To increase security, the administrator has modified the Core protection ‘Host Port Scan’ from ‘Medium’ to ‘High’ Predefined Sensitivity. Which Policy should the administrator install after Publishing the changes?
Bob and Joe both have Administrator Roles on their Gaia Platform. Bob logs in on the WebUI and then Joe logs in through CLI. Choose what BEST describes the following scenario, where Bob and Joe are both logged in:
Gaia includes Check Point Upgrade Service Engine (CPUSE), which can directly receive updates for what components?
To provide updated malicious data signatures to all Threat Prevention blades, the Threat Prevention gateway does what with the data?
An administrator wishes to use Application objects in a rule in their policy but there are no Application objects listed as options to add when clicking the"+" to add new items to the "Services & Applications" column of a rule. What should be done to fix this?
One of major features in R80.x SmartConsole is concurrent administration. Which of the following is NOT possible considering that AdminA, AdminB, and AdminC are editing the same Security Policy?
You are the Check Point administrator for Alpha Corp with an R80 Check Point estate. You have received a call by one of the management users stating that they are unable to browse the Internet with their new tablet connected to the company Wireless. The Wireless system goes through the Check Point Gateway. How do you review the logs to see what the problem may be?
When configuring LDAP with User Directory integration, changes applied to a User Directory template are:
Fill in the blank: To create policy for traffic to or from a particular location, use the _____________.
Which Security Blade needs to be enabled in order to sanitize and remove potentially malicious content from files, before those files enter the network?
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
You are the Check Point administrator for Alpha Corp. You received a call that one of the users is unable to browse the Internet on their new tablet which is connected to the company wireless, which goes through a Check Point Gateway. How would you review the logs to see what is blocking this traffic?
Tom has connected to the Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored shortly afterward. What will happen to the changes already made?
While enabling the Identity Awareness blade the Identity Awareness wizard does not automatically detect the windows domain Why does it not detect the windows domain?
To ensure that VMAC mode is enabled, which CLI command you should run on all cluster members? Choose the best answer.
Which of the following methods can be used to update the trusted log server regarding the policy and configuration changes performed on the Security Management Server?
When a Security Gateway sends its logs to an IP address other than its own, which deployment option is installed?
True or False: More than one administrator can log into the Security Management Server with SmartConsole with write permission at the same time.
How many users can have read/write access in Gaia Operating System at one time?
When logging in for the first time to a Security management Server through SmartConsole, a fingerprint is saved to the:
In a Distributed deployment, the Security Gateway and the Security Management software are installed on what platforms?
What are two basic rules Check Point recommending for building an effective security policy?
Which is a suitable command to check whether Drop Templates are activated or not?
Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?
Fill in the blank RADIUS Accounting gets_____data from requests generated by the accounting client
Fill in the blank: Once a certificate is revoked from the Security GateWay by the Security Management Server, the certificate information is _______.
Identity Awareness lets an administrator easily configure network access and auditing based on three items Choose the correct statement.
A network administrator has informed you that they have identified a malicious host on the network, and instructed you to block it. Corporate policy dictates that firewall policy changes cannot be made at this time. What tool can you use to block this traffic?
Which of the following is NOT supported by Bridge Mode on the Check Point Security Gateway?
Fill in the blanks: A Security Policy is created in_____, stored in the_____ and Distributed to the various
From the Gaia web interface, which of the following operations CANNOT be performed on a Security Management Server?
A Check Point Software license consists of two components, the Software Blade and the Software Container. There are ______ types of Software Containers: ________.
Which type of Check Point license ties the package license to the IP address of the Security Management Server?
To view the policy installation history for each gateway, which tool would an administrator use?
Which Check Point Software Wade provides visibility of users, groups and machines while also providing access control through identity-based policies?
After a new Log Server is added to the environment and the SIC trust has been established with the SMS what will the gateways do?
What needs to be configured if the NAT property ‘Translate destination on client side’ is not enabled in Global properties?
Which of the following log queries would show only dropped packets with source address of 192.168.1.1 and destination address of 172.26.1.1?
In the Check Point three-tiered architecture, which of the following is NOT a function of the Security Management Server?
AdminA and AdminB are both logged in on SmartConsole What does it mean if AdmmB sees a lock icon on a rule? Choose the BEST answer.
Fill in the blank When LDAP is integrated with Check Point Security Management it is then referred to as_____
If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsible, which of these steps should NOT be performed:
Fill in the blank: An Endpoint identity agent uses a ___________ for user authentication.
Of all the Check Point components in your network, which one changes most often and should be backed up most frequently?
John is using Management HA. Which Smartcenter should be connected to for making changes?
With URL Filtering, what portion of the traffic is sent to the Check Point Online Web Service for analysis?
Session unique identifiers are passed to the web api using which http header option?
True or False: The destination server for Security Gateway logs depends on a Security Management Server configuration.
Which option, when applied to a rule, allows all encrypted and non-VPN traffic that matches the rule?
Which of the following technologies extracts detailed information from packets and stores that information in state tables?
Fill in the blank: An identity server uses a ___________ for user authentication.
Which tool allows for the automatic updating of the Gaia OS and Check Point products installed on the Gaia OS?
When a Security Gateways sends its logs to an IP address other than its own, which deployment option is installed?
What type of NAT is a one-to-one relationship where each host is translated to a unique address?
Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?
Which type of Endpoint Identity Agent includes packet tagging and computer authentication?
Which of the following blades is NOT subscription-based and therefore does not have to be renewed on a regular basis?
Fill in the blank: By default, the SIC certificates issued by R80 Management Server are based on the ____________ algorithm.
Fill in the blank: Each cluster, at a minimum, should have at least ___________ interfaces.
In which deployment is the security management server and Security Gateway installed on the same appliance?
When comparing Stateful Inspection and Packet Filtering, what is a benefit that Stateful Inspection offers over Packer Filtering?
The “Hit count” feature allows tracking the number of connections that each rule matches. Will the Hit count feature work independently from logging and Track the hits even if the Track option is set to “None”?
Which Check Point software blade monitors Check Point devices and provides a picture of network and security performance?
In SmartConsole, objects are used to represent physical and virtual network components and also some logical components. These objects are divided into several categories. Which of the following is NOT an objects category?
Which product correlates logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?
Fill in the blanks: A ____ license requires an administrator to designate a gateway for attachment whereas a _____ license is automatically attached to a Security Gateway.
Fill in the bank: In Office mode, a Security Gateway assigns a remote client to an IP address once___________.
In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?
Which option will match a connection regardless of its association with a VPN community?
Is it possible to have more than one administrator connected to a Security Management Server at once?
An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office. Both offices are protected by Check Point Security Gateway managed by the same Security Management Server (SMS). While configuring the VPN community to specify the pre-shared secret, the administrator did not find a box to input the pre-shared secret. Why does it not allow him to specify the pre-shared secret?
Examine the sample Rule Base.
What will be the result of a verification of the policy from SmartConsole?