لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Fill in the blanks: A Check Point software license consists of a _______ and _______ .
A. Software container; software package
B. Software blade; software container
C. Software package; signature
D. Signature; software blade
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Which feature in R77 permits blocking specific IP addresses for a specified time period?
A. Suspicious Activity Monitoring
B. HTTP Methods
C. Local Interface Spoofing
D. Block Port Overflow
عرض الإجابة
اجابة صحيحة: B
السؤال #3
What does it mean if Bob gets this result on an object search? Refer to the image below. Choose the BEST answer.
A. Search detailed is missing the subnet mask
B. There is no object on the database with that name or that IP address
C. There is no object on the database with that IP address
D. Object does not have a NAT IP address
عرض الإجابة
اجابة صحيحة: B
السؤال #4
In the R80 SmartConsole, on which tab are Permissions and Administrators defined?
A. Security Policies
B. Logs and Monitor
C. Manage and Settings
D. Gateway and Servers
عرض الإجابة
اجابة صحيحة: C
السؤال #5
Which type of the Check Point license ties the package license to the IP address of the Security Management Server?
A. Local
B. Central
C. Corporate
D. Formal
عرض الإجابة
اجابة صحيحة: C
السؤال #6
Vanessa is a Firewall administrator. She wants to test a backup of her company’s production Firewall cluster Dallas_GW. She has a lab environment that is identical to her production environment. She decided to restore production backup via SmartConsole in lab environment. Which details she need to fill in System Restore window before she can click OK button and test the backup?
A. Server, SCP, Username, Password, Path, Comment, Member
B. Server, TFTP, Username, Password, Path, Comment, All Members
C. Server, Protocol, Username, Password, Path, Comment, All Members
D. Server, Protocol, Username, Password, Path, Comment, member
عرض الإجابة
اجابة صحيحة: D
السؤال #7
Which Check Point software blade provides protection from zero-day and undiscovered threats?
A. Firewall
B. Threat Emulation
C. Application Control
D. Threat Extraction
عرض الإجابة
اجابة صحيحة: B
السؤال #8
The organization's security manager wishes to back up just the Gaia operating system parameters. Which command can be used to back up only Gaia operating system parameters like interface details, Static routes and Proxy ARP entries?
A. show configuration
B. backup
C. migrate export
D. upgrade export
عرض الإجابة
اجابة صحيحة: D
السؤال #9
Which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?
A. Auditor
B. Read Only All
C. Super User
D. Full Access
عرض الإجابة
اجابة صحيحة: C
السؤال #10
Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is ________ all traffic. However, in the Application Control policy layer, the default action is ________ all traffic.
A. Accept; redirect
B. Accept; drop
C. Redirect; drop
D. Drop; accept
عرض الإجابة
اجابة صحيحة: B
السؤال #11
There are two R77.30 Security Gateways in the Firewall Cluster. They are named FW_A and FW_B. The cluster is configured to work as HA (High availability) with default cluster configuration. FW_A is configured to have higher priority than FW_B. FW_A was active and processing the traffic in the morning. FW_B was standby. Around 1100 am, its interfaces went down and this caused a failover. FW_B became active. After an hour, FW_A’s interface issues were resolved and it became operational. When it re-joins the c
A. No, since “maintain current active cluster member” option on the cluster object properties is enabled by default
B. No, since “maintain current active cluster member” option is enabled by default on the Global Properties
C. Yes, since “Switch to higher priority cluster member” option on the cluster object properties is enabled by default
D. Yes, since “Switch to higher priority cluster member” option is enabled by default on the Global Properties
عرض الإجابة
اجابة صحيحة: B
السؤال #12
You are the administrator for ABC Corp. You have logged into your R80 Management server. You are making some changes in the Rule Base and notice that rule No.6 has a pencil icon next to it. What does this mean?
A. The rule No
B. The rule No
C. The rule No
D. The rule No
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Which of the following is NOT an authentication scheme used for accounts created through SmartConsole?
A. Security questions
B. Check Point password
C. SecurID
D. RADIUS
عرض الإجابة
اجابة صحيحة: C
السؤال #14
In which VPN community is a satellite VPN gateway not allowed to create a VPN tunnel with another satellite VPN gateway?
A. Pentagon
B. Combined
C. Meshed
D. Star
عرض الإجابة
اجابة صحيحة: C
السؤال #15
You are going to upgrade from R77 to R80. Before the upgrade, you want to back up the system so that, if there are any problems, you can easily restore to the old version with all configuration and management files intact. What is the BEST backup method in this scenario?
A. backup
B. Database Revision
C. snapshot
D. migrate export
عرض الإجابة
اجابة صحيحة: C
السؤال #16
At what point is the Internal Certificate Authority (ICA) created?
A. Upon creation of a certificate
B. During the primary Security Management Server installation process
C. When an administrator decides to create one
D. When an administrator initially logs into SmartConsole
عرض الإجابة
اجابة صحيحة: B
السؤال #17
Look at the screenshot below. What CLISH command provides this output?
A. show configuration all
B. show confd configuration
C. show confd configuration all
D. show configuration
عرض الإجابة
اجابة صحيحة: C
السؤال #18
Choose what BEST describes a Session.
A. Starts when an Administrator publishes all the changes made on SmartConsole
B. Starts when an Administrator logs in to the Security Management Server through SmartConsole and ends when it is published
C. Sessions ends when policy is pushed to the Security Gateway
D. Sessions locks the policy package for editing
عرض الإجابة
اجابة صحيحة: D
السؤال #19
Fill in the blank: The command __________ provides the most complete restoration of a R80 configuration.
A. upgrade_import
B. cpconfig
C. fwm dbimport -p
D. cpinfo -recover
عرض الإجابة
اجابة صحيحة: D
السؤال #20
Choose the SmartLog property that is TRUE.
A. SmartLog has been an option since release R71
B. SmartLog is not a Check Point product
C. SmartLog and SmartView Tracker are mutually exclusive
D. SmartLog is a client of SmartConsole that enables enterprises to centrally track log records and security activity with Google-like search
عرض الإجابة
اجابة صحيحة: C
السؤال #21
Fill in the blank: Once a license is activated, a ________ should be installed.
A. License Management file
B. Security Gateway Contract file
C. Service Contract file
D. License Contract file
عرض الإجابة
اجابة صحيحة: C
السؤال #22
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ________ .
A. User Directory
B. Captive Portal and Transparent Kerberos Authentication
C. Captive Portal
D. UserCheck
عرض الإجابة
اجابة صحيحة: B
السؤال #23
MyCorp has the following NAT rules. You need to disable the NAT function when Alpha-internal networks try to reach the Google DNS (8.8.8.8) server. What can you do in this case?
A. Use manual NAT rule to make an exception
B. Use the NAT settings in the Global Properties
C. Disable NAT inside the VPN community
D. Use network exception in the Alpha-internal network object
عرض الإجابة
اجابة صحيحة: A
السؤال #24
What is the potential downside or drawback to choosing the Standalone deployment option instead of the Distributed deployment option?
A. degrades performance as the Security Policy grows in size
B. requires additional Check Point appliances
C. requires additional software subscription
D. increases cost
عرض الإجابة
اجابة صحيحة: A
السؤال #25
What port is used for delivering logs from the gateway to the management server?
A. Port 258
B. Port 18209
C. Port 257
D. Port 981
عرض الإجابة
اجابة صحيحة: D
السؤال #26
Which of the following is NOT an element of VPN Simplified Mode and VPN Communities?
A. “Encrypt” action in the Rule Base
B. Permanent Tunnels
C. “VPN” column in the Rule Base
D. Configuration checkbox “Accept all encrypted traffic”
عرض الإجابة
اجابة صحيحة: D
السؤال #27
Anti-Spoofing is typically set up on which object type?
A. Security Gateway
B. Host
C. Security Management object
D. Network
عرض الإجابة
اجابة صحيحة: B
السؤال #28
Fill in the blank: The R80 utility fw monitor is used to troubleshoot _____________
A. User data base corruption
B. LDAP conflicts
C. Traffic issues
D. Phase two key negotiation
عرض الإجابة
اجابة صحيحة: C
السؤال #29
Which of the following technologies extracts detailed information from packets and stores that information in state tables?
A. INSPECT Engine
B. Stateful Inspection
C. Packet Filtering
D. Application Layer Firewall
عرض الإجابة
اجابة صحيحة: A
السؤال #30
If there are two administrators logged in at the same time to the SmartConsole, and there are objects locked for editing, what must be done to make them available to other administrators? Choose the BEST answer.
A. Publish or discard the session
B. Revert the session
C. Save and install the Policy
D. Delete older versions of database
عرض الإجابة
اجابة صحيحة: C
السؤال #31
The following graphic shows:
A. View from SmartLog for logs initiated from source address 10
B. View from SmartView Tracker for logs of destination address 10
C. View from SmartView Tracker for logs initiated from source address 10
D. View from SmartView Monitor for logs initiated from source address 10
عرض الإجابة
اجابة صحيحة: D
السؤال #32
Fill in the blank: The tool _______ generates a R80 Security Gateway configuration report.
A. infoCP
B. infoview
C. cpinfo
D. fw cpinfo
عرض الإجابة
اجابة صحيحة: B
السؤال #33
Which utility shows the security gateway general system information statistics like operating system information and resource usage, and individual software blade statistics of VPN, Identity Awareness and DLP?
A. cpconfig
B. fw ctl pstat
C. cpview
D. fw ctl multik stat
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: