CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is:
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidated management console. It empowers the migration from legacy Client-side logic to Server-side logic. The cpm process:
NAT rules are prioritized in which order?
1. Automatic Static NAT
2. Automatic Hide NAT
3. Manual/Pre-Automatic NAT
4. Post-Automatic/Manual NAT rules
What is the name of the secure application for Mail/Calendar for mobile devices?
When gathering information about a gateway using CPINFO, what information is included or excluded when using the “-x” parameter?
With Mobile Access enabled, administrators select the web-based and native applications that can be accessed by remote users and define the actions that users can perform the applications. Mobile Access encrypts all traffic using:
In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies the type of traffic applicable to the chain module. For Wire Mode configuration, chain modules marked with ____________ will not apply.
SmartEvent has several components that function together to track security threats. What is the function of the Correlation Unit as a component of this architecture?
: 131
Which command is used to display status information for various components?
You find one of your cluster gateways showing “Down” when you run the “cphaprob stat” command. You then run the “clusterXL_admin up” on the down member but unfortunately the member continues to show down. What command do you run to determine the cause?
Using Threat Emulation technologies, what is the best way to block .exe and .bat file types?
John is using Management HA. Which Smartcenter should be connected to for making changes?
Which command can you use to verify the number of active concurrent connections?
SandBlast has several functional components that work together to ensure that attacks are prevented in real-time. Which the following is NOT part of the SandBlast component?
John detected high load on sync interface. Which is most recommended solution?
As a valid Mobile Access Method, what feature provides Capsule Connect/VPN?
In SmartEvent, what are the different types of automatic reactions that the administrator can configure?
When installing a dedicated R81 SmartEvent server. What is the recommended size of the root partition?
To enable Dynamic Dispatch on Security Gateway without the Firewall Priority Queues, run the following command in Expert mode and reboot:
For Management High Availability, which of the following is NOT a valid synchronization status?
Which command shows the current connections distributed by CoreXL FW instances?
Using ClusterXL, what statement is true about the Sticky Decision Function?
Please choose correct command to add an “emailserver1” host with IP address 10.50.23.90 using GAiA management CLI?
How would you deploy TE250X Check Point appliance just for email traffic and in-line mode without a Check Point Security Gateway?
What is the main difference between Threat Extraction and Threat Emulation?
Which of the following links will take you to the SmartView web application?
Which configuration file contains the structure of the Security Server showing the port numbers, corresponding protocol name, and status?
In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?
Your manager asked you to check the status of SecureXL, and its enabled templates and features. What command will you use to provide such information to manager?
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
Where you can see and search records of action done by R81 SmartConsole administrators?
Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?
Which of the following authentication methods ARE NOT used for Mobile Access?
To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot:
When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.
SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?
Automatic affinity means that if SecureXL is running, the affinity for each interface is automatically reset every
Which of the following statements about Site-to-Site VPN Domain-based is NOT true?
Identity Awareness allows easy configuration for network access and auditing based on what three items?
Alice works for a big security outsourcing provider company and as she receives a lot of change requests per day she wants to use for scripting daily (asks the API services from Check Point fof the Management API. Firstly she needs to be aware if the API services are running for the management. Which of the following Check Point Command is true:
While enabling the Identity Awareness blade the Identity Awareness wizard does not automatically detect the windows domain. Why does it not detect the windows domain?
What ports are used for SmartConsole to connect to the Security Management Server?
Which is the command to identify the NIC driver before considering about the employment of the Multi-Queue feature?
Hit Count is a feature to track the number of connections that each rule matches, which one is not benefit of Hit Count.
The “Hit count” feature allows tracking the number of connections that each rule matches. Will the Hit count feature work independently from logging and Track the hits if the Track option is set to “None”?
Alice knows about the Check Point Management HA installation from Bob and needs to know which Check Point Security Management Server is currently capable of issuing and managing certificate. Alice uses the Check Point command "cpconfig'' to run the Check Point Security Management Server configuration tool on both Check Point Management HA instances "Primary & Secondary" Which configuration option does she need to look for:
Joey want to configure NTP on R81 Security Management Server. He decided to do this via WebUI. What is the correct address to access the Web UI for Gaia platform via browser?
Bob works for a big security outsourcing provider company and as he receives a lot of change requests per day he wants to use for scripting daily tasks the API services (torn Check Point for the GAIA API. Firstly he needs to be aware if the API services are running for the GAIA operating system. Which of the following Check Point Command is true:
In which deployment is the security management server and Security Gateway installed on the same appliance?
After replacing a faulty Gateway the admin installed the new Hardware and want to push the policy. Installing the policy using the SmartConsole he got an Error for the Threat Prevention Policy. There is no error for the Access Control Policy. What will be the most common cause for the issue?
In Threat Prevention, you can create new or clone profiles but you CANNOT change the out-of-the-box profiles of:
Matt wants to upgrade his old Security Management server to R81.x using the Advanced Upgrade with Database Migration. What is one of the requirements for a successful upgrade?
Which of the following Check Point commands is true to enable Multi-Version Cluster (MVC)?
What object type would you use to grant network access to an LDAP user group?
GAIA greatly increases operational efficiency by offering an advanced and intuitive software update agent, commonly referred to as the:
John detected high load on sync interface. Which is most recommended solution?
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.
Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?
Which two of these Check Point Protocols are used by SmartEvent Processes?
SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?
The Security Gateway is installed on GAIA R81. The default port for the Web User Interface is ______ .
Which command collects diagnostic data for analyzing customer setup remotely?
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?
What statement best describes the Proxy ARP feature for Manual NAT in R81.20?
During the Check Point Stateful Inspection Process, for packets that do not pass Firewall Kernel Inspection and are rejected by the rule definition, packets are:
Which of the following technologies extracts detailed information from packets and stores that information in state tables?
Which of the following is NOT a VPN routing option available in a star community?
Which Check Point software blade provides Application Security and identity control?
The essential means by which state synchronization works to provide failover in the event an active member goes down, ____________ is used specifically for clustered environments to allow gateways to report their own state and learn about the states of other members in the cluster.
Which of the following is NOT an option to calculate the traffic direction?
Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?
You notice that your firewall is under a DDoS attack and would like to enable the Penalty Box feature, which command you use?
The system administrator of a company is trying to find out why acceleration is not working for the traffic. The traffic is allowed according to the rule base and checked for viruses. But it is not accelerated.
What is the most likely reason that the traffic is not accelerated?
Vanessa is a Firewall administrator. She wants to test a backup of her company’s production Firewall cluster Dallas_GW. She has a lab environment that is identical to her production environment. She decided to restore production backup via SmartConsole in lab environment.
Which details she need to fill in System Restore window before she can click OK button and test the backup?
The SmartEvent R81 Web application for real-time event monitoring is called:
Joey wants to upgrade from R75.40 to R81 version of Security management. He will use Advanced Upgrade with Database Migration method to achieve this.
What is one of the requirements for his success?
Please choose the path to monitor the compliance status of the Check Point R81.20 based management.
You have a Gateway is running with 2 cores. You plan to add a second gateway to build a cluster and used a device with 4 cores.
How many cores can be used in a Cluster for Firewall-kernel on the new device?
What will be the effect of running the following command on the Security Management Server?
Using Web Services to access the API, which Header Name-Value had to be in the HTTP Post request after the login?
What is the correct description for the Dynamic Balancing / Split feature?
Fill in the blank: An identity server uses a _________________ to trust a Terminal Server Identity Agent.
UserCheck objects in the Application Control and URL Filtering rules allow the gateway to communicate with the users. Which action is not supported in UserCheck objects?
In R81.20 a new feature dynamic log distribution was added. What is this for?
How many versions, besides the destination version, are supported in a Multi-Version Cluster Upgrade?
What needs to be configured if the NAT property ‘Translate destination or client side’ is not enabled in Global Properties?
Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security Gateway?
Which method below is NOT one of the ways to communicate using the Management API’s?
Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?
Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.
R81.20 management server can manage gateways with which versions installed?
Check Pont Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster Members over Check Point SIC _______ .
Session unique identifiers are passed to the web api using which http header option?
Which of the SecureXL templates are enabled by default on Security Gateway?
In the Check Point Security Management Architecture, which component(s) can store logs?
An established connection is going to www.google.com. The Application Control Blade Is inspecting the traffic. If SecureXL and CoreXL are both enabled, which path is handling the traffic?
You pushed a policy to your gateway and you cannot access the gateway remotely any more. What command should you use to remove the policy from the gateway by logging in through console access?
By default, what type of rules in the Access Control rulebase allow the control connections?
Alice wants to upgrade the current security management machine from R80.40 to R81.20 and she wants to check the Deployment Agent status over the GAIA CLISH. Which of the following GAIACLISH command is true?
Which of the following is an authentication method used for Identity Awareness?
What API command below creates a new host with the name “New Host” and IP address of “192.168.0.10”?
Which of the following is NOT a type of Check Point API available in R81.x?
You are investigating issues with to gateway cluster members are not able to establish the first initial cluster synchronization. What service is used by the FWD daemon to do a Full Synchronization?
To accelerate the rate of connection establishment, SecureXL groups all connection that match a particular service and whose sole differentiating element is the source port. The type of grouping enables even the very first packets of a TCP handshake to be accelerated. The first packets of the first connection on the same service will be forwarded to the Firewall kernel which will then create a template of the connection. Which of the these is NOT a SecureXL template?
SmartEvent does NOT use which of the following procedures to identify events:
Which of the following Windows Security Events will not map a username to an IP address in Identity Awareness?
Pamela is Cyber Security Engineer working for Global Instance Firm with large scale deployment of Check Point Enterprise Appliances using GAiA/R81.20. Company’s Developer Team is having random access issue to newly deployed Application Server in DMZ’s Application Server Farm Tier and blames DMZ Security Gateway as root cause. The ticket has been created and issue is at Pamela’s desk for an investigation. Pamela decides to use Check Point’s Packet Analyzer Tool-fw monitor to iron out the issue during approved Maintenance window.
What do you recommend as the best suggestion for Pamela to make sure she successfully captures entire traffic in context of Firewall and problematic traffic?
To ensure that VMAC mode is enabled, which CLI command should you run on all cluster members?
Which statement is most correct regarding about “CoreXL Dynamic Dispatcher”?
Which file contains the host address to be published, the MAC address that needs to be associated with the IP Address, and the unique IP of the interface that responds to ARP request?
When SecureXL is enabled, all packets should be accelerated, except packets that match the following conditions:
GAiA Software update packages can be imported and installed offline in situation where:
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ________ .
The ____ software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware.
One of major features in R81 SmartConsole is concurrent administration.
Which of the following is NOT possible considering that AdminA, AdminB and AdminC are editing the same Security Policy?
After the initial installation on Check Point appliance, you notice that the Management-interface and default gateway are incorrect.
Which commands could you use to set the IP to 192.168.80.200/24 and default gateway to 192.168.80.1.
Which command would you use to set the network interfaces’ affinity in Manual mode?
Check Point security components are divided into the following components: