لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
The security Gateway is installed on GAiA R80 The default port for the WEB User Interface is ____.
A. TCP 18211
B. TCP 257
C. TCP 4433
D. TCP 443
عرض الإجابة
اجابة صحيحة: D
السؤال #2
What Check Point technologies deny or permit network traffic?
A. Application Control DLP
B. Packet Filtering, Stateful Inspection, Application Layer Firewall
C. ACL SandBlast, MPT
D. IPS, Mobile Threat Protection
عرض الإجابة
اجابة صحيحة: C
السؤال #3
Fill in the blank: Once a license is activated, a ____ should be installed.
A. License Management file
B. Security Gateway Contract file
C. Service Contract file
D. License Contract file
عرض الإجابة
اجابة صحيحة: C
السؤال #4
Which product correlates logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?
A. SmartView Monitor
B. SmartEvent
C. SmartUpdate
D. SmartDashboard
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Which two Identity Awareness commands are used to support identity sharing?
A. Policy Decision Point (PDP) and Policy Enforcement Point (PEP)
B. Policy Enforcement Point (PEP) and Policy Manipulation Point (PMP)
C. Policy Manipulation Point (PMP) and Policy Activation Point (PAP)
D. Policy Activation Point (PAP) and Policy Decision Point (PDP)
عرض الإجابة
اجابة صحيحة: B
السؤال #6
When using Monitored circuit VRRP, what is a priority delta?
A. When an interface fails the priority changes to the priority delta
B. When an interface fails the delta claims the priority
C. When an interface fails the priority delta is subtracted from the priority
D. When an interface fails the priority delta decides if the other interfaces takes over
عرض الإجابة
اجابة صحيحة: A
السؤال #7
Fill in the blank: The ____ is used to obtain identification and security information about network users.
A. User Directory
B. User server
C. UserCheck
D. User index
عرض الإجابة
اجابة صحيحة: D
السؤال #8
Which of the following ClusterXL modes uses a non-unicast MAC address for the cluster IP address?
A. High Availability
B. Load Sharing Multicast
C. Load Sharing Pivot
D. Master/Backup
عرض الإجابة
اجابة صحيحة: A
السؤال #9
Fill in the blanks: A High Availability deployment is referred to as a ____ cluster and a Load Sharing deployment is referred to as a _____ cluster.
A. Standby/standby; active/active
B. Active/active; standby/standby
C. Active/active; active/standby;
D. Active/standby; active/active
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Choose what BEST describes a Session.
A. Starts when an Administrator publishes all the changes made on SmartConsole
B. Starts when an Administrator logs in to the Security Management Server through SmartConsole and ends when it is published
C. Sessions ends when policy is pushed to the Security Gateway
D. Sessions locks the policy package for editing
عرض الإجابة
اجابة صحيحة: A
السؤال #11
Which feature is NOT provided by all Check Point Mobile Access solutions?
A. Support for IPv6
B. Granular access control
C. Strong user authentication
D. Secure connectivity
عرض الإجابة
اجابة صحيحة: C
السؤال #12
Which of the completed statements is NOT true? The WebUI can be used to manage user accounts and:
A. assign privileges to users
B. edit the home directory of the user
C. add users to your Gaia system
D. assign user rights to their home directory in the Security Management Server
عرض الإجابة
اجابة صحيحة: B
السؤال #13
In R80 Management, apart from using SmartConsole, objects or rules can also be modified using:
A. 3rd Party integration of CLI and API for Gateways prior to R80
B. A complete CLI and API interface using SSH and custom CPCode integration
C. 3rd Party integration of CLI and API for Management prior to R80
D. A complete CLI and API interface for Management with 3rd Party integration
عرض الإجابة
اجابة صحيحة: CExplanati
السؤال #14
DLP and Geo Policy are examples of what type of Policy?
A. Standard Policies
B. Shared Policies
C. Inspection Policies
D. Unified Policies
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Fill in the blank: A new license should be generated and installed in all of the following situations EXCEPT when ____.
A. The license is attached to the wrong Security Gateway
B. The existing license expires
C. The license is upgraded
D. The IP address of the Security Management or Security Gateway has changed
عرض الإجابة
اجابة صحيحة: C
السؤال #16
How Capsule Connect and Capsule Workspace differ?
A. Capsule Connect provides a Layer3 VP
B. Capsule Workspace provides a Desktop with usable applications
C. Capsule Workspace can provide access to any application
D. Capsule Connect provides Business data isolation
E. Capsule Connect does not require an installed application at client
عرض الإجابة
اجابة صحيحة: C
السؤال #17
Which of the following is NOT an integral part of VPN communication within a network?
A. VPN key
B. VPN community
C. VPN trust entities
D. VPN domain
عرض الإجابة
اجابة صحيحة: A
السؤال #18
What protocol is specifically used for clustered environments?
A. Clustered Protocol
B. Synchronized Cluster Protocol
C. Control Cluster Protocol
D. Cluster Control Protocol
عرض الإجابة
اجابة صحيحة: B
السؤال #19
Phase 1 of the two-phase negotiation process conducted by IKE operates in a_____ mode.
A. Main
B. Authentication
C. Quick
D. High Alert
عرض الإجابة
اجابة صحيحة: D
السؤال #20
Fill in the blank: Gaia can be configured using the _____ or _____.
A. Gaia; command line interface
B. WebUI; Gaia Interface
C. Command line interface; WebUI
D. Gaia Interface; GaiaUI
عرض الإجابة
اجابة صحيحة: C
السؤال #21
When a packet arrives at the gateway, the gateway checks it against the rules in the top Policy Layer, sequentially from top to bottom, and enforces the first rule that matches a packet. Which of the following statements about the order of rule enforcement is true?
A. If the Action is Accept, the gateway allows the packet to pass through the gateway
B. If the Action is Drop, the gateway continues to check rules in the next Policy Layer down
C. If the Action is Accept, the gateway continues to check rules in the next Policy Layer down
D. If the Action is Drop, the gateway applies the Implicit Clean-up Rule for that Policy Layer
عرض الإجابة
اجابة صحيحة: D
السؤال #22
To optimize Rule Base efficiency, the most hit rules should be where?
A. Removed from the Rule Base
B. Towards the middle of the Rule Base
C. Towards the top of the Rule Base
D. Towards the bottom of the Rule Base
عرض الإجابة
اجابة صحيحة: A
السؤال #23
What is the default shell for the command line interface?
A. Expert
B. Clish
C. Admin
D. Normal
عرض الإجابة
اجابة صحيحة: B
السؤال #24
Choose what BEST describes the Policy Layer Traffic Inspection.
A. If a packet does not match any of the inline layers, the matching continues to the next Layer
B. If a packet matches an inline layer, it will continue matching the next layer
C. If a packet does not match any of the inline layers, the packet will be matched against the Implicit Clean-up Rule
D. If a packet does not match a Network Policy Layer, the matching continues to its inline layer
عرض الإجابة
اجابة صحيحة: B
السؤال #25
If there is an Accept Implied Policy set to “First”, what is the reason Jorge cannot see any logs?
A. Log Implied Rule was not selected on Global Properties
B. Log Implied Rule was not set correctly on the track column on the rules base
C. Track log column is set to none
D. Track log column is set to Log instead of Full Log
عرض الإجابة
اجابة صحيحة: D
السؤال #26
How many sessions can be opened on the Management Server at the same time?
A. Unlimited, One per each licensed Gateway
B. One
C. Unlimited, Multiple per administrator
D. Unlimited, One per administrator
عرض الإجابة
اجابة صحيحة: D
السؤال #27
Which default user has full read/write access?
A. Monitor
B. Altuser
C. Administrator
D. Superuser
عرض الإجابة
اجابة صحيحة: C
السؤال #28
Choose the Best place to find a Security Management Server backup file named backup_fw, on a Check Point Appliance.
A. /var/log/Cpbackup/backups/backup/backup_fw
B. /var/log/Cpbackup/backups/backup/backup_fw
C. /var/log/Cpbackup/backups/backups/backup_fw
D. /var/log/Cpbackup/backups/backup_fw
عرض الإجابة
اجابة صحيحة: D
السؤال #29
Fill in the blanks: A security Policy is created in ______, stored in the ______, and Distributed to the various ______.
A. Rule base, Security Management Server, Security Gateways
B. SmartConsole, Security Gateway, Security Management Servers
C. SmartConsole, Security Management Server, Security Gateways
D. The Check Point database, SmartConsole, Security Gateways
عرض الإجابة
اجابة صحيحة: A
السؤال #30
In R80, Unified Policy is a combination of
A. Access control policy, QoS Policy, Desktop Security Policy and endpoint policy
B. Access control policy, QoS Policy, Desktop Security Policy and Threat Prevention Policy
C. Firewall policy, address Translation and application and URL filtering, QoS Policy, Desktop Security Policy and Threat Prevention Policy
D. Access control policy, QoS Policy, Desktop Security Policy and VPN policy
عرض الإجابة
اجابة صحيحة: B
السؤال #31
Fill in the blank: The command _____ provides the most complete restoration of a R80 configuration.
A. upgrade_import
B. cpconfig
C. fwm dbimport -p
D. cpinfo -recover
عرض الإجابة
اجابة صحيحة: A
السؤال #32
Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is ___ all traffic. However, in the Application Control policy layer, the default action is _____ all traffic.
A. Accept; redirect
B. Accept; drop
C. Redirect; drop
D. Drop; accept
عرض الإجابة
اجابة صحيحة: D
السؤال #33
What are the three components for Check Point Capsule?
A. Capsule Docs, Capsule Cloud, Capsule Connect
B. Capsule Workspace, Capsule Cloud, Capsule Connect
C. Capsule Workspace, Capsule Docs, Capsule Connect
D. Capsule Workspace, Capsule Docs, Capsule Cloud
عرض الإجابة
اجابة صحيحة: D
السؤال #34
Choose the SmartLog property that is TRUE.
A. SmartLog has been an option since release R71
B. SmartLog is not a Check Point product
C. SmartLog and SmartView Tracker are mutually exclusive
D. SmartLog is a client of SmartConsole that enables enterprises to centrally track log records and security activity with Google-like search
عرض الإجابة
اجابة صحيحة: A
السؤال #35
Which Check Point feature enables application scanning and the detection?
A. Application Dictionary
B. AppWiki
C. Application Library
D. CPApp
عرض الإجابة
اجابة صحيحة: C
السؤال #36
Which command is used to add users to or from existing roles?
A. Add rba user roles
B. Add rba user
C. Add user roles
D. Add user
عرض الإجابة
اجابة صحيحة: A
السؤال #37
What are the three conflict resolution rules in the Threat Prevention Policy Layers?
A. Conflict on action, conflict on exception, and conflict on settings
B. Conflict on scope, conflict on settings, and conflict on exception
C. Conflict on settings, conflict on address, and conflict on exception
D. Conflict on action, conflict on destination, and conflict on settings
عرض الإجابة
اجابة صحيحة: D
السؤال #38
Examine the following Rule Base. What can we infer about the recent changes made to the Rule Base?
A. Rule 7 was created by the 'admin' administrator in the current session
B. 8 changes have been made by administrators since the last policy installation
C. The rules 1, 5 and 6 cannot be edited by the 'admin' administrator
D. Rule 1 and object webserver are locked by another administrator
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: