Traffic from source 192.168.1.1 is going to www.google.com. The Application Control Blade on the gateway is inspecting the traffic. Assuming acceleration is enabled which path is handling the traffic?
In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies the type of traffic applicable to the chain module. For Wire Mode configuration, chain modules marked with ____________ will not apply.
Which method below is NOT one of the ways to communicate using the Management API’s?
When Dynamic Dispatcher is enabled, connections are assigned dynamically with the exception of:
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
Which process is available on any management product and on products that require direct GUI access, such as SmartEvent and provides GUI client communications, database manipulation, policy compilation and Management HA synchronization?
What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidated management console. It empowers the migration from legacy Client-side logic to Server-side logic. The cpm process:
During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?
Which web services protocol is used to communicate to the Check Point R81 Identity Awareness Web API?
Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?
SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?
SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?
Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?
What is the protocol and port used for Health Check and State Synchronization in ClusterXL?
Fill in the blank: The tool _____ generates a R81 Security Gateway configuration report.
CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is:
Automatic affinity means that if SecureXL is running, the affinity for each interface is automatically reset every
Can multiple administrators connect to a Security Management Server at the same time?
After finishing installation admin John likes to use top command in expert mode. John has to set the expert-password and was able to use top command. A week later John has to use the top command again, He detected that the expert password is no longer valid. What is the most probable reason for this behavior?
You need to see which hotfixes are installed on your gateway, which command would you use?
Which configuration file contains the structure of the Security Server showing the port numbers, corresponding protocol name, and status?
Sieve is a Cyber Security Engineer working for Global Bank with a large scale deployment of Check Point Enterprise Appliances Steve's manager. Diana asks him to provide firewall connection table details from one of the firewalls for which he is responsible. Which of these commands may impact performance briefly and should not be used during heavy traffic times of day?
After verifying that API Server is not running, how can you start the API Server?
Which is the command to identify the NIC driver before considering about the employment of the Multi-Queue feature?
Return oriented programming (ROP) exploits are detected by which security blade?
GAIA greatly increases operational efficiency by offering an advanced and intuitive software update agent, commonly referred to as the:
What is the recommended way to have a redundant Sync connection between the cluster nodes?
Using Web Services to access the API, which Header Name-Value had to be in the HTTP Post request after the login?
Bob has finished io setup provisioning a secondary security management server. Now he wants to check if the provisioning has been correct. Which of the following Check Point command can be used to check if the security management server has been installed as a primary or a secondary security management server?
Which command collects diagnostic data for analyzing a customer setup remotely?
You work as a security administrator for a large company. CSO of your company has attended a security conference where he has learnt how hackers constantly modify their strategies and techniques to evade detection and reach corporate resources. He wants to make sure that his company has the tight protections in place. Check Point has been selected for the security vendor.
Which Check Point product protects BEST against malware and zero-day attacks while ensuring quick delivery of safe content to your users?
Fill in the blank: A new license should be generated and installed in all of the following situations EXCEPT when ________ .
When performing a minimal effort upgrade, what will happen to the network traffic?
Which command shows the current connections distributed by CoreXL FW instances?
Packet acceleration (SecureXL) identifies connections by several attributes. Which of the attributes is NOT used for identifying connection?
What should the admin do in case the Primary Management Server is temporary down?
Fill in the blank: Permanent VPN tunnels can be set on all tunnels in the community, on all tunnels for specific gateways, or ______ .
SmartEvent Security Checkups can be run from the following Logs and Monitor activity:
What are not possible commands to acquire the lock in order to make changes in Clish or Web GUI?
How is communication between different Check Point components secured in R81? As with all questions, select the BEST answer.
True or False: In R81, more than one administrator can login to the Security Management Server with write permission at the same time.
When installing a dedicated R81 SmartEvent server. What is the recommended size of the root partition?
The “Hit count” feature allows tracking the number of connections that each rule matches. Will the Hit count feature work independently from logging and Track the hits if the Track option is set to “None”?
Customer’s R81 management server needs to be upgraded to R81.20. What is the best upgrade method when the management server is not connected to the Internet?
Both ClusterXL and VRRP are fully supported by Gaia R81.20 and available to all Check Point appliances. Which the following command is NOT related to redundancy and functions?
How to can you make sure that the old logs will be available after updating the Management to version R81.20 using the Advanced Upgrade Method?
What is the recommended configuration when the customer requires SmartLog indexing for 14 days and SmartEvent to keep events for 180 days?
Choose the correct syntax to add a new host named “emailserver1” with IP address 10.50.23.90 using GAiA Management CLI?
Alice & Bob are going to deploy Management Data Plane Separation (MDPS) for all their Check Point Security Gateway(s)/Cluster(s). Which of the following statement is true?
Fill in the blanks: Default port numbers for an LDAP server is ________________ for standard connections and SSL connections.
What could NOT be a reason for synchronization issues in a Management HA environment?
Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.
Check Pont Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster Members over Check Point SIC _______ .
What is the port used for SmartConsole to connect to the Security Management Server?
What are the minimum open server hardware requirements for a Security Management Server/Standalone in R81?
Which is the command to identify the NIC driver before considering about the employment of the Multi-Queue feature?
SmartEvent has several components that function together to track security threats. What is the function of the Correlation Unit as a component of this architecture?
The Security Gateway is installed on GAIA R81. The default port for the Web User Interface is ______ .
What is the most ideal Synchronization Status for Security Management Server High Availability deployment?
The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?
When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.
Your manager asked you to check the status of SecureXL, and its enabled templates and features. What command will you use to provide such information to manager?
Which of the following is NOT a VPN routing option available in a star community?
Vanessa is a Firewall administrator. She wants to test a backup of her company’s production Firewall cluster Dallas_GW. She has a lab environment that is identical to her production environment. She decided to restore production backup via SmartConsole in lab environment.
Which details she need to fill in System Restore window before she can click OK button and test the backup?
Capsule Connect and Capsule Workspace both offer secured connection for remote users who are using their mobile devices. However, there are differences between the two.
Which of the following statements correctly identify each product's capabilities?
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.
On R81.20 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:
Where you can see and search records of action done by R81 SmartConsole administrators?
During the Check Point Stateful Inspection Process, for packets that do not pass Firewall Kernel Inspection and are rejected by the rule definition, packets are:
The system administrator of a company is trying to find out why acceleration is not working for the traffic. The traffic is allowed according to the rule base and checked for viruses. But it is not accelerated.
What is the most likely reason that the traffic is not accelerated?
NO: 219
What cloud-based SandBlast Mobile application is used to register new devices and users?
The ____ software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware.
You need to change the number of firewall Instances used by CoreXL. How can you achieve this goal?
Check Point APIs allow system engineers and developers to make changes to their organization’s security policy with CLI tools and Web Services for all the following except:
What is a best practice before starting to troubleshoot using the “fw monitor” tool?
What is the recommended number of physical network interfaces in a Mobile Access cluster deployment?
As an administrator, you may be required to add the company logo to reports. To do this, you would save the logo as a PNG file with the name ‘cover-company-logo.png’ and then copy that image file to which directory on the SmartEvent server?
Ken wants to obtain a configuration lock from other administrator on R81 Security Management Server. He can do this via WebUI or via CLI.
Which command should he use in CLI? (Choose the correct answer.)
You have a Geo-Protection policy blocking Australia and a number of other countries. Your network now requires a Check Point Firewall to be installed in Sydney, Australia.
What must you do to get SIC to work?
: 131
Which command is used to display status information for various components?
You notice that your firewall is under a DDoS attack and would like to enable the Penalty Box feature, which command you use?
Please choose the path to monitor the compliance status of the Check Point R81.20 based management.
: 156
VPN Link Selection will perform the following when the primary VPN link goes down?
What key is used to save the current CPView page in a filename format cpview_”cpview process ID”.cap”number of captures”?
GAiA Software update packages can be imported and installed offline in situation where:
Joey wants to upgrade from R75.40 to R81 version of Security management. He will use Advanced Upgrade with Database Migration method to achieve this.
What is one of the requirements for his success?
You have a Gateway is running with 2 cores. You plan to add a second gateway to build a cluster and used a device with 4 cores.
How many cores can be used in a Cluster for Firewall-kernel on the new device?
Which Check Point software blade provides Application Security and identity control?
SandBlast has several functional components that work together to ensure that attacks are prevented in real-time. Which the following is NOT part of the SandBlast component?
SmartEvent provides a convenient way to run common command line executables that can assist in investigating events. Right-clicking the IP address, source or destination, in an event provides a list of default and customized commands. They appear only on cells that refer to IP addresses because the IP address of the active cell is used as the destination of the command when run. The default commands are:
What are the attributes that SecureXL will check after the connection is allowed by Security Policy?
What will be the effect of running the following command on the Security Management Server?
After the initial installation on Check Point appliance, you notice that the Management-interface and default gateway are incorrect.
Which commands could you use to set the IP to 192.168.80.200/24 and default gateway to 192.168.80.1.
Fill in the blank: Identity Awareness AD-Query is using the Microsoft _______________ API to learn users from AD.
Fill in the blank: The “fw monitor” tool can be best used to troubleshoot ____________________.
SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day Protection?