Fill in the blanks: The _________ collects logs and sends them to the _________ .
You have two rules, ten users, and two user groups in a Security Policy. You create database version 1 for this configuration. You then delete two existing users and add a new user group. You modify one rule and add two new rules to the Rule Base. You save the Security Policy and create database version 2. After a while, you decide to roll back to version 1 to use the Rule Base, but you want to keep your user database. How can you do this?
Which the following type of authentication on Mobile Access can NOT be used as the first authentication method?
You find that Users are not prompted for authentication when they access their Web servers, even though you have created an HTTP rule via User Authentication. Choose the BEST reason why.
Match the following commands to their correct function. Each command has one function only listed.
When launching SmartDashboard, what information is required to log into R77?
You want to establish a VPN, using certificates. Your VPN will exchange certificates with an external partner. Which of the following activities sh you do first?
Which limitation of CoreXL is overcome by using (mitigated by) Multi-Queue?
Your boss wants you to closely monitor an employee suspected of transferring company secrets to the competition. The IT department discovered the suspect installed a WinSCP client in order to use encrypted communication. Which of the following methods is BEST to accomplish this task?
The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?
Vanessa is attempting to log into the Gaia Web Portal. She is able to login successfully. Then she tries the same username and password for SmartConsole but gets the message in the screenshot image below. She has checked that the IP address of the Server is correct and the username and password she used to login into Gaia is also correct.
What is the most likely reason?
SmartEvent does NOT use which of the following procedures to identity events:
Fill in the bank: In Office mode, a Security Gateway assigns a remote client to an IP address once___________.
Fill in the blank: ____________ is the Gaia command that turns the server off.
When connected to the Check Point R80 Management Server using the SmartConsole the first administrator to connect has a lock on:
Using ClusterXL, what statement is true about the Sticky Decision Function?
Fill in the blanks: There are ________ types of software containers ________.
Fill in the blank: To build an effective Security Policy, use a ________ and _______ rule.
Which of the following is NOT an authentication scheme used for accounts created through SmartConsole?
John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned a static IP address 10.0.0.19.
John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his desktop with a static IP (10.0.0.19). He wants to move around the organization and continue to have access to the HR Web Server.
To make this scenario work, the IT administrator:
1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the policy.
2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.
3) Changes from static IP address to DHCP for the client PC.
What should John request when he cannot access the web server from his laptop?
An internal router is sending UDP keep-alive packets that are being encapsulated with GRE and sent through your R77 Security Gateway to a partner site. A rule for GRE traffic is configured for ACCEPT/LOG. Although the keep-alive packets are being sent every minute, a search through the SmartView Tracker logs for GRE traffic only shows one entry for the whole day (early in the morning after a Policy install).
Your partner site indicates they are successfully receiving the GRE encapsulated keep-alive packets on the 1-minute interval.
If GRE encapsulation is turned off on the router, SmartView Tracker shows a log entry for the UDP keep-alive packet every minute.
Which of the following is the BEST explanation for this behavior?
There are 4 ways to use the Management API for creating host object with R80 Management API. Which one is NOT correct?
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
Which software blade enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine?
From the Gaia web interface, which of the following operations CANNOT be performed on a Security Management Server?
Which of the following is considered to be the more secure and preferred VPN authentication method?
What does it mean if Deyra sees the gateway status:
Choose the BEST answer.
Which of the following blades is NOT subscription-based and therefore does not have to be renewed on a regular basis?
Which backup utility captures the most information and tends to create the largest archives?
If there is an Accept Implied Policy set to “Firstâ€, what is the reason Jorge cannot see any logs?
Can a Check Point gateway translate both source IP address and destination IP address in a given packet?
Which of these components does NOT require a Security Gateway R77 license?
Fill in the blank: When LDAP is integrated with Check Point Security Management, it is then referred to as _______
What is the potential downside or drawback to choosing the Standalone deployment option instead of the Distributed deployment option?
Provide very wide coverage for all products and protocols, with noticeable performance impact.
How could you tune the profile in order to lower the CPU load still maintaining security at good level? Select the BEST answer.
R80 Security Management Server can be installed on which of the following operating systems?
When using LDAP as an authentication method for Identity Awareness, the query:
Your bank's distributed R77 installation has Security Gateways up for renewal. Which SmartConsole application will tell you which Security Gateways have licenses that will expire within the next 30 days?
Which of the following is NOT an element of VPN Simplified Mode and VPN Communities?
Which of the following is NOT a set of Regulatory Requirements related to Information Security?
Study the Rule base and Client Authentication Action properties screen.
After being authenticated by the Security Gateways, a user starts a HTTP connection to a Web site. What happens when the user tries to FTP to another site using the command line? The:
You are the Security Administrator for MegaCorp. In order to see how efficient your firewall Rule Base is, you would like to see how many often the particular rules match. Where can you see it? Give the BEST answer.
You are conducting a security audit. While reviewing configuration files and logs, you notice logs accepting POP3 traffic, but you do not see a rule allowing POP3 traffic in the Rule Base. Which of the following is the most likely cause?
You have enabled “Full Log†as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?
Fill in the blank: With the User Directory Software Blade, you can create R80 user definitions on a(an) ___________ Server.
What will be the effect of running the following command on the Security Management Server?
Tina is a new administrator who is currently reviewing the new Check Point R80 Management console interface. In the Gateways view, she is reviewing the Summary screen as in the screenshot below. What as an 'Open Server'?
Which options are given on features, when editing a Role on Gaia Platform?