11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

156-315.81 Exam Dumps - Check Point Certified Security Expert R81.20

Question # 4

Which of the following process pulls application monitoring status?

A.

fwd

B.

fwm

C.

cpwd

D.

cpd

Full Access
Question # 5

You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?

A.

SmartEvent Client Info

B.

SecuRemote

C.

Check Point Protect

D.

Check Point Capsule Cloud

Full Access
Question # 6

The Event List within the Event tab contains:

A.

a list of options available for running a query.

B.

the top events, destinations, sources, and users of the query results, either as a chart or in a tallied list.

C.

events generated by a query.

D.

the details of a selected event.

Full Access
Question # 7

What are the three components for Check Point Capsule?

A.

Capsule Docs, Capsule Cloud, Capsule Connect

B.

Capsule Workspace, Capsule Cloud, Capsule Connect

C.

Capsule Workspace, Capsule Docs, Capsule Connect

D.

Capsule Workspace, Capsule Docs, Capsule Cloud

Full Access
Question # 8

Which statement is NOT TRUE about Delta synchronization?

A.

Using UDP Multicast or Broadcast on port 8161

B.

Using UDP Multicast or Broadcast on port 8116

C.

Quicker than Full sync

D.

Transfers changes in the Kernel tables between cluster members.

Full Access
Question # 9

Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.

A.

Symmetric routing

B.

Failovers

C.

Asymmetric routing

D.

Anti-Spoofing

Full Access
Question # 10

Which command lists all tables in Gaia?

A.

fw tab –t

B.

fw tab –list

C.

fw-tab –s

D.

fw tab -1

Full Access
Question # 11

Which statement is correct about the Sticky Decision Function?

A.

It is not supported with either the Performance pack of a hardware based accelerator card

B.

Does not support SPI’s when configured for Load Sharing

C.

It is automatically disabled if the Mobile Access Software Blade is enabled on the cluster

D.

It is not required L2TP traffic

Full Access
Question # 12

What SmartEvent component creates events?

A.

Consolidation Policy

B.

Correlation Unit

C.

SmartEvent Policy

D.

SmartEvent GUI

Full Access
Question # 13

Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?

A.

Check Point Remote User

B.

Check Point Capsule Workspace

C.

Check Point Mobile Web Portal

D.

Check Point Capsule Remote

Full Access
Question # 14

What is the difference between an event and a log?

A.

Events are generated at gateway according to Event Policy

B.

A log entry becomes an event when it matches any rule defined in Event Policy

C.

Events are collected with SmartWorkflow form Trouble Ticket systems

D.

Log and Events are synonyms

Full Access
Question # 15

Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.

A.

upgrade_import

B.

cpconfig

C.

fwm dbimport -p

D.

cpinfo –recover

Full Access
Question # 16

Connections to the Check Point R81 Web API use what protocol?

A.

HTTPS

B.

RPC

C.

VPN

D.

SIC

Full Access
Question # 17

Fill in the blank: The tool _____ generates a R81 Security Gateway configuration report.

A.

infoCP

B.

infoview

C.

cpinfo

D.

fw cpinfo

Full Access
Question # 18

Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.

A.

TCP port 19009

B.

TCP Port 18190

C.

TCP Port 18191

D.

TCP Port 18209

Full Access
Question # 19

The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?

A.

add host name ip-address

B.

add hostname ip-address

C.

set host name ip-address

D.

set hostname ip-address

Full Access
Question # 20

NAT rules are prioritized in which order?

1. Automatic Static NAT

2. Automatic Hide NAT

3. Manual/Pre-Automatic NAT

4. Post-Automatic/Manual NAT rules

A.

1, 2, 3, 4

B.

1, 4, 2, 3

C.

3, 1, 2, 4

D.

4, 3, 1, 2

Full Access
Question # 21

Which of the SecureXL templates are enabled by default on Security Gateway?

A.

Accept

B.

Drop

C.

NAT

D.

None

Full Access
Question # 22

Which features are only supported with R81.20 Gateways but not R77.x?

A.

Access Control policy unifies the Firewall, Application Control & URL Filtering, Data Awareness, and Mobile Access Software Blade policies.

B.

Limits the upload and download throughput for streaming media in the company to 1 Gbps.

C.

The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.

D.

Time object to a rule to make the rule active only during specified times.

Full Access
Question # 23

How to can you make sure that the old logs will be available after updating the Management to version R81.20 using the Advanced Upgrade Method?

A.

Use the WebUI -> Maintenance > System Backup and store the backup on a remote FTP server

B.

The logs will be included running SFWDIR/scripts/migrate_server export -v R81.20

C.

Use the WebUI to save a snapshot before updating the Management -> Maintenance > Snapshot Management

D.

Use the migrate_server tool with the option '-I' for the logs and '-x' for the index

Full Access
Question # 24

Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?

A.

Synchronized

B.

Never been synchronized

C.

Lagging

D.

Collision

Full Access
Question # 25

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?

A.

Detects and blocks malware by correlating multiple detection engines before users are affected.

B.

Configure rules to limit the available network bandwidth for specified users or groups.

C.

Use UserCheck to help users understand that certain websites are against the company’s security policy.

D.

Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.

Full Access
Question # 26

Identity Awareness allows the Security Administrator to configure network access based on which of the following?

A.

Name of the application, identity of the user, and identity of the machine

B.

Identity of the machine, username, and certificate

C.

Browser-Based Authentication, identity of a user, and network location

D.

Network location, identity of a user, and identity of a machine

Full Access
Question # 27

fwssd is a child process of which of the following Check Point daemons?

A.

fwd

B.

cpwd

C.

fwm

D.

cpd

Full Access
Question # 28

To help SmartEvent determine whether events originated internally or externally you must define using the Initial Settings under General Settings in the Policy Tab. How many options are available to calculate the traffic direction?

A.

5 Network; Host; Objects; Services; API

B.

3 Incoming; Outgoing; Network

C.

2 Internal; External

D.

4 Incoming; Outgoing; Internal; Other

Full Access
Question # 29

Which command can you use to verify the number of active concurrent connections?

A.

fw conn all

B.

fw ctl pstat

C.

show all connections

D.

show connections

Full Access
Question # 30

To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot:

A.

fw ctl multik set_mode 1

B.

fw ctl Dynamic_Priority_Queue on

C.

fw ctl Dynamic_Priority_Queue enable

D.

fw ctl multik set_mode 9

Full Access
Question # 31

Automatic affinity means that if SecureXL is running, the affinity for each interface is automatically reset every

A.

15 sec

B.

60 sec

C.

5 sec

D.

30 sec

Full Access
Question # 32

Which packet info is ignored with Session Rate Acceleration?

A.

source port ranges

B.

source ip

C.

source port

D.

same info from Packet Acceleration is used

Full Access
Question # 33

There are 4 ways to use the Management API for creating host object with R81 Management API. Which one is NOT correct?

A.

Using Web Services

B.

Using Mgmt_cli tool

C.

Using CLISH

D.

Using SmartConsole GUI console

E.

Events are collected with SmartWorkflow from Trouble Ticket systems

Full Access
Question # 34

R81.20 management server can manage gateways with which versions installed?

A.

Versions R77 and higher

B.

Versions R76 and higher

C.

Versions R75.20 and higher

D.

Versions R75 and higher

Full Access
Question # 35

Tom has been tasked to install Check Point R81 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?

A.

One machine, but it needs to be installed using SecurePlatform for compatibility purposes.

B.

One machine

C.

Two machines

D.

Three machines

Full Access
Question # 36

Your manager asked you to check the status of SecureXL, and its enabled templates and features. What command will you use to provide such information to manager?

A.

fw accel stat

B.

fwaccel stat

C.

fw acces stats

D.

fwaccel stats

Full Access
Question # 37

Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?

A.

Dynamic ID

B.

RADIUS

C.

Username and Password

D.

Certificate

Full Access
Question # 38

What is true about the IPS-Blade?

A.

In R81, IPS is managed by the Threat Prevention Policy

B.

In R81, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict

C.

In R81, IPS Exceptions cannot be attached to “all rules”

D.

In R81, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same

Full Access
Question # 39

In a Client to Server scenario, which inspection point is the first point immediately following the tables and rule base check of a packet coming from outside of the network?

A.

Big l

B.

Little o

C.

Little i

D.

Big O

Full Access
Question # 40

The back-end database for Check Point Management uses:

A.

PostgreSQL

B.

MongoDB

C.

MySQL

D.

DBMS

Full Access
Question # 41

How can you grant GAiAAPI Permissions for a newly created user?

A.

Assign the user a permission profile in SmartConsole

B.

Assign the user the admin RBAC role in dish

C.

No need to grant access since every user has access by default.

D.

In bash, use the following command: "gaia_api access --user Tom -enable true"

Full Access
Question # 42

Is it possible to establish a VPN before the user login to the Endpoint Client?

A.

yes, you had to set neo_remember_user_password to true in the trac.defaults of the Remote Access Client or you can use the endpoint_vpn_remember_user_password

attribute in the trac_client_1 .ttm file located in the SFWDIR/conf directory on the Security Gateway

B.

no, the user must login first.

C.

yes. you had to set neo_always_connected to true in the trac.defaults of the Remote Access Client or you can use the endpoint_vpn_always_connected attribute in the

trac_client_1 .ttm file located in the SFWDIR/conf directory on the Security Gateway

D.

yes, you had to enable Machine Authentication in the Gateway object of the Smart Console

Full Access
Question # 43

What state is the Management HA in when both members have different policies/databases?

A.

Synchronized

B.

Never been synchronized

C.

Lagging

D.

Collision

Full Access
Question # 44

To find records in the logs that shows log records from the Application & URL Filtering Software Blade where traffic was dropped, what would be the query syntax?

A.

blada: application control AND action:drop

B.

blade."application control AND action;drop

C.

(blade: application control AND action;drop)

D.

blade;"application control AND action:drop

Full Access
Question # 45

What is the command switch to specify the Gaia API context?

A.

You have to specify it in the YAML file api.yml which is located underneath the /etc. directory of the security management server

B.

You have to change to the zsh-Shell which defaults to the Gaia API context.

C.

No need to specify a context, since it defaults to the Gaia API context.

D.

mgmt_cli --context gaia_api

Full Access
Question # 46

Which components allow you to reset a VPN tunnel?

A.

vpn tu command or SmartView monitor

B.

delete vpn ike sa or vpn she11 command

C.

vpn tunnelutil or delete vpn ike sa command

D.

SmartView monitor only

Full Access
Question # 47

Which utility allows you to configure the DHCP service on Gaia from the command line?

A.

ifconfig

B.

dhcp_ofg

C.

sysconfig

D.

cpconfig

Full Access
Question # 48

You need to change the MAC-address on eth2 interface of the gateway. What is the correct way to change MAC-address in Check Point Gaia?

A.

In CLISH run: set interface eth2 mac-addr 11:11:11:11:11:11

B.

In expert-mode run ifconfig eth1 hw 11:11:11:11 11 11

C.

In CLISH run set interface eth2 hw-addr 11 11 11:11:11 11

D.

In expert-mode run: ethtool -4 eth2 mac 11 11:11:11:11:11

Full Access
Question # 49

SecureXL is able to accelerate the Connection Rate using templates. Which attributes are used in the template to identify the connection?

A.

Source address. Destination address. Source Port, Destination port

B.

Source address. Destination address. Destination port

C.

Source address. Destination address. Destination port. Pro^col

D.

Source address. Destination address. Source Port, Destination port. Protocol

Full Access
Question # 50

How is communication between different Check Point components secured in R81? As with all questions, select the BEST answer.

A.

By using IPSEC

B.

By using SIC

C.

By using ICA

D.

By using 3DES

Full Access
Question # 51

SmartEvent Security Checkups can be run from the following Logs and Monitor activity:

A.

Reports

B.

Advanced

C.

Checkups

D.

Views

Full Access
Question # 52

In terms of Order Rule Enforcement, when a packet arrives at the gateway, the gateway checks it against the rules in the top Policy Layer, sequentially from top to bottom Which of the following statements is correct?

A.

If the Action of the matching rule is Accept the gateway will drop the packet

B.

If the Action of the matching rule is Drop, the gateway continues to check rules in the next Policy Layer down

C.

If the Action of the matching rule is Drop the gateway stops matching against later rules in the Policy Rule Base and drops the packet

D.

If the rule does not match in the Network policy it will continue to other enabled polices

Full Access
Question # 53

Fill in the blank RADIUS protocol uses_____to communicate with the gateway

A.

TDP

B.

CCP

C.

HTTP

D.

UDP

Full Access
Question # 54

UserCheck objects in the Application Control and URL Filtering rules allow the gateway to communicate with the users. Which action is not supported in UserCheck objects?

A.

Ask

B.

Drop

C.

Inform

D.

Reject

Full Access
Question # 55

The customer has about 150 remote access user with a Windows laptops. Not more than 50 Clients will be connected at the same time. The customer want to use multiple VPN Gateways as entry point and a personal firewall. What will be the best license for him?

A.

He will need Capsule Connect using MEP (multiple entry points).

B.

Because the customer uses only Windows clients SecuRemote will be sufficient and no additional license is needed

C.

He will need Harmony Endpoint because of the personal firewall.

D.

Mobile Access license because he needs only a 50 user license, license count is per concurrent user.

Full Access
Question # 56

What is a possible command to delete all of the SSH connections of a gateway?

A.

fw sam -I dport 22

B.

fw ctl conntab -x -dpott=22

C.

fw tab -t connections -x -e 00000016

D.

fwaccel dos config set dport ssh

Full Access
Question # 57

What technologies are used to deny or permit network traffic?

A.

Stateful Inspection, Firewall Blade, and URL/Application Blade

B.

Packet Filtering, Stateful Inspection, and Application Layer Firewall

C.

Firewall Blade, URL/Application Blade, and IPS

D.

Stateful Inspection, URL/Application Blade, and Threat Prevention

Full Access
Question # 58

Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?

A.

Windows Management Instrumentation (WMI)

B.

Hypertext Transfer Protocol Secure (HTTPS)

C.

Lightweight Directory Access Protocol (LDAP)

D.

Remote Desktop Protocol (RDP)

Full Access
Question # 59

Which command is used to obtain the configuration lock in Gaia?

A.

Lock database override

B.

Unlock database override

C.

Unlock database lock

D.

Lock database user

Full Access
Question # 60

What are not possible commands to acquire the lock in order to make changes in Clish or Web GUI?

A.

set config-lock on override

B.

Click the Lock icon in the WebUI

C.

"set rbac rw = 1''

D.

lock database override

Full Access
Question # 61

What should the admin do in case the Primary Management Server is temporary down?

A.

Use the VIP in SmartConsole you always reach the active Management Server.

B.

The Secondary will take over automatically Change the IP in SmartConsole to logon to the private IP of the Secondary Management Server.

C.

Run the 'promote_util' to activate the Secondary Management server

D.

Logon with SmartConsole to the Secondary Management Server and choose "Make Active' under Actions in the HA Management Menu

Full Access
Question # 62

Check Point ClusterXL Active/Active deployment is used when:

A.

Only when there is Multicast solution set up.

B.

There is Load Sharing solution set up.

C.

Only when there is Unicast solution set up.

D.

There is High Availability solution set up.

Full Access
Question # 63

What is the best sync method in the ClusterXL deployment?

A.

Use 1 cluster + 1st sync

B.

Use 1 dedicated sync interface

C.

Use 3 clusters + 1st sync + 2nd sync + 3rd sync

D.

Use 2 clusters +1st sync + 2nd sync

Full Access
Question # 64

Which of the following is true regarding the Proxy ARP feature for Manual NAT?

A.

The local.arp file must always be configured

B.

Automatic proxy ARP configuration can be enabled

C.

fw ctl proxy should be configured

D.

Translate Destination on Client Side should be configured

Full Access
Question # 65

Which is the command to identify the NIC driver before considering about the employment of the Multi-Queue feature?

A.

show interface eth0 mq

B.

ethtool A eth0

C.

ifconfig -i eth0 verbose

D.

ip show Int eth0

Full Access
Question # 66

There are multiple types of licenses for the various VPN components and types. License type related to management and functioning of Remote Access VPNs are - which of the following license requirement statement is NOT true:

A.

MobileAccessLicense ° This license is required on the Security Gateway for the following Remote Access solutions

B.

EndpointPolicyManagementLicense ° The Endpoint Security Suite includes blades other than the Remote Access VPN, hence this license is required to manage the suite

C.

EndpointContainerLicense ° The Endpoint Software Blade Licenses does not require an Endpoint Container License as the base

D.

IPSecVPNLicense • This license is installed on the VPN Gateway and is a basic requirement for a Remote Access VPN solution

Full Access
Question # 67

Which tool is used to enable ClusterXL?

A.

SmartUpdate

B.

cpconfig

C.

SmartConsole

D.

sysconfig

Full Access
Question # 68

Which of the following is NOT an alert option?

A.

SNMP

B.

High alert

C.

Mail

D.

User defined alert

Full Access
Question # 69

In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?

A.

Accounting

B.

Suppression

C.

Accounting/Suppression

D.

Accounting/Extended

Full Access
Question # 70

NO: 219

What cloud-based SandBlast Mobile application is used to register new devices and users?

A.

Check Point Protect Application

B.

Management Dashboard

C.

Behavior Risk Engine

D.

Check Point Gateway

Full Access
Question # 71

Which Check Point software blade provides Application Security and identity control?

A.

Identity Awareness

B.

Data Loss Prevention

C.

URL Filtering

D.

Application Control

Full Access
Question # 72

You can access the ThreatCloud Repository from:

A.

R81.20 SmartConsole and Application Wiki

B.

Threat Prevention and Threat Tools

C.

Threat Wiki and Check Point Website

D.

R81.20 SmartConsole and Threat Prevention

Full Access
Question # 73

Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?

A.

ThreatWiki

B.

Whitelist Files

C.

AppWiki

D.

IPS Protections

Full Access
Question # 74

Which is NOT a SmartEvent component?

A.

SmartEvent Server

B.

Correlation Unit

C.

Log Consolidator

D.

Log Server

Full Access
Question # 75

What are the types of Software Containers?

A.

Three; security management, Security Gateway, and endpoint security

B.

Three; Security Gateway, endpoint security, and gateway management

C.

Two; security management and endpoint security

D.

Two; endpoint security and Security Gateway

Full Access
Question # 76

Fill in the blank: With the User Directory Software Blade, you can create user definitions on a(n)_____________ Server.

A.

SecurID

B.

NT domain

C.

LDAP

D.

SMTP

Full Access
Question # 77

What command is used to manually failover a Multi-Version Cluster during the upgrade?

A.

clusterXL_admin down in Expert Mode

B.

clusterXL_admin down in Clish

C.

set cluster member state down in Clish

D.

set cluster down in Expert Mode

Full Access
Question # 78

What kind of information would you expect to see when using the "sim affinity -I" command?

A.

Overview over SecureXL templated connections

B.

The VMACs used in a Security Gateway cluster

C.

Affinity Distribution

D.

The involved firewall kernel modules in inbound and outbound packet chain

Full Access
Question # 79

You have enabled “Full Log” as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?

A.

Logging has disk space issues. Change logging storage options on the logging server or Security Management Server properties and install database.

B.

Data Awareness is not enabled.

C.

Identity Awareness is not enabled.

D.

Logs are arriving from Pre-R81 gateways.

Full Access
Question # 80

According to the policy installation flow the transfer state (CPTA) is responsible for the code generated by the FWM. On the Security Gateway side a process receives them and first stores them Into a temporary directory. Which process is true for receiving these Tiles;

A.

FWD

B.

CPD

C.

FWM

D.

RAD

Full Access
Question # 81

From SecureXL perspective, what are the three paths of traffic flow:

A.

Initial Path; Medium Path; Accelerated Path

B.

Layer Path; Blade Path; Rule Path

C.

Firewall Path; Accelerated Path; Medium Path

D.

Firewall Path; Accept Path; Drop Path

Full Access
Question # 82

In the Check Point Security Management Architecture, which component(s) can store logs?

A.

SmartConsole

B.

Security Management Server and Security Gateway

C.

Security Management Server

D.

SmartConsole and Security Management Server

Full Access
Question # 83

John is using Management HA. Which Security Management Server should he use for making changes?

A.

secondary Smartcenter

B.

active SmartConsole

C.

connect virtual IP of Smartcenter HA

D.

primary Log Server

Full Access
Question # 84

What does the "unknown" SIC status shown on SmartConsole mean?

A.

SIC activation key requires a reset

B.

Administrator input the wrong SIC key

C.

The management can contact the Security Gateway but cannot establish Secure Internal Communication

D.

There is no connection between the Security Gateway and Security Management Server

Full Access
Question # 85

You have used the SmartEvent GUI to create a custom Event policy. What is the best way to display the correlated Events generated by SmartEvent Policies?

A.

Open SmartView Monitor and select the SmartEvent Window from the main menu.

B.

In the SmartConsole / Logs & Monitor --> open the Logs View and use type:Correlated as query filter.

C.

In the SmartConsole / Logs & Monitor -> open a new Tab and select External Apps / SmartEvent.

D.

Select the Events tab in the SmartEvent GUI or use the Events tab in the SmartView web interface.

Full Access
Question # 86

What API command below creates a new host object with the name "My Host" and IP address of "192 168 0 10"?

A.

set host name "My Host" ip-address "192.168.0.10"

B.

new host name "My Host" ip-address "192 168.0.10"

C.

create host name "My Host" ip-address "192.168 0.10"

D.

mgmt.cli -m add host name "My Host" ip-address "192.168.0 10"

Full Access
Question # 87

Which Check Point software blade provides protection from zero-day and undiscovered threats?

A.

Firewall

B.

Threat Emulation

C.

Application Control

D.

Threat Extraction

Full Access
Question # 88

Which 3 types of tracking are available for Threat Prevention Policy?

A.

SMS Alert, Log, SNMP alert

B.

Syslog, None, User-defined scripts

C.

None, Log, Syslog

D.

Alert, SNMP trap, Mail

Full Access
Question # 89

Which of the following is NOT a method used by Identity Awareness for acquiring identity?

A.

Remote Access

B.

Active Directory Query

C.

Cloud IdP (IdentityProvider)

D.

RADIUS

Full Access
Question # 90

What are the minimum open server hardware requirements for a Security Management Server/Standalone in R81?

A.

2 CPU cores, 4GB of RAM and 15GB of disk space

B.

8 CPU cores, 16GB of RAM and 500 GB of disk space

C.

4 CPU cores, 8GB of RAM and 500GB of disk space

D.

8 CPU cores, 32GB of RAM and 1 TB of disk space

Full Access
Question # 91

Alice wants to upgrade the current security management machine from R80.40 to R81.20 and she wants to check the Deployment Agent status over the GAIA CLISH. Which of the following GAIACLISH command is true?

A.

show agent status

B.

show uninstaller status

C.

show installer packages

D.

show installer status

Full Access
Question # 92

Which command will reset the kernel debug options to default settings?

A.

fw ctl dbg -a 0

B.

fw ctl dbg resetall

C.

fw ctl debug 0

D.

fw ctl debug set 0

Full Access
Question # 93

SmartConsole R81 requires the following ports to be open for SmartEvent R81 management:

A.

19090,22

B.

19190,22

C.

18190,80

D.

19009,443

Full Access
Question # 94

How do Capsule Connect and Capsule Workspace differ?

A.

Capsule Connect provides a Layer3 VPN. Capsule Workspace provides a Desktop with usable applications.

B.

Capsule Workspace can provide access to any application.

C.

Capsule Connect provides Business data isolation.

D.

Capsule Connect does not require an installed application at client.

Full Access
Question # 95

You have existing dbedit scripts from R77. Can you use them with R81.20?

A.

dbedit is not supported in R81.20

B.

dbedit is fully supported in R81.20

C.

You can use dbedit to modify threat prevention or access policies, but not create or modify layers

D.

dbedit scripts are being replaced by mgmt_cli in R81.20

Full Access
Question # 96

Can multiple administrators connect to a Security Management Server at the same time?

A.

No, only one can be connected

B.

Yes, all administrators can modify a network object at the same time

C.

Yes, every administrator has their own username, and works in a session that is independent of other administrators.

D.

Yes, but only one has the right to write.

Full Access
Question # 97

Which GUI client is supported in R81?

A.

SmartProvisioning

B.

SmartView Tracker

C.

SmartView Monitor

D.

SmartLog

Full Access
Question # 98

: 156

VPN Link Selection will perform the following when the primary VPN link goes down?

A.

The Firewall will drop the packets.

B.

The Firewall can update the Link Selection entries to start using a different link for the same tunnel.

C.

The Firewall will send out the packet on all interfaces.

D.

The Firewall will inform the client that the tunnel is down.

Full Access
Question # 99

Automation and Orchestration differ in that:

A.

Automation relates to codifying tasks, whereas orchestration relates to codifying processes.

B.

Automation involves the process of coordinating an exchange of information through web service interactions such as XML and JSON, but orchestration does not involve processes.

C.

Orchestration is concerned with executing a single task, whereas automation takes a series of tasks and puts them all together into a process workflow.

D.

Orchestration relates to codifying tasks, whereas automation relates to codifying processes.

Full Access
Question # 100

You are investigating issues with to gateway cluster members are not able to establish the first initial cluster synchronization. What service is used by the FWD daemon to do a Full Synchronization?

A.

TCP port 443

B.

TCP port 257

C.

TCP port 256

D.

UDP port 8116

Full Access
Question # 101

You are asked to check the status of several user-mode processes on the management server and gateway. Which of the following processes can only be seen on a Management Server?

A.

fwd

B.

fwm

C.

cpd

D.

cpwd

Full Access
Question # 102

What is the purpose of Priority Delta in VRRP?

A.

When a box up, Effective Priority = Priority + Priority Delta

B.

When an Interface is up, Effective Priority = Priority + Priority Delta

C.

When an Interface fail, Effective Priority = Priority – Priority Delta

D.

When a box fail, Effective Priority = Priority – Priority Delta

Full Access
Question # 103

How many policy layers do Access Control policy support?

A.

2

B.

4

C.

1

D.

3

Full Access
Question # 104

Which blades and or features are not supported in R81?

A.

SmartEvent Maps

B.

SmartEvent

C.

Identity Awareness

D.

SmartConsole Toolbars

Full Access
Question # 105

After making modifications to the $CVPNDIR/conf/cvpnd.C file, how would you restart the daemon?

A.

cvpnd_restart

B.

cvpnd_restart

C.

cvpnd restart

D.

cvpnrestart

Full Access
Question # 106

Which web services protocol is used to communicate to the Check Point R81 Identity Awareness Web API?

A.

SOAP

B.

REST

C.

XLANG

D.

XML-RPC

Full Access
Question # 107

Which of the following will NOT affect acceleration?

A.

Connections destined to or originated from the Security gateway

B.

A 5-tuple match

C.

Multicast packets

D.

Connections that have a Handler (ICMP, FTP, H.323, etc.)

Full Access
Question # 108

Security Checkup Summary can be easily conducted within:

A.

Summary

B.

Views

C.

Reports

D.

Checkups

Full Access
Question # 109

When simulating a problem on ClusterXL cluster with cphaprob –d STOP -s problem -t 0 register, to initiate a failover on an active cluster member, what command allows you remove the problematic state?

A.

cphaprob –d STOP unregister

B.

cphaprob STOP unregister

C.

cphaprob unregister STOP

D.

cphaprob –d unregister STOP

Full Access
Question # 110

John detected high load on sync interface. Which is most recommended solution?

A.

For short connections like http service – delay sync for 2 seconds

B.

Add a second interface to handle sync traffic

C.

For short connections like http service – do not sync

D.

For short connections like icmp service – delay sync for 2 seconds

Full Access
Question # 111

Which Check Point daemon monitors the other daemons?

A.

fwm

B.

cpd

C.

cpwd

D.

fwssd

Full Access
Question # 112

SmartEvent does NOT use which of the following procedures to identify events:

A.

Matching a log against each event definition

B.

Create an event candidate

C.

Matching a log against local exclusions

D.

Matching a log against global exclusions

Full Access
Question # 113

As a valid Mobile Access Method, what feature provides Capsule Connect/VPN?

A.

That is used to deploy the mobile device as a generator of one-time passwords for authenticating to an RSA Authentication Manager.

B.

Fill Layer4 VPN –SSL VPN that gives users network access to all mobile applications.

C.

Full Layer3 VPN –IPSec VPN that gives users network access to all mobile applications.

D.

You can make sure that documents are sent to the intended recipients only.

Full Access
Question # 114

Which command shows detailed information about VPN tunnels?

A.

cat $FWDIR/conf/vpn.conf

B.

vpn tu tlist

C.

vpn tu

D.

cpview

Full Access
Question # 115

Which of the following is NOT a component of Check Point Capsule?

A.

Capsule Docs

B.

Capsule Cloud

C.

Capsule Enterprise

D.

Capsule Workspace

Full Access
Question # 116

SandBlast has several functional components that work together to ensure that attacks are prevented in real-time. Which the following is NOT part of the SandBlast component?

A.

Threat Emulation

B.

Mobile Access

C.

Mail Transfer Agent

D.

Threat Cloud

Full Access
Question # 117

Which command gives us a perspective of the number of kernel tables?

A.

fw tab -t

B.

fw tab -s

C.

fw tab -n

D.

fw tab -k

Full Access
Question # 118

NO: 180

What command can you use to have cpinfo display all installed hotfixes?

A.

cpinfo -hf

B.

cpinfo –y all

C.

cpinfo –get hf

D.

cpinfo installed_jumbo

Full Access
Question # 119

SmartEvent has several components that function together to track security threats. What is the function of the Correlation Unit as a component of this architecture?

A.

Analyzes each log entry as it arrives at the log server according to the Event Policy. When a threat pattern is identified, an event is forwarded to the SmartEvent Server.

B.

Correlates all the identified threats with the consolidation policy.

C.

Collects syslog data from third party devices and saves them to the database.

D.

Connects with the SmartEvent Client when generating threat reports.

Full Access
Question # 120

To add a file to the Threat Prevention Whitelist, what two items are needed?

A.

File name and Gateway

B.

Object Name and MD5 signature

C.

MD5 signature and Gateway

D.

IP address of Management Server and Gateway

Full Access
Question # 121

What scenario indicates that SecureXL is enabled?

A.

Dynamic objects are available in the Object Explorer

B.

SecureXL can be disabled in cpconfig

C.

fwaccel commands can be used in clish

D.

Only one packet in a stream is seen in a fw monitor packet capture

Full Access
Question # 122

What API command below creates a new host with the name “New Host” and IP address of “192.168.0.10”?

A.

new host name “New Host” ip-address “192.168.0.10”

B.

set host name “New Host” ip-address “192.168.0.10”

C.

create host name “New Host” ip-address “192.168.0.10”

D.

add host name “New Host” ip-address “192.168.0.10”

Full Access
Question # 123

What is considered Hybrid Emulation Mode?

A.

Manual configuration of file types on emulation location.

B.

Load sharing of emulation between an on premise appliance and the cloud.

C.

Load sharing between OS behavior and CPU Level emulation.

D.

High availability between the local SandBlast appliance and the cloud.

Full Access
Question # 124

What are the blades of Threat Prevention?

A.

IPS, DLP, AntiVirus, AntiBot, Sandblast Threat Emulation/Extraction

B.

DLP, AntiVirus, QoS, AntiBot, Sandblast Threat Emulation/Extraction

C.

IPS, AntiVirus, AntiBot

D.

IPS, AntiVirus, AntiBot, Sandblast Threat Emulation/Extraction

Full Access
Question # 125

: 131

Which command is used to display status information for various components?

A.

show all systems

B.

show system messages

C.

sysmess all

D.

show sysenv all

Full Access
Question # 126

What are the main stages of a policy installations?

A.

Verification & Compilation, Transfer and Commit

B.

Verification & Compilation, Transfer and Installation

C.

Verification, Commit, Installation

D.

Verification, Compilation & Transfer, Installation

Full Access
Question # 127

With Mobile Access enabled, administrators select the web-based and native applications that can be accessed by remote users and define the actions that users can perform the applications. Mobile Access encrypts all traffic using:

A.

HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, they need to install the SSL Network Extender.

B.

HTTPS for web-based applications and AES or RSA algorithm for native applications. For end users to access the native application, they need to install the SSL Network Extender.

C.

HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, no additional software is required.

D.

HTTPS for web-based applications and AES or RSA algorithm for native applications. For end users to access the native application, no additional software is required.

Full Access
Question # 128

As an administrator, you may be required to add the company logo to reports. To do this, you would save the logo as a PNG file with the name ‘cover-company-logo.png’ and then copy that image file to which directory on the SmartEvent server?

A.

SFWDIR/smartevent/conf

B.

$RTDIR/smartevent/conf

C.

$RTDIR/smartview/conf

D.

$FWDIR/smartview/conf

Full Access
Question # 129

How do you enable virtual mac (VMAC) on-the-fly on a cluster member?

A.

cphaprob set int fwha_vmac_global_param_enabled 1

B.

clusterXL set int fwha_vmac_global_param_enabled 1

C.

fw ctl set int fwha_vmac_global_param_enabled 1

D.

cphaconf set int fwha_vmac_global_param_enabled 1

Full Access
Question # 130

Which of the following is NOT a type of Check Point API available in R81.x?

A.

Identity Awareness Web Services

B.

OPSEC SDK

C.

Mobile Access

D.

Management

Full Access
Question # 131

Please choose correct command to add an “emailserver1” host with IP address 10.50.23.90 using GAiA management CLI?

A.

host name myHost12 ip-address 10.50.23.90

B.

mgmt: add host name ip-address 10.50.23.90

C.

add host name emailserver1 ip-address 10.50.23.90

D.

mgmt: add host name emailserver1 ip-address 10.50.23.90

Full Access
Question # 132

For best practices, what is the recommended time for automatic unlocking of locked admin accounts?

A.

20 minutes

B.

15 minutes

C.

Admin account cannot be unlocked automatically

D.

30 minutes at least

Full Access
Question # 133

Check Point APIs allow system engineers and developers to make changes to their organization’s security policy with CLI tools and Web Services for all the following except:

A.

Create new dashboards to manage 3rd party task

B.

Create products that use and enhance 3rd party solutions

C.

Execute automated scripts to perform common tasks

D.

Create products that use and enhance the Check Point Solution

Full Access
Question # 134

Which command would you use to set the network interfaces’ affinity in Manual mode?

A.

sim affinity -m

B.

sim affinity -l

C.

sim affinity -a

D.

sim affinity -s

Full Access
Question # 135

What command would show the API server status?

A.

cpm status

B.

api restart

C.

api status

D.

show api status

Full Access
Question # 136

Tom has connected to the R81 Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored shortly afterward.

What will happen to the changes already made?

A.

Tom’s changes will have been stored on the Management when he reconnects and he will not lose any of his work.

B.

Tom will have to reboot his SmartConsole computer, and access the Management cache store on that computer, which is only accessible after a reboot.

C.

Tom’s changes will be lost since he lost connectivity and he will have to start again.

D.

Tom will have to reboot his SmartConsole computer, clear to cache, and restore changes.

Full Access
Question # 137

What is a best practice before starting to troubleshoot using the “fw monitor” tool?

A.

Run the command: fw monitor debug on

B.

Clear the connections table

C.

Disable CoreXL

D.

Disable SecureXL

Full Access
Question # 138

From SecureXL perspective, what are the tree paths of traffic flow:

A.

Initial Path; Medium Path; Accelerated Path

B.

Layer Path; Blade Path; Rule Path

C.

Firewall Path; Accept Path; Drop Path

D.

Firewall Path; Accelerated Path; Medium Path

Full Access
Question # 139

SecureXL improves non-encrypted firewall traffic throughput and encrypted VPN traffic throughput.

A.

This statement is true because SecureXL does improve all traffic.

B.

This statement is false because SecureXL does not improve this traffic but CoreXL does.

C.

This statement is true because SecureXL does improve this traffic.

D.

This statement is false because encrypted traffic cannot be inspected.

Full Access
Question # 140

What is the order of NAT priorities?

A.

Static NAT, IP pool NAT, hide NAT

B.

IP pool NAT, static NAT, hide NAT

C.

Static NAT, automatic NAT, hide NAT

D.

Static NAT, hide NAT, IP pool NAT

Full Access
Question # 141

SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day Protection?

A.

Smart Cloud Services

B.

Load Sharing Mode Services

C.

Threat Agent Solution

D.

Public Cloud Services

Full Access
Question # 142

Which command shows the current connections distributed by CoreXL FW instances?

A.

fw ctl multik stat

B.

fw ctl affinity -l

C.

fw ctl instances -v

D.

fw ctl iflist

Full Access
Question # 143

Both ClusterXL and VRRP are fully supported by Gaia R81.20 and available to all Check Point appliances. Which the following command is NOT related to redundancy and functions?

A.

cphaprob stat

B.

cphaprob –a if

C.

cphaprob –l list

D.

cphaprob all show stat

Full Access
Question # 144

When setting up an externally managed log server, what is one item that will not be configured on the R81 Security Management Server?

A.

IP

B.

SIC

C.

NAT

D.

FQDN

Full Access
Question # 145

What component of R81 Management is used for indexing?

A.

DBSync

B.

API Server

C.

fwm

D.

SOLR

Full Access
Question # 146

What is true about VRRP implementations?

A.

VRRP membership is enabled in cpconfig

B.

VRRP can be used together with ClusterXL, but with degraded performance

C.

You cannot have a standalone deployment

D.

You cannot have different VRIDs in the same physical network

Full Access
Question # 147

You need to see which hotfixes are installed on your gateway, which command would you use?

A.

cpinfo –h all

B.

cpinfo –o hotfix

C.

cpinfo –l hotfix

D.

cpinfo –y all

Full Access
Question # 148

Which command would disable a Cluster Member permanently?

A.

clusterXL_admin down

B.

cphaprob_admin down

C.

clusterXL_admin down-p

D.

set clusterXL down-p

Full Access
Question # 149

Customer’s R81 management server needs to be upgraded to R81.20. What is the best upgrade method when the management server is not connected to the Internet?

A.

Export R81 configuration, clean install R81.20 and import the configuration

B.

CPUSE offline upgrade

C.

CPUSE online upgrade

D.

SmartUpdate upgrade

Full Access
Question # 150

Ken wants to obtain a configuration lock from other administrator on R81 Security Management Server. He can do this via WebUI or via CLI.

Which command should he use in CLI? (Choose the correct answer.)

A.

remove database lock

B.

The database feature has one command lock database override.

C.

override database lock

D.

The database feature has two commands lock database override and unlock database. Both will work.

Full Access
Question # 151

When deploying SandBlast, how would a Threat Emulation appliance benefit from the integration of ThreatCloud?

A.

ThreatCloud is a database-related application which is located on-premise to preserve privacy of company-related data

B.

ThreatCloud is a collaboration platform for all the CheckPoint customers to form a virtual cloud consisting of a combination of all on-premise private cloud environments

C.

ThreatCloud is a collaboration platform for Check Point customers to benefit from VMWare ESXi infrastructure which supports the Threat Emulation Appliances as virtual machines in the EMC Cloud

D.

ThreatCloud is a collaboration platform for all the Check Point customers to share information about malicious and benign files that all of the customers can benefit from as it makes emulation of known files unnecessary

Full Access
Question # 152

Which of the following commands shows the status of processes?

A.

cpwd_admin -l

B.

cpwd -l

C.

cpwd admin_list

D.

cpwd_admin list

Full Access
Question # 153

What is the responsibility of SOLR process on R81.20 management server?

A.

Validating all data before it’s written into the database

B.

It generates indexes of data written to the database

C.

Communication between SmartConsole applications and the Security Management Server

D.

Writing all information into the database

Full Access
Question # 154

To ensure that VMAC mode is enabled, which CLI command should you run on all cluster members?

A.

fw ctl set int fwha vmac global param enabled

B.

fw ctl get int vmac global param enabled; result of command should return value 1

C.

cphaprob-a if

D.

fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1

Full Access
Question # 155

In the Firewall chain mode FFF refers to:

A.

Stateful Packets

B.

No Match

C.

All Packets

D.

Stateless Packets

Full Access
Question # 156

What key is used to save the current CPView page in a filename format cpview_”cpview process ID”.cap”number of captures”?

A.

S

B.

W

C.

C

D.

Space bar

Full Access
Question # 157

You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?

A.

fw ctl multik dynamic_dispatching on

B.

fw ctl multik dynamic_dispatching set_mode 9

C.

fw ctl multik set_mode 9

D.

fw ctl multik pq enable

Full Access
Question # 158

Which is NOT an example of a Check Point API?

A.

Gateway API

B.

Management API

C.

OPSC SDK

D.

Threat Prevention API

Full Access
Question # 159

Please choose the path to monitor the compliance status of the Check Point R81.20 based management.

A.

Gateways & Servers --> Compliance View

B.

Compliance blade not available under R81.20

C.

Logs & Monitor --> New Tab --> Open compliance View

D.

Security & Policies --> New Tab --> Compliance View

Full Access
Question # 160

What is UserCheck?

A.

Messaging tool used to verify a user’s credentials.

B.

Communication tool used to inform a user about a website or application they are trying to access.

C.

Administrator tool used to monitor users on their network.

D.

Communication tool used to notify an administrator when a new user is created.

Full Access
Question # 161

Which Check Point feature enables application scanning and the detection?

A.

Application Dictionary

B.

AppWiki

C.

Application Library

D.

CPApp

Full Access
Question # 162

You notice that your firewall is under a DDoS attack and would like to enable the Penalty Box feature, which command you use?

A.

sim erdos –e 1

B.

sim erdos – m 1

C.

sim erdos –v 1

D.

sim erdos –x 1

Full Access
Question # 163

Joey wants to upgrade from R75.40 to R81 version of Security management. He will use Advanced Upgrade with Database Migration method to achieve this.

What is one of the requirements for his success?

A.

Size of the /var/log folder of the source machine must be at least 25% of the size of the /var/log directory on the target machine

B.

Size of the /var/log folder of the target machine must be at least 25% of the size of the /var/log directory on the source machine

C.

Size of the $FWDIR/log folder of the target machine must be at least 30% of the size of the $FWDIR/log directory on the source machine

D.

Size of the /var/log folder of the target machine must be at least 25GB or more

Full Access
Question # 164

What are the methods of SandBlast Threat Emulation deployment?

A.

Cloud, Appliance and Private

B.

Cloud, Appliance and Hybrid

C.

Cloud, Smart-1 and Hybrid

D.

Cloud, OpenServer and Vmware

Full Access
Question # 165

What is the Implicit Clean-up Rule?

A.

A setting is defined in the Global Properties for all policies.

B.

A setting that is configured per Policy Layer.

C.

Another name for the Clean-up Rule.

D.

Automatically created when the Clean-up Rule is defined.

Full Access
Question # 166

On what port does the CPM process run?

A.

TCP 857

B.

TCP 18192

C.

TCP 900

D.

TCP 19009

Full Access
Question # 167

Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ________ .

A.

User Directory

B.

Captive Portal and Transparent Kerberos Authentication

C.

Captive Portal

D.

UserCheck

Full Access
Question # 168

You need to change the number of firewall Instances used by CoreXL. How can you achieve this goal?

A.

edit fwaffinity.conf; reboot required

B.

cpconfig; reboot required

C.

edit fwaffinity.conf; reboot not required

D.

cpconfig; reboot not required

Full Access
Question # 169

What statement best describes the Proxy ARP feature for Manual NAT in R81.20?

A.

Automatic proxy ARP configuration can be enabled

B.

Translate Destination on Client Side should be configured

C.

fw ctl proxy should be configured

D.

local.arp file must always be configured

Full Access
Question # 170

Pamela is Cyber Security Engineer working for Global Instance Firm with large scale deployment of Check Point Enterprise Appliances using GAiA/R81.20. Company’s Developer Team is having random access issue to newly deployed Application Server in DMZ’s Application Server Farm Tier and blames DMZ Security Gateway as root cause. The ticket has been created and issue is at Pamela’s desk for an investigation. Pamela decides to use Check Point’s Packet Analyzer Tool-fw monitor to iron out the issue during approved Maintenance window.

What do you recommend as the best suggestion for Pamela to make sure she successfully captures entire traffic in context of Firewall and problematic traffic?

A.

Pamela should check SecureXL status on DMZ Security gateway and if it’s turned ON. She should turn OFF SecureXL before using fw monitor to avoid misleading traffic captures.

B.

Pamela should check SecureXL status on DMZ Security Gateway and if it’s turned OFF. She should turn ON SecureXL before using fw monitor to avoid misleading traffic captures.

C.

Pamela should use tcpdump over fw monitor tool as tcpdump works at OS-level and captures entire traffic.

D.

Pamela should use snoop over fw monitor tool as snoop works at NIC driver level and captures entire traffic.

Full Access
Question # 171

The SmartEvent R81 Web application for real-time event monitoring is called:

A.

SmartView Monitor

B.

SmartEventWeb

C.

There is no Web application for SmartEvent

D.

SmartView

Full Access
Question # 172

What is not a purpose of the deployment of Check Point API?

A.

Execute an automated script to perform common tasks

B.

Create a customized GUI Client for manipulating the objects database

C.

Create products that use and enhance the Check Point solution

D.

Integrate Check Point products with 3rd party solution

Full Access
Question # 173

What is the valid range for VRID value in VRRP configuration?

A.

1 - 254

B.

1 - 255

C.

0 - 254

D.

0 - 255

Full Access
Question # 174

What command lists all interfaces using Multi-Queue?

A.

cpmq get

B.

show interface all

C.

cpmq set

D.

show multiqueue all

Full Access
Question # 175

Which application should you use to install a contract file?

A.

SmartView Monitor

B.

WebUI

C.

SmartUpdate

D.

SmartProvisioning

Full Access
Question # 176

In ClusterXL Load Sharing Multicast Mode:

A.

only the primary member received packets sent to the cluster IP address

B.

only the secondary member receives packets sent to the cluster IP address

C.

packets sent to the cluster IP address are distributed equally between all members of the cluster

D.

every member of the cluster received all of the packets sent to the cluster IP address

Full Access
Question # 177

Which of the following technologies extracts detailed information from packets and stores that information in state tables?

A.

INSPECT Engine

B.

Stateful Inspection

C.

Packet Filtering

D.

Application Layer Firewall

Full Access
Question # 178

Office mode means that:

A.

SecurID client assigns a routable MAC address. After the user authenticates for a tunnel, the VPN gateway assigns a routable IP address to the remote client.

B.

Users authenticate with an Internet browser and use secure HTTPS connection.

C.

Local ISP (Internet service Provider) assigns a non-routable IP address to the remote user.

D.

Allows a security gateway to assign a remote client an IP address. After the user authenticates for a tunnel, the VPN gateway assigns a routable IP address to the remote client.

Full Access
Question # 179

GAiA Software update packages can be imported and installed offline in situation where:

A.

Security Gateway with GAiA does NOT have SFTP access to Internet

B.

Security Gateway with GAiA does NOT have access to Internet.

C.

Security Gateway with GAiA does NOT have SSH access to Internet.

D.

The desired CPUSE package is ONLY available in the Check Point CLOUD.

Full Access
Question # 180

Check Point security components are divided into the following components:

A.

GUI Client, Security Gateway, WebUI Interface

B.

GUI Client, Security Management, Security Gateway

C.

Security Gateway, WebUI Interface, Consolidated Security Logs

D.

Security Management, Security Gateway, Consolidate Security Logs

Full Access
Question # 181

Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?

A.

50%

B.

75%

C.

80%

D.

15%

Full Access
Question # 182

SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?

A.

Management Dashboard

B.

Gateway

C.

Personal User Storage

D.

Behavior Risk Engine

Full Access
Question # 183

How can SmartView application accessed?

A.

http:// /smartview

B.

http:// :4434/smartview/

C.

https:// /smartview/

D.

https:// :4434/smartview/

Full Access
Question # 184

If you needed the Multicast MAC address of a cluster, what command would you run?

A.

cphaprob –a if

B.

cphaconf ccp multicast

C.

cphaconf debug data

D.

cphaprob igmp

Full Access
Question # 185

What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?

A.

Anti-Bot is the only countermeasure against unknown malware

B.

Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control Centers

C.

Anti-Bot is the only signature-based method of malware protection.

D.

Anti-Bot is a post-infection malware protection to prevent a host from establishing a connection to a Command & Control Center.

Full Access
Question # 186

Which view is NOT a valid CPVIEW view?

A.

IDA

B.

RAD

C.

PDP

D.

VPN

Full Access
Question # 187

Session unique identifiers are passed to the web api using which http header option?

A.

X-chkp-sid

B.

Accept-Charset

C.

Proxy-Authorization

D.

Application

Full Access