Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Check Point Certified Security Expert R81 Question and Answers

Check Point Certified Security Expert R81

Last Update Apr 25, 2024
Total Questions : 617

We are offering FREE 156-315.81 Checkpoint exam questions. All you do is to just go and sign up. Give your details, prepare 156-315.81 free exam questions and then go for complete pool of Check Point Certified Security Expert R81 test questions that will help you more.

156-315.81 pdf

156-315.81 PDF

$35  $99.99
156-315.81 Engine

156-315.81 Testing Engine

$42  $119.99
156-315.81 PDF + Engine

156-315.81 PDF + Testing Engine

$56  $159.99
Questions 1

You need to change the number of firewall Instances used by CoreXL. How can you achieve this goal?

Options:

A.  

edit fwaffinity.conf; reboot required

B.  

cpconfig; reboot required

C.  

edit fwaffinity.conf; reboot not required

D.  

cpconfig; reboot not required

Discussion 0
Questions 2

In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?

Options:

A.  

SND is a feature to accelerate multiple SSL VPN connections

B.  

SND is an alternative to IPSec Main Mode, using only 3 packets

C.  

SND is used to distribute packets among Firewall instances

D.  

SND is a feature of fw monitor to capture accelerated packets

Discussion 0
Questions 3

Which of the following commands shows the status of processes?

Options:

A.  

cpwd_admin -l

B.  

cpwd -l

C.  

cpwd admin_list

D.  

cpwd_admin list

Discussion 0
Questions 4

Which statement is most correct regarding about “CoreXL Dynamic Dispatcher”?

Options:

A.  

The CoreXL FW instanxces assignment mechanism is based on Source MAC addresses, Destination MAC addresses

B.  

The CoreXL FW instances assignment mechanism is based on the utilization of CPU cores

C.  

The CoreXL FW instances assignment mechanism is based on IP Protocol type

D.  

The CoreXl FW instances assignment mechanism is based on Source IP addresses, Destination IP addresses, and the IP ‘Protocol’ type

Discussion 0
Questions 5

What is the SandBlast Agent designed to do?

Options:

A.  

Performs OS-level sandboxing for SandBlast Cloud architecture

B.  

Ensure the Check Point SandBlast services is running on the end user’s system

C.  

If malware enters an end user’s system, the SandBlast Agent prevents the malware from spreading with the network

D.  

Clean up email sent with malicious attachments

Discussion 0
Questions 6

Which file gives you a list of all security servers in use, including port number?

Options:

A.  

$FWDIR/conf/conf.conf

B.  

$FWDIR/conf/servers.conf

C.  

$FWDIR/conf/fwauthd.conf

D.  

$FWDIR/conf/serversd.conf

Discussion 0
Questions 7

You have a Geo-Protection policy blocking Australia and a number of other countries. Your network now requires a Check Point Firewall to be installed in Sydney, Australia.

What must you do to get SIC to work?

Options:

A.  

Remove Geo-Protection, as the IP-to-country database is updated externally, and you have no control of this.

B.  

Create a rule at the top in the Sydney firewall to allow control traffic from your network

C.  

Nothing - Check Point control connections function regardless of Geo-Protection policy

D.  

Create a rule at the top in your Check Point firewall to bypass the Geo-Protection

Discussion 0
Questions 8

After the initial installation on Check Point appliance, you notice that the Management-interface and default gateway are incorrect.

Which commands could you use to set the IP to 192.168.80.200/24 and default gateway to 192.168.80.1.

Options:

A.  

set interface Mgmt ipv4-address 192.168.80.200 mask-length 24set static-route default nexthop gateway address 192.168.80.1 onsave config

B.  

set interface Mgmt ipv4-address 192.168.80.200 255.255.255.0add static-route 0.0.0.0. 0.0.0.0 gw 192.168.80.1 onsave config

C.  

set interface Mgmt ipv4-address 192.168.80.200 255.255.255.0set static-route 0.0.0.0. 0.0.0.0 gw 192.168.80.1 onsave config

D.  

set interface Mgmt ipv4-address 192.168.80.200 mask-length 24add static-route default nexthop gateway address 192.168.80.1 onsave config

Discussion 0
Questions 9

Fill in the blank: The R81 SmartConsole, SmartEvent GUI client, and _______ consolidate billions of logs and shows then as prioritized security events.

Options:

A.  

SmartMonitor

B.  

SmartView Web Application

C.  

SmartReporter

D.  

SmartTracker

Discussion 0
Questions 10

You have a Gateway is running with 2 cores. You plan to add a second gateway to build a cluster and used a device with 4 cores.

How many cores can be used in a Cluster for Firewall-kernel on the new device?

Options:

A.  

3

B.  

2

C.  

1

D.  

4

Discussion 0
Questions 11

What key is used to save the current CPView page in a filename format cpview_”cpview process ID”.cap”number of captures”?

Options:

A.  

S

B.  

W

C.  

C

D.  

Space bar

Discussion 0
Questions 12

In the Firewall chain mode FFF refers to:

Options:

A.  

Stateful Packets

B.  

No Match

C.  

All Packets

D.  

Stateless Packets

Discussion 0
Questions 13

In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?

Options:

A.  

Accounting

B.  

Suppression

C.  

Accounting/Suppression

D.  

Accounting/Extended

Discussion 0
Questions 14

What kind of information would you expect to see using the sim affinity command?

Options:

A.  

The VMACs used in a Security Gateway cluster

B.  

The involved firewall kernel modules in inbound and outbound packet chain

C.  

Overview over SecureXL templated connections

D.  

Network interfaces and core distribution used for CoreXL

Discussion 0
Questions 15

What is the Implicit Clean-up Rule?

Options:

A.  

A setting is defined in the Global Properties for all policies.

B.  

A setting that is configured per Policy Layer.

C.  

Another name for the Clean-up Rule.

D.  

Automatically created when the Clean-up Rule is defined.

Discussion 0
Questions 16

The system administrator of a company is trying to find out why acceleration is not working for the traffic. The traffic is allowed according to the rule base and checked for viruses. But it is not accelerated.

What is the most likely reason that the traffic is not accelerated?

Options:

A.  

There is a virus found. Traffic is still allowed but not accelerated.

B.  

The connection required a Security server.

C.  

Acceleration is not enabled.

D.  

The traffic is originating from the gateway itself.

Discussion 0
Questions 17

What is the purpose of extended master key extension/session hash?

Options:

A.  

UDP VOIP protocol extension

B.  

In case of TLS1.x it is a prevention of a Man-in-the-Middle attack/disclosure of the client-server communication

C.  

Special TCP handshaking extension

D.  

Supplement DLP data watermark

Discussion 0
Questions 18

To enable Dynamic Dispatch on Security Gateway without the Firewall Priority Queues, run the following command in Expert mode and reboot:

Options:

A.  

fw ctl Dyn_Dispatch on

B.  

fw ctl Dyn_Dispatch enable

C.  

fw ctl multik set_mode 4

D.  

fw ctl multik set_mode 1

Discussion 0
Questions 19

Which configuration file contains the structure of the Security Server showing the port numbers, corresponding protocol name, and status?

Options:

A.  

$FWDIR/database/fwauthd.conf

B.  

$FWDIR/conf/fwauth.conf

C.  

$FWDIR/conf/fwauthd.conf

D.  

$FWDIR/state/fwauthd.conf

Discussion 0
Questions 20

You want to store the GAIA configuration in a file for later reference. What command should you use?

Options:

A.  

write mem

B.  

show config –f

C.  

save config –o

D.  

save configuration

Discussion 0
Questions 21

Which GUI client is supported in R81?

Options:

A.  

SmartProvisioning

B.  

SmartView Tracker

C.  

SmartView Monitor

D.  

SmartLog

Discussion 0
Questions 22

In SmartEvent, what are the different types of automatic reactions that the administrator can configure?

Options:

A.  

Mail, Block Source, Block Event Activity, External Script, SNMP Trap

B.  

Mail, Block Source, Block Destination, Block Services, SNMP Trap

C.  

Mail, Block Source, Block Destination, External Script, SNMP Trap

D.  

Mail, Block Source, Block Event Activity, Packet Capture, SNMP Trap

Discussion 0
Questions 23

What are the main stages of a policy installations?

Options:

A.  

Verification & Compilation, Transfer and Commit

B.  

Verification & Compilation, Transfer and Installation

C.  

Verification, Commit, Installation

D.  

Verification, Compilation & Transfer, Installation

Discussion 0
Questions 24

What are the blades of Threat Prevention?

Options:

A.  

IPS, DLP, AntiVirus, AntiBot, Sandblast Threat Emulation/Extraction

B.  

DLP, AntiVirus, QoS, AntiBot, Sandblast Threat Emulation/Extraction

C.  

IPS, AntiVirus, AntiBot

D.  

IPS, AntiVirus, AntiBot, Sandblast Threat Emulation/Extraction

Discussion 0
Questions 25

What is the port used for SmartConsole to connect to the Security Management Server?

Options:

A.  

CPMI port 18191/TCP

B.  

CPM port/TCP port 19009

C.  

SIC port 18191/TCP

D.  

https port 4434/TCP

Discussion 0
Questions 26

What component of R81 Management is used for indexing?

Options:

A.  

DBSync

B.  

API Server

C.  

fwm

D.  

SOLR

Discussion 0
Questions 27

You find one of your cluster gateways showing “Down” when you run the “cphaprob stat” command. You then run the “clusterXL_admin up” on the down member but unfortunately the member continues to show down. What command do you run to determine the cause?

Options:

A.  

cphaprob –f register

B.  

cphaprob –d –s report

C.  

cpstat –f all

D.  

cphaprob –a list

Discussion 0
Questions 28

You are investigating issues with to gateway cluster members are not able to establish the first initial cluster synchronization. What service is used by the FWD daemon to do a Full Synchronization?

Options:

A.  

TCP port 443

B.  

TCP port 257

C.  

TCP port 256

D.  

UDP port 8116

Discussion 0
Questions 29

What is true of the API server on R81.10?

Options:

A.  

By default the API-server is activated and does not have hardware requirements.

B.  

By default the API-server is not active and should be activated from the WebUI.

C.  

By default the API server is active on management and stand-alone servers with 16GB of RAM (or more).

D.  

By default, the API server is active on management servers with 4 GB of RAM (or more) and on stand-alone servers with 8GB of RAM (or more).

Discussion 0
Questions 30

What is mandatory for ClusterXL to work properly?

Options:

A.  

The number of cores must be the same on every participating cluster node

B.  

The Magic MAC number must be unique per cluster node

C.  

The Sync interface must not have an IP address configured

D.  

If you have “Non-monitored Private” interfaces, the number of those interfaces must be the same on all cluster members

Discussion 0
Questions 31

Which SmartConsole tab is used to monitor network and security performance?

Options:

A.  

Manage Setting

B.  

Security Policies

C.  

Gateway and Servers

D.  

Logs and Monitor

Discussion 0
Questions 32

What is the command to see cluster status in cli expert mode?

Options:

A.  

fw ctl stat

B.  

clusterXL stat

C.  

clusterXL status

D.  

cphaprob stat

Discussion 0
Questions 33

: 131

Which command is used to display status information for various components?

Options:

A.  

show all systems

B.  

show system messages

C.  

sysmess all

D.  

show sysenv all

Discussion 0
Questions 34

What is a best practice before starting to troubleshoot using the “fw monitor” tool?

Options:

A.  

Run the command: fw monitor debug on

B.  

Clear the connections table

C.  

Disable CoreXL

D.  

Disable SecureXL

Discussion 0
Questions 35

What is the purpose of a SmartEvent Correlation Unit?

Options:

A.  

The SmartEvent Correlation Unit is designed to check the connection reliability from SmartConsole to the SmartEvent Server.

B.  

The SmartEvent Correlation Unit’s task it to assign severity levels to the identified events.

C.  

The Correlation unit role is to evaluate logs from the log server component to identify patterns/threats and convert them to events.

D.  

The SmartEvent Correlation Unit is designed to check the availability of the SmartReporter Server.

Discussion 0
Questions 36

Which of the following describes how Threat Extraction functions?

Options:

A.  

Detect threats and provides a detailed report of discovered threats.

B.  

Proactively detects threats.

C.  

Delivers file with original content.

D.  

Delivers PDF versions of original files with active content removed.

Discussion 0
Questions 37

Tom has been tasked to install Check Point R81 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?

Options:

A.  

One machine, but it needs to be installed using SecurePlatform for compatibility purposes.

B.  

One machine

C.  

Two machines

D.  

Three machines

Discussion 0
Questions 38

The Correlation Unit performs all but the following actions:

Options:

A.  

Marks logs that individually are not events, but may be part of a larger pattern to be identified later.

B.  

Generates an event based on the Event policy.

C.  

Assigns a severity level to the event.

D.  

Takes a new log entry that is part of a group of items that together make up an event, and adds it to an ongoing event.

Discussion 0
Questions 39

Pamela is Cyber Security Engineer working for Global Instance Firm with large scale deployment of Check Point Enterprise Appliances using GAiA/R81.10. Company’s Developer Team is having random access issue to newly deployed Application Server in DMZ’s Application Server Farm Tier and blames DMZ Security Gateway as root cause. The ticket has been created and issue is at Pamela’s desk for an investigation. Pamela decides to use Check Point’s Packet Analyzer Tool-fw monitor to iron out the issue during approved Maintenance window.

What do you recommend as the best suggestion for Pamela to make sure she successfully captures entire traffic in context of Firewall and problematic traffic?

Options:

A.  

Pamela should check SecureXL status on DMZ Security gateway and if it’s turned ON. She should turn OFF SecureXL before using fw monitor to avoid misleading traffic captures.

B.  

Pamela should check SecureXL status on DMZ Security Gateway and if it’s turned OFF. She should turn ON SecureXL before using fw monitor to avoid misleading traffic captures.

C.  

Pamela should use tcpdump over fw monitor tool as tcpdump works at OS-level and captures entire traffic.

D.  

Pamela should use snoop over fw monitor tool as snoop works at NIC driver level and captures entire traffic.

Discussion 0
Questions 40

Which file contains the host address to be published, the MAC address that needs to be associated with the IP Address, and the unique IP of the interface that responds to ARP request?

Options:

A.  

/opt/CPshrd-R81/conf/local.arp

B.  

/var/opt/CPshrd-R81/conf/local.arp

C.  

$CPDIR/conf/local.arp

D.  

$FWDIR/conf/local.arp

Discussion 0
Questions 41

You can access the ThreatCloud Repository from:

Options:

A.  

R81.10 SmartConsole and Application Wiki

B.  

Threat Prevention and Threat Tools

C.  

Threat Wiki and Check Point Website

D.  

R81.10 SmartConsole and Threat Prevention

Discussion 0
Questions 42

What does it mean if Deyra sees the gateway status? (Choose the BEST answer.)

Options:

A.  

SmartCenter Server cannot reach this Security Gateway.

B.  

There is a blade reporting a problem.

C.  

VPN software blade is reporting a malfunction.

D.  

Security Gateway’s MGNT NIC card is disconnected.

Discussion 0
Questions 43

Tom has connected to the R81 Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored shortly afterward.

What will happen to the changes already made?

Options:

A.  

Tom’s changes will have been stored on the Management when he reconnects and he will not lose any of his work.

B.  

Tom will have to reboot his SmartConsole computer, and access the Management cache store on that computer, which is only accessible after a reboot.

C.  

Tom’s changes will be lost since he lost connectivity and he will have to start again.

D.  

Tom will have to reboot his SmartConsole computer, clear to cache, and restore changes.

Discussion 0
Questions 44

Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?

Options:

A.  

UDP port 265

B.  

TCP port 265

C.  

UDP port 256

D.  

TCP port 256

Discussion 0
Questions 45

NO: 180

What command can you use to have cpinfo display all installed hotfixes?

Options:

A.  

cpinfo -hf

B.  

cpinfo –y all

C.  

cpinfo –get hf

D.  

cpinfo installed_jumbo

Discussion 0
Questions 46

GAiA Software update packages can be imported and installed offline in situation where:

Options:

A.  

Security Gateway with GAiA does NOT have SFTP access to Internet

B.  

Security Gateway with GAiA does NOT have access to Internet.

C.  

Security Gateway with GAiA does NOT have SSH access to Internet.

D.  

The desired CPUSE package is ONLY available in the Check Point CLOU

D.  

Discussion 0
Questions 47

What are the types of Software Containers?

Options:

A.  

Three; security management, Security Gateway, and endpoint security

B.  

Three; Security Gateway, endpoint security, and gateway management

C.  

Two; security management and endpoint security

D.  

Two; endpoint security and Security Gateway

Discussion 0
Questions 48

Which tool is used to enable ClusterXL?

Options:

A.  

SmartUpdate

B.  

cpconfig

C.  

SmartConsole

D.  

sysconfig

Discussion 0
Questions 49

SandBlast agent extends 0 day prevention to what part of the network?

Options:

A.  

Web Browsers and user devices

B.  

DMZ server

C.  

Cloud

D.  

Email servers

Discussion 0
Questions 50

Which path below is available only when CoreXL is enabled?

Options:

A.  

Slow path

B.  

Firewall path

C.  

Medium path

D.  

Accelerated path

Discussion 0
Questions 51

You want to verify if your management server is ready to upgrade to R81.10. What tool could you use in this process?

Options:

A.  

migrate export

B.  

upgrade_tools verify

C.  

pre_upgrade_verifier

D.  

migrate import

Discussion 0
Questions 52

What is the recommended number of physical network interfaces in a Mobile Access cluster deployment?

Options:

A.  

4 Interfaces – an interface leading to the organization, a second interface leading to the internet, a third interface for synchronization, a fourth interface leading to the Security Management Server.

B.  

3 Interfaces – an interface leading to the organization, a second interface leading to the Internet, a third interface for synchronization.

C.  

1 Interface – an interface leading to the organization and the Internet, and configure for synchronization.

D.  

2 Interfaces – a data interface leading to the organization and the Internet, a second interface for synchronization.

Discussion 0
Questions 53

What is the difference between SSL VPN and IPSec VPN?

Options:

A.  

IPSec VPN does not require installation of a resilient VPN client.

B.  

SSL VPN requires installation of a resident VPN client.

C.  

SSL VPN and IPSec VPN are the same.

D.  

IPSec VPN requires installation of a resident VPN client and SSL VPN requires only an installed Browser.

Discussion 0
Questions 54

SecureXL improves non-encrypted firewall traffic throughput and encrypted VPN traffic throughput.

Options:

A.  

This statement is true because SecureXL does improve all traffic.

B.  

This statement is false because SecureXL does not improve this traffic but CoreXL does.

C.  

This statement is true because SecureXL does improve this traffic.

D.  

This statement is false because encrypted traffic cannot be inspected.

Discussion 0
Questions 55

Customer’s R81 management server needs to be upgraded to R81.10. What is the best upgrade method when the management server is not connected to the Internet?

Options:

A.  

Export R81 configuration, clean install R81.10 and import the configuration

B.  

CPUSE offline upgrade

C.  

CPUSE online upgrade

D.  

SmartUpdate upgrade

Discussion 0
Questions 56

What are the steps to configure the HTTPS Inspection Policy?

Options:

A.  

Go to Manage&Settings > Blades > HTTPS Inspection > Configure in SmartDashboard

B.  

Go to Application&url filtering blade > Advanced > Https Inspection > Policy

C.  

Go to Manage&Settings > Blades > HTTPS Inspection > Policy

D.  

Go to Application&url filtering blade > Https Inspection > Policy

Discussion 0
Questions 57

Which statement is true about ClusterXL?

Options:

A.  

Supports Dynamic Routing (Unicast and Multicast)

B.  

Supports Dynamic Routing (Unicast Only)

C.  

Supports Dynamic Routing (Multicast Only)

D.  

Does not support Dynamic Routing

Discussion 0
Questions 58

What is the main difference between Threat Extraction and Threat Emulation?

Options:

A.  

Threat Emulation never delivers a file and takes more than 3 minutes to complete.

B.  

Threat Extraction always delivers a file and takes less than a second to complete.

C.  

Threat Emulation never delivers a file that takes less than a second to complete.

D.  

Threat Extraction never delivers a file and takes more than 3 minutes to complete.

Discussion 0
Questions 59

Which CLI command will reset the IPS pattern matcher statistics?

Options:

A.  

ips reset pmstat

B.  

ips pstats reset

C.  

ips pmstats refresh

D.  

ips pmstats reset

Discussion 0
Questions 60

What happen when IPS profile is set in Detect Only Mode for troubleshooting?

Options:

A.  

It will generate Geo-Protection traffic

B.  

Automatically uploads debugging logs to Check Point Support Center

C.  

It will not block malicious traffic

D.  

Bypass licenses requirement for Geo-Protection control

Discussion 0
Questions 61

Which of the following is a new R81 Gateway feature that had not been available in R77.X and older?

Options:

A.  

The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.

B.  

Limits the upload and download throughput for streaming media in the company to 1 Gbps.

C.  

Time object to a rule to make the rule active only during specified times.

D.  

Sub Policies ae sets of rules that can be created and attached to specific rules. If the rule is matched, inspection will continue in the sub policy attached to it rather than in the next rule.

Discussion 0
Questions 62

Session unique identifiers are passed to the web api using which http header option?

Options:

A.  

X-chkp-sid

B.  

Accept-Charset

C.  

Proxy-Authorization

D.  

Application

Discussion 0
Questions 63

What are the three components for Check Point Capsule?

Options:

A.  

Capsule Docs, Capsule Cloud, Capsule Connect

B.  

Capsule Workspace, Capsule Cloud, Capsule Connect

C.  

Capsule Workspace, Capsule Docs, Capsule Connect

D.  

Capsule Workspace, Capsule Docs, Capsule Cloud

Discussion 0
Questions 64

You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?

Options:

A.  

Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.

B.  

Create a separate Security Policy package for each remote Security Gateway.

C.  

Create network objects that restricts all applicable rules to only certain networks.

D.  

Run separate SmartConsole instances to login and configure each Security Gateway directly.

Discussion 0
Questions 65

Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?

Options:

A.  

logd

B.  

fwd

C.  

fwm

D.  

cpd

Discussion 0
Questions 66

Which statement is NOT TRUE about Delta synchronization?

Options:

A.  

Using UDP Multicast or Broadcast on port 8161

B.  

Using UDP Multicast or Broadcast on port 8116

C.  

Quicker than Full sync

D.  

Transfers changes in the Kernel tables between cluster members.

Discussion 0
Questions 67

What must you do first if “fwm sic_reset” could not be completed?

Options:

A.  

Cpstop then find keyword “certificate” in objects_5_0.C and delete the section

B.  

Reinitialize SIC on the security gateway then run “fw unloadlocal”

C.  

Reset SIC from Smart Dashboard

D.  

Change internal CA via cpconfig

Discussion 0
Questions 68

The SmartEvent R81 Web application for real-time event monitoring is called:

Options:

A.  

SmartView Monitor

B.  

SmartEventWeb

C.  

There is no Web application for SmartEvent

D.  

SmartView

Discussion 0
Questions 69

What command would show the API server status?

Options:

A.  

cpm status

B.  

api restart

C.  

api status

D.  

show api status

Discussion 0
Questions 70

Where you can see and search records of action done by R81 SmartConsole administrators?

Options:

A.  

In SmartView Tracker, open active log

B.  

In the Logs & Monitor view, select “Open Audit Log View”

C.  

In SmartAuditLog View

D.  

In Smartlog, all logs

Discussion 0
Questions 71

The Event List within the Event tab contains:

Options:

A.  

a list of options available for running a query.

B.  

the top events, destinations, sources, and users of the query results, either as a chart or in a tallied list.

C.  

events generated by a query.

D.  

the details of a selected event.

Discussion 0
Questions 72

What SmartEvent component creates events?

Options:

A.  

Consolidation Policy

B.  

Correlation Unit

C.  

SmartEvent Policy

D.  

SmartEvent GUI

Discussion 0
Questions 73

You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?

Options:

A.  

SmartEvent Client Info

B.  

SecuRemote

C.  

Check Point Protect

D.  

Check Point Capsule Cloud

Discussion 0
Questions 74

Which command will allow you to see the interface status?

Options:

A.  

cphaprob interface

B.  

cphaprob –I interface

C.  

cphaprob –a if

D.  

cphaprob stat

Discussion 0
Questions 75

Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.

Options:

A.  

User data base corruption

B.  

LDAP conflicts

C.  

Traffic issues

D.  

Phase two key negotiations

Discussion 0
Questions 76

What has to be taken into consideration when configuring Management HA?

Options:

A.  

The Database revisions will not be synchronized between the management servers

B.  

SmartConsole must be closed prior to synchronized changes in the objects database

C.  

If you wanted to use Full Connectivity Upgrade, you must change the Implied Rules to allow FW1_cpredundant to pass before the Firewall Control Connections.

D.  

For Management Server synchronization, only External Virtual Switches are supported. So, if you wanted to employ Virtual Routers instead, you have to reconsider your design.

Discussion 0
Questions 77

Which two of these Check Point Protocols are used by SmartEvent Processes?

Options:

A.  

ELA and CPD

B.  

FWD and LEA

C.  

FWD and CPLOG

D.  

ELA and CPLOG

Discussion 0
Questions 78

Which features are only supported with R81.10 Gateways but not R77.x?

Options:

A.  

Access Control policy unifies the Firewall, Application Control & URL Filtering, Data Awareness, and Mobile Access Software Blade policies.

B.  

Limits the upload and download throughput for streaming media in the company to 1 Gbps.

C.  

The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.

D.  

Time object to a rule to make the rule active only during specified times.

Discussion 0
Questions 79

What is true about VRRP implementations?

Options:

A.  

VRRP membership is enabled in cpconfig

B.  

VRRP can be used together with ClusterXL, but with degraded performance

C.  

You cannot have a standalone deployment

D.  

You cannot have different VRIDs in the same physical network

Discussion 0
Questions 80

Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidated management console. It empowers the migration from legacy Client-side logic to Server-side logic. The cpm process:

Options:

A.  

Allow GUI Client and management server to communicate via TCP Port 19001

B.  

Allow GUI Client and management server to communicate via TCP Port 18191

C.  

Performs database tasks such as creating, deleting, and modifying objects and compiling policy.

D.  

Performs database tasks such as creating, deleting, and modifying objects and compiling as well as policy code generation.

Discussion 0
Questions 81

Connections to the Check Point R81 Web API use what protocol?

Options:

A.  

HTTPS

B.  

RPC

C.  

VPN

D.  

SIC

Discussion 0
Questions 82

To fully enable Dynamic Dispatcher on a Security Gateway:

Options:

A.  

run fw ctl multik set_mode 9 in Expert mode and then Reboot.

B.  

Using cpconfig, update the Dynamic Dispatcher value to “full” under the CoreXL menu.

C.  

Edit/proc/interrupts to include multik set_mode 1 at the bottom of the file, save, and reboot.

D.  

run fw multik set_mode 1 in Expert mode and then reboot.

Discussion 0
Questions 83

To help SmartEvent determine whether events originated internally or externally you must define using the Initial Settings under General Settings in the Policy Tab. How many options are available to calculate the traffic direction?

Options:

A.  

5 Network; Host; Objects; Services; API

B.  

3 Incoming; Outgoing; Network

C.  

2 Internal; External

D.  

4 Incoming; Outgoing; Internal; Other

Discussion 0
Questions 84

The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?

Options:

A.  

fwd via cpm

B.  

fwm via fwd

C.  

cpm via cpd

D.  

fwd via cpd

Discussion 0
Questions 85

When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?

Options:

A.  

None, Security Management Server would be installed by itself.

B.  

SmartConsole

C.  

SecureClient

D.  

Security Gateway

E.  

SmartEvent

Discussion 0
Questions 86

SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?

Options:

A.  

Application and Client Service

B.  

Network and Application

C.  

Network and Layers

D.  

Virtual Adapter and Mobile App

Discussion 0
Questions 87

Automatic affinity means that if SecureXL is running, the affinity for each interface is automatically reset every

Options:

A.  

15 sec

B.  

60 sec

C.  

5 sec

D.  

30 sec

Discussion 0
Questions 88

fwssd is a child process of which of the following Check Point daemons?

Options:

A.  

fwd

B.  

cpwd

C.  

fwm

D.  

cpd

Discussion 0
Questions 89

The essential means by which state synchronization works to provide failover in the event an active member goes down, ____________ is used specifically for clustered environments to allow gateways to report their own state and learn about the states of other members in the cluster.

Options:

A.  

ccp

B.  

cphaconf

C.  

cphad

D.  

cphastart

Discussion 0
Questions 90

What statement best describes the Proxy ARP feature for Manual NAT in R81.10?

Options:

A.  

Automatic proxy ARP configuration can be enabled

B.  

Translate Destination on Client Side should be configured

C.  

fw ctl proxy should be configured

D.  

local.arp file must always be configured

Discussion 0
Questions 91

You notice that your firewall is under a DDoS attack and would like to enable the Penalty Box feature, which command you use?

Options:

A.  

sim erdos –e 1

B.  

sim erdos – m 1

C.  

sim erdos –v 1

D.  

sim erdos –x 1

Discussion 0
Questions 92

Fill in the blank: The “fw monitor” tool can be best used to troubleshoot ____________________.

Options:

A.  

AV issues

B.  

VPN errors

C.  

Network traffic issues

D.  

Authentication issues

Discussion 0
Questions 93

If there are two administration logged in at the same time to the SmartConsole, and there are objects locked for editing, what must be done to make them available or other administrators? (Choose the BEST answer.)

Options:

A.  

Publish or discard the session.

B.  

Revert the session.

C.  

Save and install the Policy.

D.  

Delete older versions of database.

Discussion 0
Questions 94

By default, which port does the WebUI listen on?

Options:

A.  

80

B.  

4434

C.  

443

D.  

8080

Discussion 0
Questions 95

In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?

Options:

A.  

Publish changes

B.  

Save changes

C.  

Install policy

D.  

Install database

Discussion 0
Questions 96

You work as a security administrator for a large company. CSO of your company has attended a security conference where he has learnt how hackers constantly modify their strategies and techniques to evade detection and reach corporate resources. He wants to make sure that his company has the tight protections in place. Check Point has been selected for the security vendor.

Which Check Point product protects BEST against malware and zero-day attacks while ensuring quick delivery of safe content to your users?

Options:

A.  

IPS AND Application Control

B.  

IPS, anti-virus and anti-bot

C.  

IPS, anti-virus and e-mail security

D.  

SandBlast

Discussion 0
Questions 97

SmartEvent uses it's event policy to identify events. How can this be customized?

Options:

A.  

By modifying the firewall rulebase

B.  

By creating event candidates

C.  

By matching logs against exclusions

D.  

By matching logs against event rules

Discussion 0
Questions 98

What is the main objective when using Application Control?

Options:

A.  

To filter out specific content.

B.  

To assist the firewall blade with handling traffic.

C.  

To see what users are doing.

D.  

Ensure security and privacy of information.

Discussion 0
Questions 99

When defining QoS global properties, which option below is not valid?

Options:

A.  

Weight

B.  

Authenticated timeout

C.  

Schedule

D.  

Rate

Discussion 0
Questions 100

By default, how often does Threat Emulation update the engine on the Security Gateway?

Options:

A.  

Once per day

B.  

Once an hour

C.  

Once a week

D.  

Twice per day

Discussion 0
Questions 101

What level of CPU load on a Secure Network Distributor would indicate that another may be necessary?

Options:

A.  

Idle <20%

B.  

USR <20%

C.  

SYS <20%

D.  

Wait <20%

Discussion 0
Questions 102

If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsive, which if these steps should NOT be performed:

Options:

A.  

Rename the hostname of the Standby member to match exactly the hostname of the Active member.

B.  

Change the Standby Security Management Server to Active.

C.  

Change the Active Security Management Server to Standby.

D.  

Manually synchronize the Active and Standby Security Management Servers.

Discussion 0
Questions 103

Alice works for a big security outsourcing provider company and as she receives a lot of change requests per day she wants to use for scripting daily (asks the API services from Check Point fof the Management API. Firstly she needs to be aware if the API services are running for the management. Which of the following Check Point Command is true:

Options:

A.  

api mgmt status

B.  

api status

C.  

status api

D.  

status mgmt apt

Discussion 0
Questions 104

Which statement is WRONG regarding the usage of the Central Deployment in SmartConsole?

Options:

A.  

You can install Hotfixes with the Central Deployment in SmartConsole

B.  

You can install Jumbo Hotfix accumulators with the Central Deployment in SmartConsole.

C.  

Only be installed Hotfixes can with the Central Deployment in SmartConsole

D.  

You can upgrade your cluster without user intervention with the Central Deployment in SmartConsole from R80.40 to R81.10.

Discussion 0
Questions 105

What is the recommended configuration when the customer requires SmartLog indexing for 14 days and SmartEvent to keep events for 180 days?

Options:

A.  

Use Multi-Domain Management Server.

B.  

Choose different setting for log storage and SmartEvent db

C.  

Install Management and SmartEvent on different machines.

D.  

it is not possible.

Discussion 0
Questions 106

What is the command to check the status of Check Point processes?

Options:

A.  

top

B.  

cptop

C.  

cphaprob list

D.  

cpwd_admin list

Discussion 0
Questions 107

Alice & Bob are going to deploy Management Data Plane Separation (MDPS) for all their Check Point Security Gateway(s)/Cluster(s). Which of the following statement is true?

Options:

A.  

Each network environment is dependent and includes interfaces, routes, sockets, and processes

B.  

Management Plane – To access, provision and monitor the Security Gateway

C.  

Data Plane – To access, provision and monitor the Security Gateway

D.  

Management Plane – for all other network traffic and processing

Discussion 0
Questions 108

Which statements below are CORRECT regarding Threat Prevention profiles in Smart Dashboard?

Options:

A.  

You can assign only one profile per gateway and a profile can be assigned to one rule Only.

B.  

You can assign multiple profiles per gateway and a profile can be assigned to one rule only.

C.  

You can assign multiple profiles per gateway and a profile can be assigned to one or more rules.

D.  

You can assign only one profile per gateway and a profile can be assigned to one or more rules.

Discussion 0
Questions 109

Fill in the blank: The command ___________________ provides the most complete restoration of a R81 configuration.

Options:

A.  

upgrade_import

B.  

cpconfig

C.  

fwm dbimport -p

D.  

cpinfo –recover

Discussion 0
Questions 110

Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.

Options:

A.  

TCP port 19009

B.  

TCP Port 18190

C.  

TCP Port 18191

D.  

TCP Port 18209

Discussion 0
Questions 111

In a Client to Server scenario, which inspection point is the first point immediately following the tables and rule base check of a packet coming from outside of the network?

Options:

A.  

Big l

B.  

Little o

C.  

Little i

D.  

Big O

Discussion 0
Questions 112

Which TCP-port does CPM process listen to?

Options:

A.  

18191

B.  

18190

C.  

8983

D.  

19009

Discussion 0
Questions 113

Which command collects diagnostic data for analyzing customer setup remotely?

Options:

A.  

cpinfo

B.  

migrate export

C.  

sysinfo

D.  

cpview

Discussion 0
Questions 114

What is the correct command to observe the Sync traffic in a VRRP environment?

Options:

A.  

fw monitor –e “accept[12:4,b]=224.0.0.18;”

B.  

fw monitor –e “accept port(6118;”

C.  

fw monitor –e “accept proto=mcVRRP;”

D.  

fw monitor –e “accept dst=224.0.0.18;”

Discussion 0
Questions 115

What is the mechanism behind Threat Extraction?

Options:

A.  

This a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender.

B.  

This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy it prior to sending it to the intended recipient.

C.  

This is a new mechanism to identify the IP address of the sender of malicious codes and put it into the SAM database (Suspicious Activity Monitoring).

D.  

Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast.

Discussion 0
Questions 116

Which view is NOT a valid CPVIEW view?

Options:

A.  

IDA

B.  

RAD

C.  

PDP

D.  

VPN

Discussion 0
Questions 117

What Factor preclude Secure XL Templating?

Options:

A.  

Source Port Ranges/Encrypted Connections

B.  

IPS

C.  

ClusterXL in load sharing Mode

D.  

CoreXL

Discussion 0
Questions 118

The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?

Options:

A.  

Secure Internal Communication (SIC)

B.  

Restart Daemons if they fail

C.  

Transfers messages between Firewall processes

D.  

Pulls application monitoring status

Discussion 0
Questions 119

If you needed the Multicast MAC address of a cluster, what command would you run?

Options:

A.  

cphaprob –a if

B.  

cphaconf ccp multicast

C.  

cphaconf debug data

D.  

cphaprob igmp

Discussion 0
Questions 120

Your manager asked you to check the status of SecureXL, and its enabled templates and features. What command will you use to provide such information to manager?

Options:

A.  

fw accel stat

B.  

fwaccel stat

C.  

fw acces stats

D.  

fwaccel stats

Discussion 0
Questions 121

Which statement is true regarding redundancy?

Options:

A.  

System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob –f if command.

B.  

ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.

C.  

Machines in a ClusterXL High Availability configuration must be synchronized.

D.  

Both ClusterXL and VRRP are fully supported by Gaia and available to all Check Point appliances, open servers, and virtualized environments.

Discussion 0
Questions 122

In R81 spoofing is defined as a method of:

Options:

A.  

Disguising an illegal IP address behind an authorized IP address through Port Address Translation.

B.  

Hiding your firewall from unauthorized users.

C.  

Detecting people using false or wrong authentication logins

D.  

Making packets appear as if they come from an authorized IP address.

Discussion 0
Questions 123

Which command would disable a Cluster Member permanently?

Options:

A.  

clusterXL_admin down

B.  

cphaprob_admin down

C.  

clusterXL_admin down-p

D.  

set clusterXL down-p

Discussion 0
Questions 124

What will be the effect of running the following command on the Security Management Server?

Options:

A.  

Remove the installed Security Policy.

B.  

Remove the local ACL lists.

C.  

No effect.

D.  

Reset SIC on all gateways.

Discussion 0
Questions 125

What is the minimum amount of RAM needed for a Threat Prevention Appliance?

Options:

A.  

6 GB

B.  

8GB with Gaia in 64-bit mode

C.  

4 GB

D.  

It depends on the number of software blades enabled

Discussion 0
Questions 126

For best practices, what is the recommended time for automatic unlocking of locked admin accounts?

Options:

A.  

20 minutes

B.  

15 minutes

C.  

Admin account cannot be unlocked automatically

D.  

30 minutes at least

Discussion 0
Questions 127

What will SmartEvent automatically define as events?

Options:

A.  

Firewall

B.  

VPN

C.  

IPS

D.  

HTTPS

Discussion 0
Questions 128

How many layers make up the TCP/IP model?

Options:

A.  

2

B.  

7

C.  

6

D.  

4

Discussion 0
Questions 129

What is not a purpose of the deployment of Check Point API?

Options:

A.  

Execute an automated script to perform common tasks

B.  

Create a customized GUI Client for manipulating the objects database

C.  

Create products that use and enhance the Check Point solution

D.  

Integrate Check Point products with 3rd party solution

Discussion 0
Questions 130

Which is NOT a SmartEvent component?

Options:

A.  

SmartEvent Server

B.  

Correlation Unit

C.  

Log Consolidator

D.  

Log Server

Discussion 0
Questions 131

Which Check Point daemon invokes and monitors critical processes and attempts to restart them if they fail?

Options:

A.  

fwm

B.  

cpd

C.  

cpwd

D.  

cpm

Discussion 0
Questions 132

After having saved the Cllsh Configuration with the "save configuration config.txt* command, where can you find the config.txt file?

Options:

A.  

You will find it in the home directory of your usef account (e.g. /home/admirV)

B.  

You can locate the file via SmartConsole > Command Line.

C.  

You have to launch the WebUl and go to "Config" -> "Export Conflg File" and specifly the destination directory of your local tile system

D.  

You cannot locate the file in the file system sine© Clish does not have any access to the bash fie system

Discussion 0
Questions 133

How can you grant GAiAAPI Permissions for a newly created user?

Options:

A.  

Assign the user a permission profile in SmartConsole

B.  

Assign the user the admin RBAC role in dish

C.  

No need to grant access since every user has access by default.

D.  

In bash, use the following command: "gaia_api access --user Tom -enable true"

Discussion 0
Questions 134

What needs to be configured if the NAT property ‘Translate destination or client side’ is not enabled in Global Properties?

Options:

A.  

A host route to route to the destination IP.

B.  

Use the file local.arp to add the ARP entries for NAT to work.

C.  

Nothing, the Gateway takes care of all details necessary.

D.  

Enabling ‘Allow bi-directional NAT’ for NAT to work correctly.

Discussion 0
Questions 135

To optimize Rule Base efficiency, the most hit rules should be where?

Options:

A.  

Removed from the Rule Base.

B.  

Towards the middle of the Rule Base.

C.  

Towards the top of the Rule Base.

D.  

Towards the bottom of the Rule Base.

Discussion 0
Questions 136

What are the two types of tests when using the Compliance blade?

Options:

A.  

Policy-based tests and Global properties

B.  

Global tests and Object-based tests

C.  

Access Control policy analysis and Threat Prevention policy analysis

D.  

Tests conducted based on the loC XMfcfile and analysis of SOLR documents

Discussion 0
Questions 137

In Advanced Permanent Tunnel Configuration, to set the amount of time the tunnel test runs without a

response before the peer host is declared ‘down’, you would set the_________?

Options:

A.  

life sign polling interval

B.  

life sign timeout

C.  

life_sign_polling_interval

D.  

life_sign_timeout

Discussion 0
Questions 138

Which of the following Check Point commands is true to enable Multi-Version Cluster (MVC)?

Options:

A.  

Check Point Security Management HA (Secondary): set cluster member mvc on

B.  

Check Point Security Gateway Only: set cluster member mvc on

C.  

Check Point Security Management HA (Primary): set cluster member mvc on

D.  

Check Point Security Gateway Cluster Member: set cluster member mvc on

Discussion 0
Questions 139

What command is used to manually failover a Multi-Version Cluster during the upgrade?

Options:

A.  

clusterXL_admin down in Expert Mode

B.  

clusterXL_admin down in Clish

C.  

set cluster member state down in Clish

D.  

set cluster down in Expert Mode

Discussion 0
Questions 140

Which Correction mechanisms are available with ClusterXL under R81.10?

Options:

A.  

Correction Mechanisms are only available of Maestro Hyperscale Orchestrators

B.  

Pre-Correction and SDF (Sticky Decision Function)

C.  

SDF (Sticky Decision Function) and Flush and ACK

D.  

Dispatcher (Early Correction) and Firewall (Late Correction)

Discussion 0
Questions 141

What traffic does the Anti-bot feature block?

Options:

A.  

Command and Control traffic from hosts that have been identified as infected

B.  

Command and Control traffic to servers with reputation for hosting malware

C.  

Network traffic that is directed to unknown or malicious servers

D.  

Network traffic to hosts that have been identified as infected

Discussion 0
Questions 142

Fill in the blank: A new license should be generated and installed in all of the following situations EXCEPT when ________ .

Options:

A.  

The license is attached to the wrong Security Gateway.

B.  

The existing license expires.

C.  

The license is upgraded.

D.  

The IP address of the Security Management or Security Gateway has changed.

Discussion 0
Questions 143

IF the first packet of an UDP session is rejected by a rule definition from within a security policy (not including the clean up rule), what message is sent back through the kernel?

Options:

A.  

Nothing

B.  

TCP FIN

C.  

TCP RST

D.  

ICMP unreachable

Discussion 0
Questions 144

What destination versions are supported for a Multi-Version Cluster Upgrade?

Options:

A.  

R81.40 and later

B.  

R76 and later

C.  

R70 and Later

D.  

R81.10 and Later

Discussion 0
Questions 145

After finishing installation admin John likes to use top command in expert mode. John has to set the expert-password and was able to use top command. A week later John has to use the top command again, He detected that the expert password is no longer valid. What is the most probable reason for this behavior?

Options:

A.  

“write memory” was not issued on clish

B.  

changes are only possible via SmartConsole

C.  

“save config” was not issued in expert mode

D.  

“save config” was not issued on clish

Discussion 0
Questions 146

What command is used to manually failover a cluster during a zero-downtime upgrade?

Options:

A.  

set cluster member down

B.  

cpstop

C.  

clusterXL_admin down

D.  

set clusterXL down

Discussion 0
Questions 147

What a valid SecureXL paths in R81.10?

Options:

A.  

F2F (Slow path). Templated Path. PQX and F2V

B.  

F2F (Slow path). PXL, QXL and F2V

C.  

F2F (Slow path), Accelerated Path, PQX and F2V

D.  

F2F (Slow path), Accelerated Path, Medium Path and F2V

Discussion 0
Questions 148

The log server sends what to the Correlation Unit?

Options:

A.  

Authentication requests

B.  

CPMI dbsync

C.  

Logs

D.  

Event Policy

Discussion 0
Questions 149

In which scenario will an administrator need to manually define Proxy ARP?

Options:

A.  

When they configure an "Automatic Static NAT" which translates to an IP address that does not belong to one of the firewall’s interfaces.

B.  

When they configure an "Automatic Hide NAT" which translates to an IP address that does not belong to one of the firewall’s interfaces.

C.  

When they configure a "Manual Static NAT" which translates to an IP address that does not belong to one of the firewall’s interfaces.

D.  

When they configure a "Manual Hide NAT" which translates to an IP address that belongs to one of the firewall’s interfaces.

Discussion 0
Questions 150

The Check Point installation history feature in provides the following:

Options:

A.  

View install changes and install specific version

B.  

Policy Installation Date only

C.  

Policy Installation Date, view install changes and install specific version

D.  

View install changes

Discussion 0
Questions 151

Alice & Bob are going to use Management Data Plane Separation and therefore the routing separation needs to be enabled. Which of the following command is true for enabling the Management Data Plane Separation (MDPS):

Options:

A.  

set mdps split brain on

B.  

set mdps split plane on

C.  

set mdps mgmt plane on

D.  

set mdps data plane off

Discussion 0
Questions 152

You have used the "set inactivity-timeout 120" command to prevent the session to be disconnected after 10 minutes of inactivity. However, the Web session is being disconnected after 10 minutes. Why?

Options:

A.  

The idle timeout for the web session is specified with the "set web session-timeout" command.

B.  

The number specified is the amount of the idle timeout in seconds rather than in minutes. So you have to use the command "set inactivity-timeout 600" instead.

C.  

Probably, you have forgotten to make sure that nobody is accessing the management server via the SmartConsole which locks the management database.

D.  

The number of minutes is correct. Probably, you have forgotten to save this setting with the "save config" command.

Discussion 0
Questions 153

Installations and upgrades with CPUSE require that the CPUSE agent is up-to-date. Usually the latest build is downloaded automatically. How can you verify the CPUSE agent build?

Options:

A.  

In WebUI Status and Actions page or by running the following command in CLISH: show installer status build

B.  

In WebUI Status and Actions page or by running the following command in CLISH: show installer status version

C.  

In the Management Server or Gateway object in SmartConsole or by running the following command in CLISH: show installer status build

D.  

In the Management Server or Gateway object in SmartConsole or by running the following command in CLISH: show installer agent

Discussion 0
Questions 154

Which 3 types of tracking are available for Threat Prevention Policy?

Options:

A.  

SMS Alert, Log, SNMP alert

B.  

Syslog, None, User-defined scripts

C.  

None, Log, Syslog

D.  

Alert, SNMP trap, Mail

Discussion 0
Questions 155

What is the best method to upgrade a Security Management Server to R81.x when it is not connected to the Internet?

Options:

A.  

CPUSE offline upgrade only

B.  

Advanced upgrade or CPUSE offline upgrade

C.  

Advanced Upgrade only

D.  

SmartUpdate offline upgrade

Discussion 0
Questions 156

When using the Mail Transfer Agent, where are the debug logs stored?

Options:

A.  

$FWDIR/bin/emaild.mta. elg

B.  

$FWDIR/log/mtad elg

C.  

/var/log/mail.mta elg

D.  

$CPDIR/log/emaild elg

Discussion 0
Questions 157

What state is the Management HA in when both members have different policies/databases?

Options:

A.  

Synchronized

B.  

Never been synchronized

C.  

Lagging

D.  

Collision

Discussion 0
Questions 158

Which of the following statements about Site-to-Site VPN Domain-based is NOT true?

Options:

A.  

Domain-based- VPN domains are pre-defined for all VPN Gateways.

When the Security Gateway encounters traffic originating from one VPN Domain with the destination to a VPN Domain of another VPN Gateway, that traffic is identified as VPN traffic and is sent through the VPN Tunnel between the two Gateways.

B.  

Route-based- The Security Gateways will have a Virtual Tunnel Interface (VTI) for each VPN Tunnel with a peer VPN Gateway. The Routing Table can have routes to

forward traffic to these VTIs. Any traffic routed through a VTI is automatically identified as VPN Traffic and is passed through the VPN Tunnel associated with the VTI.

C.  

Domain-based- VPN domains are pre-defined for all VPN Gateways.

A VPN domain is a service or user that can send or receive VPN traffic through a VPN Gateway.

D.  

Domain-based- VPN domains are pre-defined for all VPN Gateways. A VPN domain is a host or network that can send or receive VPN traffic through a VPN Gateway.

Discussion 0
Questions 159

When setting up an externally managed log server, what is one item that will not be configured on the R81 Security Management Server?

Options:

A.  

IP

B.  

SIC

C.  

NAT

D.  

FQDN

Discussion 0
Questions 160

What is the most recommended way to install patches and hotfixes?

Options:

A.  

CPUSE Check Point Update Service Engine

B.  

rpm -Uv

C.  

Software Update Service

D.  

UnixinstallScript

Discussion 0
Questions 161

Which command gives us a perspective of the number of kernel tables?

Options:

A.  

fw tab -t

B.  

fw tab -s

C.  

fw tab -n

D.  

fw tab -k

Discussion 0
Questions 162

The following command is used to verify the CPUSE version:

Options:

A.  

HostName:0>show installer status build

B.  

[Expert@HostName:0]#show installer status

C.  

[Expert@HostName:0]#show installer status build

D.  

HostName:0>show installer build

Discussion 0
Questions 163

Which command shows detailed information about VPN tunnels?

Options:

A.  

cat $FWDIR/conf/vpn.conf

B.  

vpn tu tlist

C.  

vpn tu

D.  

cpview

Discussion 0
Questions 164

John is using Management HA. Which Smartcenter should be connected to for making changes?

Options:

A.  

secondary Smartcenter

B.  

active Smartenter

C.  

connect virtual IP of Smartcenter HA

D.  

primary Smartcenter

Discussion 0
Questions 165

When installing a dedicated R81 SmartEvent server. What is the recommended size of the root partition?

Options:

A.  

Any size

B.  

Less than 20GB

C.  

More than 10GB and less than 20GB

D.  

At least 20GB

Discussion 0
Questions 166

Which Remote Access Client does not provide an Office-Mode Address?

Options:

A.  

SecuRemote

B.  

Endpoint Security Suite

C.  

Endpoint Security VPN

D.  

Check Point Mobile

Discussion 0
Questions 167

Which of the following links will take you to the SmartView web application?

Options:

A.  

https:// /smartviewweb/

B.  

https:// /smartview/

C.  

https:// smartviewweb

D.  

https:// /smartview

Discussion 0
Questions 168

What is considered Hybrid Emulation Mode?

Options:

A.  

Manual configuration of file types on emulation location.

B.  

Load sharing of emulation between an on premise appliance and the cloud.

C.  

Load sharing between OS behavior and CPU Level emulation.

D.  

High availability between the local SandBlast appliance and the cloud.

Discussion 0
Questions 169

Using ClusterXL, what statement is true about the Sticky Decision Function?

Options:

A.  

Can only be changed for Load Sharing implementations

B.  

All connections are processed and synchronized by the pivot

C.  

Is configured using cpconfig

D.  

Is only relevant when using SecureXL

Discussion 0
Questions 170

What is the name of the secure application for Mail/Calendar for mobile devices?

Options:

A.  

Capsule Workspace

B.  

Capsule Mail

C.  

Capsule VPN

D.  

Secure Workspace

Discussion 0
Questions 171

In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies the type of traffic applicable to the chain module. For Wire Mode configuration, chain modules marked with ____________ will not apply.

Options:

A.  

ffff

B.  

1

C.  

2

D.  

3

Discussion 0
Questions 172

SandBlast has several functional components that work together to ensure that attacks are prevented in real-time. Which the following is NOT part of the SandBlast component?

Options:

A.  

Threat Emulation

B.  

Mobile Access

C.  

Mail Transfer Agent

D.  

Threat Cloud

Discussion 0
Questions 173

SmartEvent does NOT use which of the following procedures to identify events:

Options:

A.  

Matching a log against each event definition

B.  

Create an event candidate

C.  

Matching a log against local exclusions

D.  

Matching a log against global exclusions

Discussion 0
Questions 174

How often does Threat Emulation download packages by default?

Options:

A.  

Once a week

B.  

Once an hour

C.  

Twice per day

D.  

Once per day

Discussion 0