To add a file to the Threat Prevention Whitelist, what two items are needed?
According to out of the box SmartEvent policy, which blade will automatically be correlated into events?
Which of the following blades is NOT subscription-based and therefore does not have to be renewed on a regular basis?
Fill in the blanks: A _______ license requires an administrator to designate a gateway for attachment whereas a ________ license is automatically attached to a Security Gateway.
What CLI command compiles and installs a Security Policy on the target’s Security Gateways?
Which option, when applied to a rule, allows traffic to VPN gateways in specific VPN communities?
UserCheck objects in the Application Control and URL Filtering rules allow the gateway to communicate with the users. Which action is not supported in UserCheck objects?
Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?
Ken wants to obtain a configuration lock from other administrator on R80 Security Management Server. He can do this via WebUI or via CLI.
Which command should he use in CLI? (Choose the correct answer.)
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
What is a best practice before starting to troubleshoot using the “fw monitor†tool?
After finishing installation admin John likes to use top command in expert mode. John has to set the expert-password and was able to use top command. A week later John has to use the top command again, He detected that the expert password is no longer valid. What is the most probable reason for this behavior?
Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?
Which of the following is NOT an option to calculate the traffic direction?
What ports are used for SmartConsole to connect to the Security Management Server?
What are the different command sources that allow you to communicate with the API server?
How many images are included with Check Point TE appliance in Recommended Mode?
Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?
Which utility allows you to configure the DHCP service on Gaia from the command line?
What state is the Management HA in when both members have different policies/databases?
When deploying SandBlast, how would a Threat Emulation appliance benefit from the integration of ThreatCloud?
Which statements below are CORRECT regarding Threat Prevention profiles in SmartDashboard?
You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?
Fill in the blank: The tool _____ generates a R80 Security Gateway configuration report.
What is the most ideal Synchronization Status for Security Management Server High Availability deployment?
: 131
Which command is used to display status information for various components?
When simulating a problem on ClusterXL cluster with cphaprob –d STOP -s problem -t 0 register, to initiate a failover on an active cluster member, what command allows you remove the problematic state?
What is the protocol and port used for Health Check and State Synchronization in ClusterXL?
Which is the correct order of a log flow processed by SmartEvent components?
What API command below creates a new host with the name “New Host†and IP address of “192.168.0.10�
NO: 240
You notice that your firewall is under a DDoS attack and would like to enable the Penalty Box feature, which command you use?
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?
When running a query on your logs, to find records for user Toni with machine IP of 10.0.4.210 but exclude her tablet IP of 10.0.4.76, which of the following query syntax would you use?
What is the minimum amount of RAM needed for a Threat Prevention Appliance?
When users connect to the Mobile Access portal they are unable to open File Shares.
Which log file would you want to examine?
SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day Protection?
Which of the SecureXL templates are enabled by default on Security Gateway?
Pamela is Cyber Security Engineer working for Global Instance Firm with large scale deployment of Check Point Enterprise Appliances using GAiA/R80.10. Company’s Developer Team is having random access issue to newly deployed Application Server in DMZ’s Application Server Farm Tier and blames DMZ Security Gateway as root cause. The ticket has been created and issue is at Pamela’s desk for an investigation. Pamela decides to use Check Point’s Packet Analyzer Tool-fw monitor to iron out the issue during approved Maintenance window.
What do you recommend as the best suggestion for Pamela to make sure she successfully captures entire traffic in context of Firewall and problematic traffic?