New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Checkpoint 156-215.77 Dumps Questions Answers

Page: 1 / 15
Total 388 questions

Check Point Certified Security Administrator Questions and Answers

Question 1

Peter is your new Security Administrator. On his first working day, he is very nervous and enters the wrong password three times. His account is locked.

What can be done to unlock Peter’s account? Give the BEST answer.

Options:

A.

You can unlock Peter’s account by using the command fwm lock_admin -u Peter on the Security Management Server.

B.

You can unlock Peter’s account by using the command fwm unlock_admin -u Peter on the Security Management Server

C.

It is not possible to unlock Peter’s account. You have to install the firewall once again or abstain from Peter’s help.

D.

You can unlock Peter’s account by using the command fwm unlock_admin -u Peter on the Security Gateway.

Buy Now
Question 2

Your R77 primary Security Management Server is installed on GAiA. You plan to schedule the Security Management Server to run fw logswitch automatically every 48 hours.

How do you create this schedule?

Options:

A.

On a GAiA Security Management Server, this can only be accomplished by configuring the command fw logswitch via the cron utility.

B.

Create a time object, and add 48 hours as the interval. Open the primary Security Management Server object’s Logs and Masters window, enable Schedule log switch, and select the Time object.

C.

Create a time object, and add 48 hours as the interval. Open the Security Gateway object's Logs and Masters window, enable Schedule log switch, and select the Time object.

D.

Create a time object, and add 48 hours as the interval. Select that time object’s Global Properties > Logs and Masters window, to schedule a logswitch.

Question 3

You are reviewing the Security Administrator activity for a bank and comparing it to the change log. How do you view Security Administrator activity?

Options:

A.

SmartView Tracker cannot display Security Administrator activity; instead, view the system logs on the Security Management Server’s Operating System.

B.

SmartView Tracker in Network and Endpoint Mode

C.

SmartView Tracker in Active Mode

D.

SmartView Tracker in Management Mode

Question 4

Many companies have defined more than one administrator. To increase security, only one administrator should be able to install a Rule Base on a specific Firewall.

How do you configure this?

Options:

A.

Define a permission profile in SmartDashboard with read/write privileges, but restrict it to all other firewalls by placing them in the Policy Targets field. Then, an administrator with this permission profile cannot install a policy on any Firewall not listed here.

B.

Put the one administrator in an Administrator group and configure this group in the specific Firewall object in Advanced > Permission to Install.

C.

In the object General Properties representing the specific Firewall, go to the Software Blades product list and select Firewall. Right-click in the menu, select Administrator to Install to define only this administrator.

D.

Right-click on the object representing the specific administrator, and select that Firewall in Policy Targets.

Question 5

Secure Internal Communications (SIC) is completely NAT-tolerant because it is based on:

Options:

A.

IP addresses.

B.

SIC is not NAT-tolerant.

C.

SIC names.

D.

MAC addresses.

Question 6

An internal host initiates a session to the Google.com website and is set for Hide NAT behind the Security Gateway. The initiating traffic is an example of __________.

Options:

A.

client side NAT

B.

source NAT

C.

destination NAT

D.

None of these

Question 7

You are working with three other Security Administrators.

Which SmartConsole component can be used to monitor changes to rules or object properties made by the other administrators?

Options:

A.

Eventia Tracker

B.

SmartView Monitor

C.

Eventia Monitor

D.

SmartView Tracker

Question 8

Because of pre-existing design constraints, you set up manual NAT rules for your HTTP server. However, your FTP server and SMTP server are both using automatic NAT rules. All traffic from your FTP and SMTP servers are passing through the Security Gateway without a problem, but traffic from the Web server is dropped on rule 0 because of anti-spoofing settings.

What is causing this?

Options:

A.

Manual NAT rules are not configured correctly.

B.

Allow bi-directional NAT is not checked in Global Properties.

C.

Routing is not configured correctly.

D.

Translate destination on client side is not checked in Global Properties under Manual NAT Rules.

Question 9

You have a diskless appliance platform. How do you keep swap file wear to a minimum?

Options:

A.

Issue FW-1 bases its package structure on the Security Management Server, dynamically loading when the firewall is booted.

B.

The external PCMCIA-based flash extension has the swap file mapped to it, allowing easy replacement.

C.

Use PRAM flash devices, eliminating the longevity.

D.

A RAM drive reduces the swap file thrashing which causes fast wear on the device.

Question 10

Static NAT connections, by default, translate on which firewall kernel inspection point?

Options:

A.

Inbound

B.

Outbound

C.

Post-inbound

D.

Eitherbound

Question 11

How do you view a Security Administrator's activities with SmartConsole?

Options:

A.

Eventia Suite

B.

SmartView Monitor using the Administrator Activity filter

C.

SmartView Tracker in the Management tab

D.

SmartView Tracker in the Network and Endpoint tabs

Question 12

When restoring R77 using the command upgrade_import, which of the following items are NOT restored?

Options:

A.

SIC Certificates

B.

Licenses

C.

Route tables

D.

Global properties

Question 13

Your bank’s distributed R77 installation has Security Gateways up for renewal.

Which SmartConsole application will tell you which Security Gateways have licenses that will expire within the next 30 days?

Options:

A.

SmartView Tracker

B.

SmartPortal

C.

SmartUpdate

D.

SmartDashboard

Question 14

Which feature or command provides the easiest path for Security Administrators to revert to earlier versions of the same Security Policy and objects configuration?

Options:

A.

Database Revision Control

B.

Policy Package management

C.

dbexport/dbimport

D.

upgrade_export/upgrade_import

Question 15

How can you configure an application to automatically launch on the Security Management Server when traffic is dropped or accepted by a rule in the Security Policy?

Options:

A.

SNMP trap alert script

B.

Custom scripts cannot be executed through alert scripts.

C.

User-defined alert script

D.

Pop-up alert script

Question 16

In which Rule Base can you implement an Access Role?

Options:

A.

DLP

B.

Mobile Access

C.

IPS

D.

Firewall

Question 17

What is the purpose of a Stealth Rule?

Options:

A.

To prevent users from connecting directly to the gateway.

B.

To permit management traffic.

C.

To drop all traffic to the management server that is not explicitly permitted.

D.

To permit implied rules.

Question 18

If a Security Gateway enforces three protections, LDAP Injection, Malicious Code Protector, and Header Rejection, which Check Point license is required in SmartUpdate?

Options:

A.

IPS

B.

SSL: VPN

C.

SmartEvent Intro

D.

Data Loss Prevention

Question 19

ALL of the following options are provided by the GAiA sysconfig utility, EXCEPT:

Options:

A.

Export setup

B.

DHCP Server configuration

C.

Time & Date

D.

GUI Clients

Question 20

In a distributed management environment, the administrator has removed all default check boxes from the Policy > Global Properties > Firewall tab. In order for the Security Gateway to send logs to the Security Management Server, an explicit rule must be created to allow the Security Gateway to communicate to the Security Management Server on port ______.

Options:

A.

259

B.

900

C.

256

D.

257

Question 21

What is the syntax for uninstalling a package using newpkg?

Options:

A.

-u

B.

-i

C.

-S

D.

newpkg CANNOT be used to uninstall a package

Question 22

An advantage of using central instead of local licensing is:

Options:

A.

A license can be taken from one Security Management Server and given to another Security Management Server.

B.

Only one IP address is used for all licenses.

C.

The license must be renewed when changing the IP address of a Security Gateway. Each module’s license has a unique IP address.

D.

Licenses are automatically attached to their respective Security Gateways.

Question 23

What mechanism does a gateway configured with Identity Awareness and LDAP initially use to communicate with a Windows 2003 or 2008 server?

Options:

A.

WMI

B.

CIFS

C.

RCP

D.

LDAP

Question 24

Which command gives an overview of your installed licenses?

Options:

A.

cplicense

B.

showlic

C.

fw lic print

D.

cplic print

Question 25

MegaCorp’s security infrastructure separates Security Gateways geographically. You must request a central license for one remote Security Gateway.

How do you apply the license?

Options:

A.

Using the remote Gateway’s IP address, and attaching the license to the remote Gateway via SmartUpdate.

B.

Using your Security Management Server's IP address, and attaching the license to the remote Gateway via SmartUpdate.

C.

Using the remote Gateway's IP address, and applying the license locally with the command cplic put.

D.

Using each of the Gateways’ IP addresses, and applying the licenses on the Security Management Server with the command.

Question 26

How can you most quickly reset Secure Internal Communications (SIC) between a Security Management Server and Security Gateway?

Options:

A.

From cpconfig on the Gateway, choose the Secure Internal Communication option and retype the activation key. Next, retype the same key in the Gateway object in SmartDashboard and reinitialize Secure Internal Communications (SIC).

B.

Use SmartUpdate to retype the Security Gateway activation key. This will automatically sync SIC to both the Security Management Server and Gateway.

C.

From the Security Management Server’s command line, type fw putkey -p .

D.

Run the command fwm sic_reset to reinitialize the Security Management Server Internal Certificate Authority (ICA). Then retype the activation key on the Security Gateway from SmartDashboard.

Question 27

Which of the following options is available with the GAiA cpconfig utility on a Management Server?

Options:

A.

Export setup

B.

DHCP Server configuration

C.

GUI Clients

D.

Time & Date

Question 28

Which of the following authentication methods can be configured in the Identity Awareness setup wizard?

Options:

A.

TACACS

B.

Captive Portal

C.

Check Point Password

D.

Windows password

Question 29

Suppose the Security Gateway hard drive fails and you are forced to rebuild it. You have a snapshot file stored to a TFTP server and backups of your Security Management Server.

What is the correct procedure for rebuilding the Gateway quickly?

Options:

A.

Reinstall the base operating system (i.e., GAiA). Configure the Gateway interface so that the Gateway can communicate with the TFTP server. Revert to the stored snapshot image, and install the Security Policy.

B.

Run the command revert to restore the snapshot, establish SIC, and install the Policy.

C.

Run the command revert to restore the snapshot. Reinstall any necessary Check Point products. Establish SIC and install the Policy.

D.

Reinstall the base operating system (i.e., GAia). Configure the Gateway interface so that the Gateway can communicate with the TFTP server. Reinstall any necessary Check Point products and previously applied hotfixes. Revert to the stored snapshot image, and install the Policy.

Question 30

How can you check whether IP forwarding is enabled on an IP Security Appliance?

Options:

A.

clish -c show routing active enable

B.

cat /proc/sys/net/ipv4/ip_forward

C.

echo 1 > /proc/sys/net/ipv4/ip_forward

D.

ipsofwd list

Question 31

Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use her iPad to access the internal Finance Web server. Because the iPad is not a member of the Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter her AD credentials in the Captive Portal and then get the same access as on her office computer. Her access to resources is based on rules in the R77 Firewall Rule Base.

To make this scenario work, the IT administrator must:

1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity Sources.

2) In the Portal Settings window in the User Access section, make sure that Name and password login is selected.

3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network destinations. Select accept as the Action.

Ms. McHanry tries to access the resource but is unable. What should she do?

Options:

A.

Have the security administrator select the Action field of the Firewall Rule “Redirect HTTP connections to an authentication (captive) portal?

B.

Have the security administrator reboot the firewall

C.

Have the security administrator select Any for the Machines tab in the appropriate Access Role

D.

Install the Identity Awareness agent on her iPad

Question 32

Exhibit:

You installed Security Management Server on a computer using GAiA in the MegaCorp home office. You use IP address 10.1.1.1. You also installed the Security Gateway on a second GAiA computer, which you plan to ship to another Administrator at a MegaCorp hub office.

What is the correct order for pushing SIC certificates to the Gateway before shipping it?

Options:

A.

2, 3, 4, 1, 5

B.

2, 1, 3, 4, 5

C.

1, 3, 2, 4, 5

D.

2, 3, 4, 5, 1

Question 33

Which type of R77 Security Server does not provide User Authentication?

Options:

A.

SMTP Security Server

B.

HTTP Security Server

C.

FTP Security Server

D.

HTTPS Security Server

Question 34

You run cpconfig to reset SIC on the Security Gateway. After the SIC reset operation is complete, the policy that will be installed is the:

Options:

A.

Standard policy.

B.

Initial policy.

C.

Last policy that was installed.

D.

Default filter.

Question 35

The Captive Portal tool:

Options:

A.

Acquires identities from unidentified users.

B.

Is only used for guest user authentication.

C.

Allows access to users already identified.

D.

Is deployed from the Identity Awareness page in the Global Properties settings.

Question 36

Anti-Spoofing is typically set up on which object type?

Options:

A.

Security Gateway

B.

Host

C.

Security Management object

D.

Network

Question 37

Which of the following actions take place in IKE Phase 2 with Perfect Forward Secrecy disabled?

Options:

A.

Symmetric IPsec keys are generated.

B.

Each Security Gateway generates a private Diffie-Hellman (DH) key from random pools.

C.

The DH public keys are exchanged.

D.

Peers authenticate using certificates or preshared secrets.

Question 38

How many packets does the IKE exchange use for Phase 1 Main Mode?

Options:

A.

12

B.

1

C.

3

D.

6

Question 39

Which of the following is a viable consideration when determining Rule Base order?

Options:

A.

Grouping IPS rules with dynamic drop rules

B.

Placing more restrictive rules before more permissive rules

C.

Grouping authentication rules with QOS rules

D.

Grouping reject and drop rules after the Cleanup Rule

Question 40

Certificates for Security Gateways are created during a simple initialization from _____________.

Options:

A.

sysconfig

B.

The ICA management tool

C.

SmartUpdate

D.

SmartDashboard

Question 41

Which of the following allows administrators to allow or deny traffic to or from a specific network based on the user’s credentials?

Options:

A.

Access Policy

B.

Access Role

C.

Access Rule

D.

Access Certificate

Question 42

If you were NOT using IKE aggressive mode for your IPsec tunnel, how many packets would you see for normal Phase 1 exchange?

Options:

A.

9

B.

2

C.

3

D.

6

Question 43

Which statement below describes the most correct strategy for implementing a Rule Base?

Options:

A.

Limit grouping to rules regarding specific access.

B.

Place the most frequently used rules at the top of the Policy and the ones that are not frequently used further down.

C.

Place a network-traffic rule above the administrator access rule.

D.

Add the Stealth Rule before the last rule.

Question 44

You have a mesh VPN Community configured to create a site-to-site VPN. Given the displayed VPN properties, what can you conclude about this community?

Exhibit:

Options:

A.

The VPN Community will perform IKE Phase 1 key-exchange encryption using the longest key Security Gateway R77 supports.

B.

Changing the setting Perform key exchange encryption with from AES-256 to 3DES will enhance the VPN Community's security , and reduce encryption overhead.

C.

Change the data-integrity setting for this VPN Community because MD5 is incompatible with AES.

D.

Changing the setting Perform IPsec data encryption with from AES-128 to 3Des will increase the encryption overhead.

Question 45

As a Security Administrator, you must refresh the Client Authentication authorization time-out every time a new user connection is authorized. How do you do this? Enable the Refreshable Timeout setting:

Options:

A.

in the user object's Authentication screen.

B.

in the Gateway object's Authentication screen.

C.

in the Limit tab of the Client Authentication Action Properties screen.

D.

in the Global Properties Authentication screen.

Question 46

Can a Check Point gateway translate both source IP address and destination IP address in a given packet?

Options:

A.

Yes.

B.

No.

C.

Yes, but only when using Automatic NAT.

D.

Yes, but only when using Manual NAT.

Question 47

______________ is an R77 component that displays the number of packets accepted, rejected, and dropped on a specific Security Gateway, in real time.

Options:

A.

SmartEvent

B.

SmartView Status

C.

SmartUpdate

D.

SmartView Monitor

Question 48

Choose the SmartLog property that is TRUE.

Options:

A.

SmartLog has been an option since release R71.10.

B.

SmartLog is not a Check Point product.

C.

SmartLog and SmartView Tracker are mutually exclusive.

D.

SmartLog is a client of SmartConsole that enables enterprises to centrally track log records and security activity with Google-like search.

Question 49

You find a suspicious connection from a problematic host. You decide that you want to block everything from that whole network, not just the problematic host. You want to block this for an hour while you investigate further, but you do not want to add any rules to the Rule Base.

How do you achieve this?

Options:

A.

Use dbedit to script the addition of a rule directly into the Rule Bases_5_0.fws configuration file.

B.

Select Block intruder from the Tools menu in SmartView Tracker.

C.

Create a Suspicious Activity Rule in SmartView Monitor.

D.

Add a temporary rule using SmartDashboard and select hide rule.

Question 50

How can you activate the SNMP daemon on a Check Point Security Management Server?

Options:

A.

Using the command line, enter snmp_install.

B.

From cpconfig, select SNMP extension.

C.

Any of these options will work.

D.

In SmartDashboard, right-click a Check Point object and select Activate SNMP.

Question 51

In the Rule Base displayed for fwsingapore, user authentication in Rule 4 is configured as fully automatic. Eric is a member of the LDAP group, MSD_Group.

What happens when Eric tries to connect to a server on the Internet?

Options:

A.

None of these things will happen.

B.

Eric will be authenticated and get access to the requested server.

C.

Eric will be blocked because LDAP is not allowed in the Rule Base.

D.

Eric will be dropped by the Stealth Rule.

Question 52

Which R77 SmartConsole tool would you use to verify the installed Security Policy name on a Security Gateway?

Options:

A.

SmartView Monitor

B.

SmartUpdate

C.

SmartView Status

D.

None, SmartConsole applications only communicate with the Security Management Server.

Question 53

You find a suspicious FTP site trying to connect to one of your internal hosts. How do you block it in real time and verify it is successfully blocked? Highlight the suspicious connection in SmartView Tracker:

Options:

A.

Log mode. Block it using Tools > Block Intruder menu. Observe in the Log mode that the suspicious connection does not appear again in this SmartView Tracker view.

B.

Log mode. Block it using Tools > Block Intruder menu. Observe in the Log mode that the suspicious connection is listed in this SmartView Tracker view as “dropped.”

C.

Active mode. Block it using Tools > Block Intruder menu. Observe in the Active mode that the suspicious connection does not appear again in this SmartView Tracker view.

D.

Active mode. Block it using Tools > Block Intruder menu. Observe in the Active mode that the suspicious connection is listed in this SmartView Tracker view as “dropped.”

Question 54

What is one potential downside or drawback to choosing the Standalone deployment option instead of the Distributed deployment option?

Options:

A.

Degrades performance as the Security Policy grows in size.

B.

Requires additional Check Point Appliances

C.

Requires additional software subscription

D.

Increases cost

Question 55

Which of the following are available SmartConsole clients which can be installed from the R77 Windows CD? Read all answers and select the most complete and valid list.

Options:

A.

SmartView Tracker, SmartDashboard, CPINFO, SmartUpdate, SmartView Status

B.

SmartView Tracker, SmartDashboard, SmartLSM, SmartView Monitor

C.

SmartView Tracker, CPINFO, SmartUpdate

D.

Security Policy Editor, Log Viewer, Real Time Monitor GUI

Question 56

What action can be performed from SmartUpdate R77?

Options:

A.

upgrade_export

B.

fw stat -l

C.

cpinfo

D.

remote_uninstall_verifier

Question 57

Jack has been asked do enable Identify Awareness.

What are the three methods for Acquiring Identify available in the Identify Awareness Configuration Wizard?

Options:

A.

LDAP Query, Terminal Servers, Light-weight Identity Agent

B.

AD Query, Browser-Based Authentication, Light-Weight Identity Agent

C.

AD Query, Browser-Based Authentication, Terminal Servers

D.

LDAP Query, Browser-Based Authentication, Terminal Servers

Question 58

Lilly needs to review VPN History counters for the last week.

Where would she do this?

Options:

A.

SmartView Monitor > Tunnels > VPN History

B.

SmartView Monitor > System Counters > VPN History

C.

SmartView Monitor > System Counters > Firewall Security History

D.

SmartView Monitor > System Counters > VPN

Page: 1 / 15
Total 388 questions