not running, how can you start the API Server?

A. Run command “api start” in any mode
B. Run command “mgmt api start” in any mode
C. Run command “mgmt_cli set api start” in Expert mode
D. Run command “set api start” in CLISH mode

A

A. Run command “api start” in any mode

183
Q

You are asked to check the status of several user-mode processes on the management server and gateway. Which of the following processes can only be seen on a Management Server?

A

fwm

184
Q

Which is the lowest version supported in R81.10?

A. R77
B. R77.30
C. R65
D. R80.20

A

B. R77.30

185
Q

Which one of the following is true about Capsule Connect?

A. It does not support all VPN authentication methods
B. It offers full enterprise mobility management
C. It is supported only on iOS phones and Windows PCs
D. It is a full layer 3 VPN client

A

D. It is a full layer 3 VPN client

186
Q

You want to gather data and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?

A. Check Point Capsule Cloud
B. Sandblast Mobile Protect
C. SecuRemote
D. SmartEvent Client Info

A

B. Sandblast Mobile Protect

187
Q

Which command is used to display status information for various components?

A. show system messages
B. sysmess all
C. show all systems
D. show sysenv all

A

D. show sysenv all

188
Q

What is the benefit of Manual NAT over Automatic NAT?

A. On IPSO and GAIA Gateways, it is handled in a stateful manner.
B. There is no benefit since Automatic NAT has in any case higher priority over Manual NAT.
C. You have the full control about the priority of the NAT rules.
D. If you create a new Security Policy, the Manual NAT rules will be transferred to this new policy.D. show sysenv all

A

C. You have the full control about the priority of the NAT rules.

189
Q

To enable Dynamic Dispatch on Security Gateway without the Firewall Priority Queues, run the following command in Expert mode and reboot:

A. fw ctl multik set_mode 1
B. fw ctl multik prioq 2
C. fw ctl Dyn_Dispatch on
D. fw ctl Dyn_Dispatch enable

A

B. fw ctl multik prioq 2

190
Q

Is it possible to establish a VPN before the user login to the Endpoint Client.

A. yes, you had to set neo_remember_user_password to true in the trac.defaults of the Remote Access Client or you can use the endpoint_vpn_remember_user_password attribute in the trac_client_1.ttm file located in the $FWDIR/conf directory on the Security Gateway.

B. no, the user must login first.

C. yes, you had to set neo_always_connected to true in the trac.defaults of the Remote Access Client or you can use the endpoint_vpn_always_connected attribute in the trac_client_1.ttm file located in the $FWDIR/conf directory on the Security Gateway.

D. yes, you had to enable Machine Authentication in the Gateway object of the Smart Console.

A

D. yes, you had to enable Machine Authentication in the Gateway object of the Smart Console.

191
Q

What is required for a certificate-based VPN tunnel between two gateways with separate management systems?

A. Mutually Trusted Certificate Authorities
B. Shared User Certificates
C. Shared Secret Passwords
D. Unique Passwords

A

A. Mutually Trusted Certificate Authorities

192
Q

What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?

A. VPN Routing Mode
B. Stateless Mode
C. Wire Mode
D. Stateful Mode

A

C. Wire Mode

193
Q

Which statement is NOT TRUE about Delta synchronization?

A. Using UDP Multicast or Broadcast on port 8161
B. Quicker than Full sync
C. Transfers changes in the Kernel tables between cluster members
D. Using UDP Multicast or Broadcast on port 8116

A

A. Using UDP Multicast or Broadcast on port 8161

194
Q

Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?

A. Check Point Mobile Web Portal
B. Check Point Capsule Remote
C. Check Point Remote User
D. Check Point Capsule Workspace

A

D. Check Point Capsule Workspace

195
Q

The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?

A. mgmt_cli -m add host name ip-address
B. set host name ip-address
C. add hostname ip-address
D. set hostname ip-address

A

A. mgmt_cli -m add host name ip-address

196
Q

While using the Gaia CLI, what is the correct command to publish changes to the management server?

A. commit
B. mgmt publish
C. mgmt cli commit
D. json publish

A

A. commit

197
Q

John is using Management HA. Which Security Management Server should he use for making changes?

A. active SmartConsole
B. Primary Log Server
C. secondary Smartcenter
D. connect virtual IP of Smartcenter HA

A

B. Primary Log Server

198
Q

GAiA Software update packages can be imported and installed offline in situation where:

A. The desired CPUSE package is ONLY available in the Check Point CLOUD.
B. Security Gateway with GAiA does NOT have SFTP access to Internet.
C. Security Gateway with GAiA does NOT have access to Internet.
D. Security Gateway with GAiA does NOT have SSH access to Internet.

A

C. Security Gateway with GAiA does NOT have access to Internet.

199
Q

What order should be used when upgrading a Management High Availability Cluster?

A. Standby Management, then Active Management
B. Secondary Management, then Primary Management
C. Active Management, then Standby Management
D. Primary Management, then Secondary Management

A

D. Primary Management, then Secondary Management

200
Q

By default, how often does Threat Emulation update the engine on the Security Gateway?

A. Once per day
B. Once an hour
C. Once a week
D. Twice per day

A

A. Once per day

201
Q

Steve is a Cyber Security Engineer working for Global Bank with a large scale deployment of Check Point Enterprise Appliances. Steve’s manager, Diana, asks him to provide firewall connection table details from one of the firewalls for which he is responsible. Which of these commands may impact performance briefly and should not be used during heavy traffic times of day?

A. fw tab -t connections
B. fw tab -t connections -c
C. fw tab -t connections -f
D. fw tab -t connections -s

A

C. fw tab -t connections -f

202
Q

Which of the following processes pulls the application monitoring status from gateways?

A

cpd

203
Q

Which directory below contains log files?

A. /opt/CPshrd-R80/log
B. /opt/CPsuite-R80/fw1/log
C. /opt/CPsuite-R80/log
D. /opt/CPSmartlog-R80/log

A

B. /opt/CPsuite-R80/fw1/log

204
Q

Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidated management console. It empowers the migration from legacy Client side logic to Server-side logic. The cpm process:

A. Performs database tasks such as creating, deleting, and modifying objects and indexing logs

B. Allows SmartConsole to communicate over TCP Port 19001

C. Performs database tasks such as creating, deleting, and modifying objects and compiling policy.

D. Allows SmartConsole to communicate over TCP Port 18190

A

C. Performs database tasks such as creating, deleting, and modifying objects and compiling policy.

205
Q

What is the most recommended way to install patches and hotfixes?

A. CPUSE Check Point Update Service Engine
B. rpm -Uv
C. Software Update Service
D. UnixInstallScript

A

A. CPUSE Check Point Update Service Engine

206
Q

Which command shows detailed information about VPN tunnels?

A. vpn tu
B. vpn tu tlist
C. cat $FWDIR/conf/vpn.conf
D. cpview

A

B. vpn tu tlist

207
Q

After upgrading the primary security management server from R80.40 to R81.10 Bob wants to use the central deployment in SmartConsole R81.10 for the first time. How many installations (e.g. Jumbo Hotfix, Hotfixes or Upgrade Packages) can run of such at the same time:

A. Up to 5 gateways
B. only 1 gateway
C. Up to 10 gateways
D. Up to 3 gateways

A

C. Up to 10 gateways

208
Q

The Check Point Central Deployment Tool (CDT) communicates with the Security Gateway(s) over Check Point SIC via ________.

A. TCP Port 18190
B. TCP Port 18191
C. TCP Port 19009
D. TCP Port 18209

A

D. TCP Port 18209

209
Q

The back end database for Check Point Management uses:

A. MongoDB
B. MySQL
C. DBMS
D. PostgreSQL

A

D. PostgreSQL

210
Q

You need to change the number of firewall instances used by CoreXL. How can you achieve this goal?

A. cpconfig; reboot not required
B. edit fwaffinity.conf; reboot not required
C. edit fwaffinity.conf; reboot required
D. cpconfig; reboot required

A

D. cpconfig; reboot required

211
Q

You need to see which hotfixes are installed on your Check Point server, which command would you use?

A. cpinfo -h all
B. cpinfo -l hotfix
C. cpinfo -o hotfix
D. cpinfo -y all

A

D. cpinfo -y all

212
Q

Check Point Support in many cases asks you for a configuration summary of your Check Point system. This is also called:

A. cpexport
B. cpsizeme
C. sysinfo
D. cpinfo

A

D. cpinfo

213
Q

There are multiple types of licenses for the various VPN components and types. License type related to management and functioning of Remote Access VPNs are - which of the following license requirement statement is NOT true:

A. MobileAccessLicense - This license is required on the Security Gateway for the following Remote Access solutions

B. EndpointPolicyManagementLicense - The Endpoint Security Suite includes blades other than the Remote Access VPN, hence this license is required to manage the suite

C. EndpointContainerLicense - The Endpoint Software Blade Licenses does not require an Endpoint Container License as the base

D. IPSecVPNLicense - This license is installed on the VPN Gateway and is a basic requirement for a Remote Access VPN solution

A

C. EndpointContainerLicense - The Endpoint Software Blade Licenses does not require an Endpoint Container License as the base

214
Q

You have a Gateway that is running with 2 cores. You plan to add a second gateway to build a cluster and used a device with 4 cores. How many cores can be used in a Cluster for Firewall-kernel on the new device?

A. 4
B. 1
C. 2
D. 3

A

C. 2

215
Q

What solution is Multi-queue intended to provide?

A. Reduce the performance of network interfaces
B. Improve the efficiency of traffic handling by SecureXL SNDs
C. Improve the efficiency of CoreXL Kernel Instances
D. Reduce the confusion for traffic capturing in FW Monitor

A

C. Improve the efficiency of CoreXL Kernel Instances

216
Q

Which command can you use to enable or disable multi-queue per interface?

A. Cpmqueue set
B. cpmq set
C. Cpmq config
D. Set cpmq enable

A

B. cpmq set

217
Q

The admin lost access to the Gaia Web Management Interface but he was able to connect via ssh. How can you check if the web service is enabled, running and which port is used?

A. In expert mode run #netstat -tulnp | grep httpd to see if httpd is up and to get the port number. In clish run >show web daemon-enable to see if the web daemon is enabled.

B. In clish run >show web ssl-port to see if the web daemon is enabled and which port is in use. In expert mode run #netstat -anp | grep httpd to see if the httpd is up

C. In clish run >show web ssl-port to see if the web daemon is enabled and which port is in use. In expert mode run #netstat -anp | grep httpd2 to see if the httpd2 is up

D. In expert mode run #netstat -tulnp | grep httpd2 to see if httpd2 is up and to get the port number. In clish run >show web daemon-enable to see if the web daemon is enabled.

A

D. In expert mode run #netstat -tulnp | grep httpd2 to see if httpd2 is up and to get the port number. In clish run >show web daemon-enable to see if the web daemon is enabled.

218
Q

Connections to the Check Point R80 Web API use what protocol?

A. SOAP
B. HTTP
C. SIC
D. HTTPS

A

D. HTTPS

219
Q

What is the command to check the status of the SmartEvent Correlation Unit?

A. cpstat cpsead
B. cp_conf get_stat cpsemd
C. fw ctl stat cpsemd
D. fw ctl get int cpsead_sta

A

A. cpstat cpsead

220
Q

Which of the SecureXL templates are enabled by default on Security Gateway?

A. Drop
B. Accept
C. None
D. NAT

A

B. Accept

221
Q

Which is the command to identify the NIC driver before considering about the employment of the Multi-Queue feature?

A. show interface eth0 mq
B. ethtool -i eth0
C. ifconfig -i eth0 verbose
D. ip show int eth0

A

B. ethtool -i eth0

222
Q

How can you see historical data with cpview?

A. cpview -f
B. cpview -e
C. cpview -t
D. cpview -d

A

C. cpview -t

223
Q

What is considered Hybrid Emulation Mode?

A. Load sharing between OS behavior and CPU Level emulation
B. Manual configuration of file types on emulation location
C. Load sharing of emulation between an on premise appliance and the cloud
D. Load Sharing of Threat Emulation Server and Firewall blade

A

C. Load sharing of emulation between an on premise appliance and the cloud

224
Q

The installation of a package via SmartConsole CANNOT be applied on:

A. A single Security Gateway
B. Multiple Security Gateways and/or Clusters
C. A full Security Cluster (All Cluster Members included)
D. R81.10 Security Management Server

A

D. R81.10 Security Management Server

225
Q

What is the recommended number of physical network interfaces in a Mobile Access cluster deployment?

A. 3 Interfaces - an interface leading to the organization, a second interface leading to the internet, a third interface for synchronization

B. 2 Interfaces - a data interface leading to the organization and the Internet, a second interface for synchronization

C. 4 Interfaces - an interface leading to the organization, a second interface leading to the internet, a third interface for synchronization, a fourth interface leading to the Security Management Server

D. 1 interface - an interface leading to the organization and the Internet, and configure for synchronization

A

A. 3 Interfaces - an interface leading to the organization, a second interface leading to the internet, a third interface for synchronization

226
Q

What is not a purpose of the deployment of Check Point API?

A. Integrate Check Point products with 3rd party solution
B. Create products that use and enhance the Check Point solution
C. Create a customized GUI Client for manipulating the objects database
D. Execute an automated script to perform common tasks

A

C. Create a customized GUI Client for manipulating the objects database

227
Q

What should the admin do in case the Primary Management Server is temporary down?

A. Use the VIP in SmartConsole you always reach the active Management Server.

B. The Secondary will take over automatically. Change the IP in SmartConsole to logon to the private IP of the Secondary Management Server.

C. Run the ‘promote_util’ to activate the Secondary Management server.

D. Logon with SmartConsole to the Secondary Management Server and choose ‘Make Active’ under Actions in the HA Management Menu

A

D. Logon with SmartConsole to the Secondary Management Server and choose ‘Make Active’ under Actions in the HA Management Menu

228
Q

An established connection is going to www.google.com. The Application Control Blade is inspecting the traffic. If SecureXL and CoreXL are both enabled, which path is handling the traffic?

A. Slow Path
B. Fast Path
C. Medium Path
D. Accelerated Path

A

C. Medium Path

229
Q

You are investigating issues with two gateway cluster members are not able to establish the first initial cluster synchronization. What service is used by the FWD daemon to do a Full Synchronization?

A. UDP port 8116
B. TCP port 257
C. TCP port 443
D. TCP port 256

A

D. TCP port 256

230
Q

Which encryption algorithm is the least secured?

A

DES

231
Q

SandBlast offers businesses flexibility in implementation based on their individual business needs. Which of these is an option for deployment of Check Point SandBlast Zero-Day Protection?

A. Smart Cloud Service
B. Any Cloud Service
C. Threat Agent Service
D. Public Cloud Service

A

D. Public Cloud Service

232
Q

In Threat Prevention, you can create new or clone profiles but you CANNOT change the out-of-the-box profiles of:

A. Basic, Optimized, Strict
B. General, purposed, Strict
C. General, Escalation, Severe
D. Basic, Optimized, Severe

A

A. Basic, Optimized, Strict

233
Q

You plan to automate creating new objects using the Management API. You decide to use GAIA CLI for this task. What is the first step to run management API commands on GAIA’s shell?

A. mgmt admin@teabag > id.txt
B. login user admin password teabag
C. mgmt login
D. mgmt_cli login user “admin” password “teabag” > id.txt

A

C. mgmt login

234
Q

Which command collects diagnostic data for analyzing a customer setup remotely?

A. sysinfo
B. migrate export
C. cpv
D. cpinfo

A

D. cpinfo

235
Q

How Capsule Connect and Capsule Workspace differ?

A. Capsule Connect provides Business data isolation

B. Capsule Workspace can provide access to any application

C. Capsule Connect provides a Layer3 VPN. Capsule Workspace provides a Desktop with usable applications.

D. Capsule Connect does not require an installed application at client

A

C. Capsule Connect provides a Layer3 VPN. Capsule Workspace provides a Desktop with usable applications.

236
Q

Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?

A. After upgrading the hardware, increase the number of kernel instances using cpconfig
B. Hyperthreading must be enabled in the bios to use CoreXL
C. Run cprestart from clish
D. Administrator does not need to perform any task. Check Point will make use of the newly installed CPU and Cores.

A

A. After upgrading the hardware, increase the number of kernel instances using cpconfig

237
Q

What level of CPU load on a Secure Network Distributor would indicated that another may be necessary?

A. Idle <20%
B. USR <20%
C. Wati <20%
D. SYS <20%

A

A. Idle <20%

238
Q

With MTA (Mail Transfer Agent) enabled the gateways manages SMTP traffic and holds external email with potentially malicious attachments. What is required in order to enable MTA (Mail Transfer Agent) functionality in the Security Gateway?

A. Endpoint Total Protection
B. Threat Prevention Software Blade Package
C. Threat Cloud Intelligence
D. Traffic on port 25

A

B. Threat Prevention Software Blade Package

239
Q

Native Applications require a thin client under which circumstances?

A. If you want to use a legacy 32-Bit Windows OS
B. If you want to use a VPN Client that is not officially supported by the underlying operating system
C. If you want to have assigned a particular Office Mode IP address
D. If you are about to use a client (FTP, RDP, …) that is installed on the endpoint.

A

D. If you are about to use a client (FTP, RDP, …) that is installed on the endpoint.

240
Q

Which the following type of authentication on Mobile Access can NOT be used as the first authentication method?

A. Username and Password
B. Dynamic ID
C. Certificate
D. RADIUS

A

B. Dynamic ID

241
Q

Alice knows about the Check Point Management HA installation from Bob and needs to know which Check Point Security Management Server is currently capable of issuing and managing certificate. Alice uses the Check Point command “cpconfig” to run the Check Point Security Management Server configuration tool on both Check Point Management HA instances “Primary & Secondary”. Which configuration option does she need to look for:

A. Certificate’s Fingerprint
B. Random Pool
C. CA Authority
D. Certificate Authority

A

D. Certificate Authority

242
Q

What are the two ClusterXL Deployment options?

A. Distributed and Full High Availability
B. Broadcast and Multicast Mode
C. Distributed and Standalone
D. Unicast and Multicast Mode

A

A. Distributed and Full High Availability

243
Q

What traffic does the Anti-bot feature block?

A. Command and Control traffic from hosts that have been identified as infected
B. Command and Control traffic to servers with reputation for hosting malware
C. Network traffic to hosts that have been identified as infected
D. Network traffic that is directed to unknown or malicious servers

A

A. Command and Control traffic from hosts that have been identified as infected

244
Q

What is the protocol and port used for Health Check and State Synchronization in ClusterXL?

A. CCP and 8116
B. CCP and 18190
C. CCP and 257
D. CPC and 8116

A

A. CCP and 8116

245
Q

John detected high load on sync interface. Which is most recommended solution?

A. For short connections like icmp service - delay sync for 2 seconds
B. For FTP connections - do not sync
C. Add a second interface to handle sync traffic
D. For short connections like http service - do not sync

A

D. For short connections like http service - do not sync

246
Q

What is the command to show SecureXL status?

A. fwaccel stat
B. fwaccel status
C. fwaccel stats -m
D. fwaccel -s

A

A. fwaccel stat

247
Q

SecureXL improves non-encrypted firewall traffic throughput and encrypted VPN traffic throughput.

A. False, because SecureXL does not improve this traffic but CoreXL does
B. True, because SecureXL does improve all traffic
C. False because encrypted traffic cannot be inspected
D. True, because SecureXL does improve this traffic

A

D. True, because SecureXL does improve this traffic

248
Q

Fill in the blank: Identity Awareness AD-Query is using the Microsoft____API to learn users from AD.

A. Services.msc
B. WMI
C. XML
D. Eventvwr

A

B. WMI

249
Q

The essential means by which state synchronization works to provide failover in the event an active member goes down, ________ is used specifically for clustered environments to allow gateways to report their own state and learn about the states of other members in the cluster.

A. cphaconf
B. ccp
C. cphad
D. cphastart

A

B. ccp

250
Q

What is the benefit of “fw monitor” over “tcpdump”?

A. “fw monitor” is also available for 64-Bit operating systems.
B. “fw monitor” can be used from the CLI of the Management Server to collect information from multiple gateways.
C. “fw monitor” reveals Layer 2 information, while “tcpdump” acts at Layer 3.
D. With “fw monitor”, you can see the inspection points, which cannot be seen in “tcpdump”.

A

D. With “fw monitor”, you can see the inspection points, which cannot be seen in “tcpdump”.

251
Q

To find records in the logs that shows log records from the Application URL Filtering Software Blade where traffic was dropped, what would be the query syntax?

A. blade:”application control” AND action:drop
B. blade;”application control” AND action;drop
C. blade: application control AND action:drop
D. (blade: application control AND action;drop)

A

A. blade:”application control” AND action:drop

252
Q

When an encrypted packet is decrypted, where does this happen?

A. Inbound chain
B. Outbound chain
C. Security policy
D. Decryption is not supported

A

A. Inbound chain

253
Q

Which Check Point daemon invokes and monitors critical processes and attempts to restart them if they fail?

A. fwm
B. cpd
C. cpm
D. cpwd

A

D. cpwd

254
Q

What is the SandBlast Agent designed to do?

A. Ensure the Check Point SandBlast services is running on the end user’s system

B. Clean up email sent with malicious attachments

C. If malware enters an end user’s system, the SandBlast Agent prevents the malware from spreading with the network

D. Performs OS-level sandboxing for SandBlast Cloud architecture

A

C. If malware enters an end user’s system, the SandBlast Agent prevents the malware from spreading with the network

255
Q

After replacing a faulty Gateway the admin installed the new Hardware and want to push the policy. Installing the policy using the SmartConsole he got an Error for the Threat Prevention Policy. There is no error for the Access Control Policy. What will be the most common cause for the issue?

A. The admin forgot to reestablish the SIC for the new hardware. That is typically the case when configure only the interfaces of the replacement hardware instead restoring a backup.

B. The IPS Protection engine on the replacement hardware is too old. Before pushing the Threat Prevention Policy use SmartConsole -> Security Policies -> Updates -> IPS ‘Update Now’ to update the engine.

C. The admin forgot to apply the new license. The Access Control license is included by default but the service subscriptions for the Threat Prevention Blades are missing.

D. The Threat Prevention Policy can’t be installed on a Gateway without an already installed Access Control Policy. First install only the Access Control Policy.

A

D. The Threat Prevention Policy can’t be installed on a Gateway without an already installed Access Control Policy. First install only the Access Control Policy.

256
Q

Which one of the following is true about Threat Extraction?

A. Takes minutes to complete (less than 3 minutes)
B. Takes less than a second to complete
C. Works on MS Office and PDF files only
D. Always delivers a file

A

D. Always delivers a file

257
Q

In Advanced Permanent Tunnel Configuration, to set the amount of time the tunnel test runs without a response before the peer host is declared ‘down’, you would set the_______ ?

A. life sign polling interval
B. life sign timeout
C. life_sign_timeout
D. life_sign_polling_interval

A

C. life_sign_timeout

258
Q

Which file contains the host address to be published, the MAC address that needs to be associated with the IP Address, and the unique IP of the interface that responds to ARP request?

A. /var/opt/CPshrd-R80/conf/local.arp
B. /opt/CPshrd-R80/conf/local.arp
C. $CPDIR/conf/local.arp
D. $FWDIR/conf/local.arp

A

D. $FWDIR/conf/local.arp

259
Q

What is the recommended configuration when the customer requires SmartLog indexing for 14 days and SmartEvent to keep events for 180 days?

A. It is not possible
B. Use Multi-Domain Management Server
C. Choose different setting for log storage and SmartEvent db
D. Install Management and SmartEvent on different machines

A

C. Choose different setting for log storage and SmartEvent db

260
Q

You want to set up a VPN tunnel to an external gateway. You had to make sure that the IKE P2 SA will only be established between two subnets and not all subnets defined in the default VPN domain of your gateway.

A. In the SmartConsole create a dedicated VPN Community for both Gateways. On the Gateway add the following line to the $FWDIR/conf/user.def.FW1 file -> subnet_for_range_and_peer = { };

B. In the SmartConsole create a dedicated VPN Community for both Gateways. Go to Security Policies /Access Control and create an in-line layer rule with source and destination containing the two networks used for the IKE P2 SA. Put the name of the Community in the VPN column.

C. In the SmartConsole create a dedicated VPN Community for both Gateways. Selecting the local gateway in the Community you can set the VPN Domain to ‘User defined’ and put in the local network.

D. In the SmartConsole create a dedicated VPN Community for both Gateways. On the Management add the following line to the $FWDIR/conf/user.def.FW1 file -> subnet_for_range_and_peer = { };

A

C. In the SmartConsole create a dedicated VPN Community for both Gateways. Selecting the local gateway in the Community you can set the VPN Domain to ‘User defined’ and put in the local network.

261
Q

When using the Mail Transfer Agent, where are the debug logs stored?

A. $FWDIR/bin/emaild.mta.elg
B. /var/log/mail.mta.elg
C. $FWDIR/log/mtad.elg
D. $CPDIR/log/emaild.elg

A

C. $FWDIR/log/mtad.elg

262
Q

With SecureXL enabled, accelerated packets will pass through the following:

A. Network Interface Card, OSI Network Layer, and the Acceleration Device
B. Network Interface Card, Check Point Firewall Kernel, and the AccelerationDevice
C. Network InterfaceCard and the Acceleration Device
D. Network Interface Card, OSI Network Layer, OS IP Stack, and the Acceleration Device

A

C. Network InterfaceCard and the Acceleration Device

263
Q

Which of the following statements about SecureXL NAT Templates is true?

A. NAT Templates are generated to achieve high session rate for NAT. These templates store the NAT attributes of connections matched by rulebase so that similar new connections can take advantage of this information and do NAT without the expensive rulebase lookup. These are enabled by default and work only if Accept Templates are enabled.

B. DROP Templates are generated to achieve high session rate for NAT. These templates store the NAT attributes of connections matched by rulebase so that similar new connections can take advantage of this information and do NAT without the expensive rulebase lookup. These are disabled by default and work only if NAT Templates are disabled.

C. NAT Templates are generated to achieve high session rate for NAT. These templates store the NAT attributes of connections matched by rulebase so that similar new connections can take advantage of this information and do NAT without the expensive rulebase lookup. These are disabled by default and work only if Accept Templates are disabled.

D. ACCEPT Templates are generated to achieve high session rate for NAT. These templates store the NAT attributes of connections matched by rulebase so that similar new connections can take advantage of this information and do NAT without the expensive rulebase lookup. These are disabled by default and work only if NAT Templates are disabled.

A

A. NAT Templates are generated to achieve high session rate for NAT. These templates store the NAT attributes of connections matched by rulebase so that similar new connections can take advantage of this information and do NAT without the expensive rulebase lookup. These are enabled by default and work only if Accept Templates are enabled.

264
Q

Which NAT rules are prioritized first?

A. Manual Post-Automatic NAT Rules
B. Automatic Hide NAT Rules
C. Manual Pre-Automatic NAT Rules
D. Automatic Static NAT Rules

A

C. Manual Pre-Automatic NAT Rules

265
Q

What is the best method to upgrade a Security Management Server to R80.x when it is not connected to the Internet?

A. SmartUpdate offline upgrade
B. Advanced upgrade or CPUSE offline upgrade
C. Advanced upgrade or CPUSE offline upgrade only
D. Advanced Upgrade only

A

B. Advanced upgrade or CPUSE offline upgrade

266
Q

Check Point APIs allow system engineers and developers to make changes to their organization’s security policy with CLI tools and Web Services. Which of the following is NOT a possible use case?

A. Create products that use and enhance 3rd party solutions.
B. Create new dashboards to manage 3rd party task.
C. Create products that use and enhance the Check Point Solution.
D. Execute automated scripts to perform common tasks.

A

B. Create new dashboards to manage 3rd party task.

267
Q

Which statement is true about ClusterXL?

A. Supports Dynamic Routing (Unicast Only)
B. Does not support Dynamic Routing
C. Supports Dynamic Routing (Unicast and Multicast)
D. Supports Dynamic Routing (Multicast Only)

A

C. Supports Dynamic Routing (Unicast and Multicast)

268
Q

You have pushed policy to GW-3 and now cannot pass traffic through the gateway. As a last resort, to restore traffic flow, what command would you run to remove the latest policy from GW-3?

A. fw unloadlocal
B. fwm unload policy
C. fw unloadpolicy
D. fwm unload local

A

A. fw unloadlocal

269
Q

If SecureXL is disabled which path is used to process traffic?

A. Passive path
B. Firewall path
C. Accelerated path
D. Medium path

A

B. Firewall path

270
Q

What kind of information would you expect to see when using the “sim affinity -l” command?

A. Affinity Distribution
B. Overview over SecureXL templated connections
C. The involved firewall kernel modules in inbound and outbound packet chain
D. The VMACs used in a Security Gateway cluster

A

A. Affinity Distribution

271
Q

Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidated management console. CPM allows the GUI client and management server to communicate via web services using __________.

A. TCP Port 18191
B. TCP Port 18190
C. TCP Port 18209
D. TCP port 19009

A

D. TCP port 19009

272
Q

What are valid Policy Types in R81.10?

A. Access Control, IPS, Threat Emulation, NAT
B. Access Control, RemoteAccess VPN, NAT, IPS
C. Access Control, IPS, QoS, DLP
D. Access Control, Threat Prevention, QoS, Desktop Security

A

D. Access Control, Threat Prevention, QoS, Desktop Security

273
Q

What is true about the IPS-Blade?

A. IPS Exceptions cannot be attached to “all rules”
B. In the IPS Layer, the only three possible actions are Basic, Optimized and Strict
C. The GeoPolicy Exceptions and the Threat Prevention Exceptions are the same
D. IPS is managed by the Threat Prevention Policy

A

D. IPS is managed by the Threat Prevention Policy

274
Q

Return oriented programming (ROP) exploits are detected by which security blade?

A. Data Loss Prevention
B. Check Point Anti-Virus / Threat Emulation
C. Application control
D. Intrusion Prevention Software

A

B. Check Point Anti-Virus / Threat Emulation

275
Q

Mobile Access Gateway can be configured as a reverse proxy for Internal Web Applications. Reverse proxy users browse to a URL that is resolved to the Security Gateway IP address. Which of the following Check Point command is true for enabling the Reverse Proxy:

A. ReverseCLIProxy
B. ReverseProxyCLI
C. ReverseProxy
D. ProxyReverseCLI

A

B. ReverseProxyCLI

276
Q

In the Firewall chain mode FFF refers to:

A. Stateful Packets
B. No Match
C. Stateless Packets
D. All Packets

A

D. All Packets

277
Q

You want to verify if your management server is ready to upgrade. What tool could you use in this process?

A. migrate import
B. migrate export
C. upgrade tools verify
D. pre_upgrade_verifier

A

D. pre_upgrade_verifier

278
Q

**

With Mobile Access enabled, administrators select the web-based and native applications that can be accessed by remote users and define the actions that users can perform within the applications. Mobile Access encrypts all traffic using:

A. HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, they need to install the SSL Network Extender.

B. HTTPS for web-based applications and AES or RSA algorithm for native applications. For end users to access the native application, no additional software is required.

C. HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, no additional software is required.

D. HTTPS for web-based applications and AES or RSA algorithm for native applications. For end users to access the native application, they need to install the SSL Network Extender.

A

A. HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, they need to install the SSL Network Extender.

279
Q

Under which file is the proxy arp configuration stored?

A. $FWDIR/conf/local.arp on the management server

B. $FWDIR/conf/local.arp on the gateway

C. $FWDIR/state/tmp/proxy.arp on the security gateway

D. $FWDIR/state/proxy_arp.conf on the management server

A

B. $FWDIR/conf/local.arp on the gateway

280
Q

What is “Accelerated Policy Installation”?

A. Starting R81, the Desktop Security Policy installation process is accelerated thereby reducing the duration of the process significantly

B. Starting R81, the QoS Policy installation process is accelerated thereby reducing the duration of the process significantly

C. Starting R81, the Access Control Policy installation process is accelerated thereby reducing the duration of the process significantly

D. Starting R81, the Threat Prevention Policy installation process is accelerated thereby reducing the duration of the process significantly

A

C. Starting R81, the Access Control Policy installation process is accelerated thereby reducing the duration of the process significantly

281
Q

In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?

A. fw ctl affinity -l -a -r -v
B. fw ctl multik stat
C. fw ctl sdstat
D. cpinfo

A

A. fw ctl affinity -l -a -r -v

282
Q

What are the minimum open server hardware requirements for a Security Management Server/Standalone Security Gateway?

A. 2 CPU cores, 4GB of RAM and 15GB of disk space
B. 4 CPU cores, 8GB of RAM and 500 GB of disk space
C. 8 CPU cores, 16GB of RAM and 500 GB of disk space
D. 8 CPU cores, 32GB of RAM and 1 TB of disk space

A

B. 4 CPU cores, 8GB of RAM and 500 GB of disk space

283
Q

The “fw monitor” tool can be best used to troubleshoot_____.

A. Network traffic issues
B. Logging issues
C. Authentication issues
D. FWD issues

A

A. Network traffic issues

284
Q

Installations and upgrades with CPUSE require that the CPUSE agent is up-to-date. Usually the latest build is downloaded automatically. How can you verify the CPUSE agent build?

A. In the Management Server or Gateway object in SmartConsole or by running the following command in CLISH: show installer agent version

B. In WebUI Status and Actions page or by running the following command in CLISH: show installer agent version

C. In WebUI Status and Actions page or by running the following command in CLISH: show installer status build

D. In the Management Server or Gateway object in SmartConsole or by running the following command in CLISH: show installer status build

A

C. In WebUI Status and Actions page or by running the following command in CLISH: show installer status build

285
Q

Which one is not a valid upgrade method to R81.10?

A. RPM Upgrade
B. Upgrade with Migration
C. Advanced Upgrade
D. CPUSE Upgrade

A

A. RPM Upgrade

286
Q

SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?

A. Behavior Risk Engine
B. Gateway
C. Personal User Storage
D. Management Dashboard

A

C. Personal User Storage

287
Q

What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?

A. Anti-Bot is the only protection mechanism which starts a counter-attack against known Command Control Centers

B. Anti-Bot is the only countermeasure against unknown malware

C. Anti-Bot is a post-infection malware protection to prevent a host from establishing a connection to a Command Control Center

D. Anti-Bot is the only signature-based method of malware protection

A

C. Anti-Bot is a post-infection malware protection to prevent a host from establishing a connection to a Command Control Center

288
Q

In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?

A. SND is a feature of fw monitor to capture accelerated packets
B. SND is an alternative to IPSec Main Mode, using only 3 packets
C. SND is used to distribute packets among Firewall instances
D. SND is a feature to accelerate multiple SSL VPN connections

A

C. SND is used to distribute packets among Firewall instances

289
Q

Which of the following is true regarding the Proxy ARP feature for Manual NAT?

A. Translate Destination on Client Side should be configured
B. fw ctl proxy should be configured
C. The local.arp file must always be configured
D. Automatic proxy ARP configuration can be enabled

A

D. Automatic proxy ARP configuration can be enabled

290
Q

What Factors preclude Secure XL Templating?

A. Source Port Ranges/Encrypted Connections
B. CoreXL
C. Simple Groups
D. ClusterXL in load sharing Mode

A

A. Source Port Ranges/Encrypted Connections

291
Q

What is the main difference between Threat Extraction and Threat Emulation?

A. Threat Emulation never delivers a file that takes less than a second to complete
B. Threat Emulation never delivers a file and takes more than 3 minutes to complete
C. Threat Extraction always delivers a file and takes less than a second to complete
D. Threat Extraction never delivers a file and takes more than 3 minutes to complete

A

C. Threat Extraction always delivers a file and takes less than a second to complete

292
Q

What command is used to manually failover a cluster during a zero downtime upgrade?

A. set cluster member down
B. cpstop
C. clusterXL_admin down
D. set clusterXL down

A

C. clusterXL_admin down

293
Q

What is the name of the secure application for Mail/Calendar for mobile devices?

A. Capsule Mail
B. Capsule VPN
C. Capsule Workspace
D. Secure Workspace

A

C. Capsule Workspace

294
Q

When deploying SandBlast, how would a Threat Emulation appliance benefit from the integration of ThreatCloud?

A. ThreatCloud is a collaboration platform for all the Check Point customers to share information about malicious and benign files that all of the customers can benefit from as it makes emulation of known files unnecessary.

B. ThreatCloud is a collaboration platform for Check Point customers to benefit from VMWare ESXi infrastructure which supports the Threat Emulation Appliances as virtual machines in the EMC Cloud.

C. ThreatCloud is a database-related application which is located on-premise to preserve privacy of company-related data.

D. ThreatCloud is a collaboration platform for all the Check Point customers to form a virtual cloud consisting of a combination of all on-premise private cloud environments.

A

A. ThreatCloud is a collaboration platform for all the Check Point customers to share information about malicious and benign files that all of the customers can benefit from as it makes emulation of known files unnecessary.

295
Q

What is the responsibility of SOLR process on the management server?

A. Writing all information into the database
B. It generates indexes of data written to the database
C. Validating all data before it’s written into the database
D. Communication between SmartConsole applications and the Security Management Server

A

B. It generates indexes of data written to the database

296
Q

Which of the following is a task of the CPD process?

A. Responsible for processing most traffic on a security gateway
B. Transfers messages between Firewall processes
C. Invoke and monitor critical processes and attempts to restart them if they fail
D. Log forwarding

A

B. Transfers messages between Firewall processes

297
Q

You had setup the VPN Community ‘VPN-Stores’ with 3 gateways. There are some issues with one remote gateway(1.1.1.1) and an your local gateway. What will be the best log filter to see only the IKE Phase 2 agreed networks for both gateways.

A. action:”Key Install” AND 1.1.1.1 AND Main Mode
B. action:”Key Install” AND 1.1.1.1 AND Quick Mode
C. Blade:”VPN” AND VPN-Stores AND Main Mode
D. Blade:”VPN” AND VPN-Stores AND Quick Mode

A

C. Blade:”VPN” AND VPN-Stores AND Main Mode

298
Q

What are the two modes for SNX (SSL Network Extender)?

A. Network Mode and Application Mode
B. Visitor Mode and Office Mode
C. Network Mode and Hub Mode
D. Office Mode and Hub Mode

A

A. Network Mode and Application Mode

299
Q

Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?

A. logd
B. fwd
C. fwm
D. cpd

A

fwd

300
Q

What is the mechanism behind Threat Extraction?

A. Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast.

B. This is a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender.

C. This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy it prior to sending it to the intended recipient.

D. This is a new mechanism to identify the IP address of the sender of malicious codes and to put it into the SAM database (Suspicious Activity Monitoring).

A

A. Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast.

301
Q

Which of these statements describes the Check Point ThreatCloud?

A. Blocks or limits usage of web applications
B. Prevents or controls access to web sites based on category
C. Prevents Cloud vulnerability exploits
D. A worldwide collaborative security network

A

D. A worldwide collaborative security network

302
Q

What are possible Automatic Reactions in SmartEvent?

A. Mail, SNMP Trap, Block Source, Block Event Activity, External Script
B. Web Mail, Block Destination, SNMP Trap, SmartTask
C. Web Mail, Block Service, SNMP Trap, SmartTask, Geo Protection
D. Web Mail, Forward to SandBlast Appliance, SNMP Trap, External Script

A

A. Mail, SNMP Trap, Block Source, Block Event Activity, External Script

303
Q

Which of the following Check Point commands is true to enable Multi-Version Cluster (MVC)?

A. Check Point Security Management HA (Secondary):
set cluster member mvc on
B. Check Point Security Gateway Only:
set cluster member mvc on
C. Check Point Security Management HA (Primary):
set cluster member mvc on
D. Check Point Security Gateway Cluster Member:
set cluster member mvc on

A

D. Check Point Security Gateway Cluster Member:
set cluster member mvc on

304
Q

Hit Count is a feature to track the number of connections that each rule matches, which one is NOT a benefit of Hit Count.

A. Better understand the behavior of the Access Control Policy
B. Improve Firewall performance - You can move a rule that has a high hit count to a higher position in the Rule Base
C. Automatically rearrange Access Control Policy based on Hit Count Analysis.
D. Analyze a Rule Base - You can delete rules that have no matching connections

A

C. Automatically rearrange Access Control Policy based on Hit Count Analysis.

305
Q

Which Correction mechanisms are available with ClusterXL under R81.10?

A. Correction Mechanisms are only available of Maestro Hyperscale Orchestrators

B. Pre-Correction and SDF (Sticky Decision Function)

C. SDF (Sticky Decision Function) and Flush and ACK

D. Dispatcher (Early Correction) and Firewall (Late Correction)

A

D. Dispatcher (Early Correction) and Firewall (Late Correction)

306
Q

What are the methods of SandBlast Threat Emulation deployment?

A. Cloud, Appliance and Private
B. Cloud, Appliance and Hybrid
C. Cloud, Smart-1 and Hybrid
D. Cloud, OpenServer and Vmware

A

B. Cloud, Appliance and Hybrid

307
Q

By default, what information is NOT collected from a Security Gateway in a CPINFO?

A. OS and Network Statistics
B. System message logs
C. Configuration and database files
D. Firewall logs

A

D. Firewall logs

308
Q

To add a file to the Threat Prevention Whitelist, what two items are needed?

A. File name and Gateway
B. IP address of Management Server and Gateway
C. Object Name and MDS signature
D. MD5 signature and Gateway

A

C. Object Name and MDS signature

309
Q

Which of the following describes how Threat Extraction functions?

A. Detect threats and provides a detailed report of discovered threats.
B. Proactively detects threats.
C. Delivers file with original content.
D. Delivers PDF versions of original files with active content removed.

A

D. Delivers PDF versions of original files with active content removed.

310
Q

Which method below is NOT one of the ways to communicate using the Management API’s?

A. Sending API commands over an http connection using web-services
B. Typing API commands from a dialog box inside the SmartConsole GUI application
C. Typing API commands using Gaia’s secure shell (clish)
D. Typing API commands using the “mgmt_cli” command

A

A. Sending API commands over an http connection using web-services

311
Q

What is false regarding prerequisites for the Central Deployment usage?

A. The administrator must have write permission on SmartUpdate
B. Security Gateway must have the latest CPUSE Deployment Agent
C. No need to establish SIC between gateways and the management server, since the CDT tool will take care about SIC automatically.
D. The Security Gateway must have a policy installed

A

C. No need to establish SIC between gateways and the management server, since the CDT tool will take care about SIC automatically.

312
Q

What CLI utility runs connectivity tests from a Security Gateway to an AD domain controller?

A. ad_connectivity_test -d
B. test_ldap_connectivity -d
C. test_connectivity_ad -d
D. test_ad_connectivity -d

A

D. test_ad_connectivity -d

313
Q

Which command will reset the kernel debug options to default settings?

A. fw ctl dbg -a 0
B. fw ctl dbg resetall
C. fw ctl debug set 0
D. fw ctl debug 0

A

D. fw ctl debug 0

314
Q

When simulating a problem on ClusterXL cluster with cphaprob –d STOP -s problem -t 0 register, to initiate a failover on an active cluster member, what command allows you remove the problematic state?

A. cphaprob –d STOP unregister
B. cphaprob STOP unregister
C. cphaprob unregister STOP
D. cphaprob –d unregister STOP

A

A. cphaprob –d STOP unregister

315
Q

How can you grant GAiA API Permissions for a newly created user?

A. Assign the user a permission profile in SmartConsole
B. Assign the user the admin RBAC role in clish
C. No need to grant access since every user has access by default.
D. In bash, use the following command: “gaia_api access –user Tom –enable true”

A

D. In bash, use the following command: “gaia_api access –user Tom –enable true”

316
Q

Can Check Point and Third-party Gateways establish a certificate-based Site-to-Site VPN tunnel?

A. Yes, but they need to have a mutually trusted certificate authority

B. Yes, but they have to have a pre-shared secret key

C. No, they cannot share certificate authorities

D. No, Certificate based VPNs are only possible between Check Point devices

A

A. Yes, but they need to have a mutually trusted certificate authority

317
Q

Which of the following statements about Site-to-Site VPN Domain-based is NOT true?

A. Domain-based- VPN domains are pre-defined for all VPN Gateways. When the Security Gateway encounters traffic originating from one VPN Domain with the destination to a VPN Domain of another VPN Gateway, that traffic is identified as VPN traffic and is sent through the VPN Tunnel between the two Gateways.

B. Route-based- The Security Gateways will have a Virtual Tunnel Interface (VTI) for each VPN Tunnel with a peer VPN Gateway. The Routing Table can have routes to forward traffic to these VTIs. Any traffic routed through a VTI is automatically identified as VPN Traffic and is passed through the VPN Tunnel associated with the VTI.

C. Domain-based- VPN domains are pre-defined for all VPN Gateways. A VPN domain is a service or user that can send or receive VPN traffic through a VPN Gateway.

D. Domain-based- VPN domains are pre-defined for all VPN Gateways. A VPN domain is a host or network that can send or receive VPN traffic through a VPN Gateway.

A

C. Domain-based- VPN domains are pre-defined for all VPN Gateways. A VPN domain is a service or user that can send or receive VPN traffic through a VPN Gateway.

318
Q

What is the best sync method in the ClusterXL deployment?

A. Use 3 clusters + 1st sync + 2nd sync + 3rd sync
B. Use 2 clusters + 1st sync + 2nd sync
C. Use 1 cluster + 1st sync
D. Use 1 dedicated sync interface

A

D. Use 1 dedicated sync interface

319
Q

Alice & Bob are concurrently logged in via SSH on the same Check Point Security Gateway as user “admin” however Bob was first logged in and acquired the lock. Alice tells Bob that she also needs to perform some important configuration changes. Therefore, Bob is releasing his read/write lock from the GAIA configuration database - which of the following GAIA clish command is true:

A. unlock clish database
B. lock database override
C. unlock database
D. override lock database

A

C. unlock database

320
Q

SandBlast agent extends Zero-day prevention to what part of the network?

A. Email servers
B. Web Browsers and user devices
C. DMZ server
D. Cloud

A

B. Web Browsers and user devices

321
Q

As a valid Mobile Access Method, what feature provides Capsule Connect/VPN?

A. Full layer3 VPN -IPSec VPN that gives users network access to all mobile applications

B. That is used to deploy the mobile device as a generator of one-time passwords for authenticating to an RSA Authentication Manager

C. Full Layer4 VPN -SSL VPN that gives users network access to all mobile applications

D. You can make sure that documents are sent to the intended recipients only

A

A. Full layer3 VPN -IPSec VPN that gives users network access to all mobile applications

322
Q

After finishing installation admin John likes to use top command in expert mode. John has to set the expert-password and was able to use top command. A week later John has to use the top command again. He detected that the expert password is no longer valid. What is the most probable reason for this behavior?

A. changes are only possible via SmartConsole
B. “save config” was not issued in expert mode
C. “write memory” was not issued on clish
D. “save config” was not issued on clish

A

D. “save config” was not issued on clish

323
Q

Which Mobile Access Solution is clientless?

A. SecuRemote
B. Checkpoint Mobile
C. Mobile Access Portal
D. Endpoint Security Suite

A

C. Mobile Access Portal

324
Q

Packet acceleration (SecureXL) identifies connections by several attributes. Which of the attributes is NOT used for identifying connection?

A. Source Port
B. TCP Acknowledgment Number
C. Source Address
D. Destination Address

A

B. TCP Acknowledgment Number

325
Q

Which command would disable a Cluster Member permanently?

A. cphaprob_admin down
B. clusterXL_admin down -p
C. set clusterXL down -p
D. clusterXL_admin_down

A

B. clusterXL_admin down -p

326
Q

The fwd process on the Security Gateway sends logs to the fwd process on the Management Server, where it is forwarded to ______ via ______.

A. cpd, fwm
B. cpm, cpd
C. fwm, cpd
D. cpwd, fwssd

A

C. fwm, cpd

327
Q

If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsive, which if these steps should NOT be performed:

A. Rename the hostname of the Standby member to match exactly the hostname of the Active member.
B. Manually synchronize the Active and Standby Security Management Servers.
C. Change the Active Security Management Server to Standby.
D. Change the Standby Security Management Server to Active.

A

A. Rename the hostname of the Standby member to match exactly the hostname of the Active member.

328
Q

Which command lists all tables in Gaia?

A. fw tab -I
B. fw tab -list
C. fw tab -t
D. fw tab -s

A

D. fw tab -s

329
Q

SandBlast has several functional components that work together to ensure that attacks are prevented in real-time. Which the following is NOT part of the SandBlast component?

A. Threat Emulation
B. Threat Cloud
C. Mail Transfer Agent
D. Mobile Access

A

D. Mobile Access

330
Q

After some changes in the firewall policy you run into some issues. You want to test if the policy from two weeks ago have the same issue. You don’t want to lose the changes from the last weeks. What is the best way to do it?

A. Use the Gaia WebUI to take a backup of the Gateway. In SmartConsole under Security Policies go to the Installation History view of the Gateway, select the policy version from two weeks ago and press the ‘Install specific version’ button.

B. Use the Gaia WebUI to take a snapshot of management. In the In SmartConsole under Manage & Settings go to Sessions -> Revisions and select the revision from two weeks ago. Run the action ‘Revert to this revision…’ Restore the management snapshot.

C. In SmartConsole under Manage & Settings go to Sessions -> Revisions and select the revision from two weeks ago. Run the action ‘Revert to this revision…’.

D. In SmartConsole under Security Policies go to the Installation History view of the Gateway, select the policy version from two weeks ago and press the ‘Install specific version’ button.

A

D. In SmartConsole under Security Policies go to the Installation History view of the Gateway, select the policy version from two weeks ago and press the ‘Install specific version’ button.

331
Q

What CLI command will reset the IPS pattern matcher statistics?

A. ips reset pmstat
B. ips pmstats reset
C. ips pstats reset
D. ips pmstats refresh

A

B. ips pmstats reset

332
Q

What is the difference between Updatable Objects and Dynamic Objects?

A. Dynamic Objects are maintained automatically by the Threat Cloud. Updatable Objects are created and maintained locally. In both cases there is no need to install policy for the changes to take effect.

B. Updatable Objects is a Threat Cloud Service. The provided Objects are updated automatically. Dynamic Objects are created and maintained locally. For Dynamic Objects there is no need to install policy for the changes to take effect.

C. Updatable Objects is a Threat Cloud Service. The provided Objects are updated automatically. Dynamic Objects are created and maintained locally. In both cases there is no need to install policy for the changes to take effect.

D. Dynamic Objects are maintained automatically by the Threat Cloud. For Dynamic Objects there is no need to install policy for the changes to take effect. Updatable Objects are created and maintained locally.

A

C. Updatable Objects is a Threat Cloud Service. The provided Objects are updated automatically. Dynamic Objects are created and maintained locally. In both cases there is no need to install policy for the changes to take effect.

333
Q

Which of the following Central Deployment is NOT a limitation in R81.10 SmartConsole?

A. Security Gateway Clusters in Load Sharing mode
B. Dedicated Log Server
C. Dedicated SmartEvent Server
D. Security Gateways/Clusters in ClusterXL HA new mode

A

D. Security Gateways/Clusters in ClusterXL HA new mode

334
Q

By default, the web API uses which content-type in its response?

A. Java Script
B. XML
C. JSON
D. Text

A

C. JSON

335
Q

Which member of a high-availability cluster should be upgraded first in a Zero downtime upgrade?

A. The Active Member
B. The Primary Member
C. The Standby Member
D. The Secondary Membe

A

C. The Standby Member

336
Q

Where you can see and search records of action done by R80 SmartConsole administrators?

A. In the Logs & Monitor, logs, select “Audit Log View”
B. In Smartlog, all logs
C. In SmartView Tracker, open active log
D. In SmartAudit Log View

A

A. In the Logs & Monitor, logs, select “Audit Log View”

337
Q

Which command is used to set the CCP protocol to Multicast?

A. cphaconf set_ccp no broadcast
B. cphaprob set_ccp multicast
C. cphaconf set_ccp multicast
D. cphaprob set_ccp no_broadcast

A

C. cphaconf set_ccp multicast

338
Q

When Configuring Endpoint Compliance Settings for Applications and Gateways within Mobile Access, which of the three approaches will allow you to configure individual policies for each application?

A. Basic Approach
B. Very Advanced Approach
C. Medium Approach
D. Strong Approach

A

B. Very Advanced Approach

339
Q

In SmartConsole the IPS Blade is managed by:

A. Layers on Firewall policy
B. Threat Prevention policy
C. Threat Protection policy
D. Anti-Bot Blade

A

B. Threat Prevention policy

340
Q

How does the Anti-Virus feature of the Threat Prevention policy block traffic from infected websites?

A. By matching logs against ThreatCloud information about the reputation of the website.

B. By dropping traffic that is not proven to be from clean websites in the URL Filtering blade

C. By allowing traffic from websites that are known to run Antivirus Software on servers regularly

D. By dropping traffic from websites identified through ThreatCloud Verification and URL Caching

A

D. By dropping traffic from websites identified through ThreatCloud Verification and URL Caching

341
Q

Which Check Point software blades could be enforced under a Threat Prevention profile using a Check Point SmartConsole application?

A. Firewall, IPS, Anti-Bot, Anti-Virus, Threat Emulation
B. IPS, Anti-Bot, URL Filtering, Application Control, Threat Emulation
C. IPS, Anti-Bot, Anti-Virus, Threat Emulation, Threat Extraction
D. Firewall, PS, Threat Emulation, Application Control

A

C. IPS, Anti-Bot, Anti-Virus, Threat Emulation, Threat Extraction

342
Q

Fill in the blank: RADIUS protocol uses ________ to communicate with the gateway.

A. TDP
B. CCP
C. HTTP
D. UDP

A

D. UDP

343
Q

What object type would you use to grant network access to an LDAP user group?

A. Access Role
B. Group Template
C. SmartDirectory Group
D. User Group

A

A. Access Role

344
Q

A user complains that some Internet resources are not available. The Administrator is having issues seeing if packets are being dropped at the firewall (not seeing drops in logs). What is the solution to troubleshoot the issue?

A. run “fw ctl zdebug drop” on the relevant gateway

B. run “cpstop” on the relevant gateway and check the ping again

C. run “fw unloadlocal” on the relevant gateway and check the ping again

D. run “fw log” on the relevant gateway

A

A. run “fw ctl zdebug drop” on the relevant gateway