New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

You need to capture NAT information into packet capture, what tool is the best suitable for this task?

A.

tcpdump

B.

fw monitor

C.

cppcap

D.

fw ctl zdebug + xlate xltrc nat

Full Access
Question # 5

After manipulating the rulebase and objects with SmartConsole the application crashes and closes immediately. To troubleshoot, you will need to review the crash report. In which directory on the host PC will you find this report?

A.

\data\crash_report\

B.

\data\crash_report\

C.

\data\crash_report

D.

\crash_report\data\

Full Access
Question # 6

What is the port for the Log Collection on Security Management Server?

A.

18191

B.

443

C.

258

D.

257

Full Access
Question # 7

How many captures does the command "fw monitor -p all" take?

A.

All 15 of the inbound and outbound modules

B.

The -p option takes the same number of captures, but gathers all of the data packet

C.

1 from every inbound and outbound module of the chain

D.

All 4 points of the fw VM modules

Full Access
Question # 8

Which command shows the installed licenses and contracts on a Check Point device?

A.

cplicenses print -x

B.

cplic print-s

C.

fwlic print -x

D.

cplic print-x

Full Access
Question # 9

What Check Point process controls logging?

A.

CPWD

B.

FWD

C.

CPD

D.

CPM

Full Access
Question # 10

Check Point's self-service knowledge base of technical documents and tools covers everything from articles describing how to fix specific issues, understand error messages and to how to plan and perform product installation and upgrades. This knowledge base is called:

A.

SupportCenterBase

B.

SecureDocs

C.

SupportDocs

D.

SecureKnowledge

Full Access
Question # 11

How do you verify that Proxy ARP entries are loaded into the kernel?

A.

fw ctl arp

B.

show arp dynamic all

C.

This information can be viewed in the logs, under NAT section of log, field: Proxy ARP entry

D.

fw ctl get arp list all

Full Access
Question # 12

Which of the following is NOT an account user classification?

A.

Licensers

B.

Manager

C.

Viewer

D.

Administrator

Full Access
Question # 13

What are some measures you can take to prevent IPS false positives?

A.

Capture packets, Update the IPS database, and Back up custom IPS files

B.

Use Recommended IPS profile

C.

Use IPS only in Detect mode

D.

Exclude problematic services from being protected by IPS (sip, H.323, etc.)

Full Access
Question # 14

Which of the following is the most significant impact of not having a valid Policy Management license installed on a management server?

A.

Inability to make rule changes

B.

Inability to install policies

C.

Inability to review logs

D.

Inability to log in to SmartConsole

Full Access
Question # 15

During a problem isolation with the OSI model, what layer will you investigate when the issue is ARP or MAC address?

A.

Network level

B.

Layer 2

C.

Physical

D.

Layer 3

Full Access
Question # 16

You want to collect diagnostics data to include with an SR (Service Request). What command or utility best meets your needs?

A.

cpconfig

B.

cpinfo

C.

cpplic

D.

contracts_mgmt

Full Access
Question # 17

Which of the following System Monitoring Commands (Linux) shows process resource utilization, as well as CPU and memory utilization?

A.

df

B.

free

C.

ps

D.

top

Full Access
Question # 18

Customer wants to use autonomous threat prevention. How do you enable it?

A.

Enable Autonomous Threat Prevention on the Security Gateway from the SmartConsole: Gateway and Servers view and enable IPS on the Security Gateway by the command: ips on.

B.

Enable Autonomous Threat Prevention on the Security Gateway from the SmartConsole:Gateway and Servers view, the default profile Strict Security will be selected.

C.

Enable Autonomous Threat Prevention on the Security Gateway from the SmartConsole: Gateway and Servers view, inspection profile is not needed, the Security Gateway will automatically select the best profile according to deployment.

D.

Enable Autonomous Threat Prevention on the Security Gateway from the SmartConsole: Gateway and Servers view, then select inspection profile.

Full Access
Question # 19

Which of the following is NOT a way to insert fw monitor into the chain when troubleshooting packets throughout the chain?

A.

Relative position using id

B.

Absolute position

C.

Relative position using location

D.

Relative position using alias

Full Access
Question # 20

As a security administrator/engineer in your company, you have noticed that your HQ Check Point Security Management Server is not receiving logs from your HQ Check Point Gateway/Cluster. To investigate this issue in the command line, you will need to verify which process is running?

A.

cpm

B.

cpd

C.

fwd

D.

fwm

Full Access
Question # 21

You were asked to set up logging for a rule to log a full list of URLs when the rule hits in the Rule Base. How do you accomplish that?

A.

Set Extended logging under rule log type

B.

Click on the rule, column logging and set "log URL" under application control blade layer

C.

All URLs are logged by default

D.

For URL logging you need to modify blade settings of URL filtering blade under SmartConsole, Manage & Settings, blades, URL filtering

Full Access
Question # 22

UserCenter/PartnerMAP access is based on what criteria?

A.

The certification level achieved by employees of an organization.

B.

User permissions assigned to company contacts.

C.

The certification level achieved by the partner.

D.

The level of Support purchased by a company manager.

Full Access