Exam Questions 156-215.80: Check Point Certified Security Administrator
Exam Questions 156-215.80: Check Point Certified Security Administrator
NEW QUESTION 1
Which of the following commands can be used to remove site-to-site IPSEC Security Associations (SA)?
A. vpn tu
B. vpn ipsec remove -l
C. vpn debug ipsec
D. fw ipsec tu
Answer: A
Explanation: vpn tu
Description Launch the TunnelUtil tool which is used to control VPN tunnels.
Usage vpn tu vpn tunnelutil Example vpn tu Output
NEW QUESTION 2
What does the “unknown” SIC status shown on SmartConsole mean?
A. The SMS can contact the Security Gateway but cannot establish Secure Internal Communication.
B. SIC activation key requires a reset.
C. The SIC activation key is not known by any administrator.
D. There is no connection between the Security Gateway and SMS.
Answer: D
Explanation: The most typical status is Communicating. Any other status indicates that the SIC communication is problematic. For example, if the SIC status is
Unknown then there is no connection between the Gateway an the Security Management server. If the SIC status is Not Communicating, the Security
Management server is able to contact the gateway, but SIC communication cannot be established.
NEW QUESTION 3
You work as a security administrator for a large company. CSO of your company has attended a security conference where he has learnt how hackers constantly
modify their strategies and techniques to evade detection and reach corporate resources. He wants to make sure that his company has the right protections in
place. Check Point has been selected for the security vendor. Which Check Point products protects BEST against malware and zero-day attacks while ensuring
quick delivery of safe content to your users?
Answer: D
NEW QUESTION 4
You have enabled “Full Log” as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?
Answer: A
Explanation: The most likely reason for the logs data to stop is the low disk space on the logging device, which can be the Management Server or the Gateway
Server.
NEW QUESTION 5
Which product correlates logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?
A. SmartView Monitor
B. SmartEvent
C. SmartUpdate
D. SmartDashboard
Answer: B
Explanation: SmartEvent correlates logs from all Check Point enforcement points, including end-points, to identify suspicious activity from the clutter. Rapid data
analysis and custom event logs immediately alert administrators to anomalous behavior such as someone attempting to use the same credential in multiple
geographies simultaneously.
NEW QUESTION 6
Which of the following technologies extracts detailed information from packets and stores that information in state tables?
A. INSPECT Engine
B. Stateful Inspection
C. Packet Filtering
D. Application Layer Firewall
Answer: B
NEW QUESTION 7
What are the three essential components of the Check Point Security Management Architecture?
Answer: A
Explanation: Standalone deployment - Security Gateway and the Security Management server are installed on the same machine.
Distributed deployment - Security Gateway and the Security Management server are installed on different machines.
Deployments
Basic deployments:
Assume an environment with gateways on different sites. Each Security Gateway connects to the Internet on one side, and to a LAN on the other.
You can create a Virtual Private Network (VPN) between the two Security Gateways, to secure all communication between them.
The Security Management server is installed in the LAN, and is protected by a Security Gateway. The Security Management server manages the Security
Gateways and lets remote users connect securely to the corporate network. SmartDashboard can be installed on the Security Management server or another
computer.
There can be other OPSEC-partner modules (for example, an Anti-Virus Server) to complete the network security with the Security Management server and its
Security Gateways.
NEW QUESTION 8
Which of the following statements is TRUE about R80 management plug-ins?
Answer: C
NEW QUESTION 9
Which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?
A. Auditor
B. Read Only All
C. Super User
D. Full Access
Answer: B
NEW QUESTION 10
Which of the following is NOT a SecureXL traffic flow?
A. Medium Path
B. Accelerated Path
C. Fast Path
D. Slow Path
Answer: C
Explanation: SecureXL is an acceleration solution that maximizes performance of the Firewall and does not compromise security. When SecureXL is enabled on
a Security Gateway, some CPU intensive operations are processed by virtualized software instead of the Firewall kernel. The Firewall can inspect and process
connections more efficiently and accelerate throughput and connection rates. These are the SecureXL traffic flows:
Slow path - Packets and connections that are inspected by the Firewall and are not processed by SecureXL. Accelerated path - Packets and connections that are
offloaded to SecureXL and are not processed by the
Firewall.
Medium path - Packets that require deeper inspection cannot use the accelerated path. It is not necessary for the Firewall to inspect these packets, they can be
offloaded and do not use the slow path. For example, packets that are inspected by IPS cannot use the accelerated path and can be offloaded to the IPS PSL
(Passive Streaming Library). SecureXL processes these packets more quickly than packets on the slow path.
NEW QUESTION 10
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
Answer: D
Explanation: There are different deployment scenarios for Check Point software products.
Standalone Deployment - The Security Management Server and the Security Gateway are installed on the same computer or appliance.
NEW QUESTION 14
Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?
A. UserCheck
B. Active Directory Query
C. Account Unit Query
D. User Directory Query
Answer: B
Explanation: AD Query extracts user and computer identity information from the Active Directory Security Event Logs. The system generates a Security Event log
entry when a user or computer accesses a network resource. For example, this occurs when a user logs in, unlocks a screen, or accesses a network drive.
Reference : https://sc1.checkpoint.com/documents/R76/CP_R76_IdentityAwareness_AdminGuide/62402.htm
NEW QUESTION 16
The Gaia operating system supports which routing protocols?
Answer: A
NEW QUESTION 18
Which of the following is TRUE regarding Gaia command line?
A. Configuration changes should be done in mgmt_cli and use CLISH for monitoring, Expert mode is used only for OS level tasks.
B. Configuration changes should be done in expert-mode and CLISH is used for monitoring.
C. Configuration changes should be done in mgmt-cli and use expert-mode for OS-level tasks.
D. All configuration changes should be made in CLISH and expert-mode should be used for OS-level tasks.
Answer: D
NEW QUESTION 21
Two administrators Dave and Jon both manage R80 Management as administrators for ABC Corp. Jon logged into the R80 Management and then shortly after
Dave logged in to the same server. They are both in the Security Policies view. From the screenshots below, why does Dave not have the rule no.6 in his
SmartConsole view even though Jon has it his in his SmartConsole view?
A. Jon is currently editing rule no.6 but has Published part of his changes.
B. Dave is currently editing rule no.6 and has marked this rule for deletion.
C. Dave is currently editing rule no.6 and has deleted it from his Rule Base.
D. Jon is currently editing rule no.6 but has not yet Published his changes.
Answer: D
Explanation: When an administrator logs in to the Security Management Server through SmartConsole, a new editing session starts. The changes that the
administrator makes during the session are only available to that administrator. Other administrators see a lock icon on object and rules that are being edited. To
make changes available to all administrators, and to unlock the objects and rules that are being edited, the administrator must publish the session.
NEW QUESTION 26
Which command is used to add users to or from existing roles?
Answer: A
NEW QUESTION 30
Kofi, the administrator of the ABC Corp network wishes to change the default Gaia WebUI Portal port number currently set on the default HTTPS port. Which
CLISH commands are required to be able to change this TCP port?
Answer: A
Explanation: In Clish
Connect to command line on Security Gateway / each
Log in to Clish.
Set the desired port (e.g., port 4434):
Cluster member.
HostName> set web ssl-port <Port_Number>
Save the changes:
HostName> save config
Verify that the configuration was saved:
[Expert@HostName]# grep 'httpd:ssl_port' /config/db/initial References:
NEW QUESTION 35
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?
A. Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.
B. Create a separate Security Policy package for each remote Security Gateway.
C. Create network object that restrict all applicable rules to only certain networks.
D. Run separate SmartConsole instances to login and configure each Security Gateway directly.
Answer: B
NEW QUESTION 38
Which of the following is NOT an authentication scheme used for accounts created through SmartConsole?
A. Security questions
B. Check Point password
C. SecurID
D. RADIUS
Answer: A
NEW QUESTION 42
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ____ .
A. User Directory
B. Captive Portal and Transparent Kerberos Authentication
C. Captive Portal
D. UserCheck
Answer: B
NEW QUESTION 45
What is the purpose of Captive Portal?
Answer: C
Explanation: Captive Portal – a simple method that authenticates users through a web interface before granting them access to Intranet resources. When users
try to access a protected resource, they get a web page that
must be filled out to continue.
Reference : https://www.checkpoint.com/products/identity-awareness-software-blade/
NEW QUESTION 46
Review the following screenshot and select the BEST answer.
Answer: C
NEW QUESTION 50
Joey wants to configure NTP on R80 Security Management Server. He decided to do this via WebUI. What is the correct address to access the Web UI for Gaia
platform via browser?
A. https://<Device_IP_Address>
B. https://<Device_IP_Address>:443
C. https://<Device_IP_Address>:10000
D. https://<Device_IP_Address>:4434
Answer: A
Explanation: Access to Web UI Gaia administration interface, initiate a connection from a browser to the default administration IP address: Logging in to the
WebUI
Logging in
To log in to the WebUI:
Enter this URL in your browser: https://<Gaia IP address>
Enter your user name and password. References:
NEW QUESTION 53
Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does
NOT include a SmartConsole machine in his calculations?
A. One machine, but it needs to be installed using SecurePlatform for compatibility purposes.
B. One machine
C. Two machines
D. Three machines
Answer: C
Explanation: One for Security Management Server and the other one for the Security Gateway.
NEW QUESTION 57
Which application should you use to install a contract file?
A. SmartView Monitor
B. WebUI
C. SmartUpdate
D. SmartProvisioning
Answer: C
Explanation: Using SmartUpdate: If you already use an NGX R65 (or higher) Security Management / Provider-1 /
Multi-Domain Management Server, SmartUpdate allows you to import the service contract file that you have downloaded in Step #3.
Open SmartUpdate and from the Launch Menu select 'Licenses & Contracts' -> 'Update Contracts' -> 'From File...' and provide the path to the file you have
downloaded in Step #3:
Note: If SmartUpdate is connected to the Internet, you can download the service contract file directly from the UserCenter without going through the download and
import steps.
NEW QUESTION 62
Choose the Best place to find a Security Management Server backup file named backup_fw, on a Check Point Appliance.
A. /var/log/Cpbackup/backups/backup/backup_fw.tgs
B. /var/log/Cpbackup/backups/backup/backup_fw.tar
C. /var/log/Cpbackup/backups/backups/backup_fw.tar
D. /var/log/Cpbackup/backups/backup_fw.tgz
Answer: D
Explanation: Gaia's Backup feature allows backing up the configuration of the Gaia OS and of the Security Management server database, or restoring a
previously saved configuration. The configuration is saved to a .tgz file in the following directory:
Gaia OS Version Hardware
Local Directory R75.40 - R77.20
Check Point appliances
/var/log/CPbackup/backups/ Open Server
/var/CPbackup/backups/ R77.30
Check Point appliances
/var/log/CPbackup/backups/ Open Server
NEW QUESTION 66
Fill in the blank: With the User Directory Software Blade, you can create R80 user definitions on a(an) ______ Server.
A. NT domain
B. SMTP
C. LDAP
D. SecurID
Answer: C
NEW QUESTION 69
Which utility shows the security gateway general system information statistics like operating system information and resource usage, and individual software blade
statistics of VPN, Identity Awareness and DLP?
A. cpconfig
B. fw ctl pstat
C. cpview
D. fw ctl multik stat
Answer: C
Explanation: CPView Utility is a text based built-in utility that can be run ('cpview' command) on Security Gateway / Security Management Server / Multi-Domain
Security Management Server. CPView Utility shows statistical data that contain both general system information (CPU, Memory, Disk space) and information for
different Software Blades (only on Security Gateway). The data is continuously updated in easy to access views.
NEW QUESTION 72
Which VPN routing option uses VPN routing for every connection a satellite gateway handles?
Answer: D
Explanation: On the VPN Routing page, enable the VPN routing for satellites section, by selecting one of these options:
To center and to other Satellites through center; this allows connectivity between Gateways; for example, if the spoke Gateways are DAIP Gateways, and the hub
is a Gateway with a static IP address
To center, or through the center to other satellites, to Internet and other VPN targets; this allows connectivity between the Gateways, as well as the ability to
inspect all communication passing through the hub to the Internet.
NEW QUESTION 74
Fill in the blank: The ____ is used to obtain identification and security information about network users.
A. User Directory
B. User server
C. UserCheck
D. User index
Answer: A
NEW QUESTION 77
The following graphic shows:
A. View from SmartLog for logs initiated from source address 10.1.1.202
B. View from SmartView Tracker for logs of destination address 10.1.1.202
C. View from SmartView Tracker for logs initiated from source address 10.1.1.202
D. View from SmartView Monitor for logs initiated from source address 10.1.1.202
Answer: C
NEW QUESTION 78
Which of the following is NOT an integral part of VPN communication within a network?
A. VPN key
B. VPN community
C. VPN trust entities
D. VPN domain
Answer: A
Explanation: VPN key (to not be confused with pre-shared key that is used for authentication).
VPN trust entities, such as a Check Point Internal Certificate Authority (ICA). The ICA is part of the Check Point suite used for creating SIC trusted connection
between Security Gateways, authenticating administrators and third party servers. The ICA provides certificates for internal Security Gateways and remote access
clients which negotiate the VPN link.
VPN Domain - A group of computers and networks connected to a VPN tunnel by one VPN gateway that handles encryption and protects the VPN Domain
members.
VPN Community - A named collection of VPN domains, each protected by a VPN gateway. References:
http://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/13868.htm
NEW QUESTION 79
Fill in the blank: Gaia can be configured using the _____ or _____.
Answer: C
NEW QUESTION 83
What is the order of NAT priorities?
Answer: A
NEW QUESTION 87
Which Check Point feature enables application scanning and the detection?
A. Application Dictionary
B. AppWiki
C. Application Library
D. CPApp
Answer: B
NEW QUESTION 90
An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office. Both offices are protected by Check Point Security Gateway
managed by the same Security Management Server. While configuring the VPN community to specify the pre-shared secret the administrator found that the check
box to enable pre-shared secret is shared and cannot be enabled. Why does it not allow him to specify the pre-shared secret?
Answer: C
NEW QUESTION 94
Which of the following is NOT a license activation method?
A. SmartConsole Wizard
B. Online Activation
C. License Activation Wizard
D. Offline Activation
Answer: A
NEW QUESTION 98
Fill in the blank: The command _____ provides the most complete restoration of a R80 configuration.
A. upgrade_import
B. cpconfig
C. fwm dbimport -p <export file>
D. cpinfo -recover
Answer: A
A. Access control policy, QoS Policy, Desktop Security Policy and endpoint policy.
B. Access control policy, QoS Policy, Desktop Security Policy and Threat Prevention Policy.
C. Firewall policy, address Translation and application and URL filtering, QoS Policy, Desktop Security Policy and Threat Prevention Policy.
D. Access control policy, QoS Policy, Desktop Security Policy and VPN policy.
Answer: D
A. Local licensing because it ties the package license to the IP-address of the gateway and has no dependency of the Security Management Server.
B. Central licensing because it ties the package license to the IP-address of the Security Management Server and has no dependency of the gateway.
C. Local licensing because it ties the package license to the MAC-address of the gateway management interface and has no Security Management Server
dependency.
D. Central licensing because it ties the package license to the MAC-address of the Security Management Server Mgmt-interface and has no dependency of the
gateway.
Answer: B
A. UDP
B. TDP
C. CCP
D. HTTP
Answer: A
Explanation: Parameters:
Answer: B
Explanation: Roles
Role-based administration (RBA) lets you create administrative roles for users. With RBA, an administrator can allow Gaia users to access specified features by
including those features in a role and assigning that role to users. Each role can include a combination of administrative (read/write) access to some features,
monitoring (readonly) access to other features, and no access to other features.
You can also specify which access mechanisms (WebUI or the CLI) are available to the user.
Note - When users log in to the WebUI, they see only those features that they have read-only or read/write access to. If they have read-only access to a feature,
they can see the settings pages, but cannot change the settings.
Gaia includes these predefined roles:
You cannot delete or change the predefined roles.
Note - Do not define a new user for external users. An external user is one that is defined on an authentication server (such as RADIUS or TACACS) and not on
the local Gaia system.
A. Disguising an illegal IP address behind an authorized IP address through Port Address Translation.
B. Hiding your firewall from unauthorized users.
C. Detecting people using false or wrong authentication logins
D. Making packets appear as if they come from an authorized IP address.
Answer: D
Explanation: IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack connections to your network. Attackers use IP spoofing to
send malware and bots to your protected network, to execute DoS attacks, or to gain unauthorized access.
Answer: B
A. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and then if implicit Drop Rule drops the packet, it comes next to IPS
layer and then after accepting the packet it passes to Threat Prevention layer.
B. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and then if there is any rule which accepts the packet, it comes next
to IPS layer and then after accepting the packet it passes to Threat Prevention layer
C. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and then if there is any rule which accepts the packet, it comes next
to Threat Prevention layer and then after accepting the packet it passes to IPS layer.
D. A packet arrives at the gateway, it is checked against the rules in IPS policy layer and then it comes next to the Network policy layer and then after accepting
the packet it passes to Threat Prevention layer.
Answer: B
Explanation: To simplify Policy management, R80 organizes the policy into Policy Layers. A layer is a set of rules, or a Rule Base.
For example, when you upgrade to R80 from earlier versions:
Gateways that have the Firewall and the Application Control Software Blades enabled will have their Access Control Policy split into two ordered layers: Network
and Applications.
When the gateway matches a rule in a layer, it starts to evaluate the rules in the next layer.
Gateways that have the IPS and Threat Emulation Software Blades enabled will have their Threat Prevention policies split into two parallel layers: IPS and Threat
Prevention.
All layers are evaluated in parallel
When the gateway matches a rule in a layer, it starts to evaluate the rules in the next layer.
All layers are evaluated in parallel
A. Traffic that does not match any rule in the subpolicy is dropped.
B. All employees can access only Youtube and Vimeo.
C. Access to Youtube and Vimeo is allowed only once a day.
D. Anyone from internal network can access the internet, expect the traffic defined in drop rules 5.2, 5.5 and 5.6.
Answer: D
R80 introduces the concept of layers and sub-policies, allowing you to segment your policy according to your network segments or business units/functions. In
addition, you can also assign granular privileges by layer or sub-policy to distribute workload and tasks to the most qualified administrators
With layers, the rule base is organized into a set of security rules. These set of rules or layers, are inspected in the order in which they are defined, allowing
control over the rule base flow and the security functionalities that take precedence. If an “accept” action is performed across a layer, the inspection will continue
to the next layer. For example, a compliance layer can be created to overlay across a cross-section of rules.
Sub-policies are sets of rules that are created for a specific network segment, branch office or business unit, so if a rule is matched, inspection will continue
through this subset of rules before it moves on to the next rule.
Sub-policies and layers can be managed by specific administrators, according to their permissions profiles. This facilitates task delegation and workload
distribution.
A. Central
B. Corporate
C. Formal
D. Local
Answer: D
A. infoCP
B. infoview
C. cpinfo
D. fw cpinfo
Answer: C
Explanation: CPInfo is an auto-updatable utility that collects diagnostics data on a customer's machine at the time of execution and uploads it to Check Point
servers (it replaces the standalone cp_uploader utility for uploading files to Check Point servers).
The CPinfo output file allows analyzing customer setups from a remote location. Check Point support engineers can open the CPinfo file in a demo mode, while
viewing actual customer Security Policies and Objects. This allows the in-depth analysis of customer's configuration and environment settings.
When contacting Check Point Support, collect the cpinfo files from the Security Management server and Security Gateways involved in your case.
A. IKE Phase 1
B. IPSEC Phase 2
C. IPSEC Phase 1
D. IKE Phase 2
Answer: D
Answer: D
Answer: C
A. Thread Prevention
B. Access Control
C. Threat Emulation
D. Desktop Security
Answer: A
Explanation: The Exceptions Groups pane lets you define exception groups. When necessary, you can create exception groups to use in the Rule Base. An
exception group contains one or more defined exceptions. This option facilitates ease-of-use so you do not have to manually define exceptions in multiple rules for
commonly required exceptions. You can choose to which rules you want to add exception groups. This means they can be added to some rules and not to others,
depending on necessity.
A. 1, 2, and 3
B. 2 and 3
C. 1 and 2
D. 1 and 3
Answer: C
Answer: A
Answer: D
Explanation: ClusterXL has four working modes. This section briefly describes each mode and its relative advantages and disadvantages.
Load Sharing Multicast Mode
A. DLP
B. SSL Inspection
C. Application Control
D. URL Filtering
Answer: A
Explanation: Check Point revolutionizes DLP by combining technology and processes to move businesses from passive detection to active Data Loss Prevention.
Innovative MultiSpect™ data classification combines user, content and process information to make accurate decisions, while UserCheck™ technology empowers
users to remediate incidents in real time. Check Point’s self-educating network-based DLP solution frees IT/security personnel from incident handling and
educates users on proper data handling policies—protecting sensitive corporate information from both intentional and unintentional loss.
Answer: C
What reason could possibly BEST explain why you are unable to connect to SmartDashboard?
A. CDP is down
B. SVR is down
C. FWM is down
D. CPSM is down
Answer: C
Explanation: The correct answer would be FWM (is the process making available communication between SmartConsole applications and Security Management
Server.). STATE is T (Terminate = Down)
Symptoms
SmartDashboard fails to connect to the Security Management server.
Verify if the FWM process is running. To do this, run the command:
[Expert@HostName:0]# ps -aux | grep fwm
If the FWM process is not running, then try force-starting the process with the following command: [Expert@HostName:0]# cpwd_admin start -name FWM -path
"$FWDIR/bin/fwm" -command "fwm" [Expert@HostName:0]# ps -aux | grep fwm
[Expert@HostName:0]# cpwd_admin start -name FWM -path "$FWDIR/bin/fwm" -command "fwm"
A. 3 month
B. 4 weeks
C. 12 months
D. 6 months
Answer: A
Explanation: Keep Hit Count data up to - Select one of the time range options. The default is 6 months. Data is kept in the Security Management Server database
for this period and is shown in the Hits column.
What can we infer about the recent changes made to the Rule Base?
Answer: D
Explanation: On top of the print screen there is a number "8" which consists for the number of changes made and not saved. Session Management Toolbar (top
of SmartConsole)
A. High Availability
B. Load Sharing Multicast
C. Load Sharing Pivot
D. Master/Backup
Answer: B
Explanation: ClusterXL uses the Multicast mechanism to associate the virtual cluster IP addresses with all cluster members. By binding these IP addresses to a
Multicast MAC address, it ensures that all packets sent to the cluster, acting as a gateway, will reach all members in the cluster.
Answer: A
How could you tune the profile in order to lower the CPU load still maintaining security at good level? Select the BEST answer.
Answer: B
A. Rule 0
B. Blank field under Rule Number
C. Rule 1
D. Cleanup Rule
Answer: A
A. VPN authentication and encrypted traffic are tunneled through port TCP 443.
B. Only ESP traffic is tunneled through port TCP 443.
C. Only Main mode and Quick mode traffic are tunneled on TCP port 443.
D. All VPN traffic is tunneled through UDP port 4500.
Answer: A
A. Accept; redirect
B. Accept; drop
C. Redirect; drop
D. Drop; accept
Answer: D
Answer: C
Answer: C
A. RADIUS
B. Remote Access and RADIUS
C. AD Query
D. AD Query and Browser-based Authentication
Answer: D
A. Yes.
B. No.
C. Yes, but only when using Automatic NAT.
D. Yes, but only when using Manual NAT.
Answer: A
A. SmartDashboard > Edit Gateway Object > General Properties > Communication
B. SmartUpdate > Edit Security Management Server Object > SIC
C. SmartUpdate > Edit Gateway Object > Communication
D. SmartDashboard > Edit Security Management Server Object > SIC
Answer: A
A. SNMP
B. High alert
C. Mail
D. User defined alert
Answer: B
A. A new Policy Package created on both the Management and Gateway will be deleted and must be packed up first before proceeding.
B. A new Policy Package created on the Management is going to be installed to the existing Gateway.
C. A new Policy Package created on the Gateway is going to be installed on the existing Management.
D. A new Policy Package created on the Gateway and transferred to the management will be overwritten bythe Policy Package currently on the Gateway but can
be restored from a periodic backup on the Gateway.
Answer: B
Answer: B
Answer: A
Explanation: SmartConsole
For simple hubs and spokes (or if there is only one Hub), the easiest way is to configure a VPN star community in R80 SmartConsole:
On the Star Communitywindow, in the:
Center Gateways section, select the Security Gateway that functions as the "Hub".
Satellite Gateways section, select Security Gateways as the "spokes", or satellites.
On the VPN Routing page, Enable VPN routing for satellites section, select one of these options:
To center and to other Satellites through center - This allows connectivity between the Security Gateways, for example if the spoke Security Gateways are DAIP
Security Gateways, and the Hub is a Security Gateway with a static IP address.
To center, or through the center to other satellites, to internet and other VPN targets - This allows connectivity between the Security Gateways as well as the
ability to inspect all communication passing through the Hub to the Internet.
Create an appropriate Access Control Policy rule.
NAT the satellite Security Gateways on the Hub if the Hub is used to route connections from Satellites to the Internet.
The two Dynamic Objects (DAIP Security Gateways) can securely route communication through the Security Gateway with the static IP address.
You want to define a selected administrator's permission to edit a layer. However, when you click the + sign in the “Select additional profile that will be able edit
this layer” you do not see anything. What is the most likely cause of this problem? Select the BEST answer.
Answer: B
Answer: C
Answer: A
Answer: C
A. Application Control
B. Data Awareness
C. URL Filtering
D. Threat Emulation
Answer: A
Answer: B
Answer: B
Explanation: Check Point's licensing is designed to be scalable and modular. To this end, Check Point offers both predefined packages as well as the ability to
custom build a solution tailored to the needs of the Network Administrator. This is accomplished by the use of the following license components:
Software Blades
Container
Answer: A
A. Standby/standby; active/active
B. Active/active; standby/standby
C. Active/active; active/standby;
D. Active/standby; active/active
Answer: D
Explanation: In a High Availability cluster, only one member is active (Active/Standby operation).
ClusterXL Load Sharing distributes traffic within a cluster so that the total throughput of multiple members is increased. In Load Sharing configurations, all
functioning members in the cluster are active, and handle network traffic (Active/Active operation).
Answer: D
A. Firewall drop
B. Explicit
C. Implicit accept
D. Implicit drop
E. Implied
Answer: E
A. Command line of the Security Management Server or mgmt_cli.exe on any Windows computer.
B. SmartConsole and WebUI on the Security Management Server.
C. mgmt_cli or WebUI on Security Gateway and SmartConsole on the Security Management Server.
D. SmartConsole or mgmt_cli on any computer where SmartConsole is installed.
Answer: D
A. $SMARTLOGDIR/data
B. $SMARTLOG/dir
C. $FWDIR/smartlog
D. $FWDIR/log
Answer: A
Answer: B
After being authenticated by the Security Gateways, a user starts a HTTP connection to a Web site. What happens when the user tries to FTP to another site using
the command line? The:
Answer: C
A. Firewall
B. Application Control
C. Anti-spam and Email Security
D. Antivirus
Answer: D
Explanation: The enhanced Check Point Antivirus Software Blade uses real-time virus signatures and anomaly-based protections from ThreatCloud™, the first
collaborative network to fight cybercrime, to detect and block malware at the gateway before users are affected.
A. Two rules – first one for the HTTP traffic and second one for DNS traffic.
B. Only one rule, because Check Point firewall is a Packet Filtering firewall
C. Two rules – one for outgoing request and second one for incoming replay.
D. Only one rule, because Check Point firewall is using Stateful Inspection technology.
Answer: D
A. 2, 3, 4, 1, 5
B. 2, 1, 3, 4, 5
C. 1, 3, 2, 4, 5
D. 2, 3, 4, 5, 1
Answer: B
A. Firewall
B. Identity Awareness
C. Application Control
D. URL Filtering
Answer: B
Explanation: Check Point Identity Awareness Software Blade provides granular visibility of users, groups and machines, providing unmatched application and
access control through the creation of accurate, identity-based policies. Centralized management and monitoring allows for policies to be managed from a single,
unified console.
Answer: B
Answer: D
Explanation: Users
Use the WebUI and CLI to manage user accounts. You can:
Add users to your Gaia system.
Edit the home directory of the user.
Edit the default shell for a user.
Give a password to a user.
Give privileges to users.
Answer: A
A. No, since “maintain current active cluster member” option on the cluster object properties is enabled by default
B. No, since “maintain current active cluster member” option is enabled by default on the Global Properties
C. Yes, since “Switch to higher priority cluster member” option on the cluster object properties is enabled by default
D. Yes, since “Switch to higher priority cluster member” option is enabled by default on the Global Properties
Answer: A
returned to the higher priority member. This mode is recommended if one member is better equipped for handling connections, so it will be the default Security
Gateway.
A. Threat Emulation
B. Access Control
C. QoS
D. Threat Prevention
Answer: C
A. WebUI
B. SmartView Tracker
C. SmartView Monitor
D. SmartReporter
Answer: B
A. Security Gateway
B. Host
C. Security Management object
D. Network
Answer: A
A. The two algorithms do not have the same key length and so don't work togethe
B. You will get the error… No proposal chosen…
C. All is fine as the longest key length has been chosen for encrypting the data and a shorter key length for higher performance for setting up the tunnel.
D. Only 128 bit keys are used for phase 1 keys which are protecting phase 2, so the longer key length in phase 2 only costs performance and does not add
security due to a shorter key in phase 1.
E. All is fine and can be used as is.
Answer: C
A. If the user credentials do not match an Access Role, the system displays the Captive Portal.
B. If the user credentials do not match an Access Role, the system displays a sandbox.
C. If the user credentials do not match an Access Role, the traffic is automatically dropped.
D. If the user credentials match an Access Role, the rule is applied and traffic is accepted or dropped based on the defined action.
Answer: D
Answer: A
A. Destination
B. Identity
C. Payload
D. Location
Answer: B
A. cpconfig on a Security Management Server, in the WebUI logged into a Security Management Server.
B. Only using SmartConsole: Manage and Settings > Permissions and Administrators > Advanced > Trusted Clients.
C. In cpconfig on a Security Management Server, in the WebUI logged into a Security Management Server, in SmartConsole: Manage and Settings>Permissions
and Administrators>Advanced>Trusted Clients.
D. WebUI client logged to Security Management Server, SmartDashboard: Manage and Settings>Permissions and Administrators>Advanced>Trusted Clients, via
cpconfig on a Security Gateway.
Answer: C
Answer: A
Answer: D
A. SmartMonitor
B. SmartView Web Application
C. SmartReporter
D. SmartTracker
Answer: B
Answer: D
A. file attributes
B. application information
C. destination port
D. data type information
Answer: D
Explanation: Network Log - Generates a log with only basic Firewall information: Source, Destination, Source Port,
Destination Port, and Protocol.
Log - Equivalent to the Network Log option, but also includes the application name (for example, Dropbox), and application information (for example, the URL of
the Website). This is the default Tracking option.
Full Log - Equivalent to the log option, but also records data for each URL request made.
If suppression is not selected, it generates a complete log (as defined in pre-R80 management).
If suppression is selected, it generates an extended log(as defined in pre-R80 management).
None - Do not generate a log.
A. TACACS
B. SecurID
C. Check Point password
D. RADIUS
Answer: B
Explanation: SecurID
SecurID requires users to both possess a token authenticator and to supply a PIN or password References:
A. snapshot creates a full OS-level backup, including network-interface data, Check Point production information, and configuration settings of a GAiA Security
Gateway.
B. snapshot creates a Security Management Server full system-level backup on any OS
C. snapshot stores only the system-configuration settings on the Gateway
D. A Gateway snapshot includes configuration settings and Check Point product information from the remote Security Management Server
Answer: A
A. UserCheck
B. User Directory
C. User Administration
D. User Center
Answer: B
Explanation: Check Point User Directory integrates LDAP, and other external user management technologies, with the Check Point solution. If you have a large
user count, we recommend that you use an external user management database such as LDAP for enhanced Security Management Server performance.
Answer: C
Answer: B
Answer: B
Explanation: Should be Trial or Evaluation, even Plug-and-play (all are synonyms ). Answer B is the best choice.
A. Rule is locked by AdminA, because the save bottom has not been press.
B. Rule is locked by AdminA, because an object on that rule is been edited.
C. Rule is locked by AdminA, and will make it available if session is published.
D. Rule is locked by AdminA, and if the session is saved, rule will be available
Answer: C
Answer: A
Answer: D
Answer: B
A. She needs to edit /etc/SSHd/SSHd_config and add the Standard Mode account.
B. She needs to run sysconfig and restart the SSH process.
C. She needs to edit /etc/scpusers and add the Standard Mode account.
D. She needs to run cpconfig to enable the ability to SCP files.
Answer: C
Answer: A
A. Port 258
B. Port 18209
C. Port 257
D. Port 981
Answer: C
A. SmartView Tracker
B. SmartPortal
C. SmartUpdate
D. SmartDashboard
Answer: C
A. Infinite
B. One
C. Three
D. Two
Answer: B
A. Create a text-file with mgmt_cli script that creates all objects and policie
B. Open the file in SmartConsole Command Line to run it.
C. Create a text-file with Gaia CLI -commands in order to create all objects and policie
Answer: A
Explanation: Did you know: mgmt_cli can accept csv files as inputs using the --batch option.
The first row should contain the argument names and the rows below it should hold the values for these parameters.
So an equivalent solution to the powershell script could look like this:
data.csv:
A. show configuration
B. backup
C. migrate export
D. upgrade export
Answer: B
A. Change the Rule Base and install the Policy to all Security Gateways
B. Block Intruder feature of SmartView Tracker
C. Intrusion Detection System (IDS) Policy install
D. SAM – Suspicious Activity Rules feature of SmartView Monitor
Answer: B
Answer: C
A. This is a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender
B. This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy it prior to sending it to the intended recipient
C. This is a new mechanism to identify the IP address of the sender of malicious codes and to put it into the SAM database (Suspicious Activity Monitoring).
D. Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which
makes this solution very fast
Answer: D
Answer: B
A. The Firewall kernel only touches the packet if the connection is accelerated
B. The Firewall can run different policies per core
C. The Firewall kernel is replicated only with new connections and deletes itself once the connection times out
D. The Firewall can run the same policy on all cores
Answer: D
A. DBSync
B. API Server
C. fwm
D. SOLR
Answer: D
A. Verify that Security Gateway > General Properties > Authentication > Use UserDirectory (LDAP) for Security Gateways is checked
B. Verify that Global Properties > Authentication > Use UserDirectory (LDAP) for Security Gateways is checked.
C. Verify that Security Gateway > General Properties > UserDirectory (LDAP) > Use UserDirectory (LDAP) for Security Gateways is checked.
D. Verify that Global Properties > UserDirectory (LDAP) > Use UserDirectory (LDAP) for Security Gateways is checked.
Answer: D
Answer: D
A. Have the security administrator select the Action field of the Firewall Rule “Redirect HTTP connections to an authentication (captive) portal”.
B. Have the security administrator reboot the firewall.
C. Have the security administrator select Any for the Machines tab in the appropriate Access Role.
D. Install the Identity Awareness agent on her iPad.
Answer: A
Answer: D
Answer: B
A. The setting Log does not capture this level of detail for GR
B. Set the rule tracking action to Audit since certain types of traffic can only be tracked this way.
C. The log unification process is using a LUUID (Log Unification Unique Identification) that has become corrup
D. Because it is encrypted, the R77 Security Gateway cannot distinguish between GRE session
E. This is a known issue with GR
F. Use IPSEC instead of the non-standard GRE protocol for encapsulation.
G. The Log Server log unification process unifies all log entries from the Security Gateway on a specific connection into only one log entry in the SmartView Tracke
H. GRE traffic has a 10 minute session timeout, thus each keep-alive packet is considered part of the original logged connection at the beginning of the day.
I. The Log Server is failing to log GRE traffic properly because it is VPN traffi
J. Disable all VPN configuration to the partner site to enable proper logging.
Answer: C
A. Automatic NAT
B. Static NAT
C. Manual NAT
D. Hide NAT
Answer: D
Answer: A
A. Change the gateway settings to allow Captive Portal access via an external interface.
B. No action is necessar
C. This access is available by default.
D. Change the Identity Awareness settings under Global Properties to allow Captive Policy access on all interfaces.
E. Change the Identity Awareness settings under Global Properties to allow Captive Policy access for an external interface.
Answer: A
Answer: A
Answer: D
Answer: B
A. fw conn all
B. fw ctl pst pstat
C. show all connections
D. show connections
Answer: B
What happens when a user from the internal network tries to browse to the internet using HTTP? The user:
Answer: D
Answer: B
A. Checkpoint Mobile
B. Endpoint Security Suite
C. SecuRemote
D. Mobile Access Portal
Answer: D
Answer: C
Answer: A
A. Asymmetric encryption
B. Dynamic encryption
C. Certificate-based encryption
D. Symmetric encryption
Answer: D
A. If the user credentials do not match an Access Role, the traffic is automatically dropped.
B. If the user credentials do not match an Access Role, the system displays a sandbox.
C. If the user credentials do not match an Access Role, the gateway moves onto the next rule.
D. If the user credentials do not match an Access Role, the system displays the Captive Portal.
Answer: C
A. Dynamic ID
B. RADIUS
C. Username and Password
D. Certificate
Answer: A
Answer: D
A. 18210
B. 18184
C. 257
D. 18191
Answer: B
Answer: C
Answer: B
Answer: C
Answer: B
Answer: D
A. fw ctl stat
B. clusterXL stat
C. clusterXL status
D. cphaprob stat
Answer: A
Answer: A
Answer: B
You have two rules, ten users, and two user groups in a Security Policy. You create database version 1 for this configuration. You then delete two existing users
and add a new user group. You modify one rule and add two new rules to the Rule Base. You save the Security Policy and create database version 2. After a
while, you decide to roll back to version 1 to use the Rule Base, but you want to keep your user database. How can you do this?
Answer: D
A. SmartDashboard
B. SmartUpdate
C. SmartView Status
D. SmartView Tracker
Answer: D
A. Using the remote Gateway's IP address, and attaching the license to the remote Gateway via SmartUpdate.
B. Using your Security Management Server's IP address, and attaching the license to the remote Gateway via SmartUpdate.
C. Using the remote Gateway's IP address, and applying the license locally with command cplic put.
D. Using each of the Gateway's IP addresses, and applying the licenses on the Security Management Server with the command cprlic put.
Answer: B
Answer: B
A. Gateway
B. Interoperable Device
C. Externally managed gateway
D. Network Node
Answer: C
A. CPMI 200
B. TCP 8080
C. HTTP 80
D. HTTPS 443
Answer: D
Answer: B
A. 3DES
B. IDEA
C. DES
D. MD5
Answer: D
A. Security Gateway
B. Management Server
C. Policy Server
D. SmartLSM
Answer: B
A. SmartView Monitor
B. SmartView Tracker
C. SmartDashboard
D. SmartView Status
Answer: A
A. As expert user, issue these commands:# IP link set eth0 down# IP link set eth0 addr 00:0C:29:12:34:56# IP link set eth0 up
B. Edit the file /etc/sysconfig/netconf.C and put the new MAC address in the field(conf:(conns:(conn:hwaddr (“00:0C:29:12:34:56”)
C. As expert user, issue the command:# IP link set eth0 addr 00:0C:29:12:34:56
D. Open the WebUI, select Network > Connections > eth0. Place the new MAC address in the field Physical Address, and press Apply to save the settings.
Answer: C
A. Weight
B. Authenticated timeout
C. Schedule
D. Rate
Answer: C
Answer: C
A. Security Gateway API, Management API, Threat Prevention API and Identity Awareness Web Services API
B. Management API, Threat Prevention API, Identity Awareness Web Services API and OPSEC SDK API
C. OSE API, OPSEC SDK API, Threat Prevention API and Policy Editor API
D. CPMI API, Management API, Threat Prevention API and Identity Awareness Web Services API
Answer: B
Answer: D
A. Connections from the specified source are blocked without the need to change the Security Policy.
B. Connections to the specified target are blocked without the need to change the Security Policy.
C. Connections to and from the specified target are blocked without the need to change the Security Policy.
D. Connections to and from the specified target are blocked with the need to change the Security Policy.
Answer: A
A. Purchase the SmartView Monitor license for your Security Management Server.
B. Enable Monitoring on your Security Management Server.
C. Purchase the SmartView Monitor license for your Security Gateway.
D. Enable Monitoring on your Security Gateway.
Answer: D
A. In Global Properties > Reporting Tools check the box Enable tracking all rules (including rules marked as None in the Track column). Send these logs to a
secondary log server for a complete logging histor
B. Use your normal log server for standard logging for troubleshooting.
C. Install the View Implicit Rules package using SmartUpdate.
D. Define two log servers on the R77 Gateway objec
E. Lof Implied Rules on the first log serve
F. Enable Log Rule Base on the second log serve
G. Use SmartReporter to merge the two log server records into the same database for HIPPA log audits.
H. Check the Log Implied Rules Globally box on the R77 Gateway object.
Answer: A
Answer: B
A. S
B. W
C. C
D. Space bar
Answer: B
A. Tom’s changes will have been stored on the Management when he reconnects and he will not lose any of this work.
B. Tom will have to reboot his SmartConsole computer, and access the Management cache store on that computer, which is only accessible after a reboot.
C. Tom’s changes will be lost since he lost connectivity and he will have to start again.
D. Tom will have to reboot his SmartConsole computer, clear the cache and restore changes.
Answer: A
Answer: D
A. a routing table
B. awareness of the network topology
C. a Demilitarized Zone
D. a Security Policy install
Answer: B
Explanation: The network topology represents the internal network (both the LAN and the DMZ) protected by the gateway. The gateway must be aware of the
layout of the network topology to:
Correctly enforce the Security Policy.
Ensure the validity of IP addresses for inbound and outbound traffic.
Configure a special domain for Virtual Private Networks.
R80.10 management server can manage gateways with which versions installed?
Answer: B
A. The rule base can be built of layers, each containing a set of the security rule
B. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.
C. Limits the upload and download throughput for streaming media in the company to 1 Gbps.
D. Time object to a rule to make the rule active only during specified times.
E. Sub Policies are sets of rules that can be created and attached to specific rule
F. If the rule is matched, inspection will continue in the sub policy attached to it rather than in the next rule.
Answer: D
A. In R80 all Network Address Translation is done automatically and there is no need for manually defined NAT-rules.
B. Network Address Translation of RFC1918-compliant networks is needed to access the Internet.
C. Network Address Translation is desired for some services, but not for others.
D. The public IP-address is different from the gateway’s external IP
Answer: D
Answer: A
Answer: C
A. Slow Path
B. Medium Path
C. Fast Path
D. Accelerated Path
Answer: A
Answer: A
Answer: C
A. ADQuery
B. Terminal Servers Endpoint Identity Agent
C. Endpoint Identity Agent and Browser-Based Authentication
D. RADIUS and Account Logon
Answer: D
A. Export R80 configuration, clean install R80.10 and import the configuration
B. CPUSE online upgrade
C. CPUSE offline upgrade
D. SmartUpdate upgrade
Answer: C
Answer: D
A. User groups
B. Users using UserCheck
C. Individual users
D. All users in the database
Answer: A
A. SmartView Monitor
B. SmartEventWeb
C. There is no Web application for SmartEvent
D. SmartView
Answer: B
A. SmartManager
B. SmartConsole
C. Security Gateway
D. Security Management Server
Answer: C
A. Down
B. No Response
C. Inactive
D. Failed
Answer: A
Answer: A
A. Rename the hostname of the Standby member to match exactly the hostname of the Active member.
B. Change the Standby Security Management Server to Active.
C. Change the Active Security Management Server to Standby.
D. Manually synchronize the Active and Standby Security Management Servers.
Answer: A
A. backup
B. snapshot
C. Database Revision
D. migrate export
Answer: B
Answer: C
A. AES-128
B. AES-256
C. DES
D. 3DES
Answer: A
Answer: B
A. Only the objects being modified in the Management Database and other administrators can connect to make changes using a special session as long as they all
connect from the same LAN network.
B. The entire Management Database and other administrators can connect to make changes only if the first administrator switches to Read-only.
C. The entire Management Database and all sessions and other administrators can connect only as Read-only.
D. Only the objects being modified in his session of the Management Database and other administrators can connect to make changes using different sessions.
Answer: D
Answer: C
A. Incoming
B. Internal
C. External
D. Outgoing
Answer: D
Answer: B
A. There is connection between the gateway and Security Management Server but it is not trusted.
B. The secure communication is established.
C. There is no connection between the gateway and Security Management Server.
D. The Security Management Server can contact the gateway, but cannot establish SIC.
Answer: AC
Explanation: After the gateway receives the certificate issued by the ICA, the SIC status shows if the Security Management Server can communicate securely
with this gateway:
Communicating - The secure communication is established.
Unknown - There is no connection between the gateway and Security Management Server.
Not Communicating - The Security Management Server can contact the gateway, but cannot establish SIC. A message shows more information.
Answer: A
A. fw ver
B. fw stat
C. fw monitor
D. cpinfo
Answer: A
Answer: B
A. SHA-256
B. SHA-200
C. MD5
D. SHA-128
Answer: A
A. Basic – Provides reliable protection on a range of non-HTTP protocols for servers, with minimal impact on network performance
B. Optimized – Provides excellent protection for common network products and protocols against recent or popular attacks
C. Strict – Provides a wide coverage for all products and protocols, with impact on network performance
D. Recommended – Provides all protection for all common network products and servers, with impact on network performance
Answer: D
Answer: A
Answer: B
Answer: C
A. Explicit Drop
B. Implied Drop
C. Explicit Cleanup
D. Implicit Drop
Answer: A
A. secondary Smartcenter
B. active Smartcenter
C. connect virtual IP of Smartcenter HA
D. primary Smartcenter
Answer: B
Answer: B
Answer: D
A. SSL
B. Captive Portal
C. PKI
D. RSA
Answer: B
Answer: A
Explanation: The users and user groups are arranged on the Account Unit in the tree structure of the LDAP server. User management in User Directory is
external, not local. You can change the User Directory templates. Users
associated with this template get the changes immediately. You can change user definitions manually in SmartDashboard, and the changes are immediate on the
server.
A. cplic print
B. print cplic
C. fwlic print
D. show licenses
Answer: A
A. Consolidation Policy
B. Correlation Unit
C. SmartEvent Policy
D. SmartEvent GUI
Answer: B
Answer: A
A. Distributed
B. Standalone
C. Bridge
Answer: A
A. Distributed
B. Bridge Mode
C. Remote
D. Standalone
Answer: B
Answer: C
A. restore_backup
B. import backup
C. cp_merge
D. migrate import
Answer: A
A. NAT
B. Firewall
C. Global Properties
D. Object Explorer
Answer: C
Answer: D
Answer: C
A. Any size
B. Less than 20GB
C. More than 10GB and less than 20 GB
D. At least 20GB
Answer: D
Answer: D
Answer: D
A. ifconfig -a
B. show interfaces
C. show interfaces detail
D. show configuration interface
Answer: D
Answer: B
Answer: D
Answer: D
A. User Center
B. Package repository
C. Download Center Web site
D. License and Contract repository
Answer: B
A. Hide; source
B. Static; source
C. Simple; source
D. Hide; destination
Answer: B
A. RADIUS
B. Active Directory Query
C. Remote Access
D. Certificates
Answer: D
A. Security Gateway
B. Management container
C. Management server
D. Security Gateway container
Answer: A
A. SmartConsole
B. Security Management Server and Security Gateway
C. Security Management Server
D. SmartConsole and Security Management Server
Answer: B
Answer: B
A. Threat Emulation never delivers a file and takes more than 3 minutes to complete
B. Threat Extraction always delivers a file and takes less than a second to complete
C. Threat Emulation never delivers a file that takes less than a second to complete
D. Threat Extraction never delivers a file and takes more than 3 minutes to complete
Answer: B
A. Main
B. Authentication
C. Quick
D. High Alert
Answer: A
A. show unsaved
B. show save-state
C. show configuration diff
D. show config-state
Answer: D
A. ThreatWiki
B. Whitelist Files
C. AppWiki
D. IPS Protections
Answer: A
A. 3rd Party integration of CLI and API for Gateways prior to R80.
B. A complete CLI and API interface using SSH and custom CPCode integration.
C. 3rd Party integration of CLI and API for Management prior to R80.
D. A complete CLI and API interface for Management with 3rd Party integration.
Answer: B
A. cpm status
B. api restart
C. api status
D. show api status
Answer: D
A. Shared secret
B. Certificate
C. One-time password
D. Token
Answer: A
Answer: A
Answer: A
Fill in the blanks: A _____ license requires an administrator to designate a gateway for attachment whereas a _____ license is automatically attached to a Security
Gateway.
A. Format; corporate
B. Local; formal
C. Local; central
D. Central; local
Answer: D
A. X-chkp-sid
B. Accept-Charset
C. Proxy-Authorization
D. Application
Answer: C
* 156-215.80 Most Realistic Questions that Guarantee you a Pass on Your FirstTry
* 156-215.80 Practice Test Questions in Multiple Choice Formats and Updatesfor 1 Year