You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?
Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.
Fill in the blank: The tool _____ generates a R81 Security Gateway configuration report.
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.
The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?
NAT rules are prioritized in which order?
1. Automatic Static NAT
2. Automatic Hide NAT
3. Manual/Pre-Automatic NAT
4. Post-Automatic/Manual NAT rules
Which of the SecureXL templates are enabled by default on Security Gateway?
How to can you make sure that the old logs will be available after updating the Management to version R81.20 using the Advanced Upgrade Method?
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
Identity Awareness allows the Security Administrator to configure network access based on which of the following?
To help SmartEvent determine whether events originated internally or externally you must define using the Initial Settings under General Settings in the Policy Tab. How many options are available to calculate the traffic direction?
Which command can you use to verify the number of active concurrent connections?
To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot:
Automatic affinity means that if SecureXL is running, the affinity for each interface is automatically reset every
There are 4 ways to use the Management API for creating host object with R81 Management API. Which one is NOT correct?
R81.20 management server can manage gateways with which versions installed?
Tom has been tasked to install Check Point R81 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?
Your manager asked you to check the status of SecureXL, and its enabled templates and features. What command will you use to provide such information to manager?
Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?
In a Client to Server scenario, which inspection point is the first point immediately following the tables and rule base check of a packet coming from outside of the network?
Is it possible to establish a VPN before the user login to the Endpoint Client?
What state is the Management HA in when both members have different policies/databases?
To find records in the logs that shows log records from the Application & URL Filtering Software Blade where traffic was dropped, what would be the query syntax?
Which utility allows you to configure the DHCP service on Gaia from the command line?
You need to change the MAC-address on eth2 interface of the gateway. What is the correct way to change MAC-address in Check Point Gaia?
SecureXL is able to accelerate the Connection Rate using templates. Which attributes are used in the template to identify the connection?
How is communication between different Check Point components secured in R81? As with all questions, select the BEST answer.
SmartEvent Security Checkups can be run from the following Logs and Monitor activity:
In terms of Order Rule Enforcement, when a packet arrives at the gateway, the gateway checks it against the rules in the top Policy Layer, sequentially from top to bottom Which of the following statements is correct?
Fill in the blank RADIUS protocol uses_____to communicate with the gateway
UserCheck objects in the Application Control and URL Filtering rules allow the gateway to communicate with the users. Which action is not supported in UserCheck objects?
The customer has about 150 remote access user with a Windows laptops. Not more than 50 Clients will be connected at the same time. The customer want to use multiple VPN Gateways as entry point and a personal firewall. What will be the best license for him?
What is a possible command to delete all of the SSH connections of a gateway?
Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?
What are not possible commands to acquire the lock in order to make changes in Clish or Web GUI?
What should the admin do in case the Primary Management Server is temporary down?
Which of the following is true regarding the Proxy ARP feature for Manual NAT?
Which is the command to identify the NIC driver before considering about the employment of the Multi-Queue feature?
There are multiple types of licenses for the various VPN components and types. License type related to management and functioning of Remote Access VPNs are - which of the following license requirement statement is NOT true:
In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?
NO: 219
What cloud-based SandBlast Mobile application is used to register new devices and users?
Which Check Point software blade provides Application Security and identity control?
Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?
Fill in the blank: With the User Directory Software Blade, you can create user definitions on a(n)_____________ Server.
What command is used to manually failover a Multi-Version Cluster during the upgrade?
What kind of information would you expect to see when using the "sim affinity -I" command?
You have enabled “Full Log†as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?
According to the policy installation flow the transfer state (CPTA) is responsible for the code generated by the FWM. On the Security Gateway side a process receives them and first stores them Into a temporary directory. Which process is true for receiving these Tiles;
In the Check Point Security Management Architecture, which component(s) can store logs?
John is using Management HA. Which Security Management Server should he use for making changes?
You have used the SmartEvent GUI to create a custom Event policy. What is the best way to display the correlated Events generated by SmartEvent Policies?
What API command below creates a new host object with the name "My Host" and IP address of "192 168 0 10"?
Which Check Point software blade provides protection from zero-day and undiscovered threats?
Which of the following is NOT a method used by Identity Awareness for acquiring identity?
What are the minimum open server hardware requirements for a Security Management Server/Standalone in R81?
Alice wants to upgrade the current security management machine from R80.40 to R81.20 and she wants to check the Deployment Agent status over the GAIA CLISH. Which of the following GAIACLISH command is true?
SmartConsole R81 requires the following ports to be open for SmartEvent R81 management:
Can multiple administrators connect to a Security Management Server at the same time?
: 156
VPN Link Selection will perform the following when the primary VPN link goes down?
You are investigating issues with to gateway cluster members are not able to establish the first initial cluster synchronization. What service is used by the FWD daemon to do a Full Synchronization?
You are asked to check the status of several user-mode processes on the management server and gateway. Which of the following processes can only be seen on a Management Server?
After making modifications to the $CVPNDIR/conf/cvpnd.C file, how would you restart the daemon?
Which web services protocol is used to communicate to the Check Point R81 Identity Awareness Web API?
When simulating a problem on ClusterXL cluster with cphaprob –d STOP -s problem -t 0 register, to initiate a failover on an active cluster member, what command allows you remove the problematic state?
John detected high load on sync interface. Which is most recommended solution?
SmartEvent does NOT use which of the following procedures to identify events:
As a valid Mobile Access Method, what feature provides Capsule Connect/VPN?
SandBlast has several functional components that work together to ensure that attacks are prevented in real-time. Which the following is NOT part of the SandBlast component?
NO: 180
What command can you use to have cpinfo display all installed hotfixes?
SmartEvent has several components that function together to track security threats. What is the function of the Correlation Unit as a component of this architecture?
To add a file to the Threat Prevention Whitelist, what two items are needed?
What API command below creates a new host with the name “New Host†and IP address of “192.168.0.10�
: 131
Which command is used to display status information for various components?
With Mobile Access enabled, administrators select the web-based and native applications that can be accessed by remote users and define the actions that users can perform the applications. Mobile Access encrypts all traffic using:
As an administrator, you may be required to add the company logo to reports. To do this, you would save the logo as a PNG file with the name ‘cover-company-logo.png’ and then copy that image file to which directory on the SmartEvent server?
Which of the following is NOT a type of Check Point API available in R81.x?
Please choose correct command to add an “emailserver1†host with IP address 10.50.23.90 using GAiA management CLI?
For best practices, what is the recommended time for automatic unlocking of locked admin accounts?
Check Point APIs allow system engineers and developers to make changes to their organization’s security policy with CLI tools and Web Services for all the following except:
Which command would you use to set the network interfaces’ affinity in Manual mode?
Tom has connected to the R81 Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored shortly afterward.
What will happen to the changes already made?
What is a best practice before starting to troubleshoot using the “fw monitor†tool?
SecureXL improves non-encrypted firewall traffic throughput and encrypted VPN traffic throughput.
SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day Protection?
Which command shows the current connections distributed by CoreXL FW instances?
Both ClusterXL and VRRP are fully supported by Gaia R81.20 and available to all Check Point appliances. Which the following command is NOT related to redundancy and functions?
When setting up an externally managed log server, what is one item that will not be configured on the R81 Security Management Server?
You need to see which hotfixes are installed on your gateway, which command would you use?
Customer’s R81 management server needs to be upgraded to R81.20. What is the best upgrade method when the management server is not connected to the Internet?
Ken wants to obtain a configuration lock from other administrator on R81 Security Management Server. He can do this via WebUI or via CLI.
Which command should he use in CLI? (Choose the correct answer.)
When deploying SandBlast, how would a Threat Emulation appliance benefit from the integration of ThreatCloud?
To ensure that VMAC mode is enabled, which CLI command should you run on all cluster members?
What key is used to save the current CPView page in a filename format cpview_â€cpview process IDâ€.capâ€number of capturesâ€?
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?
Please choose the path to monitor the compliance status of the Check Point R81.20 based management.
Which Check Point feature enables application scanning and the detection?
You notice that your firewall is under a DDoS attack and would like to enable the Penalty Box feature, which command you use?
Joey wants to upgrade from R75.40 to R81 version of Security management. He will use Advanced Upgrade with Database Migration method to achieve this.
What is one of the requirements for his success?
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ________ .
You need to change the number of firewall Instances used by CoreXL. How can you achieve this goal?
What statement best describes the Proxy ARP feature for Manual NAT in R81.20?
Pamela is Cyber Security Engineer working for Global Instance Firm with large scale deployment of Check Point Enterprise Appliances using GAiA/R81.20. Company’s Developer Team is having random access issue to newly deployed Application Server in DMZ’s Application Server Farm Tier and blames DMZ Security Gateway as root cause. The ticket has been created and issue is at Pamela’s desk for an investigation. Pamela decides to use Check Point’s Packet Analyzer Tool-fw monitor to iron out the issue during approved Maintenance window.
What do you recommend as the best suggestion for Pamela to make sure she successfully captures entire traffic in context of Firewall and problematic traffic?
The SmartEvent R81 Web application for real-time event monitoring is called:
Which of the following technologies extracts detailed information from packets and stores that information in state tables?
GAiA Software update packages can be imported and installed offline in situation where:
Check Point security components are divided into the following components:
Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?
SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?
If you needed the Multicast MAC address of a cluster, what command would you run?
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?
Session unique identifiers are passed to the web api using which http header option?