web analytics

SmartView Tracker R77 consists of three different modes. They are:

SmartView Tracker R77 consists of three different modes. They are: A. Log, Active, and Audit B. Log, Active, and Management C. Network and Endpoint, Active, and Management D. Log, Track,

While in SmartView Tracker, Brady has noticed some very odd network traffic that he thinks could be an intrusion. He decides to block the traffic for 60 minutes, but cannot remember all the steps. What is the correct order of steps needed to set up the block?

While in SmartView Tracker, Brady has noticed some very odd network traffic that he thinks could be an intrusion. He decides to block the traffic for 60 minutes, but cannot

Which of the following R77 SmartView Tracker views will display a popup warning about performance implications on the Security Gateway?

Which of the following R77 SmartView Tracker views will display a popup warning about performance implications on the Security Gateway? A. All Records Query B. Account Query C. Active Tab

You are reviewing the Security Administrator activity for a bank and comparing it to the change log. How do you view Security Administrator activity?

You are reviewing the Security Administrator activity for a bank and comparing it to the change log. How do you view Security Administrator activity? A. SmartView Tracker cannot display Security

Which SmartView Tracker selection would most effectively show who installed a Security Policy blocking all traffic from the corporate network?

Which SmartView Tracker selection would most effectively show who installed a Security Policy blocking all traffic from the corporate network? A. Management tab B. Custom filter C. Network and Endpoint

How do you view a Security Administrator’s activities with SmartConsole?

How do you view a Security Administrator’s activities with SmartConsole? A. Eventia Suite B. SmartView Monitor using the Administrator Activity filter C. SmartView Tracker in the Management tab D. SmartView

Where are custom queries stored in R77 SmartView Tracker?

Where are custom queries stored in R77 SmartView Tracker? A. On the SmartView Tracker PC local file system under the user’s profile. B. On the Security Management Server tied to

Where can an administrator configure the notification action in the event of a policy install time change?

Where can an administrator configure the notification action in the event of a policy install time change? A. SmartView Monitor > Gateways > Thresholds Settings B. SmartView Monitor > Gateway

Where can an administrator specify the notification action to be taken by the firewall in the event that available disk space drops below 15%?

Where can an administrator specify the notification action to be taken by the firewall in the event that available disk space drops below 15%? A. SmartView Monitor > Gateway Status

You have detected a possible intruder listed in SmartView Tracker’s active pane. What is the fastest method to block this intruder from accessing your network indefinitely?

You have detected a possible intruder listed in SmartView Tracker’s active pane. What is the fastest method to block this intruder from accessing your network indefinitely? A. Modify the Rule

Which R77 SmartConsole tool would you use to verify the installed Security Policy name on a Security Gateway?

Which R77 SmartConsole tool would you use to verify the installed Security Policy name on a Security Gateway? A. SmartView Tracker B. None, SmartConsole applications only communicate with the Security

Which of the following can be found in cpinfo from an enforcement point?

Which of the following can be found in cpinfo from an enforcement point? A. Everything NOT contained in the file r2info B. VPN keys for all established connections to all

Where is the easiest and BEST place to find information about connections between two machines?

Where is the easiest and BEST place to find information about connections between two machines? A. All options are valid. B. On a Security Gateway using the command fw log.

The Security Management Server is running under GAiA, and the GUI is on a system running Microsoft Windows. How do you run the command traceroute on an IP address?

You can include External commands in SmartView Tracker by the menu Tools > Custom Commands. The Security Management Server is running under GAiA, and the GUI is on a system

Which SmartView Tracker mode allows you to read the SMTP e-mail body sent from the Chief Executive Officer (CEO) of a company?

Which SmartView Tracker mode allows you to read the SMTP e-mail body sent from the Chief Executive Officer (CEO) of a company? A. This is not a SmartView Tracker feature.

Which SmartConsole component can be used to monitor changes to rules or object properties made by the other administrators?

You are working with three other Security Administrators. Which SmartConsole component can be used to monitor changes to rules or object properties made by the other administrators? A. Eventia Tracker

By default, when you click File > Switch Active File in SmartView Tracker, the Security Management Server:

By default, when you click File > Switch Active File in SmartView Tracker, the Security Management Server: A. Saves the current log file, names the log file by date and

What happens when you select File > Export from the SmartView Tracker menu?

What happens when you select File > Export from the SmartView Tracker menu? A. Current logs are exported to a new *.log file. B. Exported log entries are not viewable

SmartView Tracker logs the following Security Administrator activities, EXCEPT:

SmartView Tracker logs the following Security Administrator activities, EXCEPT: A. Object creation, deletion, and editing B. Tracking SLA compliance C. Administrator login and logout D. Rule Base changes Answer: B

Which SmartConsole tool would you use to see the last policy pushed in the audit log?

Which SmartConsole tool would you use to see the last policy pushed in the audit log? A. SmartView Tracker B. None, SmartConsole applications only communicate with the Security Management Server.

How do you resolve this problem without causing other security issues? Choose the BEST answer.

You receive a notification that long-lasting Telnet connections to a mainframe are dropped after an hour of inactivity. Reviewing SmartView Tracker shows the packet is dropped with the error: Unknown

What is the default setting when you use NAT?

What is the default setting when you use NAT? A. Destination Translated on Server side B. Destination Translated on Client side C. Source Translated on both sides D. Source Translated

You are responsible for the configuration of MegaCorp’s Check Point Firewall. You need to allow two NAT rules to match a connection. Is it possible? Give the BEST answer.

You are responsible for the configuration of MegaCorp’s Check Point Firewall. You need to allow two NAT rules to match a connection. Is it possible? Give the BEST answer. A.

Which of the following is NOT a possible reason?

You just installed a new Web server in the DMZ that must be reachable from the Internet. You create a manual Static NAT rule as follows: Source: Any || Destination:

what else must be configured so that a host on the Internet can initiate an inbound connection to this host?

You have configured Automatic Static NAT on an internal host-node object. You clear the box Translate destination on client site from Global Properties > NAT. Assuming all other NAT settings

what point in the monitor output will you observe the HTTP SYN-ACK packet translated from 216.216.216.5 back into 10.10.10.5?

You enable Automatic Static NAT on an internal host node object with a private IP address of 10.10.10.5, which is NATed into 216.216.216.5. (You use the default settings in Global

Do the above settings limit the partner’s access?

You are a Security Administrator who has installed Security Gateway R77 on your network. You need to allow a specific IP address range for a partner site to access your

Your internal network is configured to be 10.1.1.0/24. This network is behind your perimeter R77 Gateway, which connects to your ISP provider. How do you configure the Gateway to allow this network to go out to the Internet?

Your internal network is configured to be 10.1.1.0/24. This network is behind your perimeter R77 Gateway, which connects to your ISP provider. How do you configure the Gateway to allow

Which is the likely source of the issue?

After filtering a fw monitor trace by port and IP, a packet is displayed three times; in the i, I, and o inspection points, but not in the O inspection

Which answers are TRUE? Automatic Static NAT CANNOT be used when:

Which answers are TRUE? Automatic Static NAT CANNOT be used when: 1) NAT decision is based on the destination port. 2) Both Source and Destination IP’s have to be translated.

You are MegaCorp’s Security Administrator. There are various network objects which must be NATed. Some of them use the Automatic Hide NAT method, while others use the Automatic Static NAT method. What is the rule order if both methods are used together? Give the BEST answer.

You are MegaCorp’s Security Administrator. There are various network objects which must be NATed. Some of them use the Automatic Hide NAT method, while others use the Automatic Static NAT

Static NAT connections, by default, translate on which firewall kernel inspection point?

Static NAT connections, by default, translate on which firewall kernel inspection point? A. Inbound B. Outbound C. Post-inbound D. Eitherbound Answer: A

Secure Internal Communications (SIC) is completely NAT-tolerant because it is based on:

Secure Internal Communications (SIC) is completely NAT-tolerant because it is based on: A. IP addresses. B. SIC is not NAT-tolerant. C. SIC names. D. MAC addresses. Answer: C

In SmartDashboard, Translate destination on client side is checked in Global Properties. When Network Address Translation is used:

In SmartDashboard, Translate destination on client side is checked in Global Properties. When Network Address Translation is used: A. It is not necessary to add a static route to the

The fw monitor utility is used to troubleshoot which of the following problems?

The fw monitor utility is used to troubleshoot which of the following problems? A. Phase two key negotiation B. Address translation C. Log Consolidation Engine D. User data base corruption

When translation occurs using automatic Hide NAT, what also happens?

When translation occurs using automatic Hide NAT, what also happens? A. Nothing happens. B. The destination is modified. C. The destination port is modified. D. The source port is modified.

what other configuration must be done to allow the traffic to reach the Web server?

A Web server behind the Security Gateway is set to Automatic Static NAT. Client side NAT is not checked in the Global Properties. A client on the Internet initiates a

A host on the Internet initiates traffic to the Static NAT IP of your Web server behind the Security Gateway. With the default settings in place for NAT, the initiating packet will translate the _________.

A host on the Internet initiates traffic to the Static NAT IP of your Web server behind the Security Gateway. With the default settings in place for NAT, the initiating

An internal host initiates a session to the Google.com website and is set for Hide NAT behind the Security Gateway. The initiating traffic is an example of __________.

An internal host initiates a session to the Google.com website and is set for Hide NAT behind the Security Gateway. The initiating traffic is an example of __________. A. client

Which of the following configurations will allow this network to access the Internet?

Your main internal network 10.10.10.0/24 allows all traffic to the Internet using Hide NAT. You also have a small network 10.10.20.0/24 behind the internal router. You want to configure the

Which NAT option applicable for Automatic NAT applies to Manual NAT as well?

Which NAT option applicable for Automatic NAT applies to Manual NAT as well? A. Allow bi-directional NAT B. Automatic ARP configuration C. Translate destination on client-side D. Enable IP Pool

After implementing Static Address Translation to allow Internet traffic to an internal Web Server on your DMZ, you notice that any NATed connections to that machine are being dropped by anti-spoofing protections. Which of the following is the MOST LIKELY cause?

After implementing Static Address Translation to allow Internet traffic to an internal Web Server on your DMZ, you notice that any NATed connections to that machine are being dropped by

What is an alternative configuration if proxy ARP cannot be used on your Security Gateway?

You want to implement Static Destination NAT in order to provide external, Internet users access to an internal Web Server that has a reserved (RFC 1918) IP address. You have

Which Check Point address translation method is necessary if you want to connect from a host on the Internet via HTTP to a server with a reserved (RFC 1918) IP address on your DMZ?

Which Check Point address translation method is necessary if you want to connect from a host on the Internet via HTTP to a server with a reserved (RFC 1918) IP

NAT can NOT be configured on which of the following objects?

NAT can NOT be configured on which of the following objects? A. HTTP Logical Server B. Gateway C. Address Range D. Host Answer: A

Which Check Point address translation method allows an administrator to use fewer ISP-assigned IP addresses than the number of internal hosts requiring Internet connectivity?

Which Check Point address translation method allows an administrator to use fewer ISP-assigned IP addresses than the number of internal hosts requiring Internet connectivity? A. Hide B. Static Destination C.

Which of the following statements BEST describes Check Point’s Hide Network Address Translation method?

Which of the following statements BEST describes Check Point’s Hide Network Address Translation method? A. Translates many destination IP addresses into one destination IP address B. One-to-one NAT which implements

How many log entries do you see for that connection in SmartView Tracker?

You enable Hide NAT on the network object, 10.1.1.0 behind the Security Gateway’s external interface. You browse to the Google Website from host, 10.1.1.10 successfully. You enable a log on

What is causing this?

Because of pre-existing design constraints, you set up manual NAT rules for your HTTP server. However, your FTP server and SMTP server are both using automatic NAT rules. All traffic

Which of these Security Policy changes optimize Security Gateway performance?

Which of these Security Policy changes optimize Security Gateway performance? A. Using groups within groups in the manual NAT Rule Base. B. Use Automatic NAT rules instead of Manual NAT