Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?
You want to store the GAiA configuration in a file for later reference. What command should you use?
After a new Log Server is added to the environment and the SIC trust has been established with the SMS what will the gateways do?
Which deployment adds a Security Gateway to an existing environment without changing IP routing?
Which option, when applied to a rule, allows traffic to VPN gateways in specific VPN communities?
Which option will match a connection regardless of its association with a VPN community?
Which part of SmartConsole allows administrators to add, edit delete, and clone objects?
Which method below is NOT one of the ways to communicate using the Management API’s?
In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?
You are the Check Point administrator for Alpha Corp. You received a call that one of the users is unable to browse the Internet on their new tablet which is connected to the company wireless, which goes through a Check Point Gateway. How would you review the logs to see what is blocking this traffic?
Gaia has two default user accounts that cannot be deleted. What are those user accounts?
Fill in the blank: By default, the SIC certificates issued by R80 Management Server are based on the ____________ algorithm.
Which one of the following is a way that the objects can be manipulated using the new API integration in R80 Management?
Which is a suitable command to check whether Drop Templates are activated or not?
Which configuration element determines which traffic should be encrypted into a VPN tunnel vs. sent in the clear?
Which of the following technologies extracts detailed information from packets and stores that information in state tables?
Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?
Fill in the blank: The_____is used to obtain identification and security information about network users.
John is the administrator of a R80 Security Management server managing r R77.30 Check Point Security Gateway. John is currently updating the network objects and amending the rules using SmartConsole. To make John’s changes available to other administrators, and to save the database before installing a policy, what must John do?
What is the BEST command to view configuration details of all interfaces in Gaia CLISH?
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ___________.
You had setup the VPN Community NPN-Stores' with 3 gateways. There are some issues with one remote gateway(l .1.1.1) and an your local gateway. What will be the best log filter to see only the IKE Phase 2 agreed networks for both gateways.
When you upload a package or license to the appropriate repository in SmartUpdate. where is the package or license stored?
The Network Operations Center administrator needs access to Check Point Security devices mostly for troubleshooting purposes. You do not want to give her access to the expert mode, but she still should be able to run tcpdump. How can you achieve this requirement?
Fill in the blank RADIUS Accounting gets_____data from requests generated by the accounting client
You want to set up a VPN tunnel to a external gateway. You had to make sure that the IKE P2 SA will only be established between two subnets and not all subnets defined in the default VPN domain of your gateway.
How is communication between different Check Point components secured in R80? As with all questions, select the best answer.
You have enabled "Extended Log" as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?
Which of the following is considered a "Subscription Blade", requiring renewal every 1-3 years?
In R80 Management, apart from using SmartConsole, objects or rules can also be modified using:
If there are two administrators logged in at the same time to the SmartConsole, and there are objects locked for editing, what must be done to make them available to other administrators? Choose the BEST answer
Traffic from source 192.168.1.1 is going to www.google.com. The Application Control Blade on the gateway is inspecting the traffic. Assuming acceleration is enable which path is handling the traffic?
Vanessa is attempting to log into the Gaia Web Portal. She is able to login successfully. Then she tries the same username and password for SmartConsole but gets the message in the screenshot image below. She has checked that the IP address of the Server is correct and the username and password she used to login into Gaia is also correct.
What is the most likely reason?
Fill in the blank: SmartConsole, SmartEvent GUI client, and ___________ allow viewing of billions of consolidated logs and shows them as prioritized security events.
Which application is used for the central management and deployment of licenses and packages?
When defining group-based access in an LDAP environment with Identity Awareness, what is the BEST object type to represent an LDAP group in a Security Policy?
The Online Activation method is available for Check Point manufactured appliances. How does the administrator use the Online Activation method?
To increase security, the administrator has modified the Core protection ‘Host Port Scan’ from ‘Medium’ to ‘High’ Predefined Sensitivity. Which Policy should the administrator install after Publishing the changes?
An administrator can use section titles to more easily navigate between large rule bases. Which of these statements is FALSE?
Which backup utility captures the most information and tends to create the largest archives?
In a Distributed deployment, the Security Gateway and the Security Management software are installed on what platforms?
What needs to be configured if the NAT property ‘Translate destination on client side’ is not enabled in Global properties?
Of all the Check Point components in your network, which one changes most often and should be backed up most frequently?
How do logs change when the "Accounting" tracking option is enabled on a traffic rule?
Which of the completed statements is NOT true? The WebUI can be used to manage Operating System user accounts and
You are going to perform a major upgrade. Which back up solution should you use to ensure your database can be restored on that device?
Which of the following is used to initially create trust between a Gateway and Security Management Server?
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?
What data MUST be supplied to the SmartConsole System Restore window to restore a backup?
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
Gaia includes Check Point Upgrade Service Engine (CPUSE), which can directly receive updates for what components?
Fill in the bank: In Office mode, a Security Gateway assigns a remote client to an IP address once___________.
SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day Protection?
Fill in the blank: When a policy package is installed, ________ are also distributed to the target installation Security Gateways.
Fill in the blank: To create policy for traffic to or from a particular location, use the _____________.
How many users can have read/write access in Gaia Operating System at one time?
Fill in the blank: The _____ feature allows administrators to share a policy with other policy packages.
When connected to the Check Point R80 Management Server using the SmartConsole the first administrator to connect has a lock on:
Identity Awareness allows easy configuration for network access and auditing based on what three items?
In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?
Access roles allow the firewall administrator to configure network access according to:
What is the most complete definition of the difference between the Install Policy button on the SmartConsole’s tab, and the Install Policy within a specific policy?
If an administrator wants to restrict access to a network resource only allowing certain users to access it, and only when they are on a specific network what is the best way to accomplish this?
Fill in the blank: It is Best Practice to have a _____ rule at the end of each policy layer.
Fill in the blank: Permanent VPN tunnels can be set on all tunnels in the community, on all tunnels for specific gateways, or__________.
When configuring Spoof Tracking, which tracking actions can an administrator select to be done when spoofed packets are detected?
True or False: The destination server for Security Gateway logs depends on a Security Management Server configuration.
Which tool allows for the automatic updating of the Gaia OS and Check Point products installed on the Gaia OS?
In Unified SmartConsole Gateways and Servers tab you can perform the following functions EXCEPT ________.
Which of the following blades is NOT subscription-based and therefore does not have to be renewed on a regular basis?