لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
In order to modify Security Policies the administrator can use which of the following tools? Select the BEST answer.
A. Command line of the Security Management Server or mgmt_cli
B. SmartConsole and WebUI on the Security Management Server
C. mgmt_cli or WebUI on Security Gateway and SmartConsole on the Security Management Server
D. SmartConsole or mgmt_cli on any computer where SmartConsole is installed
عرض الإجابة
اجابة صحيحة: A
السؤال #2
Fill in the blank: Licenses can be added to the License and Contract repository ________ .
A. From the User Center, from a file, or manually
B. From a file, manually, or from SmartView Monitor
C. Manually, from SmartView Monitor, or from the User Center
D. From SmartView Monitor, from the User Center, or from a file
عرض الإجابة
اجابة صحيحة: A
السؤال #3
By default, which port does the WebUI listen on?
A. 80
B. 4434C
D. 8080
عرض الإجابة
اجابة صحيحة: A
السؤال #4
To install a brand new Check Point Cluster, the MegaCorp IT department bought 1 Smart-1 and 2 Security Gateway Appliances to run a cluster. Which type of cluster is it?
A. Full HA Cluster
B. High Availability
C. Standalone
D. Distributed
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Fill in the blank: RADIUS protocol uses ______ to communicate with the gateway.
A. UDP
B. TDP
C. CCP
D. HTTP
عرض الإجابة
اجابة صحيحة: A
السؤال #6
You are unable to login to SmartDashboard. You log into the management server and run #cpwd_admin list with the following output: What reason could possibly BEST explain why you are unable to connect to SmartDashboard?
A. CDP is down
B. SVR is down
C. FWM is down
D. CPSM is down
عرض الإجابة
اجابة صحيحة: A
السؤال #7
What are the three conflict resolution rules in the Threat Prevention Policy Layers?
A. Conflict on action, conflict on exception, and conflict on settings
B. Conflict on scope, conflict on settings, and conflict on exception
C. Conflict on settings, conflict on address, and conflict on exception
D. Conflict on action, conflict on destination, and conflict on settings
عرض الإجابة
اجابة صحيحة: B
السؤال #8
On the following graphic, you will find layers of policies. What is a precedence of traffic inspection for the defined polices?
A. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and then if implicit Drop Rule drops the packet, it comes next to IPS layer and then after accepting the packet it passes to Threat Prevention layer
B. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and then if there is any rule which accepts the packet, it comes next to IPS layer and then after accepting the packet it passes to Threat Prevention layer
C. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and then if there is any rule which accepts the packet, it comes next to Threat Prevention layer and then after accepting the packet it passes to IPS layer
D. A packet arrives at the gateway, it is checked against the rules in IPS policy layer and then it comes next to the Network policy layer and then after accepting the packet it passes to Threat Prevention layer
عرض الإجابة
اجابة صحيحة: A
السؤال #9
Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?
A. One machine, but it needs to be installed using SecurePlatform for compatibility purposes
B. One machine
C. Two machines
D. Three machines
عرض الإجابة
اجابة صحيحة: D
السؤال #10
In which VPN community is a satellite VPN gateway not allowed to create a VPN tunnel with another satellite VPN gateway?
A. Pentagon
B. Combined
C. Meshed
D. Star
عرض الإجابة
اجابة صحيحة: C
السؤال #11
When a packet arrives at the gateway, the gateway checks it against the rules in the top Policy Layer, sequentially from top to bottom, and enforces the first rule that matches a packet. Which of the following statements about the order of rule enforcement is true?
A. If the Action is Accept, the gateway allows the packet to pass through the gateway
B. If the Action is Drop, the gateway continues to check rules in the next Policy Layer down
C. If the Action is Accept, the gateway continues to check rules in the next Policy Layer down
D. If the Action is Drop, the gateway applies the Implicit Clean-up Rule for that Policy Layer
عرض الإجابة
اجابة صحيحة: A
السؤال #12
Kofi, the administrator of the ABC Corp network wishes to change the default Gaia WebUI Portal port number currently set on the default HTTPS port. Which CLISH commands are required to be able to change this TCP port?
A. set web ssl-port
B. set Gaia-portal
C. set Gaia-portal https-port
D. set web https-port
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Which of the following is NOT a license activation method?
A. SmartConsole Wizard
B. Online Activation
C. License Activation Wizard
D. Offline Activation
عرض الإجابة
اجابة صحيحة: C
السؤال #14
Choose the Best place to find a Security Management Server backup file named backup_fw, on a Check Point Appliance.
A. /var/log/Cpbackup/backups/backup/backup_fw
B. /var/log/Cpbackup/backups/backup/backup_fw
C. /var/log/Cpbackup/backups/backups/backup_fw
D. /var/log/Cpbackup/backups/backup_fw
عرض الإجابة
اجابة صحيحة: B
السؤال #15
You want to reset SIC between smberlin and sgosaka. In SmartDashboard, you choose sgosaka, Communication, Reset. On sgosaka, you start cpconfig, choose Secure Internal Communication and enter the new SIC Activation Key. The screen reads The SIC was successfully initialized and jumps back to the menu. When trying to establish a connection, instead of a working connection, you receive this error message: What is the reason for this behavior?
A. The Gateway was not rebooted, which is necessary to change the SIC key
B. You must first initialize the Gateway object in SmartDashboard (i
C. The check Point services on the Gateway were not restarted because you are still in the cpconfig utility
D. The activation key contains letters that are on different keys on localized keyboards
عرض الإجابة
اجابة صحيحة: B
السؤال #16
While enabling the Identity Awareness blade the Identity Awareness wizard does not automatically detect the windows domain. Why does it not detect the windows domain?
A. Security Gateways is not part of the Domain
B. SmartConsole machine is not part of the domain
C. SMS is not part of the domain
D. Identity Awareness is not enabled on Global properties
عرض الإجابة
اجابة صحيحة: B
السؤال #17
In R80, Unified Policy is a combination of
A. Access control policy, QoS Policy, Desktop Security Policy and endpoint policy
B. Access control policy, QoS Policy, Desktop Security Policy and Threat Prevention Policy
C. Firewall policy, address Translation and application and URL filtering, QoS Policy, Desktop Security Policy and Threat Prevention Policy
D. Access control policy, QoS Policy, Desktop Security Policy and VPN policy
عرض الإجابة
اجابة صحيحة: D
السؤال #18
Which of the following is TRUE regarding Gaia command line?
A. Configuration changes should be done in mgmt_cli and use CLISH for monitoring, Expert mode is used only for OS level tasks
B. Configuration changes should be done in expert-mode and CLISH is used for monitoring
C. Configuration changes should be done in mgmt-cli and use expert-mode for OS-level tasks
D. All configuration changes should be made in CLISH and expert-mode should be used for OS-level tasks
عرض الإجابة
اجابة صحيحة: D
السؤال #19
Fill in the blank: RADIUS Accounting gets ______ data from requests generated by the accounting client
A. Destination
B. Identity
C. Payload
D. Location
عرض الإجابة
اجابة صحيحة: D
السؤال #20
Which Threat Prevention Software Blade provides comprehensive against malicious and unwanted network traffic, focusing on application and server vulnerabilities?
A. Anti-Virus
B. IPS
C. Anti-Spam
D. Anti-bot
عرض الإجابة
اجابة صحيحة: C
السؤال #21
Which one of the following is the preferred licensing model? Select the Best answer.
A. Local licensing because it ties the package license to the IP-address of the gateway and has no dependency of the Security Management Server
B. Central licensing because it ties the package license to the IP-address of the Security Management Server and has no dependency of the gateway
C. Local licensing because it ties the package license to the MAC-address of the gateway management interface and has no Security Management Server dependency
D. Central licensing because it ties the package license to the MAC-address of the Security Management Server Mgmt-interface and has no dependency of the gateway
عرض الإجابة
اجابة صحيحة: C
السؤال #22
Bob and Joe both have Administrator Roles on their Gaia Platform. Bob logs in on the WebUI and then Joe logs in through CLI. Choose what BEST describes the following scenario, where Bob and Joe are both logged in:
A. When Joe logs in, Bob will be log out automatically
B. Since they both are log in on different interfaces, they both will be able to make changes
C. If Joe tries to make changes, he won't, database will be locked
D. Bob will be prompt that Joe logged in
عرض الإجابة
اجابة صحيحة: A
السؤال #23
Fill in the blank: A _______ is used by a VPN gateway to send traffic as if it were a physical interface.
A. VPN Tunnel Interface
B. VPN community
C. VPN router
D. VPN interface
عرض الإجابة
اجابة صحيحة: C
السؤال #24
Which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?
A. Auditor
B. Read Only All
C. Super User
D. Full Access
عرض الإجابة
اجابة صحيحة: B
السؤال #25
Which directory holds the SmartLog index files by default?
A. $SMARTLOGDIR/data
B. $SMARTLOG/dir
C. $FWDIR/smartlog
D. $FWDIR/log
عرض الإجابة
اجابة صحيحة: E
السؤال #26
Joey is using the computer with IP address 192.168.20.13. He wants to access web page “www.Check Point.com”, which is hosted on Web server with IP address 203.0.113.111. How many rules on Check Point Firewall are required for this connection?
A. Two rules – first one for the HTTP traffic and second one for DNS traffic
B. Only one rule, because Check Point firewall is a Packet Filtering firewall
C. Two rules – one for outgoing request and second one for incoming replay
D. Only one rule, because Check Point firewall is using Stateful Inspection technology
عرض الإجابة
اجابة صحيحة: A
السؤال #27
Fill in the blanks: A Check Point software license consists of a _______ and _______ .
A. Software container; software package
B. Software blade; software container
C. Software package; signature
D. Signature; software blade
عرض الإجابة
اجابة صحيحة: D
السؤال #28
Tina is a new administrator who is currently reviewing the new Check Point R80 Management console interface. In the Gateways view, she is reviewing the Summary screen as in the screenshot below. What as an 'Open Server'?
A. Check Point software deployed on a non-Check Point appliance
B. The Open Server Consortium approved Server Hardware used for the purpose of Security and Availability
C. A check Point Management Server deployed using the Open Systems Interconnection (OSI) Server and Security deployment model
D. A check Point Management Server software using the Open SSL
عرض الإجابة
اجابة صحيحة: B
السؤال #29
Why would an administrator see the message below?
A. A new Policy Package created on both the Management and Gateway will be deleted and must be packed up first before proceeding
B. A new Policy Package created on the Management is going to be installed to the existing Gateway
C. A new Policy Package created on the Gateway is going to be installed on the existing Management
D. A new Policy Package created on the Gateway and transferred to the management will be overwritten by the Policy Package currently on the Gateway but can be restored from a periodic backup on the Gateway
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: