In order to see real-time and historical graph views of Security Gateway statistics in SmartView Monitor, what feature needs to be enabled on the Security Gateway?
Your internal networks 10.1.1.0/24, 10.2.2.0/24 and 192.168.0.0/16 are behind the Internet Security Gateway. Considering that Layer 2 and Layer 3 setup is correct, what are the steps you will need to do in SmartConsole in order to get the connection working?
Which of the following is considered to be the more secure and preferred VPN authentication method?
True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway
Which Check Point supported authentication scheme typically requires a user to possess a token?
Which configuration element determines which traffic should be encrypted into a VPN tunnel vs. sent in the clear?
Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.
When configuring Anti-Spoofing, which tracking options can an Administrator select?
Which of the following is NOT an authentication scheme used for accounts created through SmartConsole?
Which Check Point software blade provides Application Security and identity control?
To view the policy installation history for each gateway, which tool would an administrator use?
Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?
Which one of the following is a way that the objects can be manipulated using the new API integration in R80 Management?
Which Check Point software blade monitors Check Point devices and provides a picture of network and security performance?
Fill in the blank: An identity server uses a______________to trust a Terminal Server Identity Agent.
Which of the following is used to initially create trust between a Gateway and Security Management Server?
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?
Which option in a firewall rule would only match and allow traffic to VPN gateways for one Community in common?
A Check Point Software license consists of two components, the Software Blade and the Software Container. There are ______ types of Software Containers: ________.
When defining group-based access in an LDAP environment with Identity Awareness, what is the BEST object type to represent an LDAP group in a Security Policy?
When a Security Gateway communicates about its status to an IP address other than its own, which deployment option was chosen?
Which repositories are installed on the Security Management Server by SmartUpdate?
From the Gaia web interface, which of the following operations CANNOT be performed on a Security Management Server?
The purpose of the Communication Initialization process is to establish a trust between the Security Management Server and the Check Point gateways. Which statement best describes this Secure Internal
Communication (SIC)?
You want to verify if there are unsaved changes in GAiA that will be lost with a reboot. What command can be used?
Fill in the blank: The _____ feature allows administrators to share a policy with other policy packages.
The ______ software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware.
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?
When a Security Gateway sends its logs to an IP address other than its own, which deployment option is installed?
You have successfully backed up your Check Point configurations without the OS information. What command would you use to restore this backup?
Fill in the blank: Once a certificate is revoked from the Security GateWay by the Security Management Server, the certificate information is _______.
For Automatic Hide NAT rules created by the administrator what is a TRUE statement?
In R80 Management, apart from using SmartConsole, objects or rules can also be modified using:
Which of the following methods can be used to update the trusted log server regarding the policy and configuration changes performed on the Security Management Server?
Fill in the blank: By default, the SIC certificates issued by R80 Management Server are based on the ____________ algorithm.
What is the most complete definition of the difference between the Install Policy button on the SmartConsole’s tab, and the Install Policy within a specific policy?
Name the file that is an electronically signed file used by Check Point to translate the features in the license into a code?
In a Distributed deployment, the Security Gateway and the Security Management software are installed on what platforms?
You are the Check Point administrator for Alpha Corp with an R80 Check Point estate. You have received a call by one of the management users stating that they are unable to browse the Internet with their new tablet connected to the company Wireless. The Wireless system goes through the Check Point Gateway. How do you review the logs to see what the problem may be?
A security zone is a group of one or more network interfaces from different centrally managed gateways. What is considered part of the zone?
Fill in the bank: In Office mode, a Security Gateway assigns a remote client to an IP address once___________.
Which product correlates logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?
Which of the following blades is NOT subscription-based and therefore does not have to be renewed on a regular basis?
Phase 1 of the two-phase negotiation process conducted by IKE operates in ______ mode.
Which option will match a connection regardless of its association with a VPN community?
After the initial installation on Check Point appliance, you notice that the Management interface and default gateway are incorrect. Which commands could you use to set the IP to 192.168.80.200/24 and default gateway to 192.168.80.1.
Fill in the blank: In order to install a license, it must first be added to the ____________.
Which information is included in the “Extended Log” tracking option, but is not included in the “Log” tracking option?
Fill in the blank When LDAP is integrated with Check Point Security Management it is then referred to as_____
Traffic from source 192.168.1.1 is going to www.google.com. The Application Control Blade on the gateway is inspecting the traffic. Assuming acceleration is enable which path is handling the traffic?
In the Check Point three-tiered architecture, which of the following is NOT a function of the Security Management Server?
In Unified SmartConsole Gateways and Servers tab you can perform the following functions EXCEPT ________.
What are the three main components of Check Point security management architecture?
The “Hit count” feature allows tracking the number of connections that each rule matches. Will the Hit count feature work independently from logging and Track the hits even if the Track option is set to “None”?
Fill in the blank: Each cluster, at a minimum, should have at least ___________ interfaces.
The default shell of the Gaia CLI is cli.sh. How do you change from the cli.sh shell to the advanced shell to run Linux commands?
Which Security Blade needs to be enabled in order to sanitize and remove potentially malicious content from files, before those files enter the network?
CPU-level of your Security gateway is peaking to 100% causing problems with traffic. You suspect that the problem might be the Threat Prevention settings.
The following Threat Prevention Profile has been created.
How could you tune the profile in order to lower the CPU load still maintaining security at good level? Select the BEST answer.
What type of NAT is a one-to-one relationship where each host is translated to a unique address?
Which method below is NOT one of the ways to communicate using the Management API’s?
When configuring LDAP User Directory integration, Changes applied to a User Directory template are: