Peter is your new Security Administrator. On his first working day, he is very nervous and enters the wrong password three times. His account is locked.
What can be done to unlock Peter’s account? Give the BEST answer.
Your R77 primary Security Management Server is installed on GAiA. You plan to schedule the Security Management Server to run fw logswitch automatically every 48 hours.
How do you create this schedule?
You are reviewing the Security Administrator activity for a bank and comparing it to the change log. How do you view Security Administrator activity?
Many companies have defined more than one administrator. To increase security, only one administrator should be able to install a Rule Base on a specific Firewall.
How do you configure this?
Secure Internal Communications (SIC) is completely NAT-tolerant because it is based on:
An internal host initiates a session to the Google.com website and is set for Hide NAT behind the Security Gateway. The initiating traffic is an example of __________.
You are working with three other Security Administrators.
Which SmartConsole component can be used to monitor changes to rules or object properties made by the other administrators?
Because of pre-existing design constraints, you set up manual NAT rules for your HTTP server. However, your FTP server and SMTP server are both using automatic NAT rules. All traffic from your FTP and SMTP servers are passing through the Security Gateway without a problem, but traffic from the Web server is dropped on rule 0 because of anti-spoofing settings.
What is causing this?
You have a diskless appliance platform. How do you keep swap file wear to a minimum?
Static NAT connections, by default, translate on which firewall kernel inspection point?
How do you view a Security Administrator's activities with SmartConsole?
When restoring R77 using the command upgrade_import, which of the following items are NOT restored?
Your bank’s distributed R77 installation has Security Gateways up for renewal.
Which SmartConsole application will tell you which Security Gateways have licenses that will expire within the next 30 days?
Which feature or command provides the easiest path for Security Administrators to revert to earlier versions of the same Security Policy and objects configuration?
How can you configure an application to automatically launch on the Security Management Server when traffic is dropped or accepted by a rule in the Security Policy?
In which Rule Base can you implement an Access Role?
What is the purpose of a Stealth Rule?
If a Security Gateway enforces three protections, LDAP Injection, Malicious Code Protector, and Header Rejection, which Check Point license is required in SmartUpdate?
ALL of the following options are provided by the GAiA sysconfig utility, EXCEPT:
In a distributed management environment, the administrator has removed all default check boxes from the Policy > Global Properties > Firewall tab. In order for the Security Gateway to send logs to the Security Management Server, an explicit rule must be created to allow the Security Gateway to communicate to the Security Management Server on port ______.
What is the syntax for uninstalling a package using newpkg?
An advantage of using central instead of local licensing is:
What mechanism does a gateway configured with Identity Awareness and LDAP initially use to communicate with a Windows 2003 or 2008 server?
Which command gives an overview of your installed licenses?
MegaCorp’s security infrastructure separates Security Gateways geographically. You must request a central license for one remote Security Gateway.
How do you apply the license?
How can you most quickly reset Secure Internal Communications (SIC) between a Security Management Server and Security Gateway?
Which of the following options is available with the GAiA cpconfig utility on a Management Server?
Which of the following authentication methods can be configured in the Identity Awareness setup wizard?
Suppose the Security Gateway hard drive fails and you are forced to rebuild it. You have a snapshot file stored to a TFTP server and backups of your Security Management Server.
What is the correct procedure for rebuilding the Gateway quickly?
How can you check whether IP forwarding is enabled on an IP Security Appliance?
Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use her iPad to access the internal Finance Web server. Because the iPad is not a member of the Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter her AD credentials in the Captive Portal and then get the same access as on her office computer. Her access to resources is based on rules in the R77 Firewall Rule Base.
To make this scenario work, the IT administrator must:
1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity Sources.
2) In the Portal Settings window in the User Access section, make sure that Name and password login is selected.
3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network destinations. Select accept as the Action.
Ms. McHanry tries to access the resource but is unable. What should she do?
Exhibit:
You installed Security Management Server on a computer using GAiA in the MegaCorp home office. You use IP address 10.1.1.1. You also installed the Security Gateway on a second GAiA computer, which you plan to ship to another Administrator at a MegaCorp hub office.
What is the correct order for pushing SIC certificates to the Gateway before shipping it?
Which type of R77 Security Server does not provide User Authentication?
You run cpconfig to reset SIC on the Security Gateway. After the SIC reset operation is complete, the policy that will be installed is the:
The Captive Portal tool:
Anti-Spoofing is typically set up on which object type?
Which of the following actions take place in IKE Phase 2 with Perfect Forward Secrecy disabled?
How many packets does the IKE exchange use for Phase 1 Main Mode?
Which of the following is a viable consideration when determining Rule Base order?
Certificates for Security Gateways are created during a simple initialization from _____________.
Which of the following allows administrators to allow or deny traffic to or from a specific network based on the user’s credentials?
If you were NOT using IKE aggressive mode for your IPsec tunnel, how many packets would you see for normal Phase 1 exchange?
Which statement below describes the most correct strategy for implementing a Rule Base?
You have a mesh VPN Community configured to create a site-to-site VPN. Given the displayed VPN properties, what can you conclude about this community?
Exhibit:
As a Security Administrator, you must refresh the Client Authentication authorization time-out every time a new user connection is authorized. How do you do this? Enable the Refreshable Timeout setting:
Can a Check Point gateway translate both source IP address and destination IP address in a given packet?
______________ is an R77 component that displays the number of packets accepted, rejected, and dropped on a specific Security Gateway, in real time.
Choose the SmartLog property that is TRUE.
You find a suspicious connection from a problematic host. You decide that you want to block everything from that whole network, not just the problematic host. You want to block this for an hour while you investigate further, but you do not want to add any rules to the Rule Base.
How do you achieve this?
How can you activate the SNMP daemon on a Check Point Security Management Server?
In the Rule Base displayed for fwsingapore, user authentication in Rule 4 is configured as fully automatic. Eric is a member of the LDAP group, MSD_Group.
What happens when Eric tries to connect to a server on the Internet?
Which R77 SmartConsole tool would you use to verify the installed Security Policy name on a Security Gateway?
You find a suspicious FTP site trying to connect to one of your internal hosts. How do you block it in real time and verify it is successfully blocked? Highlight the suspicious connection in SmartView Tracker:
What is one potential downside or drawback to choosing the Standalone deployment option instead of the Distributed deployment option?
Which of the following are available SmartConsole clients which can be installed from the R77 Windows CD? Read all answers and select the most complete and valid list.
What action can be performed from SmartUpdate R77?
Jack has been asked do enable Identify Awareness.
What are the three methods for Acquiring Identify available in the Identify Awareness Configuration Wizard?
Lilly needs to review VPN History counters for the last week.
Where would she do this?