Most Check Point deployments use Gaia but which product deployment utilizes special Check Point code (with unification in R81.10)?
The default shell of the Gaia CLI is cli.sh. How do you change from the cli.sh shell to the advanced shell to run Linux commands?
Which of the following is NOT a role of the SmartCenter:
Which method below is NOT one of the ways to communicate using the Management API’s?
Which information is included in the “Extended Log” tracking option, but is not included in the “Log” tracking option?
Security Gateway software blades must be attached to what?
What is the SOLR database for?
Which command shows the installed licenses in Expert mode?
The purpose of the Communication Initialization process is to establish a trust between the Security Management Server and the Check Point gateways. Which statement best describes this Secure Internal
Communication (SIC)?
From the Gaia web interface, which of the following operations CANNOT be performed on a Security Management Server?
What command would show the API server status?
Which part of SmartConsole allows administrators to add, edit delete, and clone objects?
What data MUST be supplied to the SmartConsole System Restore window to restore a backup?
Fill in the blank: SmartConsole, SmartEvent GUI client, and ___________ allow viewing of billions of consolidated logs and shows them as prioritized security events.
What is the purpose of a Stealth Rule?
Fill in the blanks: In _____ NAT, Only the ________ is translated.
Which option, when applied to a rule, allows traffic to VPN gateways in specific VPN communities?
Choose what BEST describes the reason why querying logs now are very fast.
From SecureXL perspective, what are the tree paths of traffic flow:
Which command shows the installed licenses?
An administrator wishes to enable Identity Awareness on the Check Point firewalls. However they allow users to use company issued or personal laptops. Since the administrator cannot manage the personal laptops, which of the following methods would BEST suit this company?
Where can alerts be viewed?
DLP and Geo Policy are examples of what type of Policy?
When logging in for the first time to a Security management Server through SmartConsole, a fingerprint is saved to the:
Which one of the following is TRUE?
Which software blade enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine?
Choose what BEST describes users on Gaia Platform.
What is the purpose of Captive Portal?
Which tool allows you to monitor the top bandwidth on smart console?
What is the order of NAT priorities?
The ______ software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware.
True or False: In R80, more than one administrator can login to the Security Management Server with write permission at the same time.
The Network Operations Center administrator needs access to Check Point Security devices mostly for troubleshooting purposes. You do not want to give her access to the expert mode, but she still should be able to run tcpdump. How can you achieve this requirement?
What is required for a certificate-based VPN tunnel between two gateways with separate management systems?
What is the purpose of a Clean-up Rule?
From SecureXL perspective, what are the tree paths of traffic flow:
Fill in the blank: An identity server uses a ___________ for user authentication.
Which of the following describes how Threat Extraction functions?
Which type of attack can a firewall NOT prevent?
Which firewall daemon is responsible for the FW CLI commands?
To view the policy installation history for each gateway, which tool would an administrator use?
Which configuration element determines which traffic should be encrypted into a VPN tunnel vs. sent in the clear?
Traffic from source 192.168.1.1 is going to The Application Control Blade on the gateway is inspecting the traffic. Assuming acceleration is enable which path is handling the traffic?
In which deployment is the security management server and Security Gateway installed on the same appliance?
Which message indicates IKE Phase 2 has completed successfully?
Which software blade does NOT accompany the Threat Prevention policy?
Which of the following is a valid deployment option?
R80.10 management server can manage gateways with which versions installed?
When defining group-based access in an LDAP environment with Identity Awareness, what is the BEST object type to represent an LDAP group in a Security Policy?
: 370
What technologies are used to deny or permit network traffic?
Which of the following methods can be used to update the trusted log server regarding the policy and configuration changes performed on the Security Management Server?
What is the difference between SSL VPN and IPSec VPN?
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
When installing a dedicated R80 SmartEvent server, what is the recommended size of the root partition?
Which of the following Windows Security Events will NOT map a username to an IP address in Identity Awareness?
John is using Management HA. Which Smartcenter should be connected to for making changes?
Which of the completed statements is NOT true? The WebUI can be used to manage Operating System user accounts and
What is true about the IPS-Blade?
Please choose correct command syntax to add an “emailserver1” host with IP address 10.50.23.90 using GAiA management CLI?
Which single Security Blade can be turned on to block both malicious files from being downloaded as well as block websites known to host malware?
Which policy type is used to enforce bandwidth and traffic control rules?
A layer can support different combinations of blades What are the supported blades:
When a gateway requires user information for authentication, what order does it query servers for user information?
What type of NAT is a one-to-one relationship where each host is translated to a unique address?
Fill in the blank: To create policy for traffic to or from a particular location, use the _____________.
Name one limitation of using Security Zones in the network?
After a new Log Server is added to the environment and the SIC trust has been established with the SMS what will the gateways do?
What is NOT an advantage of Stateful Inspection?
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
You are the Check Point administrator for Alpha Corp. You received a call that one of the users is unable to browse the Internet on their new tablet which is connected to the company wireless, which goes through a Check Point Gateway. How would you review the logs to see what is blocking this traffic?
To view statistics on detected threats, which Threat Tool would an administrator use?
Fill in the blank: An LDAP server holds one or more ______________.
SmartConsole provides a consolidated solution for everything that is necessary for the security of an organization, such as the following
Which tool allows for the automatic updating of the Gaia OS and Check Point products installed on the Gaia OS?
Which of the following is NOT a component of Check Point Capsule?
Fill in the blank: It is Best Practice to have a _____ rule at the end of each policy layer.
Your internal networks 10.1.1.0/24, 10.2.2.0/24 and 192.168.0.0/16 are behind the Internet Security Gateway. Considering that Layer 2 and Layer 3 setup is correct, what are the steps you will need to do in SmartConsole in order to get the connection working?
Both major kinds of NAT support Hide and Static NAT. However, one offers more flexibility. Which statement is true?
What are the software components used by Autonomous Threat Prevention Profiles in R8I.20 and higher?
Core Protections are installed as part of what Policy?
Identity Awareness lets an administrator easily configure network access and auditing based on three items Choose the correct statement.
True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway
You have discovered suspicious activity in your network. What is the BEST immediate action to take?
Which of the following cannot be configured in an Access Role Object?
What is the Transport layer of the TCP/IP model responsible for?
When a Security Gateways sends its logs to an IP address other than its own, which deployment option is installed?
One of major features in R80.x SmartConsole is concurrent administration. Which of the following is NOT possible considering that AdminA, AdminB, and AdminC are editing the same Security Policy?
Which backup utility captures the most information and tends to create the largest archives?
Choose what BEST describes the reason why querying logs now is very fast.
In order to modify Security Policies, the administrator can use which of the following tools? (Choose the best answer.)
Which encryption algorithm is the least secured?
Which of the following is NOT a type of Endpoint Identity Agent?
In which scenario is it a valid option to transfer a license from one hardware device to another?
To ensure that VMAC mode is enabled, which CLI command you should run on all cluster members? Choose the best answer.
What kind of NAT enables Source Port Address Translation by default?
You had setup the VPN Community NPN-Stores' with 3 gateways. There are some issues with one remote gateway(l .1.1.1) and an your local gateway. What will be the best log filter to see only the IKE Phase 2 agreed networks for both gateways.
When enabling tracking on a rule, what is the default option?
URL Filtering cannot be used to:
Which of the following is considered to be the more secure and preferred VPN authentication method?
What is the purpose of the Stealth Rule?
Session unique identifiers are passed to the web api using which http header option?
You are the Check Point administrator for Alpha Corp with an R80 Check Point estate. You have received a call by one of the management users stating that they are unable to browse the Internet with their new tablet connected to the company Wireless. The Wireless system goes through the Check Point Gateway. How do you review the logs to see what the problem may be?
In which scenario will an administrator need to manually define Proxy ARP?
Fill in the blank: In order to install a license, it must first be added to the ____________.
What are the three types of UserCheck messages?
Which of the following commands is used to monitor cluster members?
Administrator Dave logs into R80 Management Server to review and makes some rule changes. He notices that there is a padlock sign next to the DNS rule in the Rule Base.
What is the possible explanation for this?
Name the pre-defined Roles included in Gaia OS.
An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office. Both offices are protected by Check Point Security Gateway managed by the same Security Management Server (SMS). While configuring the VPN community to specify the pre-shared secret, the administrator did not find a box to input the pre-shared secret. Why does it not allow him to specify the pre-shared secret?
Gaia has two default user accounts that cannot be deleted. What are those user accounts?
Please choose correct command syntax to add an “emailserver1” host with IP address 10.50.23.90 using GAiA management CLI?
For Automatic Hide NAT rules created by the administrator what is a TRUE statement?
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ___________.
A Check Point Software license consists of two components, the Software Blade and the Software Container. There are ______ types of Software Containers: ________.
What licensing feature is used to verify licenses and activate new licenses added to the License and Contracts repository?
The competition between stateful inspection and proxies was based on performance, protocol support, and security. Considering stateful Inspections and Proxies, which statement is correct?
When configuring LDAP User Directory integration, Changes applied to a User Directory template are: