لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
VPN gateways authenticate using ___________ and ___________ .
A. Passwords; tokens
B. Certificates; pre-shared secrets
C. Certificates; passwords
D. Tokens; pre-shared secrets
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Which of the following is NOT a SecureXL traffic flow?
A. Medium Path
B. Accelerated PathC
D. Slow Path
عرض الإجابة
اجابة صحيحة: C
السؤال #3
While enabling the Identity Awareness blade the Identity Awareness wizard does not automatically detect the windows domain. Why does it not detect the windows domain?
A. Security Gateways is not part of the Domain
B. SmartConsole machine is not part of the domain
C. Security Management Server is not part of the domain
D. Identity Awareness is not enabled on Global properties
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Your boss wants you to closely monitor an employee suspected of transferring company secrets to the competition. The IT department discovered the suspect installed a WinSCP client in order to use encrypted communication. Which of the following methods is BEST to accomplish this task?
A. Use SmartView Tracker to follow his actions by filtering log entries that feature the WinSCP destination port
B. Use SmartDashboard to add a rule in the firewall Rule Base that matches his IP address, and those of potential targets and suspicious protocols
C. Watch his IP in SmartView Monitor by setting an alert action to any packet that matches your Rule Base and his IP address for inbound and outbound traffic
D. Send the suspect an email with a keylogging Trojan attached, to get direct information about his wrongdoings
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Fill in the blank: An LDAP server holds one or more ______________.
A. Server Units
B. Administrator Units
C. Account Units
D. Account Server
عرض الإجابة
اجابة صحيحة: C
السؤال #6
Using the SmartConsole, which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?
A. Editor
B. Read Only All
C. Super User
D. Full Access
عرض الإجابة
اجابة صحيحة: B
السؤال #7
Your users are defined in a Windows 2008 R2 Active Directory server. You must add LDAP users to a Client Authentication rule. Which kind of user group do you need in the Client Authentication rule in R77?
A. External-user group
B. LDAP group
C. A group with a genetic user
D. All Users
عرض الإجابة
اجابة صحيحة: B
السؤال #8
Fill in the blank: Authentication rules are defined for ____________.
A. User groups
B. Users using UserCheck
C. Individual users
D. All users in the database
عرض الإجابة
اجابة صحيحة: A
السؤال #9
With the User Directory Software Blade, you can create R80 user definitions on a(an) ___________ Server.
A. NT domain
B. SMTP
C. LDAP
D. SecurID
عرض الإجابة
اجابة صحيحة: C
السؤال #10
What is true about the IPS-Blade?
A. in R80, IPS is managed by the Threat Prevention Policy
B. in R80, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict
C. in R80, IPS Exceptions cannot be attached to “all rules”
D. in R80, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same
عرض الإجابة
اجابة صحيحة: A
السؤال #11
What is NOT an advantage of Packet Filtering?
A. Low Security and No Screening above Network Layer
B. Application Independence
C. High Performance
D. Scalability
عرض الإجابة
اجابة صحيحة: A
السؤال #12
To build an effective Security Policy, use a ________ and _______ rule.
A. Cleanup; stealth
B. Stealth; implicit
C. Cleanup; default
D. Implicit; explicit
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Tina is a new administrator who is currently reviewing the new Check Point R80 Management console interface. In the Gateways view, she is reviewing the Summary screen as in the screenshot below. What as an 'Open Server'?
A. Check Point software deployed on a non-Check Point appliance
B. The Open Server Consortium approved Server Hardware used for the purpose of Security and Availability
C. A Check Point Management Server deployed using the Open Systems Interconnection (OSI) Server and Security deployment model
D. A Check Point Management Server software using the Open SSL
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Your manager requires you to setup a VPN to a new business partner site. The administrator from the partner site gives you his VPN settings and you notice that he setup AES 128 for IKE phase 1 and AES 256 for IKE phase 2. Why is this a problematic setup?
A. The two algorithms do not have the same key length and so don't work together
B. All is fine as the longest key length has been chosen for encrypting the data and a shorter key length for higher performance for setting up the tunnel
C. Only 128 bit keys are used for phase 1 keys which are protecting phase 2, so the longer key length in phase 2 only costs performance and does not add security due to a shorter key in phase 1
D. All is fine and can be used as is
عرض الإجابة
اجابة صحيحة: C
السؤال #15
Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.
A. Down
B. No Response
C. Inactive
D. Failed
عرض الإجابة
اجابة صحيحة: A
السؤال #16
Bob and Joe both have Administrator Roles on their Gaia Platform. Bob logs in on the WebUI and then Joe logs in through CLI. Choose what BEST describes the following scenario, where Bob and Joe are both logged in:
A. When Joe logs in, Bob will be logged out automatically
B. Since they both are logged in on different interfaces, they both will be able to make changes
C. The database will be locked by Bob and Joe will not be able to make any changes
D. Bob will receive a prompt that Joe logged in
عرض الإجابة
اجابة صحيحة: C
السؤال #17
Harriet wants to protect sensitive information from intentional loss when users browse to a specific URL: https://personal.mymail.com, which blade will she enable to achieve her goal?
A. DLP
B. SSL Inspection
C. Application Control
D. URL Filtering
عرض الإجابة
اجابة صحيحة: A
السؤال #18
The R80 utility fw monitor is used to troubleshoot _____________
A. User data base corruption
B. LDAP conflicts
C. Traffic issues
D. Phase two key negotiation
عرض الإجابة
اجابة صحيحة: C
السؤال #19
Fill in the blank: By default, the SIC certificates issued by R80 Management Server are based on the ____________ algorithm.
A. SHA-256
B. SHA-200C
D. SHA-128
عرض الإجابة
اجابة صحيحة: C
السؤال #20
What component of R80 Management is used for indexing?
A. DBSync
B. API Server
C. fwm
D. SOLR
عرض الإجابة
اجابة صحيحة: D
السؤال #21
The fw monitor utility is used to troubleshoot which of the following problems?
A. Phase two key negotiation
B. Address translation
C. Log Consolidation Engine
D. User data base corruption
عرض الإجابة
اجابة صحيحة: B
السؤال #22
How many users can have read/write access in Gaia at one time?
A. Infinite
B. One
C. Three
D. Two
عرض الإجابة
اجابة صحيحة: B
السؤال #23
A _______ is used by a VPN gateway to send traffic as if it was a physical interface.
A. VPN Tunnel Interface
B. VPN community
C. VPN router
D. VPN interface
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: