لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following situations would not require a new license to be generated and installed?A.The Security Gateway is upgraded.
B. he existing license expires
C. he license is upgraded
D. he IP address of the Security Management or Security Gateway has changed
عرض الإجابة
اجابة صحيحة: A
السؤال #2
Which tool allows automatic update of Gaia OS and Check Point products installed on Gaia OS?A. CPDAS - Check Point Deployment Agent Service
B. CPUSE - Check Point Upgrade Service Engine
C. CPASE - Check Point Automatic Service Engine
D. CPAUE - Check Point Automatic Update Engine
عرض الإجابة
اجابة صحيحة: B
السؤال #3
What is the default shell of Gaia CLI?A.Monitor
B. LI
C. ead-only
D. ash
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Fill in the blank: The R80 SmartConsole, SmartEvent GUI client, and _______ consolidate billions of logs and shows them as prioritized security events.A.SmartMonitor
B. martView Web Application
C. martReporter
D. martTracker
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Sally has a Hot Fix Accumulator (HFA) she wants to install on her Security Gateway which operates with GAiA, but she cannot SCP the HFA to the system. She can SSH into the Security Gateway, but she has never been able to SCP files to it. What would be the most likely reason she cannot do so?A.She needs to edit /etc/SSHd/SSHd_config and add the Standard Mode account.
B. he needs to run sysconfig and restart the SSH process
C. he needs to edit /etc/scpusers and add the Standard Mode account
D. he needs to run cpconfig to enable the ability to SCP files
عرض الإجابة
اجابة صحيحة: C
السؤال #6
Which of the following commands is used to verify license installation?A.Cplic verify license
B. plic print
C. plic show
D. plic license
عرض الإجابة
اجابة صحيحة: B
السؤال #7
Fill in the blank: The ________ feature allows administrators to share a policy with other policy packages.A.Shared policy packages
B. hared policies
C. oncurrent policy packages
D. oncurrent policies
عرض الإجابة
اجابة صحيحة: A
السؤال #8
Fill in the blank: RADIUS Accounting gets ______ data from requests generated by the accounting clientA.Destination
B. dentity
C. ayload
D. ocation
عرض الإجابة
اجابة صحيحة: B
السؤال #9
In which deployment is the security management server and Security Gateway installed on the same appliance?A. Switch
B. Standalone
C. Distributed
D. Remote
عرض الإجابة
اجابة صحيحة: B
السؤال #10
The Captive Portal tool:A.Acquires identities from unidentified users.
B. s only used for guest user authentication
C. llows access to users already identified
D. s deployed from the Identity Awareness page in the Global Properties settings
عرض الإجابة
اجابة صحيحة: A
السؤال #11
Which of the following is NOT a valid option when configuring access for Captive Portal?A.From the Internet
B. hrough internal interfaces
C. hrough all interfaces
D. ccording to the Firewall Policy
عرض الإجابة
اجابة صحيحة: A
السؤال #12
When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?A.RADIUS
B. emote Access and RADIUS
C. D Query
D. D Query and Browser-based Authentication
عرض الإجابة
اجابة صحيحة: D
السؤال #13
True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security GatewayA.True, CLI is the prefer method for Licensing
B. alse, Central License are handled via Security Management Server
C. alse, Central License are installed via Gaia on Security Gateways
D. rue, Central License can be installed with CPLIC command on a Security Gateway
عرض الإجابة
اجابة صحيحة: D
السؤال #14
Where do we need to reset the SIC on a gateway object?A.SmartDashboard > Edit Gateway Object > General Properties > Communication
B. martUpdate > Edit Security Management Server Object > SIC
C. martUpdate > Edit Gateway Object > Communication
D. martDashboard > Edit Security Management Server Object > SIC
عرض الإجابة
اجابة صحيحة: A
السؤال #15
Which of the following is a valid deployment option?A. CloudSec deployment
B. Disliked deployment
C. Router only deployment
D. Standalone deployment
عرض الإجابة
اجابة صحيحة: D
السؤال #16
True or False: More than one administrator can log into the Security Management Server with SmartConsole with write permission at the same time.A. True, every administrator works on a different database that is independent of the other administrators
B. False, only one administrator can login with write permission
C. True, every administrator works in a session that is independent of the other administrators
D. False, this feature has to be enabled in the Global Properties
عرض الإجابة
اجابة صحيحة: C
السؤال #17
The IT Management team is interested in the new features of the Check Point R80 Management and wants to upgrade but they are concerned that the existing R77.30 Gaia Gateways cannot be managed by R80 because it is so different. As the administrator responsible for the Firewalls, how can you answer or confirm these concerns?A.R80 Management contains compatibility packages for managing earlier versions of Check Point Gateways prior to R80. Consult the R80 Release Notes for more information.
B. 80 Management requires the separate installation of compatibility hotfix packages for managing the earlier versions of Check Point Gateways prior to R80
C. 80 Management was designed as a completely different Management system and so can only monitor Check Point Gateways prior to R80
D. 80 Management cannot manage earlier versions of Check Point Gateways prior to R80
عرض الإجابة
اجابة صحيحة: A
السؤال #18
Which Check Point software blade provides protection from zero-day and undiscovered threats?A.Firewall
B. hreat Emulation
C. pplication Control
D. hreat Extraction
عرض الإجابة
اجابة صحيحة: B
السؤال #19
Which of the following authentication methods can be configured in the Identity Awareness setup wizard?A.Check Point Password
B. ACACS
C. DAP
D. indows password
عرض الإجابة
اجابة صحيحة: C
السؤال #20
Using the SmartConsole, which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?A. Read Only All
B. Full Access
C. Editor
D. Super User
عرض الإجابة
اجابة صحيحة: A
السؤال #21
What is the appropriate default Gaia Portal address?A.HTTP://[IPADDRESS]
B. TTPS://[IPADDRESS]:8080
C. TTPS://[IPADDRESS]:4434
D. TTPS://[IPADDRESS]
عرض الإجابة
اجابة صحيحة: D
السؤال #22
Which Identity Source(s) should be selected in Identity Awareness for when there is a requirement for a higher level of security for sensitive servers?A.AD Query
B. erminal Servers Endpoint Identity Agent
C. ndpoint Identity Agent and Browser-Based Authentication
D. ADIUS and Account Logon
عرض الإجابة
اجابة صحيحة: C
السؤال #23
Can multiple administrators connect to a Security Management Server at the same time?A.No, only one can be connected
B. es, all administrators can modify a network object at the same time
C. es, every administrator has their own username, and works in a session that is independent of other administrators
D. es, but only one has the right to write
عرض الإجابة
اجابة صحيحة: C
السؤال #24
AdminA and AdminB are both logged in on SmartConsole. What does it mean if AdminB sees a locked icon on a rule? Choose the BEST answer.A.Rule is locked by AdminA, because the save bottom has not been press.
B. ule is locked by AdminA, because an object on that rule is been edited
C. ule is locked by AdminA, and will make it available if session is published
D. ule is locked by AdminA, and if the session is saved, rule will be available
عرض الإجابة
اجابة صحيحة: C
السؤال #25
Fill in the blank: Backup and restores can be accomplished through _____.A. CLI, SmartUpdate, or SmartBackup
B. SmartUpdate, SmartBackup, or SmartConsole
C. SmartConsole, WebUI, or CLI
D. WebUI, CLI, or SmartUpdate
عرض الإجابة
اجابة صحيحة: C
السؤال #26
Which of these components does NOT require a Security Gateway R77 license?A.Security Management Server
B. heck Point Gateway
C. martConsole
D. martUpdate upgrading/patching
عرض الإجابة
اجابة صحيحة: C
السؤال #27
When using Monitored circuit VRRP, what is a priority delta?A.When an interface fails the priority changes to the priority delta
B. hen an interface fails the delta claims the priority
C. hen an interface fails the priority delta is subtracted from the priority
D. hen an interface fails the priority delta decides if the other interfaces takes over
عرض الإجابة
اجابة صحيحة: C
السؤال #28
Provide very wide coverage for all products and protocols, with noticeable performance impact.How could you tune the profile in order to lower the CPU load still maintaining security at good level? Select the BEST answer.A.Set High Confidence to Low and Low Confidence to Inactive.
B. et the Performance Impact to Medium or lower
C. he problem is not with the Threat Prevention Profile
D. et the Performance Impact to Very Low Confidence to Prevent
عرض الإجابة
اجابة صحيحة: B
السؤال #29
Which of the following is used to initially create trust between a Gateway and Security Management Server?A.Internal Certificate Authority
B. oken
C. ne-time Password
D. ertificate
عرض الإجابة
اجابة صحيحة: C
السؤال #30
Which statement is NOT TRUE about Delta synchronization?A.Using UDP Multicast or Broadcast on port 8161
B. sing UDP Multicast or Broadcast on port 8116
C. uicker than Full sync
D. ransfers changes in the Kernel tables between cluster members
عرض الإجابة
اجابة صحيحة: A
السؤال #31
In SmartConsole, on which tab are Permissions and Administrators defined?A. MANAGE & SETTINGS
B. SECURITY POLICIES
C. GATEWAYS & SERVERS
D. LOGS & MONITOR
عرض الإجابة
اجابة صحيحة: A
السؤال #32
Which tool CANNOT be launched from SmartUpdate R77?A.IP Appliance Voyager
B. napshot
C. AiA WebUI
D. pinfo
عرض الإجابة
اجابة صحيحة: B
السؤال #33
Katie has been asked to do a backup on the Blue Security Gateway. Which command would accomplish this in the Gaia CLI?A.Blue > add local backup
B. xpert&Blue#add local backing
C. lue > set backup local
D. lue > add backup local
عرض الإجابة
اجابة صحيحة: D
السؤال #34
Which of the following is NOT an element of VPN Simplified Mode and VPN Communities?A."Encrypt" action in the Rule Base
B. ermanent Tunnels
C. VPN" column in the Rule Base
D. onfiguration checkbox "Accept all encrypted traffic"
عرض الإجابة
اجابة صحيحة: A
السؤال #35
Which of the following are available SmartConsole clients which can be installed from the R77 Windows CD? Read all answers and select the most complete and valid list.A.SmartView Tracker, SmartDashboard, CPINFO, SmartUpdate, SmartView Status
B. martView Tracker, SmartDashboard, SmartLSM, SmartView Monitor
C. martView Tracker, CPINFO, SmartUpdate
D. ecurity Policy Editor, Log Viewer, Real Time Monitor GUI
عرض الإجابة
اجابة صحيحة: C
السؤال #36
URL Filtering cannot be used to:A. Control Data Security
B. Decrease legal liability
C. Improve organizational security
D. Control Bandwidth issues
عرض الإجابة
اجابة صحيحة: A
السؤال #37
You installed Security Management Server on a computer using GAiA in the MegaCorp home office. You use IP address 10.1.1.1. You also installed the Security Gateway on a second GAiA computer, which you plan to ship to another Administrator at a MegaCorp hub office. What is the correct order for pushing SIC certificates to the Gateway before shipping it?1. Run cpconfig on the Gateway, select Secure Internal Communication, enter the activation key, and reconfirm.2. Initialize Internal Certificate Authority (ICA.2, 3, 4, 1, 5
B. , 1, 3, 4, 5
C. , 3, 2, 4, 5
D. , 3, 4, 5, 1
عرض الإجابة
اجابة صحيحة: B
السؤال #38
VPN gateways must authenticate to each other prior to exchanging information. What are the two types of credentials used for authentication?A.3DES and MD5
B. ertificates and IPsec
C. ertificates and pre-shared secret
D. Psec and VPN Domains
عرض الإجابة
اجابة صحيحة: C
السؤال #39
Which feature in R77 permits blocking specific IP addresses for a specified time period?A.Suspicious Activity Monitoring
B. TTP Methods
C. ocal Interface Spoofing
D. lock Port Overflow
عرض الإجابة
اجابة صحيحة: A
السؤال #40
You are using SmartView Tracker to troubleshoot NAT entries. Which column do you check to view the NAT'd source port if you are using Source NAT?A.XlateDst
B. lateSPort
C. lateDPort
D. lateSrc
عرض الإجابة
اجابة صحيحة: B
السؤال #41
You manage a global network extending from your base in Chicago to Tokyo, Calcutta and Dallas. Management wants a report detailing the current software level of each Enterprise class Security Gateway. You plan to take the opportunity to create a proposal outline, listing the most cost-effective way to upgrade your Gateways. Which two SmartConsole applications will you use to create this report and outline?A.SmartView Tracker and SmartView Monitor
B. martLSM and SmartUpdate
C. martDashboard and SmartView Tracker
D. martView Monitor and SmartUpdate
عرض الإجابة
اجابة صحيحة: D
السؤال #42
Which icon in the WebUI indicates that read/write access is enabled?A. Eyeglasses
B. Pencil
C. Padlock
D. Book
عرض الإجابة
اجابة صحيحة: B
السؤال #43
Fill in the blanks: A, High Availability deployment is referred to as a ______ cluster and a Load Sharing deployment is referred to as a ________ cluster.A.Standby/standby; active/active
B. ctive/active; standby/standby
C. ctive/active; active/standby;
D. ctive/standby; active/active
عرض الإجابة
اجابة صحيحة: D
السؤال #44
You have two rules, ten users, and two user groups in a Security Policy. You create database version 1 for this configuration. You then delete two existing users and add a new user group. You modify one rule and add two new rules to the Rule Base. You save theSecurity Policy and create database version 2. After a while, you decide to roll back to version 1 to use the Rule Base, but you want to keep your user database. How can you do this?A.Run fwm dbexport -1 filename. Restore the database. Then, run fwm dbimport -1 filename to import the users.
B. un fwm_dbexport to export the user database
C. estore the entire database, except the user database, and then create the new user and user group
D. estore the entire database, except the user database
عرض الإجابة
اجابة صحيحة: D
السؤال #45
Identify the ports to which the Client Authentication daemon listens on by default?A.259, 900
B. 56, 257
C. 080, 529
D. 0, 256
عرض الإجابة
اجابة صحيحة: A
السؤال #46
If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsible, which of these steps should NOT be performed:A.Rename the hostname of the Standby member to match exactly the hostname of the Active member.
B. hange the Standby Security Management Server to Active
C. hange the Active Security Management Server to Standby
D. anually synchronize the Active and Standby Security Management Servers
عرض الإجابة
اجابة صحيحة: A
السؤال #47
According to Check Point Best Practice, when adding a 3rd party gateway to a Check Point security solution what object SHOULD be added? A(n):A.Interoperable Device
B. etwork Node
C. xternally managed gateway
D. ateway
عرض الإجابة
اجابة صحيحة: A
السؤال #48
According to Check Point Best Practice, when adding a non-managed Check Point Gateway to a Check Point security solution what object SHOULD be added? A(n):A.Gateway
B. nteroperable Device
C. xternally managed gateway
D. etwork Node
عرض الإجابة
اجابة صحيحة: C
السؤال #49
Which remote Access Solution is clientless?A.Checkpoint Mobile
B. ndpoint Security Suite
C. ecuRemote
D. obile Access Portal
عرض الإجابة
اجابة صحيحة: D
السؤال #50
Which one of the following is true about Threat Extraction?A.Always delivers a file to user
B. orks on all MS Office, Executables, and PDF files
C. an take up to 3 minutes to complete
D. elivers file only if no threats found
عرض الإجابة
اجابة صحيحة: B
السؤال #51
As you review this Security Policy, what changes could you make to accommodate Rule 4?A.Remove the service HTTP from the column Service in Rule 4.
B. odify the column VPN in Rule 2 to limit access to specific traffic
C. othing at all
D. odify the columns Source or Destination in Rule 4
عرض الإجابة
اجابة صحيحة: B
السؤال #52
Identity Awareness allows the Security Administrator to configure network access based on which of the following?A.Name of the application, identity of the user, and identity of the machine
B. dentity of the machine, username, and certificate
C. etwork location, identity of a user, and identity of a machine
D. rowser-Based Authentication, identity of a user, and network location
عرض الإجابة
اجابة صحيحة: C
السؤال #53
What SmartEvent component creates events?A.Consolidation Policy
B. orrelation Unit
C. martEvent Policy
D. martEvent GUI
عرض الإجابة
اجابة صحيحة: B
السؤال #54
You are the Check Point administrator for Alpha Corp. You received a call that one of the users is unable to browse the Internet on their new tablet which is connected to the company wireless, which goes through a Check Point Gateway. How would you review the logs to see what is blocking this traffic?A. Open SmartEvent to see why they are being blocked.
B. From SmartConsole, go to the Log & Monitor tab and filter for the IP address of the tablet
C. Open SmartMonitor and connect remotely to the wireless controller
D. Open SmartUpdate and review the logs tab
عرض الإجابة
اجابة صحيحة: B
السؤال #55
Which of the following is NOT a valid application navigation tab in SmartConsole?A. WEBUI & COMMAND LINE
B. SECURITY POLICIES
C. GATEWAYS & SERVERS
D. LOGS & MONITOR
عرض الإجابة
اجابة صحيحة: A
السؤال #56
Identify the API that is not supported by Check Point currently.A.R80 Management API-
B. dentity Awareness Web Services API
C. pen REST API
D. PSEC SDK
عرض الإجابة
اجابة صحيحة: C
السؤال #57
Which of the following is a hash algorithm?A.3DES
B. DEA
C. ES
D. D5
عرض الإجابة
اجابة صحيحة: D
السؤال #58
At what point is the Internal Certificate Authority (ICA) created?A.Upon creation of a certificate
B. uring the primary Security Management Server installation process
C. hen an administrator decides to create one
D. hen an administrator initially logs into SmartConsole
عرض الإجابة
اجابة صحيحة: B
السؤال #59
What Check Point tool is used to automatically update Check Point products for the Gaia OS?A. Check Point Update Engine
B. Check Point Upgrade Installation Service
C. Check Point Upgrade Service Engine (CPUSE)
D. Check Point INSPECT Engine
عرض الإجابة
اجابة صحيحة: C
السؤال #60
What CLI utility allows an administrator to capture traffic along the firewall inspection chain?A.show interface (interface) \xadchain
B. cpdump
C. cpdump /snoop
D. w monitor
عرض الإجابة
اجابة صحيحة: D
السؤال #61
John Adams is an HR partner in the ACME organization. ACME IT wants to limit access toHR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, gateway policy permits access only from Join's desktop which is assigned an IP address 10.0.0.19 via DHCP.John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but the limits him to operating it only from his desk. The curreA.John should install the identity Awareness Agent
B. he firewall admin should install the Security Policy
C. ohn should lock and unlock the computer
D. nvestigate this as a network connectivity issue
عرض الإجابة
اجابة صحيحة: C
السؤال #62
In SmartEvent, what are the different types of automatic reactions that the administrator can configure?A.Mail, Block Source, Block Event Activity, External Script, SNMP Trap
B. ail, Block Source, Block Destination, Block Services, SNMP Trap
C. ail, Block Source, Block Destination, External Script, SNMP Trap
D. ail, Block Source, Block Event Activity, Packet Capture, SNMP Trap
عرض الإجابة
اجابة صحيحة: A
السؤال #63
What is the main objective when using Application Control?A. To see what users are doing.
B. Ensure security and privacy of information
C. To filter out specific content
D. To assist the firewall blade with handling traffic
عرض الإجابة
اجابة صحيحة: B
السؤال #64
Which of the following is NOT defined by an Access Role object?A.Source Network
B. ource Machine
C. ource User
D. ource Server
عرض الإجابة
اجابة صحيحة: D
السؤال #65
To install a brand new Check Point Cluster, the MegaCorp IT department bought 1 Smart-1 and 2 Security Gateway Appliances to run a cluster. Which type of cluster is it?A.Full HA Cluster
B. igh Availability
C. tandalone
D. istributed
عرض الإجابة
اجابة صحيحة: B
السؤال #66
When launching SmartDashboard, what information is required to log into R77?A.User Name, Management Server IP, certificate fingerprint file
B. ser Name, Password, Management Server IP
C. assword, Management Server IP
D. assword, Management Server IP, LDAP Server IP
عرض الإجابة
اجابة صحيحة: B
السؤال #67
Bob and Joe both have Administrator Roles on their Gaia Platform. Bob logs in on the WebUI and then Joe logs in through CLI. Choose what BEST describes the following scenario, where Bob and Joe are both logged in:A.When Joe logs in, Bob will be log out automatically.
B. ince they both are log in on different interfaces, they both will be able to make changes
C. f Joe tries to make changes, he won't, database will be locked
D. ob will be prompt that Joe logged in
عرض الإجابة
اجابة صحيحة: C
السؤال #68
Which of the following is NOT an advantage to using multiple LDAP servers?A.You achieve a faster access time by placing LDAP servers containing the database at remote sites
B. nformation on a user is hidden, yet distributed across several servers
C. ou achieve compartmentalization by allowing a large number of users to be distributed across several servers
D. ou gain High Availability by replicating the same information on several servers
عرض الإجابة
اجابة صحيحة: B
السؤال #69
Look at the following screenshot and select the BEST answer.A.Clients external to the Security Gateway can download archive files from FTP_Ext server using FTP.
B. nternal clients can upload and download any-files to FTP_Ext-server using FTP
C. nternal clients can upload and download archive-files to FTP_Ext server using FTP
D. lients external to the Security Gateway can upload any files to the FTP_Ext-server using FTP
عرض الإجابة
اجابة صحيحة: A
السؤال #70
An internal router is sending UDP keep-alive packets that are being encapsulated with GRE and sent through your R77 Security Gateway to a partner site. A rule for GRE traffic is configured for ACCEPT/LOG. Although the keep-alive packets are being sent every minute, a search through the SmartView Tracker logs for GRE traffic only shows one entry for the whole day (early in the morning after a Policy install).Your partner site indicates they are successfully receiving the GRE encapsulated keep- alive packets A.The setting Log does not capture this level of detail for GRE. Set the rule tracking action to Audit since certain types of traffic can only be tracked this way.
B. he log unification process is using a LUUID (Log Unification Unique Identification) that has become corrupt
C. he Log Server log unification process unifies all log entries from the Security Gateway on a specific connection into only one log entry in the SmartView Tracker
D. he Log Server is failing to log GRE traffic properly because it is VPN traffic
عرض الإجابة
اجابة صحيحة: C
السؤال #71
Which of these attributes would be critical for a site-to-site VPN?A.Scalability to accommodate user groups
B. entralized management
C. trong authentication
D. trong data encryption
عرض الإجابة
اجابة صحيحة: D
السؤال #72
How Capsule Connect and Capsule Workspace differ?A.Capsule Connect provides a Layer3 VPN. Capsule Workspace provides a Desktop with usable applications
B. apsule Workspace can provide access to any application
C. apsule Connect provides Business data isolation
D. apsule Connect does not require an installed application at client
عرض الإجابة
اجابة صحيحة: A
السؤال #73
You find that Users are not prompted for authentication when they access their Web servers, even though you have created an HTTP rule via User Authentication. Choose the BEST reason why.A.You checked the cache password on desktop option in Global Properties.
B. nother rule that accepts HTTP without authentication exists in the Rule Base
C. ou have forgotten to place the User Authentication Rule before the Stealth Rule
D. sers must use the SecuRemote Client, to use the User Authentication Rule
عرض الإجابة
اجابة صحيحة: B
السؤال #74
Choose the SmartLog property that is TRUE.A.SmartLog has been an option since release R71.10.
B. martLog is not a Check Point product
C. martLog and SmartView Tracker are mutually exclusive
D. martLog is a client of SmartConsole that enables enterprises to centrally track log records and security activity with Google-like search
عرض الإجابة
اجابة صحيحة: D
السؤال #75
Study the Rule base and Client Authentication Action properties screen.After being authenticated by the Security Gateways, a user starts a HTTP connection to a Web site. What happens when the user tries to FTP to another site using the command line? The:A.user is prompted for authentication by the Security Gateways again.
B. TP data connection is dropped after the user is authenticated successfully
C. ser is prompted to authenticate from that FTP site only, and does not need to enter his username and password for Client Authentication
D. TP connection is dropped by Rule 2
عرض الإجابة
اجابة صحيحة: C
السؤال #76
Tom has connected to the Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored shortly afterward.What will happen to the changes already made?A. Tom will have to reboot his SmartConsole computer, and access the Management cache store on that computer, which is only accessible after a reboot.
B. Tom will have to reboot his SmartConsole computer, clear the cache, and restore changes
C. Tom's changes will have been stored on the Management when he reconnects and he will not lose any of his work
D. Tom’s changes will be lost since he lost connectivity and he will have to start again
عرض الإجابة
اجابة صحيحة: C
السؤال #77
Which of the following is considered to be the more secure and preferred VPN authentication method?A.Password
B. ertificate
C. D5
D. re-shared secret
عرض الإجابة
اجابة صحيحة: B
السؤال #78
Which of the completed statements is NOT true? The WebUI can be used to manage user accounts and:A.assign privileges to users.
B. dit the home directory of the user
C. dd users to your Gaia system
D. ssign user rights to their home directory in the Security Management Server
عرض الإجابة
اجابة صحيحة: D
السؤال #79
Which of the following uses the same key to decrypt as it does to encrypt?A.Asymmetric encryption
B. ynamic encryption
C. ertificate-based encryption
D. ymmetric encryption
عرض الإجابة
اجابة صحيحة: D
السؤال #80
Choose the correct statement regarding Implicit Rules.A.To edit the Implicit rules you go to: Launch Button > Policy > Global Properties > Firewall.
B. mplied rules are fixed rules that you cannot change
C. ou can directly edit the Implicit rules by double-clicking on a specific Implicit rule
D. ou can edit the Implicit rules but only if requested by Check Point support personnel
عرض الإجابة
اجابة صحيحة: A
السؤال #81
Which command is used to obtain the configuration lock in Gaia?A.Lock database override
B. nlock database override
C. nlock database lock
D. ock database user
عرض الإجابة
اجابة صحيحة: A
السؤال #82
Vanessa is a Firewall administrator. She wants to test a backup of her company's production Firewall cluster Dallas_GW. She has a lab environment that is identical to her production environment. She decided to restore production backup via SmartConsole in lab environment. Which details she need to fill in System Restore window before she can clickOK button and test the backup?A.Server, SCP, Username, Password, Path, Comment, Member
B. erver, TFTP, Username, Password, Path, Comment, All Members
C. erver, Protocol, Username, Password, Path, Comment, All Members
D. erver, Protocol, Username, Password, Path, Comment, Member
عرض الإجابة
اجابة صحيحة: C
السؤال #83
Fill in the blanks: A Check Point software license consists of a _____ and _____.A. Software container; software package
B. Software package; signature
C. Signature; software blade
D. Software blade; software container
عرض الإجابة
اجابة صحيحة: D
السؤال #84
Fill in the bank: In Office mode, a Security Gateway assigns a remote client to an IP address once___________.A.the user connects and authenticates
B. ffice mode is initiated
C. he user requests a connection
D. he user connects
عرض الإجابة
اجابة صحيحة: A
السؤال #85
The most important part of a site-to-site VPN deployment is the ________ .A.Internet
B. emote users
C. ncrypted VPN tunnel
D. PN gateways
عرض الإجابة
اجابة صحيحة: C
السؤال #86
What is a role of Publishing?A.The Publish operation sends the modifications made via SmartConsole in the private session and makes them public
B. he Security Management Server installs the updated policy and the entire database on Security Gateways
C. he Security Management Server installs the updated session and the entire Rule Base on Security Gateways
D. odifies network objects, such as servers, users, services, or IPS profiles, but not the Rule Base
عرض الإجابة
اجابة صحيحة: A
السؤال #87
Review the rules. Assume domain UDP is enabled in the implied rules.What happens when a user from the internal network tries to browse to the internet using HTTP? The user:A.can connect to the Internet successfully after being authenticated.
B. s prompted three times before connecting to the Internet successfully
C. an go to the Internet after Telnetting to the client authentication daemon port 259
D. an go to the Internet, without being prompted for authentication
عرض الإجابة
اجابة صحيحة: D
السؤال #88
What happens if the identity of a user is known?A.If the user credentials do not match an Access Role, the traffic is automatically dropped.
B. f the user credentials do not match an Access Role, the system displays a sandbox
C. f the user credentials do not match an Access Role, the gateway moves onto the next rule
D. f the user credentials do not match an Access Role, the system displays the Captive Portal
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: