لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What are the three tabs available in SmartView Tracker?
A. etwork & Endpoint, Management, and Active
B. etwork, Endpoint, and Active
C. redefined, All Records, Custom Queries
D. ndpoint, Active, and Custom Queries
عرض الإجابة
اجابة صحيحة: C
السؤال #2
While in SmartView Tracker, Brady has noticed some very odd network traffic that he thinks could be an intrusion. He decides to block the traffic for 60 minutes, but cannot remember all the steps. What is the correct order of steps needed to set up the block?1)Select Active Mode tab in SmartView Tracker.2) Select Tools > Block Intruder.3) Select Log Viewing tab in SmartView Tracker.4) Set Blocking Timeout value to 60 minutes.5) Highlight connection that should be blocked.
A. , 2, 5, 4
B. , 2, 5, 4
C. , 5, 2, 4
D. , 5, 2, 4
عرض الإجابة
اجابة صحيحة: C
السؤال #3
The SmartEvent R80 Web application for real-time event monitoring is called:
A. martView Monitor
B. martEventWeb
C. here is no Web application for SmartEvent
D. martView
عرض الإجابة
اجابة صحيحة: B
السؤال #4
What port is used for delivering logs from the gateway to the management server?
A. ort 258
B. ort 18209
C. ort 257
D. ort 981
عرض الإجابة
اجابة صحيحة: C
السؤال #5
Fill in the blank: Licenses can be added to the License and Contract repository ________ .
A. rom the User Center, from a file, or manually
B. rom a file, manually, or from SmartView Monitor
C. anually, from SmartView Monitor, or from the User Center
D. rom SmartView Monitor, from the User Center, or from a file
عرض الإجابة
اجابة صحيحة: A
السؤال #6
What is the purpose of the Clean-up Rule?
A. o log all traffic that is not explicitly allowed or denied in the Rule Base
B. o clean up policies found inconsistent with the compliance blade reports
C. o remove all rules that could have a conflict with other rules in the database
D. o eliminate duplicate log entries in the Security Gateway
عرض الإجابة
اجابة صحيحة: A
السؤال #7
Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use her iPad to access the internal Finance Web server. Because the iPad is not amember of the Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter her AD credentials in the Captive Portal and then get the same access as on her office computer. Her access to resources is based on rules in the R77 Firewall Rule Base.To make this scenario work, the IT administrator must:1) Enable Iden
A. ave the security administrator select the Action field of the Firewall Rule "Redirect HTTP connections to an authentication (captive) portal"
B. ave the security administrator reboot the firewall
C. ave the security administrator select Any for the Machines tab in the appropriate Access Role
D. nstall the Identity Awareness agent on her iPad
عرض الإجابة
اجابة صحيحة: A
السؤال #8
Which of the following licenses are considered temporary?
A. erpetual and Trial
B. lug-and-play and Evaluation
C. ubscription and Perpetual
D. valuation and Subscription
عرض الإجابة
اجابة صحيحة: B
السؤال #9
DLP and Mobile Access Policy are examples of what type of Policy?
A. Shared Policies
B. Unified Policies
C. Inspection Policies
D. Standard Policies
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Can a Check Point gateway translate both source IP address and destination IP address in a given packet?
A. es
B. o
C. es, but only when using Automatic NAT
D. es, but only when using Manual NAT
عرض الإجابة
اجابة صحيحة: A
السؤال #11
You want to define a selected administrator's permission to edit a layer. However, when you click the + sign in the "Select additional profile that will be able edit this layer" you do not see anything. What is the most likely cause of this problem? Select the BEST answer.
A. Edit layers by Software Blades" is unselected in the Permission Profile
B. here are no permission profiles available and you need to create one first
C. ll permission profiles are in use
D. Edit layers by selected profiles in a layer editor" is unselected in the Permission profile
عرض الإجابة
اجابة صحيحة: B
السؤال #12
Your manager requires you to setup a VPN to a new business partner site. The administrator from the partner site gives you his VPN settings and you notice that he setup AES 128 for IKE phase 1 and AES 256 for IKE phase 2. Why is this a problematic setup?
A. he two algorithms do not have the same key length and so don't work together
B. ll is fine as the longest key length has been chosen for encrypting the data and a shorter key length for higher performance for setting up the tunnel
C. nly 128 bit keys are used for phase 1 keys which are protecting phase 2, so the longer key length in phase 2 only costs performance and does not add security due to a shorter key in phase 1
D. ll is fine and can be used as is
عرض الإجابة
اجابة صحيحة: C
السؤال #13
All R77 Security Servers can perform authentication with the exception of one. Which of the Security Servers can NOT perform authentication?
A. TP
B. MTP
C. TTP
D. LOGIN
عرض الإجابة
اجابة صحيحة: B
السؤال #14
Which of the following is NOT a set of Regulatory Requirements related to Information Security?
A. SO 37001
B. arbanes Oxley (SOX)
C. IPPA
D. CI
عرض الإجابة
اجابة صحيحة: A
السؤال #15
Choose what BEST describes a Session.
A. tarts when an Administrator publishes all the changes made on SmartConsole
B. tarts when an Administrator logs in to the Security Management Server through SmartConsole and ends when it is published
C. essions ends when policy is pushed to the Security Gateway
D. essions locks the policy package for editing
عرض الإجابة
اجابة صحيحة: B
السؤال #16
Office mode means that:
A. ecureID client assigns a routable MAC address
B. sers authenticate with an Internet browser and use secure HTTPS connection
C. ocal ISP (Internet service Provider) assigns a non-routable IP address to the remote user
D. llows a security gateway to assign a remote client an IP address
عرض الإجابة
اجابة صحيحة: D
السؤال #17
Which authentication scheme requires a user to possess a token?
A. ACACS
B. ecurID
C. heck Point password
D. ADIUS
عرض الإجابة
اجابة صحيحة: B
السؤال #18
Fill in the blank: Each cluster, at a minimum, should have at least ___________ interfaces.
A. ive
B. wo
C. hree
D. our
عرض الإجابة
اجابة صحيحة: C
السؤال #19
What action can be performed from SmartUpdate R77?
A. pgrade_export
B. w stat -1
C. pinfo
D. emote_uninstall_verifier
عرض الإجابة
اجابة صحيحة: C
السؤال #20
Which set of objects have an Authentication tab?
A. emplates, Users
B. sers, Networks
C. sers, User Group
D. etworks, Hosts
عرض الإجابة
اجابة صحيحة: A
السؤال #21
You have successfully backed up your Check Point configurations without the OS information. What command would you use to restore this backup?
A. estore_backup
B. mport backup
C. p_merge
D. igrate import
عرض الإجابة
اجابة صحيحة: A
السؤال #22
When using GAiA, it might be necessary to temporarily change the MAC address of the interface eth 0 to 00:0C:29:12:34:56. After restarting the network the old MAC address should be active. How do you configure this change?
A. s expert user, issue these commands:# IP link set eth0 down# IP link set eth0 addr00:0C:29:12:34:56# IP link set eth0 up
B. dit the file /etc/sysconfig/netconf
C. s expert user, issue the command:# IP link set eth0 addr 00:0C:29:12:34:56
D. pen the WebUI, select Network > Connections > eth0
عرض الإجابة
اجابة صحيحة: C
السؤال #23
What is the mechanism behind Threat Extraction?
A. his is a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender
B. his is a new mechanism which is able to collect malicious files out of any kind of file types to destroy it prior to sending it to the intended recipient
C. his is a new mechanism to identify the IP address of the sender of malicious codes and to put it into the SAM database (Suspicious Activity Monitoring)
D. ny active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast
عرض الإجابة
اجابة صحيحة: D
السؤال #24
Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.
A. own
B. o Response
C. nactive
D. ailed
عرض الإجابة
اجابة صحيحة: A
السؤال #25
Fill in the blanks: The Application Layer Firewalls inspect traffic through the ________ layer(s) of the TCP/IP model and up to and including the ________ layer.
A. ower; Application
B. irst two; Internet
C. irst two; Transport
D. pper; Application
عرض الإجابة
اجابة صحيحة: A
السؤال #26
What is the Manual Client Authentication TELNET port?
A. 3
B. 64
C. 00
D. 59
عرض الإجابة
اجابة صحيحة: D
السؤال #27
The WebUI offers three methods for downloading Hotfixes via CPUSE. One of them is Automatic method. How many times per day will CPUSE agent check for hotfixes and automatically download them?
A. ix times per day
B. even times per day
C. very two hours
D. very three hours
عرض الإجابة
اجابة صحيحة: D
السؤال #28
Which of the following technologies extracts detailed information from packets and stores that information in different tables?
A. Application Layer Firewall
B. Packet Filtering
C. Next-Generation Firewall
D. Stateful Inspection
عرض الإجابة
اجابة صحيحة: D
السؤال #29
Which method below is NOT one of the ways to communicate using the Management API's?
A. yping API commands using the "mgmt_cli" command
B. yping API commands from a dialog box inside the SmartConsole GUI application
C. yping API commands using Gaia's secure shell (clash)19+
D. ending API commands over an http connection using web-services
عرض الإجابة
اجابة صحيحة: D
السؤال #30
On R80.10 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:
A. 8210
B. 8184
C. 57
D. 8191
عرض الإجابة
اجابة صحيحة: B
السؤال #31
In the R80 SmartConsole, on which tab are Permissions and Administrators defined?
A. ecurity Policies
B. ogs and Monitor
C. anage and Settings
D. ateway and Servers
عرض الإجابة
اجابة صحيحة: C
السؤال #32
NAT can NOT be configured on which of the following objects?
A. TTP Logical Server
B. ateway
C. ddress Range
D. ost
عرض الإجابة
اجابة صحيحة: A
السؤال #33
Where can administrator edit a list of trusted SmartConsole clients in R80?
A. pconfig on a Security Management Server, in the WebUI logged into a Security Management Server
B. nly using SmartConsole: Manage and Settings > Permissions and Administrators > Advanced > Trusted Clients
C. n cpconfig on a Security Management Server, in the WebUI logged into a Security Management Server, in SmartConsole: Manage and Settings>Permissions and Administrators>Advanced>Trusted Clients
D. ebUI client logged to Security Management Server, SmartDashboard: Manage and Settings>Permissions and Administrators>Advanced>Trusted Clients, via cpconfig on a Security Gateway
عرض الإجابة
اجابة صحيحة: C
السؤال #34
You are about to test some rule and object changes suggested in an R77 news group. Which backup solution should you use to ensure the easiest restoration of your Security Policy to its previous configuration after testing the changes?
A. anual copies of the directory $FWDIR/conf
B. pgrade_export command
C. atabase Revision Control
D. AiA backup utilities
عرض الإجابة
اجابة صحيحة: C
السؤال #35
Examine the sample Rule Base.What will be the result of a verification of the policy from SmartConsole?
A. o errors or Warnings
B. erification Error
C. erification Error
D. erification Error
عرض الإجابة
اجابة صحيحة: C
السؤال #36
Fill in the blank: The IPS policy for pre-R80 gateways is installed during the _______ .
A. irewall policy install
B. hreat Prevention policy install
C. nti-bot policy install
D. ccess Control policy install
عرض الإجابة
اجابة صحيحة: B
السؤال #37
Administrator wishes to update IPS from SmartConsole by clicking on the option "update now" under the IPS tab. Which device requires internet access for the update to work?
A. ecurity Gateway
B. evice where SmartConsole is installed
C. MS
D. martEvent
عرض الإجابة
اجابة صحيحة: B
السؤال #38
Which rule is responsible for the user authentication failure?
A. ule 4
B. ule 6
C. ule 3
D. ule 5
عرض الإجابة
اجابة صحيحة: C
السؤال #39
Which default Gaia user has full read/write access?
A. superuser
B. monitor
C. altuser
D. admin
عرض الإجابة
اجابة صحيحة: D
السؤال #40
What happens when you run the command: fw sam -J src [Source IP Address]?
A. onnections from the specified source are blocked without the need to change the Security Policy
B. onnections to the specified target are blocked without the need to change the Security Policy
C. onnections to and from the specified target are blocked without the need to change theSecurity Policy
D. onnections to and from the specified target are blocked with the need to change the Security Policy
عرض الإجابة
اجابة صحيحة: A
السؤال #41
After the initial installation the First Time Configuration Wizard should be run. Select the BEST answer.
A. irst Time Configuration Wizard can be run from the Unified SmartConsole
B. irst Time Configuration Wizard can be run from the command line or from the WebUI
C. irst time Configuration Wizard can only be run from the WebUI
D. onnection to the internet is required before running the First Time Configuration wizard
عرض الإجابة
اجابة صحيحة: B
السؤال #42
Where would an administrator enable Implied Rules logging?
A. n Smart Log Rules View
B. n SmartDashboard on each rule
C. n Global Properties under Firewall
D. n Global Properties under log and alert
عرض الإجابة
اجابة صحيحة: B
السؤال #43
What component of R80 Management is used for indexing?
A. BSync
B. PI Server
C. wm
D. OLR
عرض الإجابة
اجابة صحيحة: D
السؤال #44
What are the two elements of address translation rules?
A. Original packet and translated packet
B. Manipulated packet and original packet
C. Untranslated packet and manipulated packet
D. Translated packet and untranslated packet
عرض الإجابة
اجابة صحيحة: A
السؤال #45
There are two R77.30 Security Gateways in the Firewall Cluster. They are named FW_A and FW_B. The cluster is configured to work as HA (High availability) with default cluster configuration. FW_A is configured to have higher priority than FW_B. FW_A was active and processing the traffic in the morning. FW_B was standby. Around 1100 am, its interfaces went down and this caused a failover. FW_B became active. After an hour, FW_A's interface issues were resolved and it became operational. When it re-joins the c
A. o, since "maintain current active cluster member" option on the cluster object properties is enabled by default
B. o, since "maintain current active cluster member" option is enabled by default on the Global Properties
C. es, since "Switch to higher priority cluster member" option on the cluster object properties is enabled by default
D. es, since "Switch to higher priority cluster member" option is enabled by default on the Global Properties
عرض الإجابة
اجابة صحيحة: A
السؤال #46
R80 Security Management Server can be installed on which of the following operating systems?
A. aia only
B. aia, SPLAT, Windows Server only
C. aia, SPLAT, Windows Server and IPSO only
D. aia and SPLAT only
عرض الإجابة
اجابة صحيحة: A
السؤال #47
Which the following type of authentication on Mobile Access can NOT be used as the first authentication method?
A. ynamic ID
B. ADIUS
C. sername and Password
D. ertificate
عرض الإجابة
اجابة صحيحة: A
السؤال #48
Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?
A. ll options stop Check Point processes
B. ackup
C. igrate export
D. napshot
عرض الإجابة
اجابة صحيحة: D
السؤال #49
You want to reset SIC between smberlin and sgosaka.In SmartDashboard, you choose sgosaka, Communication, Reset. On sgosaka, you start cpconfig, choose Secure Internal Communication and enter the new SIC Activation Key. The screen reads The SIC was successfully initialized and jumps back to the menu. When trying to establish a connection, instead of a working connection, you receive this error message:What is the reason for this behavior?
A. he Gateway was not rebooted, which is necessary to change the SIC key
B. ou must first initialize the Gateway object in SmartDashboard (i
C. he check Point services on the Gateway were not restarted because you are still in the cpconfig utility
D. he activation key contains letters that are on different keys on localized keyboards
عرض الإجابة
اجابة صحيحة: C
السؤال #50
As a Security Administrator, you must refresh the Client Authentication authorized time-out every time a new user connection is authorized. How do you do this? Enable the Refreshable Timeout setting:
A. n the user object's Authentication screen
B. n the Gateway object's Authentication screen
C. n the Limit tab of the Client Authentication Action Properties screen
D. n the Global Properties Authentication screen
عرض الإجابة
اجابة صحيحة: C
السؤال #51
The fw monitor utility is used to troubleshoot which of the following problems?
A. hase two key negotiation
B. ddress translation
C. og Consolidation Engine
D. ser data base corruption
عرض الإجابة
اجابة صحيحة: B
السؤال #52
If there are two administrators logged in at the same time to the SmartConsole, and there are objects locked for editing, what must be done to make them available to other administrators? Choose the BEST answer.
A. Delete older versions of database
B. Publish or discard the session
C. Revert the session
D. Save and install the Policy
عرض الإجابة
اجابة صحيحة: B
السؤال #53
What is the best sync method in the ClusterXL deployment?
A. se 1 cluster + 1st sync
B. se 1 dedicated sync interface
C. se 3 clusters + 1st sync + 2nd sync + 3rd sync
D. se 2 clusters + 1st sync + 2nd sync
عرض الإجابة
اجابة صحيحة: B
السؤال #54
Packet acceleration (SecureXL) identifies connections by several attributes. Which of the attributes is NOT used for identifying connection?
A. ource Address
B. estination Address
C. CP Acknowledgment Number
D. ource Port
عرض الإجابة
اجابة صحيحة: C
السؤال #55
You have configured SNX on the Security Gateway. The client connects to the Security Gateway and the user enters the authentication credentials. What must happen after authentication that allows the client to connect to the Security Gateway's VPN domain?
A. NX modifies the routing table to forward VPN traffic to the Security Gateway
B. n office mode address must be obtained by the client
C. he SNX client application must be installed on the client
D. ctive-X must be allowed on the client
عرض الإجابة
اجابة صحيحة: A
السؤال #56
Vanessa is expecting a very important Security Report. The Document should be sent as an attachment via e-mail. An e-mail with Security_report.pdf file was delivered to her e-mail inbox. When she opened the PDF file, she noticed that the file is basically empty and only few lines of text are in it. The report is missing some graphs, tables and links. Which component of SandBlast protection is her company using on a Gateway?
A. andBlast Threat Emulation
B. andBlast Agent
C. heck Point Protect
D. andBlast Threat Extraction
عرض الإجابة
اجابة صحيحة: D
السؤال #57
Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?
A. hreatWiki
B. hitelist Files
C. ppWiki
D. PS Protections
عرض الإجابة
اجابة صحيحة: A
السؤال #58
Which policy type is used to enforce bandwidth and traffic control rules?
A. hreat Emulation
B. ccess Control
C. oS
D. hreat Prevention
عرض الإجابة
اجابة صحيحة: C
السؤال #59
Which configuration element determines which traffic should be encrypted into a VPN tunnel vs. sent in the clear?
A. he firewall topologies
B. AT Rules
C. he Rule Base
D. he VPN Domains
عرض الإجابة
اجابة صحيحة: C
السؤال #60
What are the three main components of Check Point security management architecture?
A. Smart Console, Standalone, Security Management Server
B. Policy-Client, Security Management Server, Security Gateway
C. SmartConsole, Security Policy Server, Logs & Monitoring
D. SmartConsole, Security Management Server, Security Gateway
عرض الإجابة
اجابة صحيحة: D
السؤال #61
Using ClusterXL, what statement is true about the Sticky Decision Function?
A. an only be changed for Load Sharing implementations
B. ll connections are processed and synchronized by the pivot
C. s configured using cpconfig
D. s only relevant when using SecureXL
عرض الإجابة
اجابة صحيحة: A
السؤال #62
Which component functions as the Internal Certificate Authority for R77?
A. ecurity Gateway
B. anagement Server
C. olicy Server
D. martLSM
عرض الإجابة
اجابة صحيحة: B
السؤال #63
You are going to upgrade from R77 to R80. Before the upgrade, you want to back up the system so that, if there are any problems, you can easily restore to the old version with all configuration and management files intact. What is the BEST backup method in this scenario?
A. ackup
B. atabase Revision
C. napshot
D. igrate export
عرض الإجابة
اجابة صحيحة: C
السؤال #64
Which of the following statements accurately describes the command snapshot?
A. napshot creates a full OS-level backup, including network-interface data, Check Point production information, and configuration settings of a GAiA Security Gateway
B. napshot creates a Security Management Server full system-level backup on any OS
C. napshot stores only the system-configuration settings on the Gateway
D. Gateway snapshot includes configuration settings and Check Point product information from the remote Security Management Server
عرض الإجابة
اجابة صحيحة: A
السؤال #65
Application Control/URL filtering database library is known as:
A. AppWiki
B. Application-Forensic Database
C. Application Library
D. Application database
عرض الإجابة
اجابة صحيحة: A
السؤال #66
How many users can have read/write access in Gaia at one time?
A. nfinite
B. ne
C. hree
D. wo
عرض الإجابة
اجابة صحيحة: B
السؤال #67
How would you deploy TE250X Check Point appliance just for email traffic and in-line mode without a Check Point Security Gateway?
A. nstall appliance TE250X on SpanPort on LAN switch in MTA mode
B. nstall appliance TE250X in standalone mode and setup MTA
C. ou can utilize only Check Point Cloud Services for this scenario
D. t is not possible, always Check Point SGW is needed to forward emails to SandBlast appliance
عرض الإجابة
اجابة صحيحة: C
السؤال #68
Which Check Point software blade provides visibility of users, groups and machines while also providing access control through identity-based policies?
A. irewall
B. dentity Awareness
C. pplication Control
D. RL Filtering
عرض الإجابة
اجابة صحيحة: B
السؤال #69
If there is an Accept Implied Policy set to "First", what is the reason Jorge cannot see any logs?
A. og Implied Rule was not selected on Global Properties
B. og Implied Rule was not set correctly on the track column on the rules base
C. rack log column is set to none
D. rack log column is set to Log instead of Full Log
عرض الإجابة
اجابة صحيحة: A
السؤال #70
Which SmartConsole component can Administrators use to track changes to the Rule Base?
A. ebUI
B. martView Tracker
C. martView Monitor
D. martReporter
عرض الإجابة
اجابة صحيحة: B
السؤال #71
What is the main difference between Threat Extraction and Threat Emulation?
A. hreat Emulation never delivers a file and takes more than 3 minutes to complete
B. hreat Extraction always delivers a file and takes less than a second to complete
C. hreat Emulation never delivers a file that takes less than a second to complete
D. hreat Extraction never delivers a file and takes more than 3 minutes to complete
عرض الإجابة
اجابة صحيحة: B
السؤال #72
One of major features in SmartConsole is concurrent administration.Which of the following is NOT possible considering that AdminA, AdminB and AdminC are editing the same Security Policy?
A. AdminB sees a pencil icon next the rule that AdminB is currently editing
B. AdminA, AdminB and AdminC are editing three different rules at the same time
C. AdminA and AdminB are editing the same rule at the same time
D. AdminC sees a lock icon which indicates that the rule is locked for editing by another administrator
عرض الإجابة
اجابة صحيحة: C
السؤال #73
What are the two deployment options available for a security gateway?
A. Bridge and Switch
B. Local and Remote
C. Cloud and Router
D. Standalone and Distributed
عرض الإجابة
اجابة صحيحة: D
السؤال #74
MegaCorp's security infrastructure separates Security Gateways geographically. You must request a central license for one remote Security Gateway.How do you apply the license?
A. sing the remote Gateway's IP address, and attaching the license to the remote Gateway via SmartUpdate
B. sing your Security Management Server's IP address, and attaching the license to the remote Gateway via SmartUpdate
C. sing the remote Gateway's IP address, and applying the license locally with command cplic put
D. sing each of the Gateway's IP addresses, and applying the licenses on the Security Management Server with the command cprlic put
عرض الإجابة
اجابة صحيحة: B
السؤال #75
Which command can you use to enable or disable multi-queue per interface?
A. pmq set
B. pmqueue set
C. pmq config
D. et cpmq enable
عرض الإجابة
اجابة صحيحة: A
السؤال #76
Look at the screenshot below. What CLISH command provides this output?
A. how configuration all
B. how confd configuration
C. how confd configuration all
D. how configuration
عرض الإجابة
اجابة صحيحة: D
السؤال #77
Where do you verify that UserDirectory is enabled?
A. erify that Security Gateway > General Properties > Authentication > Use UserDirectory(LDAP) for Security Gateways is checked
B. erify that Global Properties > Authentication > Use UserDirectory (LDAP) for Security Gateways is checked
C. erify that Security Gateway > General Properties > UserDirectory (LDAP) > Use UserDirectory (LDAP) for Security Gateways is checked
D. erify that Global Properties > UserDirectory (LDAP) > Use UserDirectory (LDAP) for Security Gateways is checked
عرض الإجابة
اجابة صحيحة: D
السؤال #78
Which NAT rules are prioritized first?
A. ost-Automatic/Manual NAT rules
B. anual/Pre-Automatic NAT
C. utomatic Hide NAT
D. utomatic Static NAT
عرض الإجابة
اجابة صحيحة: B
السؤال #79
Which R77 GUI would you use to see number of packets accepted since the last policy install?
A. martView Monitor
B. martView Tracker
C. martDashboard
D. martView Status
عرض الإجابة
اجابة صحيحة: A
السؤال #80
Fill in the blank: The _________ software blade enables Application Security policies to allow, block, or limit website access based on user, group, and machine identities.
A. pplication Control
B. ata Awareness
C. RL Filtering
D. hreat Emulation
عرض الإجابة
اجابة صحيحة: A
السؤال #81
You are the Security Administrator for MegaCorp. In order to see how efficient your firewallRule Base is, you would like to see how many often the particular rules match. Where can you see it? Give the BEST answer.
A. n the SmartView Tracker, if you activate the column Matching Rate
B. n SmartReporter, in the section Firewall Blade \xad Activity > Network Activity with information concerning Top Matched Logged Rules
C. martReporter provides this information in the section Firewall Blade \xad Security > Rule Base Analysis with information concerning Top Matched Logged Rules
D. t is not possible to see it directly
عرض الإجابة
اجابة صحيحة: C
السؤال #82
Which of the following is TRUE about the Check Point Host object?
A. heck Point Host has no routing ability even if it has more than one interface installed
B. hen you upgrade to R80 from R77
C. heck Point Host is capable of having an IP forwarding mechanism
D. heck Point Host can act as a firewall
عرض الإجابة
اجابة صحيحة: A
السؤال #83
Which SmartConsole tab is used to monitor network and security performance?
A. Logs Monitor
B. Manage Settings
C. Security Policies
D. Gateway Servers
عرض الإجابة
اجابة صحيحة: A
السؤال #84
What must a Security Administrator do to comply with a management requirement to log all traffic accepted through the perimeter Security Gateway?
A. n Global Properties > Reporting Tools check the box Enable tracking all rules (including rules marked as None in the Track column)
B. nstall the View Implicit Rules package using SmartUpdate
C. efine two log servers on the R77 Gateway object
D. heck the Log Implied Rules Globally box on the R77 Gateway object
عرض الإجابة
اجابة صحيحة: A
السؤال #85
What is the difference between SSL VPN and IPSec VPN?
A. PSec VPN does not require installation of a resident VPN client
B. SL VPN requires installation of a resident VPN client
C. SL VPN and IPSec VPN are the same
D. PSec VPN requires installation of a resident VPN client and SSL VPN requires only an installed Browser
عرض الإجابة
اجابة صحيحة: D
السؤال #86
In the Check Point three-tiered architecture, which of the following is NOT a function of the Security Management Server?
A. Verify and compile Security Policies
B. Display policies and logs on the administrator's workstation
C. Store firewall logs to hard drive storage
D. Manage the object database
عرض الإجابة
اجابة صحيحة: B
السؤال #87
What is also referred to as Dynamic NAT?
A. utomatic NAT
B. tatic NAT
C. anual NAT
D. ide NAT
عرض الإجابة
اجابة صحيحة: D
السؤال #88
When using LDAP as an authentication method for Identity Awareness, the query:
A. equires client and server side software
B. rompts the user to enter credentials
C. equires administrators to specifically allow LDAP traffic to and from the LDAP Server and the Security Gateway
D. s transparent, requiring no client or server side software, or client intervention
عرض الإجابة
اجابة صحيحة: D
السؤال #89
When configuring Spoof Tracking, which tracking actions can an administrator select to be done when spoofed packets are detected?
A. og, send snmp trap, email
B. rop packet, alert, none
C. og, alert, none
D. og, allow packets, email
عرض الإجابة
اجابة صحيحة: C
السؤال #90
One of major features in R80.x SmartConsole is concurrent administration. Which of the following is NOT possible considering that AdminA, AdminB, and AdminC are editing the same Security Policy?
A. dminC sees a lock icon which indicates that the rule is locked for editing by another administrator
B. dminA and AdminB are editing the same rule at the same time
C. dminB sees a pencil icon next the rule that AdminB is currently editing
D. dminA, AdminB and AdminC are editing three different rules at the same time
عرض الإجابة
اجابة صحيحة: A
السؤال #91
How many packets does the IKE exchange use for Phase 1 Main Mode?
A. 2
B.
C.
D.
عرض الإجابة
اجابة صحيحة: D
السؤال #92
What is the purpose of Priority Delta in VRRP?
A. hen a box is up, Effective Priority = Priority + Priority Delta
B. hen an Interface is up, Effective Priority = Priority + Priority Delta
C. hen an Interface fails, Effective Priority = Priority - Priority Delta
D. hen a box fails, Effective Priority = Priority - Priority Delta
عرض الإجابة
اجابة صحيحة: C
السؤال #93
Fill in the blank: Back up and restores can be accomplished through_________.
A. martConsole, WebUI, or CLI
B. ebUI, CLI, or SmartUpdate
C. LI, SmartUpdate, or SmartBackup
D. martUpdate, SmartBackup, or SmartConsole
عرض الإجابة
اجابة صحيحة: A
السؤال #94
What is NOT an advantage of Stateful Inspection?
A. igh Performance
B. ood Security
C. o Screening above Network layer
D. ransparency
عرض الإجابة
اجابة صحيحة: A
السؤال #95
Check Point APIs allow system engineers and developers to make changes to their organization's security policy with CLI tools and Web Services for all of the following except:
A. reate new dashboards to manage 3rd party task
B. reate products that use and enhance 3rd party solutions
C. xecute automated scripts to perform common tasks
D. reate products that use and enhance the Check Point Solution
عرض الإجابة
اجابة صحيحة: A
السؤال #96
You find a suspicious connection from a problematic host. You decide that you want to block everything from that whole network, not just the problematic host. You want to block this for an hour while you investigate further, but you do not want to add any rules to the Rule Base. How do you achieve this?
A. se dbedit to script the addition of a rule directly into the Rule Bases_5_0
B. elect Block intruder from the Tools menu in SmartView Tracker
C. reate a Suspicious Activity Rule in Smart Monitor
D. dd a temporary rule using SmartDashboard and select hide rule
عرض الإجابة
اجابة صحيحة: C
السؤال #97
What does it mean if Bob gets this result on an object search? Refer to the image below.Choose the BEST answer.
A. earch detailed is missing the subnet mask
B. here is no object on the database with that name or that IP address
C. here is no object on the database with that IP address
D. bject does not have a NAT IP address
عرض الإجابة
اجابة صحيحة: B
السؤال #98
Fill in the blank: ________information is included in the "Full Log" tracking option, but is not included in the "Log" tracking option?
A. ile attributes
B. pplication
C. estination port
D. ata type
عرض الإجابة
اجابة صحيحة: D
السؤال #99
Choose what BEST describes a Session.
A. Sessions ends when policy is pushed to the Security Gateway
B. Sessions locks the policy package for editing
C. Starts when an Administrator logs in through SmartConsole and ends when the Administrator logs out
D. Starts when an Administrator publishes all the changes made on SmartConsole
عرض الإجابة
اجابة صحيحة: C
السؤال #100
The system administrator of a company is trying to find out why acceleration is not working for the traffic. The traffic is allowed according to the rule base and checked for viruses. But it is not accelerated. What is the most likely reason that the traffic is not accelerated?
A. here is a virus found
B. he connection required a Security server
C. cceleration is not enabled
D. he traffic is originating from the gateway itself
عرض الإجابة
اجابة صحيحة: D
السؤال #101
Your boss wants you to closely monitor an employee suspected of transferring company secrets to the competition. The IT department discovered the suspect installed a WinSCP client in order to use encrypted communication. Which of the following methods is BEST toaccomplish this task?
A. se SmartView Tracker to follow his actions by filtering log entries that feature the WinSCP destination port
B. se SmartDashboard to add a rule in the firewall Rule Base that matches his IP address, and those of potential targets and suspicious protocols
C. atch his IP in SmartView Monitor by setting an alert action to any packet that matches your Rule Base and his IP address for inbound and outbound traffic
D. end the suspect an email with a keylogging Trojan attached, to get direct information about his wrongdoings
عرض الإجابة
اجابة صحيحة: A
السؤال #102
Which of the following are types of VPN communities?
A. entagon, star, and combination
B. tar, octagon, and combination
C. ombined and star
D. eshed, star, and combination
عرض الإجابة
اجابة صحيحة: D
السؤال #103
Which of the below is the MOST correct process to reset SIC from SmartDashboard?
A. un cpconfig, and click Reset
B. lick the Communication button for the firewall object, then click Reset
C. un cpconfig, and select Secure Internal Communication > Change One Time Password
D. lick Communication > Reset on the Gateway object, and type a new activation key
عرض الإجابة
اجابة صحيحة: B
السؤال #104
What are two basic rules Check Point recommends for building an effective security policy?
A. Accept Rule and Drop Rule
B. Explicit Rule and Implied Rule
C. Cleanup Rule and Stealth Rule
D. NAT Rule and Reject Rule
عرض الإجابة
اجابة صحيحة: C
السؤال #105
Which software blade enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine?
A. Data Awareness
B. Threat Emulation
C. Application Control
D. Identity Awareness
عرض الإجابة
اجابة صحيحة: D
السؤال #106
Choose what BEST describes users on Gaia Platform.
A. here is one default user that cannot be deleted
B. here are two default users and one cannot be deleted
C. here is one default user that can be deleted
D. here are two default users that cannot be deleted and one SmartConsole Administrator
عرض الإجابة
اجابة صحيحة: B
السؤال #107
You are conducting a security audit. While reviewing configuration files and logs, you notice logs accepting POP3 traffic, but you do not see a rule allowing POP3 traffic in the Rule Base. Which of the following is the most likely cause?
A. he POP3 rule is disabled
B. OP3 is accepted in Global Properties
C. he POP3 rule is hidden
D. OP3 is one of 3 services (POP3, IMAP, and SMTP) accepted by the default mail object in R77
عرض الإجابة
اجابة صحيحة: C
السؤال #108
Which one of the following is the preferred licensing model? Select the BEST answer.
A. Local licensing because it ties the package license to the IP-address of the gateway and has no dependency of the Security Management Server
B. Local licensing because it ties the package license to the MAC-address of the gateway management interface and has no Security Management Server dependency
C. Central licensing because it ties the package license to the IP-address of the Security Management Server and has no dependency on the gateway
D. Central licensing because it ties the package license to the MAC-address of the Security Management Server's Mgmt-interface and has no dependency on the gateway
عرض الإجابة
اجابة صحيحة: C
السؤال #109
Fill in the blank: Once a license is activated, a ________ should be installed.
A. icense Management file
B. ecurity Gateway Contract file
C. ervice Contract file
D. icense Contract file
عرض الإجابة
اجابة صحيحة: C
السؤال #110
In SmartView Tracker, which rule shows when a packet is dropped due to anti-spoofing?
A. ule 0
B. lank field under Rule Number
C. ule 1
D. leanup Rule
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: