When you upload a package or license to the appropriate repository in SmartUpdate. where is the package or license stored?
To ensure that VMAC mode is enabled, which CLI command you should run on all cluster members? Choose the best answer.
You have enabled "Extended Log" as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?
Which type of Check Point license ties the package license to the IP address of the Security Management Server?
In the Check Point three-tiered architecture, which of the following is NOT a function of the Security Management Server?
Name the utility that is used to block activities that appear to be suspicious.
Your internal networks 10.1.1.0/24, 10.2.2.0/24 and 192.168.0.0/16 are behind the Internet Security Gateway. Considering that Layer 2 and Layer 3 setup is correct, what are the steps you will need to do in SmartConsole in order to get the connection working?
John is the administrator of a R80 Security Management server managing r R77.30 Check Point Security Gateway. John is currently updating the network objects and amending the rules using SmartConsole. To make John’s changes available to other administrators, and to save the database before installing a policy, what must John do?
Identity Awareness allows the Security Administrator to configure network access based on which of the following?
What are two basic rules Check Point recommending for building an effective security policy?
Fill in the blank: The position of an implied rule is manipulated in the __________________ window.
Fill in the bank: In Office mode, a Security Gateway assigns a remote client to an IP address once___________.
CPU-level of your Security gateway is peaking to 100% causing problems with traffic. You suspect that the problem might be the Threat Prevention settings.
The following Threat Prevention Profile has been created.
How could you tune the profile in order to lower the CPU load still maintaining security at good level? Select the BEST answer.
A security zone is a group of one or more network interfaces from different centrally managed gateways. What is considered part of the zone?
Fill in the blank: Each cluster, at a minimum, should have at least ___________ interfaces.
In R80 Management, apart from using SmartConsole, objects or rules can also be modified using:
For Automatic Hide NAT rules created by the administrator what is a TRUE statement?
With URL Filtering, what portion of the traffic is sent to the Check Point Online Web Service for analysis?
When a gateway requires user information for authentication, what order does it query servers for user information?
When configuring Anti-Spoofing, which tracking options can an Administrator select?
In which deployment is the security management server and Security Gateway installed on the same appliance?
How many users can have read/write access in Gaia Operating System at one time?
Which product correlates logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?
What object type would you use to grant network access to an LDAP user group?
Examine the sample Rule Base.
What will be the result of a verification of the policy from SmartConsole?
SmartEvent does NOT use which of the following procedures to identity events:
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ___________.
Fill in the blank: In order to install a license, it must first be added to the ____________.
What is required for a certificate-based VPN tunnel between two gateways with separate management systems?
Which option will match a connection regardless of its association with a VPN community?
What are the Threat Prevention software components available on the Check Point Security Gateway?
Which Threat Prevention Profile is not included by default in R80 Management?
The Online Activation method is available for Check Point manufactured appliances. How does the administrator use the Online Activation method?
If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsible, which of these steps should NOT be performed:
You have created a rule at the top of your Rule Base to permit Guest Wireless access to the Internet. However, when guest users attempt to reach the Internet, they are not seeing the splash page to accept your Terms of Service, and cannot access the Internet. How can you fix this?
Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?
Traffic from source 192.168.1.1 is going to www.google.com. The Application Control Blade on the gateway is inspecting the traffic. Assuming acceleration is enable which path is handling the traffic?
Which of the following situations would not require a new license to be generated and installed?
Which part of SmartConsole allows administrators to add, edit delete, and clone objects?
Fill in the blank: When LDAP is integrated with Check Point Security Management, it is then referred to as _______.
You are going to perform a major upgrade. Which back up solution should you use to ensure your database can be restored on that device?
After the initial installation on Check Point appliance, you notice that the Management interface and default gateway are incorrect. Which commands could you use to set the IP to 192.168.80.200/24 and default gateway to 192.168.80.1.
In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?
Which of the following commands is used to monitor cluster members in CLI?
Which type of Endpoint Identity Agent includes packet tagging and computer authentication?
In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?
What needs to be configured if the NAT property ‘Translate destination on client side’ is not enabled in Global properties?
Which of the completed statements is NOT true? The WebUI can be used to manage Operating System user accounts and
Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?
Identity Awareness allows easy configuration for network access and auditing based on what three items?
You want to set up a VPN tunnel to a external gateway. You had to make sure that the IKE P2 SA will only be established between two subnets and not all subnets defined in the default VPN domain of your gateway.
If an administrator wants to restrict access to a network resource only allowing certain users to access it, and only when they are on a specific network what is the best way to accomplish this?
Fill in the blank: When a policy package is installed, ________ are also distributed to the target installation Security Gateways.
Phase 1 of the two-phase negotiation process conducted by IKE operates in ______ mode.
Fill in the blank When LDAP is integrated with Check Point Security Management it is then referred to as_____
How is communication between different Check Point components secured in R80? As with all questions, select the best answer.
In Unified SmartConsole Gateways and Servers tab you can perform the following functions EXCEPT ________.
To provide updated malicious data signatures to all Threat Prevention blades, the Threat Prevention gateway does what with the data?
What is the main difference between Threat Extraction and Threat Emulation?
Which of the following is a new R80.10 Gateway feature that had not been available in R77.X and older?
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?
Which Check Point software blade provides Application Security and identity control?
Which of the following blades is NOT subscription-based and therefore does not have to be renewed on a regular basis?
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
Which option in tracking allows you to see the amount of data passed in the connection?
Fill in the blank: An identity server uses a ___________ for user authentication.
When defining group-based access in an LDAP environment with Identity Awareness, what is the BEST object type to represent an LDAP group in a Security Policy?
Why is a Central License the preferred and recommended method of licensing?
Which single Security Blade can be turned on to block both malicious files from being downloaded as well as block websites known to host malware?
The purpose of the Communication Initialization process is to establish a trust between the Security Management Server and the Check Point gateways. Which statement best describes this Secure Internal
Communication (SIC)?
When installing a dedicated R80 SmartEvent server, what is the recommended size of the root partition?
How do logs change when the "Accounting" tracking option is enabled on a traffic rule?
What licensing feature is used to verify licenses and activate new licenses added to the License and Contracts repository?