NAT rules are prioritized in which order?
1. Automatic Static NAT
2. Automatic Hide NAT
3. Manual/Pre-Automatic NAT
4. Post-Automatic/Manual NAT rules
Automatic affinity means that if SecureXL is running, the affinity for each interface is automatically reset every
Session unique identifiers are passed to the web api using which http header option?
To help SmartEvent determine whether events originated internally or externally you must define using the Initial Settings under General Settings in the Policy Tab. How many options are available to calculate the traffic direction?
Your manager asked you to check the status of SecureXL, and its enabled templates and features. What command will you use to provide such information to manager?
To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot:
CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is:
Which of the following is a new R81 Gateway feature that had not been available in R77.X and older?
SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?
Fill in the blank: The “fw monitor” tool can be best used to troubleshoot ____________________.
What kind of information would you expect to see using the sim affinity command?
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
Fill in the blank: The R81 feature _____ permits blocking specific IP addresses for a specified time period.
During the Check Point Stateful Inspection Process, for packets that do not pass Firewall Kernel Inspection and are rejected by the rule definition, packets are:
Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?
Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?
Which method below is NOT one of the ways to communicate using the Management API’s?
Which file contains the host address to be published, the MAC address that needs to be associated with the IP Address, and the unique IP of the interface that responds to ARP request?
How many images are included with Check Point TE appliance in Recommended Mode?
Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?
On R81.20 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:
If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsive, which if these steps should NOT be performed:
Fill in the blank: The tool _____ generates a R81 Security Gateway configuration report.
In which deployment is the security management server and Security Gateway installed on the same appliance?
Check Pont Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster Members over Check Point SIC _______ .
To ensure that VMAC mode is enabled, which CLI command should you run on all cluster members?
In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?
Matt wants to upgrade his old Security Management server to R81.x using the Advanced Upgrade with Database Migration. What is one of the requirements for a successful upgrade?
After some changes in the firewall policy you run into some issues. You want to test if the policy from two weeks ago have the same issue. You don't want to lose the changes from the last weeks. What is the best way to do it?
You have used the "set inactivity-timeout 120" command to prevent the session to be disconnected after 10 minutes of inactivity. However, the Web session is being disconnected after 10 minutes. Why?
By default how often updates are checked when the CPUSE Software Updates Policy is set to Automatic?
While enabling the Identity Awareness blade the Identity Awareness wizard does not automatically detect the windows domain. Why does it not detect the windows domain?
What command is used to manually failover a Multi-Version Cluster during the upgrade?
Firewall polices must be configured to accept VRRP packets on the GAiA platform if it Firewall software. The Multicast destination assigned by the internet Assigned Number Authority (IANA) for VRRP is:
Which of the following is NOT a method used by Identity Awareness for acquiring identity?
What are valid authentication methods for mutual authenticating the VPN gateways?
Which Check Point software blade provides protection from zero-day and undiscovered threats?
You are the administrator for ABC Corp. You have logged into your R81 Management server. You are making some changes in the Rule Base and notice that rule No.6 has a pencil icon next to it.
What does this mean?
Which Check Point daemon invokes and monitors critical processes and attempts to restart them if they fail?
Fill in the blank: The IPS policy for pre-R81 gateways is installed during the _______ .
The customer has about 150 remote access user with a Windows laptops. Not more than 50 Clients will be connected at the same time. The customer want to use multiple VPN Gateways as entry point and a personal firewall. What will be the best license for him?
Which Check Point software blade provides visibility of users, groups and machines while also providing access control through identity-based policies?
When a packet arrives at the gateway, the gateway checks it against the rules in the hop Policy Layer, sequentially from top to bottom, and enforces the first rule that matches a packet. Which of the following statements about the order of rule enforcement is true?
After replacing a faulty Gateway the admin installed the new Hardware and want to push the policy. Installing the policy using the SmartConsole he got an Error for the Threat Prevention Policy. There is no error for the Access Control Policy. What will be the most common cause for the issue?
Kofi, the administrator of the ALPHA Corp network wishes to change the default Gaia WebUI Portal port number currently set on the default HTTPS port. Which CLISH commands are required to be able to change this TCP port?
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?
You plan to automate creating new objects using new R81 Management API. You decide to use GAIA CLI for this task.
What is the first step to run management API commands on GAIA’s shell?
Aaron is a Syber Security Engineer working for Global Law Firm with large scale deployment of Check Point Enterprise Appliances running GAiA R81.X The Network Security Developer Team is having an issue testing the API with a newly deployed R81.X Security Management Server Aaron wants to confirm API services are working properly. What should he do first?
Which of the completed statements is NOT true? The WebUI can be used to manage user accounts and:
Kurt is planning to upgrade his Security Management Server to R81.X. What is the lowest supported version of the Security Management he can upgrade from?
Is it possible to establish a VPN before the user login to the Endpoint Client?
Which statement is WRONG regarding the usage of the Central Deployment in SmartConsole?
You want to gather data and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?
Which command collects diagnostic data for analyzing a customer setup remotely?
The admin is connected via ssh lo the management server. He wants to run a mgmt_dl command but got a Error 404 message. To check the listening ports on the management he runs netstat with the results shown below. What can be the cause for the issue?
UserCheck objects in the Application Control and URL Filtering rules allow the gateway to communicate with the users. Which action is not supported in UserCheck objects?
What kind of information would you expect to see when using the "sim affinity -I" command?
SmartConsole R81 requires the following ports to be open for SmartEvent R81 management:
Which statements below are CORRECT regarding Threat Prevention profiles in Smart Dashboard?
Customer’s R81 management server needs to be upgraded to R81.20. What is the best upgrade method when the management server is not connected to the Internet?
SmartEvent has several components that function together to track security threats. What is the function of the Correlation Unit as a component of this architecture?
You are asked to check the status of several user-mode processes on the management server and gateway. Which of the following processes can only be seen on a Management Server?
You need to see which hotfixes are installed on your gateway, which command would you use?
Which configuration file contains the structure of the Security Server showing the port numbers, corresponding protocol name, and status?
An administrator would like to troubleshoot why templating is not working for some traffic. How can he determine at which rule templating is disabled?
Which command shows the current connections distributed by CoreXL FW instances?
Please choose correct command to add an “emailserver1” host with IP address 10.50.23.90 using GAiA management CLI?
What is the port used for SmartConsole to connect to the Security Management Server?
Using Threat Emulation technologies, what is the best way to block .exe and .bat file types?
SandBlast has several functional components that work together to ensure that attacks are prevented in real-time. Which the following is NOT part of the SandBlast component?
After making modifications to the $CVPNDIR/conf/cvpnd.C file, how would you restart the daemon?
To enable Dynamic Dispatch on Security Gateway without the Firewall Priority Queues, run the following command in Expert mode and reboot:
To accelerate the rate of connection establishment, SecureXL groups all connection that match a particular service and whose sole differentiating element is the source port. The type of grouping enables even the very first packets of a TCP handshake to be accelerated. The first packets of the first connection on the same service will be forwarded to the Firewall kernel which will then create a template of the connection. Which of the these is NOT a SecureXL template?
: 156
VPN Link Selection will perform the following when the primary VPN link goes down?
What is the name of the secure application for Mail/Calendar for mobile devices?
When setting up an externally managed log server, what is one item that will not be configured on the R81 Security Management Server?
As an administrator, you may be required to add the company logo to reports. To do this, you would save the logo as a PNG file with the name ‘cover-company-logo.png’ and then copy that image file to which directory on the SmartEvent server?
When simulating a problem on ClusterXL cluster with cphaprob –d STOP -s problem -t 0 register, to initiate a failover on an active cluster member, what command allows you remove the problematic state?
Can multiple administrators connect to a Security Management Server at the same time?
When Dynamic Dispatcher is enabled, connections are assigned dynamically with the exception of:
Which command can you use to verify the number of active concurrent connections?
You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?
With MTA (Mail Transfer Agent) enabled the gateways manages SMTP traffic and holds external email with potentially malicious attachments. What is required in order to enable MTA (Mail Transfer Agent) functionality in the Security Gateway?
You notice that your firewall is under a DDoS attack and would like to enable the Penalty Box feature, which command you use?
Pamela is Cyber Security Engineer working for Global Instance Firm with large scale deployment of Check Point Enterprise Appliances using GAiA/R81.20. Company’s Developer Team is having random access issue to newly deployed Application Server in DMZ’s Application Server Farm Tier and blames DMZ Security Gateway as root cause. The ticket has been created and issue is at Pamela’s desk for an investigation. Pamela decides to use Check Point’s Packet Analyzer Tool-fw monitor to iron out the issue during approved Maintenance window.
What do you recommend as the best suggestion for Pamela to make sure she successfully captures entire traffic in context of Firewall and problematic traffic?
NO: 219
What cloud-based SandBlast Mobile application is used to register new devices and users?
Which file gives you a list of all security servers in use, including port number?
Fill in the blank: The R81 SmartConsole, SmartEvent GUI client, and _______ consolidate billions of logs and shows then as prioritized security events.
Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?
When attempting to start a VPN tunnel, in the logs the error “no proposal chosen” is seen numerous times. No other VPN-related entries are present.
Which phase of the VPN negotiations has failed?
Check Point APIs allow system engineers and developers to make changes to their organization’s security policy with CLI tools and Web Services for all the following except:
Which command would you use to set the network interfaces’ affinity in Manual mode?
In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?
Which of the following is NOT a VPN routing option available in a star community?
SmartEvent provides a convenient way to run common command line executables that can assist in investigating events. Right-clicking the IP address, source or destination, in an event provides a list of default and customized commands. They appear only on cells that refer to IP addresses because the IP address of the active cell is used as the destination of the command when run. The default commands are:
What key is used to save the current CPView page in a filename format cpview_”cpview process ID”.cap”number of captures”?
When deploying SandBlast, how would a Threat Emulation appliance benefit from the integration of ThreatCloud?
In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies the type of traffic applicable to the chain module. For Stateful Mode configuration, chain modules marked with __________________ will not apply.
Tom has connected to the R81 Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored shortly afterward.
What will happen to the changes already made?
Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?
One of major features in R81 SmartConsole is concurrent administration.
Which of the following is NOT possible considering that AdminA, AdminB and AdminC are editing the same Security Policy?
Which of the following technologies extracts detailed information from packets and stores that information in state tables?
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.
What are the different command sources that allow you to communicate with the API server?