لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
A. None, Security Management Server would be installed by itself
B. SmartConsole
C. SecureClient
D. Security Gateway
E. SmartEvent
عرض الإجابة
اجابة صحيحة: C
السؤال #2
DLP and Geo Policy are examples of what type of Policy?
A. Standard Policies
B. Shared Policies
C. Inspection Policies
D. Unified Policies
عرض الإجابة
اجابة صحيحة: D
السؤال #3
Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?
A. UserCheck
B. Active Directory Query
C. Account Unit Query
D. User Directory Query
عرض الإجابة
اجابة صحيحة: C
السؤال #4
Identify the API that is not supported by Check Point currently.
A. R80 Management API-
B. Identity Awareness Web Services API
C. Open REST API
D. OPSEC SDK
عرض الإجابة
اجابة صحيحة: A
السؤال #5
When a packet arrives at the gateway, the gateway checks it against the rules in the hop Policy Layer, sequentially from top to bottom, and enforces the first rule that matches a packet. Which of the following statements about the order of rule enforcement is true?
A. If the Action is Accept, the gateway allows the packet to pass through the gateway
B. If the Action is Drop, the gateway continues to check rules in the next Policy Layer down
C. If the Action is Accept, the gateway continues to check rules in the next Policy Layer down
D. If the Action is Drop, the gateway applies the Implicit Clean-up Rule for that Policy Layer
عرض الإجابة
اجابة صحيحة: A
السؤال #6
Which file contains the host address to be published, the MAC address that needs to be associated with the IP Address, and the unique IP of the interface that responds to ARP request?
A. /opt/CPshrd-R80/conf/local
B. /var/opt/CPshrd-R80/conf/local
C. $CPDIR/conf/local
D. $FWDIR/conf/local
عرض الإجابة
اجابة صحيحة: C
السؤال #7
You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?
A. restore_backup
B. import backup
C. cp_merge
D. migrate import
عرض الإجابة
اجابة صحيحة: C
السؤال #8
What is the command to check the status of Check Point processes?
A. top
B. cptop
C. cphaprob list
D. cpwd_admin list
عرض الإجابة
اجابة صحيحة: D
السؤال #9
What is the responsibility of SOLR process on R80.10 management server?
A. Validating all data before it’s written into the database
B. It generates indexes of data written to the database
C. Communication between SmartConsole applications and the Security Management Server
D. Writing all information into the database
عرض الإجابة
اجابة صحيحة: D
السؤال #10
There are 4 ways to use the Management API for creating host object with R80 Management API. Which one is NOT correct?
A. Using Web Services
B. Using Mgmt_cli tool
C. Using CLISH
D. Using SmartConsole GUI console
E. Events are collected with SmartWorkflow from Trouble Ticket systems
عرض الإجابة
اجابة صحيحة: B
السؤال #11
What CLI command compiles and installs a Security Policy on the target’s Security Gateways?
A. fwm compile
B. fwm load
C. fwm fetch
D. fwm install
عرض الإجابة
اجابة صحيحة: B
السؤال #12
When users connect to the Mobile Access portal they are unable to open File Shares. Which log file would you want to examine?
A. cvpnd
B. httpd
C. vpnd
D. fw
عرض الإجابة
اجابة صحيحة: C
السؤال #13
To enable Dynamic Dispatch on Security Gateway without the Firewall Priority Queues, run the following command in Expert mode and reboot:
A. fw ctl Dyn_Dispatch on
B. fw ctl Dyn_Dispatch enable
C. fw ctl multik set_mode 4
D. fw ctl multik set_mode 1
عرض الإجابة
اجابة صحيحة: B
السؤال #14
Please choose the path to monitor the compliance status of the Check Point R80.10 based management.
A. Gateways & Servers --> Compliance View
B. Compliance blade not available under R80
C. Logs & Monitor --> New Tab --> Open compliance View
D. Security & Policies --> New Tab --> Compliance View
عرض الإجابة
اجابة صحيحة: B
السؤال #15
On R80.10 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:
A. 18210
B. 18184
C. 257
D. 18191
عرض الإجابة
اجابة صحيحة: D
السؤال #16
You have enabled “Full Log” as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?
A. Logging has disk space issue
B. Change logging storage options on the logging server or Security Management Server properties and install database
C. Data Awareness is not enabled
D. Identity Awareness is not enabled
E. Logs are arriving from Pre-R80 gateways
عرض الإجابة
اجابة صحيحة: D
السؤال #17
John is using Management HA. Which Smartcenter should be connected to for making changes?
A. secondary Smartcenter
B. active Smartenter
C. connect virtual IP of Smartcenter HA
D. primary Smartcenter
عرض الإجابة
اجابة صحيحة: B
السؤال #18
The “Hit count” feature allows tracking the number of connections that each rule matches. Will the Hit count feature work independently from logging and Track the hits if the Track option is set to “None”?
A. No, it will work independentl
B. Hit Count will be shown only for rules Track option set as Log or alert
C. Yes it will work independently as long as “analyze all rules” tick box is enabled on the Security Gateway
D. No, it will not work independently because hit count requires all rules to be logged
E. Yes it will work independently because when you enable Hit Count, the SMS collects the data from supported Security Gateways
عرض الإجابة
اجابة صحيحة: D
السؤال #19
SandBlast has several functional components that work together to ensure that attacks are prevented in real-time. Which the following is NOT part of the SandBlast component?
A. Threat Emulation
B. Mobile Access
C. Mail Transfer Agent
D. Threat Cloud
عرض الإجابة
اجابة صحيحة: C
السؤال #20
Which Check Point feature enables application scanning and the detection?
A. Application Dictionary
B. AppWiki
C. Application Library
D. CPApp
عرض الإجابة
اجابة صحيحة: A
السؤال #21
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) ______ or _______ action for the file types.
A. Inspect/Bypass
B. Inspect/Prevent
C. Prevent/Bypass
D. Detect/Bypass
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: