CCSE Flashcards
What is the port used for SmartConsole to connect to the Security Management Server:
CPMI port 18191/TCP
Which is the correct order of a log flow processed by SmartEvents components
Firewall > Log Server > Correlation Unit > SmartEvent Server Database > SmartEvent Client
In SmartEvent, what are the different types of automatic reactions that the administrator can configure?
Mail, Block Source, Block Event Activity, External Script, SNMP Trap
Which components allow you to reset a VPN tunnel?
SmartView monitor only
When synchronizing clusters, which of the following statements is FALSE?
A. The state of connections using resources is maintained in a Security Server, so their connections cannot be synchronized.
B. Only cluster members running on the same OS platform can be synchronized.
C. In the case of a failover, accounting information on the failed member may be lost despite a properly working synchronization.
D. Client Authentication or Session Authentication connections through a cluster member will be lost if the cluster member fails.
Client Authentication or Session Authentication connections through a cluster member will be lost if the cluster member fails.
Which of the following is a new R80.10 Gateway feature that had not been available in R77.X and older?
The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control
over the rule base flow and which security functionalities take precedence.
In R80.10, how do you manage your Mobile Access Policy?
From SmartDashboard
You find one of your cluster gateways showing “Down” when you run the “cphaprob stat” command. You then run the “clusterXL_admin up” on the down member
but unfortunately the member continues to show down. What command do you run to determine the case?
cphaprob -a list
SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day
Protection?
Threat Agent Solution
Which of the following is NOT a valid way to view interface’s IP address settings in Gaia?
Using the command sthtool in Expert Mode
Check Point recommends configuring Disk Space Management parameters to delete old log entities when available disk space is less than or equal to?
15%
What API command below creates a new host with the name “New Host” and IP address of “192.168.0.10”?
add host name “New Host” ip-address “192.168.0.10”
What are types of Check Point APIs available currently as part of R80.10 code?
Management API, Threat Prevention API, Identity Awareness Web Services API and OPSEC SDK API
Which of the following is NOT an internal/native Check Point command?
A. fwaccel on
B. fw ct1 debug
C. tcpdump
D. cphaprob
tcpdump
What is the SandBlast Agent designed to do?
If malware enters an end user’s system, the SandBlast Agent prevents the malware form spreading with the network
The SmartEvent R80 Web application for real-time event monitoring is called:
SmartView Monitor
What Shell is required in Gaia to use WinSCP?
Bash
Which one of the following is true about Threat Emulation?
Takes minutes to complete (less than 3 minutes)
What are the minimum open server hardware requirements for a Security Management Server/Standalone in R80.10?
4 CPU cores, 8GB of RAM and 500GB of disk space
The “MAC magic” value must be modified under the following condition:
A firewall cluster is configured to use Broadcast for CCP traffic
The Correlation Unit performs all but which of the following actions:
Assigns a severity level to the event
The following command is used to verify the CPUSE version:
HostName:0>show installer status build
Which statement is true regarding redundancy?
Both Cluster XL and VRRP are fully supported by Gaia and available to all Check Point appliances, open servers, and virtualized environments.
Vanessa is expecting a very important Security Report. The Document should be sent as an attachment via e-mail. An e-mail with Security_ report.pdf file was
delivered to her e-mail inbox. When she opened the PDF file, she noticed that the file is basically empty and only few lines of text are in it. The report is missing
some graphs, tables and links. Which component of SandBlast protection is her company using on a Gateway?
SandBlast Threat Extraction
Which command collects diagnostic data for analyzing customer setup remotely?
cpinfo
When deploying multiple clustered firewalls on the same subnet, what does the firewall administrator need to configure to prevent CCP broadcasts being sent to
the wrong cluster?
Set the cluster global ID using the command “cphaconf cluster_id set “
Which of these options is an implicit MEP option?
Primary-backup
John detected high load on sync interface. Which is most recommended solution?
For short connections like http service - delay sync for 2 seconds
What is the SOLR database for?
Used for full text search and enables powerful matching capabilities
What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?
Wire Mode
On R80.10 the IPS Blade is managed by:
Threat Prevention policy
Which packet info is ignored with Session Rate Acceleration?
source port
What is the purpose of Priority Delta in VRRP?
When an Interface fail, Effective Priority = Priority - Priority Delta
What is the purpose of a SmartEvent Correlation Unit?
The Correlation unit role is to evaluate logs from the log server component to identify patterns/threats and convert them to events.
The CDT utility supports which of the following?
All upgrades
The Central Deployment Tool (CDT)
The Firewall kernel is replicated multiple times, therefore:
The Firewall can run the same policy on all cores
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
Asymmetric routing
Which is not a blade option when configuring SmartEvent?
A. Correlation Unit
B. SmartEvent Unit
C. SmartEvent Server
D. Log Server
SmartEvent Unit
What command would show the API server status?
api status
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?
fw cti multik set_mode 9
You have existing dbedit scripts from R77. Can you use them with R80.10?
dbedit scripts are being replaced by mgmt._cli in R80.10
SecureXL improves non-encrypted firewall traffic throughput and encrypted VPN traffic throughput.
This statement is true because SecureXL does improve this traffic
What are the three components for Check Point Capsule?
Capsule Workspace, Capsule Docs, Capsule Cloud
Using mgmt_cli, what is the correct syntax to import a host object called Server_1 from the CLI?
mgmt_ cli add host name “Server_ 1” ip-address “10.15.123.10” - format json
When defining QoS global properties, which option below is not valid?
A. Weight
B. Authenticated timeout
C. Schedule
D. Rate
Schedule
Check Point APIs allow system engineers and developers to make changes to their organization’s security policy with CLI tools and Web Services for all of the following except?
A. Create new dashboards to manage 3rd party task
B. Create products that use and enhance 3rd party solutions.
C. Execute automated scripts to perform common tasks.
D. Create products that use and enhance the Check Point Solution.
Create new dashboards to manage 3rd party task
What happen when IPS profile is set in Detect-Only Mode for troubleshooting?
It will not block malicious traffic
When simulating a problem on CLusterXL cluster with cphaprob -d STOP -s problem -t 0 register, to initiate a failover on an active cluster member, what
command allows you remove the problematic state?
cphaprob -d STOP unregister
You are investigating issues with two gateway cluster members that are not able to establish the first initial cluster synchronization. What service is used by the
FWD daemon to do a Full Synchronization?
TCP port 256
Which command shows the current connections distributed by CoreXL FW instances?
fw ctl multik stat
What is the most ideal Synchronization Status for Security Management Server High Availability deployment?
Synchronized
What GUI client would you use to view an IPS packet capture?
SmartView Tracker
What is the valid range for VRID value in VRRP configuration?
1 - 255
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
A. Detects and blocks malware by correlating multiple detection engines before users are affected.
B. Configure rules to limit the available network bandwidth for specified users or groups.
C. Use UserCheck to help users understand that certain websites are against the company’s security policy.
D. Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.
Detects and blocks malware by correlating multiple detection engines before users are affected.
Which command will reset the kernel debug options to default settings?
fw ctl debug 0
You need to change the number of firewall instances used by CoreXL. How can you achieve this goal?
cpconfig; reboot required
As a valid Mobile Access Method, what feature provides Capsule Connect/VPN?
Full layer3 VPN -IPSec VPN that gives users network access to all mobile applications
What does the command vpn crl__zap do?
Erases all CRL’s from the gateway cache
Firewall policies must be configured to accept VRRP packets on the GAiA platform if it runs Firewall software. The Multicast destination assigned by the Internet Assigned Numbers Authority (IANA) for VRRP is:
224.0.0.18
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?
TCP port 256
GAiA greatly increases operational efficiency by offering an advanced and intuitive software update agent, commonly referred to as the:
Check Point Upgrade Service Engine.
Which one of these is NOT a firewall chain?
A. RTM packet in (rtm)
B. VPN node add (vpnad)
C. IP Options restore (in) (ipopt_res)
D. Fw SCV inbound (scv)
VPN node add (vpnad)
Which is a suitable command to check whether Drop Templates are activated or not?
fwaccel stat
Which directory below contains log files?
/opt/CPsuite-R80/fw1/log
What is the responsibility of SOLR process on R80.10 management server?
It generates indexes of data written to the database
VPN Tunnel Sharing can be configured with any of the options below, EXCEPT One:
A. Gateway-based
B. Subnet-based
C. IP range based
D. Host-based
IP range based
You want to store the GAiA configuration in a file for later reference. What command should you use?
save configuration
What can you do to see the current number of kernel instances in a system with CoreXL enabled?
Execute command cpconfig
When Dynamic Dispatcher is enabled, connections are assigned dynamically with the exception of
VolP & VPN Encrypted Traffic
Why would you not see a CoreXL configuration option in cpconfig?
The gateway only has one processor
In SPLAT the command to set the timeout was idle. In order to achieve this and increase the timeout for Gaia, what command do you use?
set inactivity-timeout
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?
Anti-Bot is a post-infection malware protection to prevent a host from establishing a connection to a Command & Control Center
SmartEvent does NOT use which of the following procedures to identify events?
A. Matching a log against each event definition
B. Create an event candidate
C. Matching a log against local exclusions
D. Matching a log against global exclusions
Matching a log against local exclusions
In Gaia, if one is unsure about a possible command, what command lists all possible commands.
show commands
In which case is a Sticky Decision Function relevant?
Load Sharing - Multicast
The Security Gateway is installed on GAiA R80. The default port for the Web User Interface is _______.
TCP 443
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
SmartEvent
Fill in the blank: The tool ___________ generates a R80 Security Gateway configuration report.
cpinfo
Fill in the blank: The R80 utility fw monitor is used to troubleshoot __________.
Traffic issues
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?
Create a separate Security Policy package for each remote Security Gateway.
Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, how many machines will be need if he
does NOT include a SmartConsole machine in his calculations?
Two machines
Fill in the blank: The command _______________ provides the most complete restoration of a R80 configuration.
upgrade_import
Which of the following statements is TRUE about R80 management plug-ins?
A management plug-in interacts with a Security Management Server to provide new features and support for new products.
Fill in the blank: The R80 feature ________ permits blocking specific IP addresses for a specified time period.
Suspicious Activity Monitoring
In R80 spoofing is defined as a method of:
Making packets appear as if they come from an authorized IP address.
Which features are only supported with R80.10 Gateways but not R77.x?
The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control
over the rule base flow and which security functionalities take precedence.
For best practices, what is the recommended time for automatic unlocking of locked admin accounts?
30 minutes at least
What scenario indicates that SecureXL is enabled?
fwaccel commands can be used in clish
What is the command to show SecureXL status?
fwaccel stat
Which web services protocol is used to communicate to the Check Point R80 identity Awareness Web APi?
REST
Which file gives you a list of all security servers in use, including port number?
$FWDIR/conf/fwauthd.conf
What CLI command will reset the IPS pattern matcher statistics?
ips pmstats reset
GAiA Software update packages can be imported and installed offline in situation where:
Security Gateway with GAiA does NOT have access to Internet.
The Event List within the Events tab contains:
events generated by a query.
Query
Statistics
List
Preview
What is mandatory for ClusterXL to work properly?
The Magic MAC number must be unique per cluster node.
Which one of the following processes below would not start if there was a licensing issue.
CPD
Aaron is a Cyber Security Engineer working for Global Law Firm with large scale deployment of Check Point Enterprise Appliances using GAiA/R80.10.
Company’s Network Security Developer Team is having issue testing new API with newly deployed R80.10 Security Management Server and blames Check
Point Security Management Server as root cause. The ticket has been created and issue is at Aaron’s desk for an investigation. What do you recommend as the
best suggestion for Aaron to make sure API testing works as expected?
Aaron should check API Server status from expert CLI by “api status” and if it’s stopped he should start using command “api start” on Security Management
Server.
What utility would you use to configure route-based VPNs?
vpn shell
Where do you create and modify the Mobile Access policy in R80?
SmartDashboard
Customer’s R80 management server needs to be upgraded to R80.10. What is the best upgrade method when the management server is not connected to the Internet?
CPUSE offline upgrade
CPD is a core Check Point process that does all of the following EXCEPT:
A. AMON status pull from the Gateway
B. Management High Availability (HA) sync
C. SIC (Secure Internal Communication) functions
D. Policy installation
Management High Availability (HA) sync
What processes does CPM control?
web_services, dle_server and object_Store
Please choose correct command syntax to add an “emailserver1” host with IP address 10.50.23.90 using GAiA management CLI?
mgmt. add host name emailserver1 ip-address 10.50.23.90
Where you can see and search records of action done by R80 SmartConsole administrators?
In the Logs & Monitor view, select “Open Audit Log View”
What are the different command sources that allow you to communicate with the API server?
SmartConsole GUI Console, mgmt_cli Tool, Gaia CLI, Web Services
Both ClusterXL and VRRP are fully supported by Gaia R80.10 and available to all Check Point appliances. Which of the following command is NOT related to
redundancy and functions?
A. cphaprob stat
B. cphaprob -a if
C. cphaprob -l list
D. cphaprob all show stat
cphaprob all show stat
What are the steps to configure the HTTPS Inspection Policy?
Go to Manage&Settings>Blades>HTTPS Inspection>Policy
To find records in the logs that shows log records from the Application & URL Filtering Software Blade where traffic was blocked, what would be the query
syntax?
blade: “application control” AND action:block
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core
CPU. After installation, is the administrator required to perform any additional tasks?
Go to clish-Run cpconfig | Configure CoreXL to make use of the additional Cores | Exit cpconfig |Reboot Security Gateway
Identify the API that is not supported by Check Point currently.
A. R80 Management API-
B. Identify Awareness Web Services API
C. Open REST API
D. OPSEC SDK
Open REST API
Which command can you use to enable or disable multi-queue per interface?
cpmq set
Which of the following is NOT a type of Check Point API available in R80.10?
A. Ientity Awareness Web Services
B. OPSEC SDK
C. Mobile Access
D. Management
Mobile Access
What is the limitation of employing Sticky Decision Function?
Acceleration technologies, such as SecureXL and CoreXL are disabled when activating SDF
When configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:
18184
Mobile Access supports all of the following methods of Link Translation EXCEPT:
A. Hostname Translation (HT)
B. Path Translation (PT)
C. URL Translation (UT)
D. Identity Translation (IT)
Identity Translation (IT)
What is true of the API server on R80.10?
By default, the API server is active on management servers with 4 GB of RAM (or more) and on stand-alone servers with 8 GB of RAM (more)
How many images are included with Check Point TE appliance in Recommended Mode?
2 (OS) images
Which deployment methods can an administrator choose when deploying the Sandblast agent?
Use both SCCM and GPO for the deployment agent and End Point Management to push the Agent.
Which Check Point software blades could be enforced under Threat Prevention profile using Check Point R80.10 SmartConsole application?
IPS, Anti-Bot, Anti-Virus, Threat Emulation, Threat Extraction
What’s true about Troubleshooting option in the IPS profile properties?
Temporarily set all protections to track (log) in SmartView Tracker
What is the mechanism behind Threat Extraction?
Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast.
Which command will allow you to see the interface status?
cphaprob -a if
What is the least ideal Synchronization Status for Security Management Server High Availability deployment?
Lagging
If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data
loss. Providing the Active Security Management Server is responsive, which of these steps should NOT be performed:
Rename the hostname of the Standby member to match exactly the hostname of the Active member.
During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should
you try to remediate first?
Host having a Critical event found by Threat Emulation
What is correct statement about Security Gateway and Security Management Server failover in Check Point R80.X in terms of Check Point Redundancy driven
solutions?
Security Gateway failover is an automatic procedure but Security Management Server failover is a manual procedure.
You want to verify if your management server is ready to upgrade to R80.10. What tool could you use in this process?
pre_upgrade_verifier
After successfully exporting a policy package, how would you import that package into another SMS database in R80.10?
upgrade_import
Choose the ClusterXL process that is defined by default as a critical device?
fwd
Security Checkup Summary can be easily conducted within:
Views
Which of the SecureXL templates are enabled by default on Security Gateway?
Accept
As an administrator, you may be required to add the company logo to reports. To do this, you would save the logo as a PNG file with the name ‘cover-company-
logo.png’ and then copy that image file to which directory on the SmartEvent server?
$RTDIR/smartview/conf
Which NAT rules are prioritized first?
Manual/Pre-Automatic NAT
What CLI command compiles and installs a Security Policy on the target’s Security Gateways?
fwm load
What is the command to see cluster status in cli expert mode?
cphaprob stat
What are the methods of SandBlast Threat Emulation deployment?
Cloud, Appliance and Hybrid
Which command is used to display status information for various components?
show sysenv all
Which is NOT an example of a Check Point API?
A. Gateway API
B. Management API
C. OPSEC SDK
D. Threat Prevention API
Gateway API
NAT rules are prioritized in which order?
- Automatic Static NAT
- Automatic Hide NAT
- Manual/Pre-Automatic NAT
- Post-Automatic/Manual NAT rules
3, 1, 2, 4
Events can be categorized and assigned to System Administrators to track their path through the workflow. Which of the following is NOT an option?
A. Under Investigation
B. Pending Investigation
C. False Positive
D. Open
Open
How is the processing order for overall inspection and routing of packets?
Firewall, NAT, Routing
When Configuring Endpoint Compliance Settings for Applications and Gateways within Mobile Access, which of the three approaches will allow you to configure -individual policies for each application?
A. Basic Approach
B. Strong Approach
C. Advanced Approach
D. Medium Approach
Advanced Approach
What is true about VRRP implementations?
You cannot have a standalone deployment
When using Monitored circuit VRRP, what is a priority delta?
When an interface fails the priority delta is subtracted from the priority
Which one of the following is true about Threat Extraction?
almost instantaneous
Daisy need to review how the Security Gateway Cluster, Jonas, behaves when a cluster member comes back on line. Where would she review the behavior of
cluster member recovery in the Dashboard?
Open SmartDashboard, select and open the Cluster Object Jonas, Select Topology - Advanced Options and review the High Availability recovery options.
What is considered Hybrid Emulation Mode?
Load sharing of emulation between an on premise appliance and the cloud
To accelerate the rate of connection establishment, SecureXL groups all connection that match a particular service and whose sole differentiating element is the
source port. The type of grouping enables even the very first packets of a TCP handshake to be accelerated. The first packets of the first connection on the same service will be forwarded to the Firewall kernel which will then create a template of the connection. Which of these IS NOT a SecureXL template?
A. Accept Template
B. Deny template
C. Drop Template
D. NAT Template
Deny template
What is the difference between an event and a log?
A log entry becomes an event when it matches any rule defined in Event Policy
Jack is using SmartEvent and does not see the identities of the users on the events. As an administrator with full access, what does he need to do to fix his issue?
Open SmartEvent, go to the Policy Tab, select General Settings from the left column > User Identities and check the box Show Identities
What command can you use to have cpinfo display all installed hotfixes?
cpinfo -y all
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidated management console. CPM allows the GUI client and management server to communicate via web service using ______.
TCP Port 18190
What is true about the IPS-Blade?
in R80, IPS is managed by the Threat Prevention Policy