How many users can have read/write access in Gaia Operating System at one time?
Which option will match a connection regardless of its association with a VPN community?
An administrator can use section titles to more easily navigate between large rule bases. Which of these statements is FALSE?
Which command shows the installed licenses?
When you upload a package or license to the appropriate repository in SmartUpdate. where is the package or license stored?
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?
In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?
Fill in the blank: An identity server uses a ___________ for user authentication.
Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.
When defining group-based access in an LDAP environment with Identity Awareness, what is the BEST object type to represent an LDAP group in a Security Policy?
Which one of the following is the preferred licensing model? Select the BEST answer
Fill in the blank: SmartConsole, SmartEvent GUI client, and ___________ allow viewing of billions of consolidated logs and shows them as prioritized security events.
When logging in for the first time to a Security management Server through SmartConsole, a fingerprint is saved to the:
A stateful inspection firewall works by registering connection data and compiling this information. Where is the information stored?
Fill in the blank: By default, the SIC certificates issued by R80 Management Server are based on the ____________ algorithm.
The ______ software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware.
What is NOT an advantage of Packet Filtering?
What is the purpose of a Stealth Rule?
Which of the following technologies extracts detailed information from packets and stores that information in state tables?
When connected to the Check Point R80 Management Server using the SmartConsole the first administrator to connect has a lock on:
When an Admin logs into SmartConsole and sees a lock icon on a gateway object and cannot edit that object, what does that indicate?
Check Point licenses come in two forms. What are those forms?
When a Security Gateway sends its logs to an IP address other than its own, which deployment option is installed?
Stateful Inspection compiles and registers connections where?
Fill in the blank: When LDAP is integrated with Check Point Security Management, it is then referred to as _______.
Which GUI tool can be used to view and apply Check Point licenses?
Which Check Point Software Wade provides visibility of users, groups and machines while also providing access control through identity-based policies?
While enabling the Identity Awareness blade the Identity Awareness wizard does not automatically detect the windows domain Why does it not detect the windows domain?
Check Point ClusterXL Active/Active deployment is used when:
When should you generate new licenses?
When dealing with rule base layers, what two layer types can be utilized?
When changes are made to a Rule base, it is important to _______________ to enforce changes.
In order to see real-time and historical graph views of Security Gateway statistics in SmartView Monitor, what feature needs to be enabled on the Security Gateway?
Which configuration element determines which traffic should be encrypted into a VPN tunnel vs. sent in the clear?
Fill in the blank: It is Best Practice to have a _____ rule at the end of each policy layer.
Can multiple administrators connect to a Security Management Server at the same time?
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
How do logs change when the "Accounting" tracking option is enabled on a traffic rule?
In Unified SmartConsole Gateways and Servers tab you can perform the following functions EXCEPT ________.
Fill in the blanks: Default port numbers for an LDAP server is ______ for standard connections and _______ SSL connections.
Which of the following is considered to be the more secure and preferred VPN authentication method?
What is the difference between SSL VPN and IPSec VPN?
Using ClusterXL, what statement is true about the Sticky Decision Function?
After a new Log Server is added to the environment and the SIC trust has been established with the SMS what will the gateways do?
You are asked to check the status of several user-mode processes on the management server and gateway. Which of the following processes can only be seen on a Management Server?
What Check Point technologies deny or permit network traffic?
Name the file that is an electronically signed file used by Check Point to translate the features in the license into a code?
When a SAM rule is required on Security Gateway to quickly block suspicious connections which are not restricted by the Security Policy, what actions does the administrator need to take?
Fill in the blank: Each cluster, at a minimum, should have at least ___________ interfaces.
Which two of these Check Point Protocols are used by ?
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?
What is the purpose of the Stealth Rule?
Which statement is NOT TRUE about Delta synchronization?
In which scenario will an administrator need to manually define Proxy ARP?
Which is NOT an encryption algorithm that can be used in an IPSEC Security Association (Phase 2)?
Which of the following commands is used to monitor cluster members?
Which Check Point software blade prevents malicious files from entering a network using virus signatures and anomaly-based protections from ThreatCloud?
Session unique identifiers are passed to the web api using which http header option?
Which type of Endpoint Identity Agent includes packet tagging and computer authentication?
Which of the following is NOT a component of a Distinguished Name?
The competition between stateful inspection and proxies was based on performance, protocol support, and security. Considering stateful Inspections and Proxies, which statement is correct?
What are the steps to configure the HTTPS Inspection Policy?
What is the purpose of Captive Portal?
The Gateway Status view in SmartConsole shows the overall status of Security Gateways and Software Blades. What does the Status Attention mean?
Which backup utility captures the most information and tends to create the largest archives?
Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?
A network administrator has informed you that they have identified a malicious host on the network, and instructed you to block it. Corporate policy dictates that firewall policy changes cannot be made at this time. What tool can you use to block this traffic?
A layer can support different combinations of blades What are the supported blades:
Name the pre-defined Roles included in Gaia OS.
Of all the Check Point components in your network, which one changes most often and should be backed up most frequently?
Security Zones do no work with what type of defined rule?
Which one of the following is a way that the objects can be manipulated using the new API integration in R80 Management?
If an administrator wants to restrict access to a network resource only allowing certain users to access it, and only when they are on a specific network what is the best way to accomplish this?
Which command is used to add users to or from existing roles?
Fill in the blank: The position of an implied rule is manipulated in the __________________ window.
URL Filtering employs a technology, which educates users on web usage policy in real time. What is the name of that technology?
Which policy type is used to enforce bandwidth and traffic control rules?
Which of the following is NOT a tracking option? (Select three)
Which single Security Blade can be turned on to block both malicious files from being downloaded as well as block websites known to host malware?
What are the types of Software Containers?
Fill in the blank: An Endpoint identity agent uses a ___________ for user authentication.
Which is a main component of the Check Point security management architecture?
The “Hit count” feature allows tracking the number of connections that each rule matches. Will the Hit count feature work independently from logging and Track the hits even if the Track option is set to “None”?
Fill in the blanks: A ____ license requires an administrator to designate a gateway for attachment whereas a _____ license is automatically attached to a Security Gateway.
You can see the following graphic:
What is presented on it?
What is the default shell of Gaia CLI?
Which SmartConsole application shows correlated logs and aggregated data to provide an overview of potential threats and attack patterns?
Choose what BEST describes the reason why querying logs now is very fast.
Which Identity Source(s) should be selected in Identity Awareness for when there is a requirement for a higher level of security for sensitive servers?
Which Threat Prevention Profile is not included by default in R80 Management?
Which back up method uses the command line to create an image of the OS?
Which software blade does NOT accompany the Threat Prevention policy?
In R80 Management, apart from using SmartConsole, objects or rules can also be modified using:
Which of the following methods can be used to update the trusted log server regarding the policy and configuration changes performed on the Security Management Server?
Identity Awareness lets an administrator easily configure network access and auditing based on three items Choose the correct statement.
Which SmartConsole tab is used to monitor network and security performance?
In SmartEvent, a correlation unit (CU) is used to do what?
True or False: The destination server for Security Gateway logs depends on a Security Management Server configuration.
Which of the following is a new R80.10 Gateway feature that had not been available in R77.X and older?
Core Protections are installed as part of what Policy?
Choose what BEST describes a Session
Identity Awareness allows the Security Administrator to configure network access based on which of the following?
You are the Check Point administrator for Alpha Corp with an R80 Check Point estate. You have received a call by one of the management users stating that they are unable to browse the Internet with their new tablet connected to the company Wireless. The Wireless system goes through the Check Point Gateway. How do you review the logs to see what the problem may be?
What are the advantages of a “shared policy” in R80?
R80 is supported by which of the following operating systems:
At what point is the Internal Certificate Authority (ICA) created?
What are the software components used by Autonomous Threat Prevention Profiles in R8I.20 and higher?
Which Check Point software blade monitors Check Point devices and provides a picture of network and security performance?
Fill in the blank: Service blades must be attached to a ______________.
To increase security, the administrator has modified the Core protection ‘Host Port Scan’ from ‘Medium’ to ‘High’ Predefined Sensitivity. Which Policy should the administrator install after Publishing the changes?
A Check Point Software license consists of two components, the Software Blade and the Software Container. There are ______ types of Software Containers: ________.
You are going to perform a major upgrade. Which back up solution should you use to ensure your database can be restored on that device?
Consider the Global Properties following settings:
The selected option “Accept Domain Name over UDP (Queries)” means:
Fill in the blank: In Security Gateways R75 and above, SIC uses ______________ for encryption.
To view statistics on detected threats, which Threat Tool would an administrator use?
Fill in the blank Backup and restores can be accomplished through
What command would show the API server status?
Application Control/URL filtering database library is known as:
Which two Identity Awareness commands are used to support identity sharing?
When comparing Stateful Inspection and Packet Filtering, what is a benefit that Stateful Inspection offers over Packer Filtering?