Choose what BEST describes the reason why querying logs now are very fast.
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?
In a Distributed deployment, the Security Gateway and the Security Management software are installed on what platforms?
"The Security Management ServerClosed (1) and the Security GatewayClosed (3) are installed on different computers, with a network connection (2)." https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Installation_and_Upgrade_Guide/Topics-IUG/Getting-Started.htm
To view the policy installation history for each gateway, which tool would an administrator use?
Why is a Central License the preferred and recommended method of licensing?
Which of the following is the most secure means of authentication?
Which of the following is NOT supported by Bridge Mode on the Check Point Security Gateway?
NAT rules (specifically, Firewall kernel in logs shows the traffic as accepted, but Security Gateway does not actually forward it). For more information, see sk106146. https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Installation_and_Upgrade_Guide/Topics-IUG/Deploying-Security-Gateway-or-ClusterXL-in-Bridge-Mode.htm
Identity Awareness allows the Security Administrator to configure network access based on which of the following?
Check Point licenses come in two forms. What are those forms?
What data MUST be supplied to the SmartConsole System Restore window to restore a backup?
Fill in the blank: An identity server uses a ___________ for user authentication.
When a Security Gateways sends its logs to an IP address other than its own, which deployment option is installed?
In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?
You have enabled "Extended Log" as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?
In order to modify Security Policies the administrator can use which of the following tools? (Choose the best answer.)
Customer’s R80 management server needs to be upgraded to R80.10. What is the best upgrade method when the management server is not connected to the Internet?
What is UserCheck?
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?
Which message indicates IKE Phase 2 has completed successfully?
Fill in the blanks: Gaia can be configured using _______ the ________.
Which tool is used to enable ClusterXL?
You can see the following graphic:
What is presented on it?
How can the changes made by an administrator before publishing the session be seen by a superuser administrator?
From the Smartconsole, you can possibly view the changes via Manage & setting, Sessions
Fill in the blank: ____________ is the Gaia command that turns the server off.
Which one of the following is TRUE?
URL Filtering cannot be used to:
What is the RFC number that act as a best practice guide for NAT?
When a Security Gateway sends its logs to an IP address other than its own, which deployment option is installed?
What is the best sync method in the ClusterXL deployment?
Fill in the blank: When a policy package is installed, ________ are also distributed to the target installation Security Gateways.
A policy package is a collection of different types of policies. After installation, the Security Gateway enforces all the policies in the package. A policy package can have one or more of these policy types:
The installation process:
If there are verification errors, the policy is not installed. If there are verification warnings (for example, if anti-spoofing is not enabled for a Security Gateway with multiple interfaces), the policy package is installed with a warning.
Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.
What are the types of Software Containers?
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?
How would you determine the software version from the CLI?
What are the Threat Prevention software components available on the Check Point Security Gateway?
Which of the following is NOT a method used by Identity Awareness for acquiring identity?
Fill in the blank: The _____ feature allows administrators to share a policy with other policy packages.
"The Shared Policies section in the Security Policies shows the policies that are not in a Policy package. They are shared between all Policy packages." https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/SmartConsole-Toolbars-Shared-Policies.htm
A security zone is a group of one or more network interfaces from different centrally managed gateways. What is considered part of the zone?
The Interface window opens. The Topology area of the General pane shows the Security Zone to which the interface is already bound. By default, the Security Zone is calculated according to where the interface Leads To. https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/Security-Zones.htm
What SmartEvent component creates events?
CPU-level of your Security gateway is peaking to 100% causing problems with traffic. You suspect that the problem might be the Threat Prevention settings.
The following Threat Prevention Profile has been created.
How could you tune the profile in order to lower the CPU load still maintaining security at good level? Select the BEST answer.
Which of the following methods can be used to update the trusted log server regarding the policy and configuration changes performed on the Security Management Server?
What are the advantages of a “shared policy” in R80?
Of all the Check Point components in your network, which one changes most often and should be backed up most frequently?
Which tool allows for the automatic updating of the Gaia OS and Check Point products installed on the Gaia OS?
Check Point Update Service Engine (CPUSE), also known as Deployment Agent [DA], is an advanced and intuitive mechanism for software deployment on Gaia OS, which supports deployments of single HotFixes (HF), of HotFix Accumulators (Jumbo), and of Major Versions. https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails= &solutionid=sk92449&js_peid=P-14d3e809b51-10001
What are the three types of UserCheck messages?
Shows when the action for the ruleClosed is inform. It informs users what the company policy is for that site.
Shows when a request is blocked.
Shows when the action for the rule is ask. It informs users what the company policy is for that site and they must click OK to continue to the site.
What Check Point technologies deny or permit network traffic?
The CDT utility supports which of the following?
Which software blade enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine?
Which method below is NOT one of the ways to communicate using the Management API’s?
What is the main difference between Static NAT and Hide NAT?
Hide NAT only translates the source address to hide it behind a gateway.
R80 is supported by which of the following operating systems: