You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.
Which of the following technologies extracts detailed information from packets and stores that information in state tables?
When attempting to start a VPN tunnel, in the logs the error “no proposal chosen” is seen numerous times. No other VPN-related entries are present.
Which phase of the VPN negotiations has failed?
Office mode means that:
Which packet info is ignored with Session Rate Acceleration?
Aaron is a Syber Security Engineer working for Global Law Firm with large scale deployment of Check Point Enterprise Appliances running GAiA R80.X The Network Security Developer Team is having an issue testing the API with a newly deployed R80.X Security Management Server Aaron wants to confirm API services are working properly. What should he do first?
What information is NOT collected from a Security Gateway in a Cpinfo?
Which command will allow you to see the interface status?
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?
What are the blades of Threat Prevention?
Automatic affinity means that if SecureXL is running, the affinity for each interface is automatically reset every
Which VPN routing option uses VPN routing for every connection a satellite gateway handles?
Where you can see and search records of action done by R80 SmartConsole administrators?
Fill in the blank: The command ___________________ provides the most complete restoration of a R80 configuration.
The system administrator of a company is trying to find out why acceleration is not working for the traffic. The traffic is allowed according to the rule base and checked for viruses. But it is not accelerated.
What is the most likely reason that the traffic is not accelerated?
Which GUI client is supported in R80?
You are the administrator for ABC Corp. You have logged into your R80 Management server. You are making some changes in the Rule Base and notice that rule No.6 has a pencil icon next to it.
What does this mean?
To find records in the logs that shows log records from the Application & URL Filtering Software Blade where traffic was dropped, what would be the query syntax?
What API command below creates a new host with the name “New Host” and IP address of “192.168.0.10”?
At what point is the Internal Certificate Authority (ICA) created?
Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is ____ all traffic. However, in the Application Control policy layer, the default action is ______ all traffic.
To ensure that VMAC mode is enabled, which CLI command should you run on all cluster members?
Which command is used to obtain the configuration lock in Gaia?
The following command is used to verify the CPUSE version:
There are 4 ways to use the Management API for creating host object with R80 Management API. Which one is NOT correct?
How often does Threat Emulation download packages by default?
The log server sends what to the Correlation Unit?
What key is used to save the current CPView page in a filename format cpview_”cpview process ID”.cap”number of captures”?
What is considered Hybrid Emulation Mode?
CoreXL is supported when one of the following features is enabled:
Which features are only supported with R80.10 Gateways but not R77.x?
From SecureXL perspective, what are the tree paths of traffic flow:
What are the two high availability modes?
Which command is used to add users to or from existing roles?
What is the purpose of the CPCA process?
Capsule Connect and Capsule Workspace both offer secured connection for remote users who are using their mobile devices. However, there are differences between the two.
Which of the following statements correctly identify each product's capabilities?
To enable Dynamic Dispatch on Security Gateway without the Firewall Priority Queues, run the following command in Expert mode and reboot:
The SmartEvent R80 Web application for real-time event monitoring is called:
According to out of the box SmartEvent policy, which blade will automatically be correlated into events?
Which of the following Windows Security Events will not map a username to an IP address in Identity Awareness?
CoreXL is NOT supported when one of the following features is enabled: (Choose three)
ClusterXL is fully supported by Gaia and available to all Check Point appliances. Which command is NOT related to redundancy and functions?
To optimize Rule Base efficiency, the most hit rules should be where?
NAT rules are prioritized in which order?
1. Automatic Static NAT
2. Automatic Hide NAT
3. Manual/Pre-Automatic NAT
4. Post-Automatic/Manual NAT rules
When an encrypted packet is decrypted, where does this happen?
Fill in the blank: The IPS policy for pre-R80 gateways is installed during the _______ .
What is the purpose of a SmartEvent Correlation Unit?
GAIA greatly increases operational efficiency by offering an advanced and intuitive software update agent, commonly referred to as the:
What is the least amount of CPU cores required to enable CoreXL?
Which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?
Which NAT rules are prioritized first?
Which one of the following is true about Capsule Connect?
What is correct statement about Security Gateway and Security Management Server failover in Check Point R80.X in terms of Check Point Redundancy driven solution?
N NO: 211
The essential means by which state synchronization works to provide failover in the event an active member goes down, ____________ is used specifically for clustered environments to allow gateways to report their own state and learn about the states of other members in the cluster.
Which of the following statements is TRUE about R80 management plug-ins?
Installations and upgrades with CPUSE require that the CPUSE agent is up-to-date. Usually the latest build is downloaded automatically. How can you verify the CPUSE agent build?
You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?
What is mandatory for ClusterXL to work properly?
Fill in the blank: The R80 feature _____ permits blocking specific IP addresses for a specified time period.
Fill in the blank: The “fw monitor” tool can be best used to troubleshoot ____________________.
D18912E1457D5D1DDCBD40AB3BF70D5D
The system administrator of a company is trying to find out why acceleration is not working for the traffic. The traffic is allowed according to the rule based and checked for viruses. But it is not accelerated. What is the most likely reason that the traffic is not accelerated?
When setting up an externally managed log server, what is one item that will not be configured on the R80 Security Management Server?
In the Firewall chain mode FFF refers to:
You have created a rule at the top of your Rule Base to permit Guest Wireless access to the Internet. However, when guest users attempt to reach the Internet, they are not seeing the splash page to accept your Terms of Service, and cannot access the Internet. How can you fix this?
If you needed the Multicast MAC address of a cluster, what command would you run?
Which command gives us a perspective of the number of kernel tables?
Can multiple administrators connect to a Security Management Server at the same time?
What is not a component of Check Point SandBlast?