Which deployment adds a Security Gateway to an existing environment without changing IP routing?
What data MUST be supplied to the SmartConsole System Restore window to restore a backup?
When logging in for the first time to a Security management Server through SmartConsole, a fingerprint is saved to the:
When configuring Anti-Spoofing, which tracking options can an Administrator select?
In order to modify Security Policies, the administrator can use which of the following tools? (Choose the best answer.)
What is the most complete definition of the difference between the Install Policy button on the SmartConsole’s tab, and the Install Policy within a specific policy?
In SmartConsole, objects are used to represent physical and virtual network components and also some logical components. These objects are divided into several categories. Which of the following is NOT an objects category?
AdminA and AdminB are both logged in on SmartConsole What does it mean if AdmmB sees a lock icon on a rule? Choose the BEST answer.
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?
Fill in the blank: The position of an implied rule is manipulated in the __________________ window.
Which of the following situations would not require a new license to be generated and installed?
Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?
Fill in the blank: Permanent VPN tunnels can be set on all tunnels in the community, on all tunnels for specific gateways, or__________.
Which Check Point supported authentication scheme typically requires a user to possess a token?
An administrator can use section titles to more easily navigate between large rule bases. Which of these statements is FALSE?
Fill in the blanks: Default port numbers for an LDAP server is ______ for standard connections and _______ SSL connections.
Which of the following statements about Site-to-Site VPN Domain-based is NOT true?
Which is NOT an encryption algorithm that can be used in an IPSEC Security Association (Phase 2)?
Fill in the blanks: A Security Policy is created in_____, stored in the_____ and Distributed to the various
You have discovered suspicious activity in your network. What is the BEST immediate action to take?
What licensing feature is used to verify licenses and activate new licenses added to the License and Contracts repository?
You had setup the VPN Community NPN-Stores' with 3 gateways. There are some issues with one remote gateway(l .1.1.1) and an your local gateway. What will be the best log filter to see only the IKE Phase 2 agreed networks for both gateways.
What are valid authentication methods for mutual authenticating the VPN gateways?
A Check Point Software license consists of two components, the Software Blade and the Software Container. There are ______ types of Software Containers: ________.
One of major features in R80.x SmartConsole is concurrent administration. Which of the following is NOT possible considering that AdminA, AdminB, and AdminC are editing the same Security Policy?
In which scenario is it a valid option to transfer a license from one hardware device to another?
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ___________.
Which part of SmartConsole allows administrators to add, edit delete, and clone objects?
Which of the completed statements is NOT true? The WebUI can be used to manage Operating System user accounts and
If an administrator wants to restrict access to a network resource only allowing certain users to access it, and only when they are on a specific network what is the best way to accomplish this?
The competition between stateful inspection and proxies was based on performance, protocol support, and security. Considering stateful Inspections and Proxies, which statement is correct?
CPU-level of your Security gateway is peaking to 100% causing problems with traffic. You suspect that the problem might be the Threat Prevention settings.
The following Threat Prevention Profile has been created.
How could you tune the profile in order to lower the CPU load still maintaining security at good level? Select the BEST answer.
How do logs change when the "Accounting" tracking option is enabled on a traffic rule?
An administrator wishes to use Application objects in a rule in their policy but there are no Application objects listed as options to add when clicking the"+" to add new items to the "Services & Applications" column of a rule. What should be done to fix this?
Identity Awareness lets an administrator easily configure network access and auditing based on three items Choose the correct statement.
You have created a rule at the top of your Rule Base to permit Guest Wireless access to the Internet. However, when guest users attempt to reach the Internet, they are not seeing the splash page to accept your Terms of Service, and cannot access the Internet. How can you fix this?
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
Which of the following is NOT an authentication scheme used for accounts created through SmartConsole?
Which of the following is used to extract state related information from packets and store that information in state tables?
Fill in the blank: The_____is used to obtain identification and security information about network users.
Fill in the blank Once a license is activated, a___________should be installed.
In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?
You are asked to check the status of several user-mode processes on the management server and gateway. Which of the following processes can only be seen on a Management Server?
Most Check Point deployments use Gaia but which product deployment utilizes special Check Point code (with unification in R81.10)?
Fill in the blank: SmartConsole, SmartEvent GUI client, and ___________ allow viewing of billions of consolidated logs and shows them as prioritized security events.
Which of the following is an authentication method used for Identity Awareness?
Which backup utility captures the most information and tends to create the largest archives?
Phase 1 of the two-phase negotiation process conducted by IKE operates in ______ mode.
Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.
Bob and Joe both have Administrator Roles on their Gaia Platform. Bob logs in on the WebUI and then Joe logs in through CLI. Choose what BEST describes the following scenario, where Bob and Joe are both logged in:
True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway
Which Check Point Software Wade provides visibility of users, groups and machines while also providing access control through identity-based policies?
For Automatic Hide NAT rules created by the administrator what is a TRUE statement?
Identify the ports to which the Client Authentication daemon listens on by default?
Which of the following is NOT a valid application navigation tab in the R80 SmartConsole?
In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?
You have successfully backed up your Check Point configurations without the OS information. What command would you use to restore this backup?
Traffic from source 192.168.1.1 is going to www.google.com. The Application Control Blade on the gateway is inspecting the traffic. Assuming acceleration is enable which path is handling the traffic?
The Gateway Status view in SmartConsole shows the overall status of Security Gateways and Software Blades. What does the Status Attention mean?
Which one of the following is the preferred licensing model? Select the BEST answer
When comparing Stateful Inspection and Packet Filtering, what is a benefit that Stateful Inspection offers over Packer Filtering?
Please choose correct command syntax to add an “emailserver1” host with IP address 10.50.23.90 using GAiA management CLI?
Fill in the blank: It is Best Practice to have a _____ rule at the end of each policy layer.
Can multiple administrators connect to a Security Management Server at the same time?
When a Security Gateway sends its logs to an IP address other than its own, which deployment option is installed?
The Network Operations Center administrator needs access to Check Point Security devices mostly for troubleshooting purposes. You do not want to give her access to the expert mode, but she still should be able to run tcpdump. How can you achieve this requirement?
Which of the following is NOT supported by Bridge Mode Check Point Security Gateway
Which Identity Source(s) should be selected in Identity Awareness for when there is a requirement for a higher level of security for sensitive servers?
Which of the following Windows Security Events will NOT map a username to an IP address in Identity Awareness?
When configuring LDAP with User Directory integration, changes applied to a User Directory template are:
To provide updated malicious data signatures to all Threat Prevention blades, the Threat Prevention gateway does what with the data?