Which software blade enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine?
You want to verify if there are unsaved changes in GAiA that will be lost with a reboot. What command can be used?
What is the most complete definition of the difference between the Install Policy button on the SmartConsole’s tab, and the Install Policy within a specific policy?
Which configuration element determines which traffic should be encrypted into a VPN tunnel vs. sent in the clear?
True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway
Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.
When installing a dedicated R80 SmartEvent server, what is the recommended size of the root partition?
To view the policy installation history for each gateway, which tool would an administrator use?
If the first packet of an UDP session is rejected by a security policy, what does the firewall send to the client?
Match the following commands to their correct function. Each command has one function only listed.
You have two rules, ten users, and two user groups in a Security Policy. You create database version 1 for this configuration. You then delete two existing users and add a new user group. You modify one rule and add two new rules to the Rule Base. You save the Security Policy and create database version 2. After a while, you decide to roll back to version 1 to use the Rule Base, but you want to keep your user database. How can you do this?
You have just installed your Gateway and want to analyze the packet size distribution of your traffic with SmartView Monitor.
Unfortunately, you get the message:
“There are no machines that contain Firewall Blade and SmartView Monitor”.
What should you do to analyze the packet size distribution of your traffic? Give the BEST answer.
How do you configure the Security Policy to provide uses access to the Captive Portal through an external (Internet) interface?
SandBlast has several functional components that work together to ensure that attacks are prevented in real-time. Which the following is NOT part of the SandBlast component?
Vanessa is expecting a very important Security Report. The Document should be sent as an attachment via e-mail. An e-mail with Security_report.pdf file was delivered to her e-mail inbox. When she opened the PDF file, she noticed that the file is basically empty and only few lines of text are in it. The report is missing some graphs, tables and links. Which component of SandBlast protection is her company using on a Gateway?
You are about to integrate RSA SecurID users into the Check Point infrastructure. What kind of users are to be defined via SmartDashboard?
Which of the below is the MOST correct process to reset SIC from SmartDashboard?
What must a Security Administrator do to comply with a management requirement to log all traffic accepted through the perimeter Security Gateway?
Which of the following are available SmartConsole clients which can be installed from the R77 Windows CD? Read all answers and select the most complete and valid list.
You have configured SNX on the Security Gateway. The client connects to the Security Gateway and the user enters the authentication credentials. What must happen after authentication that allows the client to connect to the Security Gateway's VPN domain?
You work as a security administrator for a large company. CSO of your company has attended a security conference where he has learnt how hackers constantly modify their strategies and techniques to evade detection and reach corporate resources. He wants to make sure that his company has the right protections in place. Check Point has been selected for the security vendor. Which Check Point products protects BEST against malware and zero-day attacks while ensuring quick delivery of safe content to your users?
Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?
Which of the following is NOT an integral part of VPN communication within a network?
With which command can you view the running configuration of Gaia-based system.
ALPHA Corp has a new administrator who logs into the Gaia Portal to make some changes. He realizes that even though he has logged in as an administrator, he is unable to make any changes because all configuration options are greyed out as shown in the screenshot image below. What is the likely cause for this?
View the rule below. What does the lock-symbol in the left column mean? Select the BEST answer.
Which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?
What will be the effect of running the following command on the Security Management Server?
You are the administrator for Alpha Corp. You have logged into your R80 Management server. You are making some changes in the Rule Base and notice that rule No.6 has a pencil icon next to it.
What does this mean?
Which utility allows you to configure the DHCP service on GAIA from the command line?
Ken wants to obtain a configuration lock from other administrator on R80 Security Management Server. He can do this via WebUI or a via CLI. Which command should be use in CLI? Choose the correct answer.
Where can you trigger a failover of the cluster members?
1. Log in to Security Gateway CLI and run command clusterXL_admin down.
2. In SmartView Monitor right-click the Security Gateway member and select Cluster member down.
3. Log into Security Gateway CLI and run command cphaprob down.
Which of the following Automatically Generated Rules NAT rules have the lowest implementation priority?
Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?
Which of the following commands can be used to remove site-to-site IPSEC Security Associations (SA)?
John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, gateway policy permits access only from Join's desktop which is assigned an IP address 10.0.0.19 via DHCP.
John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but the limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop. He wants to move around the organization and continue to have access to the HR Web Server.
To make this scenario work, the IT administrator:
1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources.
2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.
John plugged in his laptop to the network on a different network segment and he is not able to connect. How does he solve this problem?
Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is ________ all traffic. However, in the Application Control policy layer, the default action is ________ all traffic.
In SmartView Tracker, which rule shows when a packet is dropped due to anti-spoofing?
To install a brand new Check Point Cluster, the MegaCorp IT department bought 1 Smart-1 and 2 Security Gateway Appliances to run a cluster. Which type of cluster is it?
The fw monitor utility is used to troubleshoot which of the following problems?
What port is used for delivering logs from the gateway to the management server?
Jack works for a managed service provider and he has been tasked to create 17 new policies for several new customers. He does not have much time. What is the BEST way to do this with R80 security management?
Which SmartConsole component can Administrators use to track changes to the Rule Base?
Fill in the blank: When LDAP is integrated with Check Point Security Management, it is then referred to as _______
When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?
If there is an Accept Implied Policy set to “First”, what is the reason Jorge cannot see any logs?
In the R80 SmartConsole, on which tab are Permissions and Administrators defined?
Administrator wishes to update IPS from SmartConsole by clicking on the option “update now” under the IPS tab. Which device requires internet access for the update to work?