web analytics

Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?

Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to? A. 50% B. 75% C. 80% D.

When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or _______.

When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or _______. A. SecureID B. SecurID C. Complexity

Which CLI command will reset the IPS pattern matcher statistics?

Which CLI command will reset the IPS pattern matcher statistics? A. ips reset pmstat B. ips pstats reset C. ips pmstats refresh D. ips pmstats reset Answer: D

Which features are only supported with R80.10 Gateways but not R77.x?

Which features are only supported with R80.10 Gateways but not R77.x? A. Access Control policy unifies the Firewall, Application Control & URL Filtering, Data Awareness, and Mobile Access Software Blade

Which command collects diagnostic data for analyzing customer setup remotely?

Which command collects diagnostic data for analyzing customer setup remotely? A. cpinfo B. migrate export C. sysinfo D. cpview Answer: A

What SmartEvent component creates events?

What SmartEvent component creates events? A. Consolidation Policy B. Correlation Unit C. SmartEvent Policy D. SmartEvent GUI Answer: B

Which command shows actual allowed connections in state table?

Which command shows actual allowed connections in state table? A. fw tab ­t StateTable B. fw tab ­t connections C. fw tab ­t connection D. fw tab connections Answer: B

Session unique identifiers are passed to the web api using which http header option?

Session unique identifiers are passed to the web api using which http header option? A. X-chkp-sid B. Accept-Charset C. Proxy-Authorization D. Application Answer: C

To fully enable Dynamic Dispatcher on a Security Gateway:

To fully enable Dynamic Dispatcher on a Security Gateway: A. run fw ctl multik set_mode 9 in Expert mode and then Reboot. B. Using cpconfig, update the Dynamic Dispatcher value

Which of the following process pulls application monitoring status?

Which of the following process pulls application monitoring status? A. fwd B. fwm C. cpwd D. cpd Answer: D

Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?

Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails? A. Check Point Remote User B. Check Point

What is the limitation of employing Sticky Decision Function?

What is the limitation of employing Sticky Decision Function? A. With SDF enabled, the involved VPN Gateways only supports IKEv1 B. Acceleration technologies, such as SecureXL and CoreXL are disabled

Advanced Security Checkups can be easily conducted within:

Advanced Security Checkups can be easily conducted within: A. Reports B. Advanced C. Checkups D. Views E. Summary Answer: A

To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot:

To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot: A. fw ctl multik set_mode 1 B. fw

Selecting an event displays its configurable properties in the Detail pane and a description of the event in the Description pane. Which is NOT an option to adjust or configure?

Selecting an event displays its configurable properties in the Detail pane and a description of the event in the Description pane. Which is NOT an option to adjust or configure?

The Firewall kernel is replicated multiple times, therefore:

The Firewall kernel is replicated multiple times, therefore: A. The Firewall kernel only touches the packet if the connection is accelerated B. The Firewall can run different policies per core

Fill in the blank: The R80 utility fw monitor is used to troubleshoot ________.

Fill in the blank: The R80 utility fw monitor is used to troubleshoot ________. A. User data base corruption B. LDAP conflicts C. Traffic issues D. Phase two key negotiations

Where you can see and search records of action done by R80 SmartConsole administrators?

Where you can see and search records of action done by R80 SmartConsole administrators? A. In SmartView Tracker, open active log B. In the Logs & Monitor view, select “Open

What command verifies that the API server is responding?

What command verifies that the API server is responding? A. api stat B. api status C. show api_status D. app_get_status Answer: B

How can SmartView application accessed?

How can SmartView application accessed? A. http:///smartview B. http://:4434/smartview C. https:///smartview/ D. https://:4434/smartview Answer: C

Which of the following statements is TRUE about R80 management plug-ins?

Which of the following statements is TRUE about R80 management plug-ins? A. The plug-in is a package installed on the Security Gateway. B. Installing a management plug-in requires a Snapshot,

Which command can you use to verify the number of active concurrent connections?

Which command can you use to verify the number of active concurrent connections? A. fw conn all B. fw ctl pstat C. show all connections D. show connections Answer: B

R80.10 management server can manage gateways with which versions installed?

R80.10 management server can manage gateways with which versions installed? A. Versions R77 and higher B. Versions R76 and higher C. Versions R75.20 and higher D. Versions R75 and higher

In R80.10, how do you manage your Mobile Access Policy?

In R80.10, how do you manage your Mobile Access Policy? A. Through the Unified Policy B. Through the Mobile Console C. From SmartDashboard D. From the Dedicated Mobility Tab Answer:

NAT rules are prioritized in which order?

NAT rules are prioritized in which order? 1. Automatic Static NAT 2. Automatic Hide NAT 3. Manual/Pre-Automatic NAT 4. Post-Automatic/Manual NAT rules A. 1, 2, 3, 4 B. 1, 4,

Which statement is true regarding redundancy?

Which statement is true regarding redundancy? A. System Administrators know their cluster has failed over and can also see why it failed over by using the cphaprob ­f if command.

Which statement is correct about the Sticky Decision Function?

Which statement is correct about the Sticky Decision Function? A. It is not supported with either the Performance pack of a hardware based accelerator card B. Does not support SPI’s

The Event List within the Event tab contains:

The Event List within the Event tab contains: A. a list of options available for running a query. B. the top events, destinations, sources, and users of the query results,

Which statement is NOT TRUE about Delta synchronization?

Which statement is NOT TRUE about Delta synchronization? A. Using UDP Multicast or Broadcast on port 8161 B. Using UDP Multicast or Broadcast on port 8116 C. Quicker than Full

What are the attributes that SecureXL will check after the connection is allowed by Security Policy?

What are the attributes that SecureXL will check after the connection is allowed by Security Policy? A. Source address, Destination address, Source port, Destination port, Protocol B. Source MAC address,

What is the difference between an event and a log?

What is the difference between an event and a log? A. Events are generated at gateway according to Event Policy B. A log entry becomes an event when it matches

What has to be taken into consideration when configuring Management HA?

What has to be taken into consideration when configuring Management HA? A. The Database revisions will not be synchronized between the management servers B. SmartConsole must be closed prior to

What is the correct command to observe the Sync traffic in a VRRP environment?

What is the correct command to observe the Sync traffic in a VRRP environment? A. fw monitor ­e “accept[12:4,b]=224.0.0.18;” B. fw monitor ­e “accept(6118;” C. fw monitor ­e “accept proto=mcVRRP;”

Which of the following authentication methods ARE NOT used for Mobile Access?

Which of the following authentication methods ARE NOT used for Mobile Access? A. RADIUS server B. Username and password (internal, LDAP) C. SecurID D. TACACS+ Answer: D

You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?

You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose? A. Eliminate all possible contradictory rules such as

What is the least amount of CPU cores required to enable CoreXL?

What is the least amount of CPU cores required to enable CoreXL? A. 2 B. 1 C. 4 D. 6 Answer: B

How many images are included with Check Point TE appliance in Recommended Mode?

How many images are included with Check Point TE appliance in Recommended Mode? A. 2(OS) images B. images are chosen by administrator during installation C. as many as licensed for

On R80.10 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:

On R80.10 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port: A. 18210 B. 18184 C. 257 D. 18191

When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?

When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component? A. None, Security Management Server would be installed by itself. B.

You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or ______ action for the file types.

You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or ______ action for the file types. A.

Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?

Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT

The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?

The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement? A. add

You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?

You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup? A. restore_backup B. import backup C. cp_merge D. migrate

The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?

The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes? A. fwd via cpm B. fwm via fwd C.

Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?

Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway? A. logd B. fwd C. fwm D.

What are the three components for Check Point Capsule?

What are the three components for Check Point Capsule? A. Capsule Docs, Capsule Cloud, Capsule Connect B. Capsule Workspace, Capsule Cloud, Capsule Connect C. Capsule Workspace, Capsule Docs, Capsule Connect

Which is NOT an example of a Check Point API?

Which is NOT an example of a Check Point API? A. Gateway API B. Management API C. OPSC SDK D. Threat Prevention API Answer: A

If you needed the Multicast MAC address of a cluster, what command would you run?

If you needed the Multicast MAC address of a cluster, what command would you run? A. cphaprob ­a if B. cphaconf ccp multicast C. cphaconf debug data D. cphaprob igmp

CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is:

CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is: A. MySQL B. Postgres SQL C. MarisDB D. SOLR Answer: B

Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.

Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster. A. Symmetric routing B. Failovers C. Asymmetric routing D. Anti-Spoofing Answer: