web analytics

Customer’s R80 management server needs to be upgraded to R80.10. What is the best upgrade method when the management server is not connected to the Internet?

Customer’s R80 management server needs to be upgraded to R80.10. What is the best upgrade method when the management server is not connected to the Internet? A. Export R80 configuration,

What utility would you use to configure route-based VPNs?

What utility would you use to configure route-based VPNs? A. vpn shell B. vpn tu C. vpn sw_topology D. vpn set_slim_server Answer: A

Where do you create and modify the Mobile Access policy in R80?

Where do you create and modify the Mobile Access policy in R80? A. SmartConsole B. SmartMonitor C. SmartEndpoint D. SmartDashboard Answer: D

What do you recommend as the best suggestion for Aaron to make sure API testing works as expected?

Aaron is a Cyber Security Engineer working for Global Law Firm with large scale deployment of Check Point Enterprise Appliances using GAiA/R80.10. Company’s Network Security Developer Team is having issue

Which one of the following processes below would not start if there was a licensing issue. A. CPD B. CPCA C. FWM D. CPWD Answer: A

Which one of the following processes below would not start if there was a licensing issue. A. CPD B. CPCA C. FWM D. CPWD Answer: A

What is mandatory for ClusterXL to work properly?

What is mandatory for ClusterXL to work properly? A. The number of cores must be the same on every participating cluster node B. The Magic MAC number must be unique

The Event List within the Events tab contains:

The Event List within the Events tab contains: A. a list of options available for running a query. B. the top events, destinations, sources, and users of the query results,

GAiA Software update packages can be imported and installed offline in situation where:

GAiA Software update packages can be imported and installed offline in situation where: A. Security Gateway with GAiA does NOT have SFTP access to Internet B. Security Gateway with GAiA

What CLI command will reset the IPS pattern matcher statistics?

What CLI command will reset the IPS pattern matcher statistics? A. ips reset pmstat B. ips pstats reset C. ips pmstats refresh D. ips pmstats reset Answer: D

Which file gives you a list of all security servers in use, including port number?

Which file gives you a list of all security servers in use, including port number? A. $FWDIR/conf/conf.conf B. $FWDIR/conf/servers.conf C. $FWDIR/conf/fwauthd.conf D. $FWDIR/conf/serversd.conf Answer: C

Which web services protocol is used to communicate to the Check Point R80 identity Awareness Web APi?

Which web services protocol is used to communicate to the Check Point R80 identity Awareness Web APi? A. SOAP B. REST C. XLANG D. XML-RPC Answer: B

What is the command to show SecureXL status?

What is the command to show SecureXL status? A. fwaccel status B. fwaccel stats ­m C. fwaccel ­s D. fwaccel stat Answer: D

What scenario indicates that SecureXL is enabled?

What scenario indicates that SecureXL is enabled? A. Dynamic objects are available in the Object Explorer B. SecureXL can be disabled in cpconfig C. fwaccel commands can be used in

For best practices, what is the recommended time for automatic unlocking of locked admin accounts?

For best practices, what is the recommended time for automatic unlocking of locked admin accounts? A. 20 minutes B. 15 minutes C. Admin account cannot be unlocked automatically D. 30

Which features are only supported with R80.10 Gateways but not R77.x?

Which features are only supported with R80.10 Gateways but not R77.x? A. Access Control policy unifies the Firewall, Application Control & URL Filtering, Data Awareness, and Mobile Access Software Blade

In R80 spoofing is defined as a method of:

In R80 spoofing is defined as a method of: A. Disguising an illegal IP address behind an authorized IP address through Port Address Translation. B. Hiding your firewall from unauthorized

Fill in the blank: The R80 feature ________ permits blocking specific IP addresses for a specified time period.

Fill in the blank: The R80 feature ________ permits blocking specific IP addresses for a specified time period. A. Block Port Overflow B. Local Interface Spoofing C. Suspicious Activity Monitoring

Which of the following statements is TRUE about R80 management plug-ins?

Which of the following statements is TRUE about R80 management plug-ins? A. The plug-in is a package installed on the Security Gateway. B. Installing a management plug-in requires a Snapshot,

Fill in the blank: The command _______________ provides the most complete restoration of a R80 configuration.

Fill in the blank: The command _______________ provides the most complete restoration of a R80 configuration. A. upgrade_import B. cpconfig file> C. fwm dbimport ­p

Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, how many machines will be need if he does NOT include a SmartConsole machine in his calculations?

Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, how many machines will be need if he does NOT

You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?

You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose? A. Eliminate all possible contradictory rules such as

Fill in the blank: The R80 utility fw is used to troubleshoot __________. monitor

Fill in the blank: The R80 utility fw is used to troubleshoot __________. monitor A. User data base corruption B. LDAP conflicts C. Traffic issues D. Phase two key negotiation

Fill in the blank: The tool ___________ generates a R80 Security Gateway configuration report.

Fill in the blank: The tool ___________ generates a R80 Security Gateway configuration report. A. infoCP B. infoview C. cpinfo D. fw cpinfo Answer: C

When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?

When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component? A. None, Security Management Server would be installed by itself B.

The Security Gateway is installed on GAiA R80. The default port for the Web User Interface is _______.

The Security Gateway is installed on GAiA R80. The default port for the Web User Interface is _______. A. TCP 18211 B. TCP 257 C. TCP 4433 D. TCP 443

In which case is a Sticky Decision Function relevant?

In which case is a Sticky Decision Function relevant? A. Load Sharing ­ Multicast B. Load Balancing ­ Forward C. High Availability D. Load Sharing ­ Unicast Answer: C

In Gaia, if one is unsure about a possible command, what command lists all possible commands.

In Gaia, if one is unsure about a possible command, what command lists all possible commands. A. show all |grep commands B. show configuration C. show commands D. get all

SmartEvent does NOT use which of the following procedures to identify events?

SmartEvent does NOT use which of the following procedures to identify events? A. Matching a log against each event definition B. Create an event candidate C. Matching a log against

What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?

What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation? A. Anti-Bot is the only countermeasure against unknown malware B. Anti-Bot

what command do you use?

In SPLAT the command to set the timeout was idle. In order to achieve this and increase the timeout for Gaia, what command do you use? idle A. set B.

Why would you not see a CoreXL configuration option in cpconfig?

Why would you not see a CoreXL configuration option in cpconfig? A. The gateway only has one processor B. CoreXL is not licenses C. CoreXL is disabled via policy D.

When Dynamic Dispatcher is enabled, connections are assigned dynamically with the exception of

When Dynamic Dispatcher is enabled, connections are assigned dynamically with the exception of A. Threat Emulation B. HTTPS C. QOS D. VolP Answer: D

What can you do to see the current number of kernel instances in a system with CoreXL enabled?

What can you do to see the current number of kernel instances in a system with CoreXL enabled? A. Browse to Secure Platform Web GUI B. Only Check Point support

You want to store the GAiA configuration in a file for later reference. What command should you use?

You want to store the GAiA configuration in a file for later reference. What command should you use? A. write mem B. show config ­f C. save config ­o D.

VPN Tunnel Sharing can be configured with any of the options below, EXCEPT One:

VPN Tunnel Sharing can be configured with any of the options below, EXCEPT One: A. Gateway-based B. Subnet-based C. IP range based D. Host-based Answer: C

What is the responsibility of SOLR process on R80.10 management server?

What is the responsibility of SOLR process on R80.10 management server? A. Validating all data before it’s written into the database B. It generates indexes of data written to the

Which directory below contains log files?

Which directory below contains log files? A. /opt/CPSmartlog-R80/log B. /opt/CPshrd-R80/log C. /opt/CPsuite-R80/fw1/log D. /opt/CPsuite-R80/log Answer: C

Which is a suitable command to check whether Drop Templates are activated or not?

Which is a suitable command to check whether Drop Templates are activated or not? A. fw ctl get int activate _drop_ templates B. fwaccel stat C. fwaccel stats D. fw

Which one of these is NOT a firewall chain?

Which one of these is NOT a firewall chain? A. RTM packet in (rtm) B. VPN node add (vpnad) C. IP Options restore (in) (ipopt_res) D. Fw SCV inbound (scv)

GAiA greatly increases operational efficiency by offering an advanced and intuitive software update agent, commonly referred to as the:

GAiA greatly increases operational efficiency by offering an advanced and intuitive software update agent, commonly referred to as the: A. Check Point Upgrade Service Engine. B. Check Point Software Update

Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?

Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this? A. UDP port 265 B. TCP port 265 C. UDP port 256 D. TCP

Firewall policies must be configured to accept VRRP packets on the GAiA platform if it runs Firewall software. The Multicast destination assigned by the Internet Assigned Numbers Authority (IANA) for VRRP is:

Firewall policies must be configured to accept VRRP packets on the GAiA platform if it runs Firewall software. The Multicast destination assigned by the Internet Assigned Numbers Authority (IANA) for

What does the command vpn do? crl__zap

What does the command vpn do? crl__zap A. Nothing, it is not a valid command B. Erases all CRL’s from the gateway cache C. Erases VPN certificates from cache D.

As a valid Mobile Access Method, what feature provides Capsule Connect/VPN?

As a valid Mobile Access Method, what feature provides Capsule Connect/VPN? A. that is used to deploy the mobile device as a generator of one-time passwords for authenticating to an

You need to change the number of firewall instances used by CoreXL. How can you achieve this goal?

You need to change the number of firewall instances used by CoreXL. How can you achieve this goal? A. edit fwaffinity.conf; reboot required B. cpconfig; reboot required C. edit fwaffinity.conf;

Which command will reset the kernel debug options to default settings?

Which command will reset the kernel debug options to default settings? A. fw ctl dbg ­a 0 B. fw ctl dbg resetall C. fw ctl debug 0 D. fw ctl

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade? A. Detects and blocks malware by correlating multiple detection engines before users

What is the valid range for VRID value in VRRP configuration?

What is the valid range for VRID value in VRRP configuration? A. 1 ­ 254 B. 1 ­ 255 C. 0 ­ 254 D. 0 ­ 255 Answer: B

What GUI client would you use to view an IPS packet capture?

What GUI client would you use to view an IPS packet capture? A. SmartView Monitor B. SmartView Tracker C. Smart Update D. Smart Reporter Answer: B

What is the most ideal Synchronization Status for Security Management Server High Availability deployment?

What is the most ideal Synchronization Status for Security Management Server High Availability deployment? A. Lagging B. Synchronized C. Never been synchronized D. Collision Answer: B