Which of the following is used to initially create trust between a Gateway and Security Management Server?
Which of the following is NOT a valid configuration screen of an Access Role Object?
You have enabled "Extended Log" as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?
Fill in the blank: Each cluster, at a minimum, should have at least ___________ interfaces.
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
URL Filtering employs a technology, which educates users on web usage policy in real time. What is the name of that technology?
In a Distributed deployment, the Security Gateway and the Security Management software are installed on what platforms?
Identity Awareness lets an administrator easily configure network access and auditing based on three items Choose the correct statement.
A layer can support different combinations of blades What are the supported blades:
Which of the completed statements is NOT true? The WebUI can be used to manage Operating System user accounts and
You want to verify if there are unsaved changes in GAiA that will be lost with a reboot. What command can be used?
What Check Point tool is used to automatically update Check Point products for the Gaia OS?
Vanessa is attempting to log into the Gaia Web Portal. She is able to login successfully. Then she tries the same username and password for SmartConsole but gets the message in the screenshot image below. She has checked that the IP address of the Server is correct and the username and password she used to login into Gaia is also correct.
What is the most likely reason?
Which is NOT an encryption algorithm that can be used in an IPSEC Security Association (Phase 2)?
When a SAM rule is required on Security Gateway to quickly block suspicious connections which are not restricted by the Security Policy, what actions does the administrator need to take?
You are the Check Point administrator for Alpha Corp with an R80 Check Point estate. You have received a call by one of the management users stating that they are unable to browse the Internet with their new tablet connected to the company Wireless. The Wireless system goes through the Check Point Gateway. How do you review the logs to see what the problem may be?
The Network Operations Center administrator needs access to Check Point Security devices mostly for troubleshooting purposes. You do not want to give her access to the expert mode, but she still should be able to run tcpdump. How can you achieve this requirement?
In R80 Management, apart from using SmartConsole, objects or rules can also be modified using:
You had setup the VPN Community NPN-Stores' with 3 gateways. There are some issues with one remote gateway(l .1.1.1) and an your local gateway. What will be the best log filter to see only the IKE Phase 2 agreed networks for both gateways.
To ensure that VMAC mode is enabled, which CLI command you should run on all cluster members? Choose the best answer.
Which Threat Prevention Software Blade provides comprehensive protection against malicious and unwanted network traffic, focusing on application and server vulnerabilities?
CPU-level of your Security gateway is peaking to 100% causing problems with traffic. You suspect that the problem might be the Threat Prevention settings.
The following Threat Prevention Profile has been created.
How could you tune the profile in order to lower the CPU load still maintaining security at good level? Select the BEST answer.
What are valid authentication methods for mutual authenticating the VPN gateways?
When installing a dedicated R80 SmartEvent server, what is the recommended size of the root partition?
Fill in the blanks: A Check Point software license consists of a__________ and _______.
You are asked to check the status of several user-mode processes on the management server and gateway. Which of the following processes can only be seen on a Management Server?
When URL Filtering is set, what identifying data gets sent to the Check Point Online Web Service?
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?
Which option in a firewall rule would only match and allow traffic to VPN gateways for one Community in common?
Fill in the blank: The position of an implied rule is manipulated in the __________________ window.
In which deployment is the security management server and Security Gateway installed on the same appliance?
What data MUST be supplied to the SmartConsole System Restore window to restore a backup?
What are the three main components of Check Point security management architecture?
Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?
Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?
True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway
If there are two administrators logged in at the same time to the SmartConsole, and there are objects locked for editing, what must be done to make them available to other administrators? Choose the BEST answer
Which of the following is considered a "Subscription Blade", requiring renewal every 1-3 years?
Gaia has two default user accounts that cannot be deleted. What are those user accounts?
Fill in the blank: It is Best Practice to have a _____ rule at the end of each policy layer.
Which part of SmartConsole allows administrators to add, edit delete, and clone objects?
Fill in the blank: In Security Gateways R75 and above, SIC uses ______________ for encryption.
Administrator Dave logs into R80 Management Server to review and makes some rule changes. He notices that there is a padlock sign next to the DNS rule in the Rule Base.
What is the possible explanation for this?
Traffic from source 192.168.1.1 is going to www.google.com. The Application Control Blade on the gateway is inspecting the traffic. Assuming acceleration is enable which path is handling the traffic?
Which of the following log queries would show only dropped packets with source address of 192.168.1.1 and destination address of 172.26.1.1?
Fill in the blank: An identity server uses a ___________ for user authentication.
Both major kinds of NAT support Hide and Static NAT. However, one offers more flexibility. Which statement is true?
Which repositories are installed on the Security Management Server by SmartUpdate?
Which one of the following is the preferred licensing model? Select the BEST answer
Fill in the blank: SmartConsole, SmartEvent GUI client, and ___________ allow viewing of billions of consolidated logs and shows them as prioritized security events.
To provide updated malicious data signatures to all Threat Prevention blades, the Threat Prevention gateway does what with the data?
Which option, when applied to a rule, allows traffic to VPN gateways in specific VPN communities?
Which SmartConsole application shows correlated logs and aggregated data to provide an overview of potential threats and attack patterns?
Which of the following situations would not require a new license to be generated and installed?
To view the policy installation history for each gateway, which tool would an administrator use?
Fill in the blanks: A Security Policy is created in_____, stored in the_____ and Distributed to the various
The purpose of the Communication Initialization process is to establish a trust between the Security Management Server and the Check Point gateways. Which statement best describes this Secure Internal
Communication (SIC)?
Which of the following is a new R80.10 Gateway feature that had not been available in R77.X and older?
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ___________.
An administrator can use section titles to more easily navigate between large rule bases. Which of these statements is FALSE?
Examine the sample Rule Base.
What will be the result of a verification of the policy from SmartConsole?
Bob and Joe both have Administrator Roles on their Gaia Platform. Bob logs in on the WebUI and then Joe logs in through CLI. Choose what BEST describes the following scenario, where Bob and Joe are both logged in:
Fill in the blank RADIUS Accounting gets_____data from requests generated by the accounting client