لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which software blade does NOT accompany the Threat Prevention policy?
A. Anti-virus
B. IPS
C. Threat Emulation
D. Application Control and URL Filtering
عرض الإجابة
اجابة صحيحة: D
السؤال #2
What is the default shell for the command line interface?
A. Expert
B. Clish
C. Admin
D. Normal
عرض الإجابة
اجابة صحيحة: A
السؤال #3
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
A. None, Security Management Server would be installed by itself
B. SmartConsole
C. SecureClient
D. Security Gateway
عرض الإجابة
اجابة صحيحة: D
السؤال #4
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?
A. Security Gateway IP-address cannot be changed without re-establishing the trust
B. The Security Gateway name cannot be changed in command line without re-establishing trust
C. The Security Management Server name cannot be changed in SmartConsole without re-establishing trust
D. The Security Management Server IP-address cannot be changed without re-establishing the trust
عرض الإجابة
اجابة صحيحة: A
السؤال #5
How do you manage Gaia?
A. Through CLI and WebUI
B. Through CLI only
C. Through SmartDashboard only
D. Through CLI, WebUI, and SmartDashboard
عرض الإجابة
اجابة صحيحة: D
السؤال #6
Which of the following commands is used to verify license installation?
A. Cplic verify license
B. Cplic print
C. Cplic show
D. Cplic license
عرض الإجابة
اجابة صحيحة: B
السؤال #7
Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?
A. UserCheck
B. Active Directory Query
C. Account Unit Query
D. User Directory Query
عرض الإجابة
اجابة صحيحة: B
السؤال #8
The following graphic shows:
A. View from SmartLog for logs initiated from source address 10
B. View from SmartView Tracker for logs of destination address 10
C. View from SmartView Tracker for logs initiated from source address 10
D. View from SmartView Monitor for logs initiated from source address 10
عرض الإجابة
اجابة صحيحة: D
السؤال #9
Which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?
A. Auditor
B. Read Only All
C. Super User
D. Full Access
عرض الإجابة
اجابة صحيحة: C
السؤال #10
If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsible, which of these steps should NOT be performed:
A. Rename the hostname of the Standby member to match exactly the hostname of the Active member
B. Change the Standby Security Management Server to Active
C. Change the Active Security Management Server to Standby
D. Manually synchronize the Active and Standby Security Management Servers
عرض الإجابة
اجابة صحيحة: A
السؤال #11
Which one of the following is TRUE?
A. Ordered policy is a sub-policy within another policy
B. One policy can be either inline or ordered, but not both
C. Inline layer can be defined as a rule action
D. Pre-R80 Gateways do not support ordered layers
عرض الإجابة
اجابة صحيحة: C
السؤال #12
Which Threat Prevention Software Blade provides comprehensive against malicious and unwanted network traffic, focusing on application and server vulnerabilities?
A. Anti-Virus
B. IPS
C. Anti-Spam
D. Anti-bot
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Which of the following are types of VPN communities?
A. Pentagon, star, and combination
B. Star, octagon, and combination
C. Combined and star
D. Meshed, star, and combination
عرض الإجابة
اجابة صحيحة: D
السؤال #14
When defining group-based access in an LDAP environment with Identity Awareness, what is the BEST object type to represent an LDAP group in a Security Policy?
A. Access Role
B. User Group
C. SmartDirectory Group
D. Group Template
عرض الإجابة
اجابة صحيحة: A
السؤال #15
Fill in the blank: The R80 utility fw monitor is used to troubleshoot _____________
A. User data base corruption
B. LDAP conflicts
C. Traffic issues
D. Phase two key negotiation
عرض الإجابة
اجابة صحيحة: A
السؤال #16
Which of the following is NOT a valid backup command for a Security Management Server?
A. save backup
B. add backup
C. add snapshot
D. migrate export
عرض الإجابة
اجابة صحيحة: A
السؤال #17
Which of the following commands can be used to remove site-to-site IPSEC Security Associations (SA)?
A. vpn tu
B. vpn ipsec remove -l
C. vpn debug ipsec
D. fw ipsec tu
عرض الإجابة
اجابة صحيحة: B
السؤال #18
Can multiple administrators connect to a Security Management Server at the same time?
A. No, only one can be connected
B. Yes, all administrators can modify a network object at the same time
C. Yes, every administrator has their own username, and works in a session that is independent of other administrators
D. Yes, but only one has the right to write
عرض الإجابة
اجابة صحيحة: C
السؤال #19
Which message indicates IKE Phase 2 has completed successfully?
A. Quick Mode Complete
B. Aggressive Mode Complete
C. Main Mode Complete
D. IKE Mode Complete
عرض الإجابة
اجابة صحيحة: A
السؤال #20
What is the purpose of a Stealth Rule?
A. A rule used to hide a server's IP address from the outside world
B. A rule that allows administrators to access SmartDashboard from any device
C. To drop any traffic destined for the firewall that is not otherwise explicitly allowed
D. A rule at the end of your policy to drop any traffic that is not explicitly allowed
عرض الإجابة
اجابة صحيحة: C
السؤال #21
Choose what BEST describes the Policy Layer Traffic Inspection.
A. If a packet does not match any of the inline layers, the matching continues to the next Layer
B. If a packet matches an inline layer, it will continue matching the next layer
C. If a packet does not match any of the inline layers, the packet will be matched against the Implicit Clean-up Rule
D. If a packet does not match a Network Policy Layer, the matching continues to its inline layer
عرض الإجابة
اجابة صحيحة: B
السؤال #22
Where is the “Hit Count” feature enabled or disabled in SmartConsole?
A. On the Policy Package
B. On each Security Gateway
C. On the Policy layer
D. In Global Properties for the Security Management Server
عرض الإجابة
اجابة صحيحة: B
السؤال #23
An Endpoint identity agent uses a ___________ for user authentication.
A. Shared secret
B. Token
C. Username/password or Kerberos Ticket
D. Certificate
عرض الإجابة
اجابة صحيحة: C
السؤال #24
The SIC Status “Unknown” means
A. There is connection between the gateway and Security Management Server but it is not trusted
B. The secure communication is established
C. There is no connection between the gateway and Security Management Server
D. The Security Management Server can contact the gateway, but cannot establish SIC
عرض الإجابة
اجابة صحيحة: C
السؤال #25
The position of an implied rule is manipulated in the __________________ window.
A. NAT
B. Firewall
C. Global Properties
D. Object Explorer
عرض الإجابة
اجابة صحيحة: C
السؤال #26
Administrator Kofi has just made some changes on his Management Server and then clicks on the Publish button in SmartConsole but then gets the error message shown in the screenshot below. Where can the administrator check for more information on these errors?
A. The Log and Monitor section in SmartConsole
B. The Validations section in SmartConsole
C. The Objects section in SmartConsoleD
عرض الإجابة
اجابة صحيحة: B
السؤال #27
Identify the ports to which the Client Authentication daemon listens on by default?
A. 259, 900
B. 256, 257
C. 8080, 529
D. 80, 256
عرض الإجابة
اجابة صحيحة: A
السؤال #28
The Gaia operating system supports which routing protocols?
A. BGP, OSPF, RIP
B. BGP, OSPF, EIGRP, PIM, IGMP
C. BGP, OSPF, RIP, PIM, IGMP
D. BGP, OSPF, RIP, EIGRP
عرض الإجابة
اجابة صحيحة: C
السؤال #29
ABC Corp has a new administrator who logs into the Gaia Portal to make some changes. He realizes that even though he has logged in as an administrator, he is unable to make any changes because all configuration options are greyed out as shown in the screenshot image below. What is the likely cause for this?
A. The Gaia /bin/confd is locked by another administrator from a SmartConsole session
B. The database is locked by another administrator SSH session
C. The Network address of his computer is in the blocked hosts
D. The IP address of his computer is not in the allowed hosts
عرض الإجابة
اجابة صحيحة: B
السؤال #30
While enabling the Identity Awareness blade the Identity Awareness wizard does not automatically detect the windows domain. Why does it not detect the windows domain?
A. Security Gateways is not part of the Domain
B. SmartConsole machine is not part of the domain
C. SMS is not part of the domain
D. Identity Awareness is not enabled on Global properties
عرض الإجابة
اجابة صحيحة: D
السؤال #31
Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?
A. One machine, but it needs to be installed using SecurePlatform for compatibility purposes
B. One machine
C. Two machines
D. Three machines
عرض الإجابة
اجابة صحيحة: C
السؤال #32
Fill in the blank: The _________ collects logs and sends them to the _________ .
A. Log server; security management server
B. Log server; Security Gateway
C. Security management server; Security Gateway
D. Security Gateways; log server
عرض الإجابة
اجابة صحيحة: B
السؤال #33
What is the default time length that Hit Count Data is kept?
A. 3 month
B. 4 weeks
C. 12 months
D. 6 months
عرض الإجابة
اجابة صحيحة: B
السؤال #34
Fill in the blank: The R80 feature ________ permits blocking specific IP addresses for a specified time period.
A. Block Port Overflow
B. Local Interface Spoofing
C. Suspicious Activity Monitoring
D. Adaptive Threat Prevention
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: