Which option in tracking allows you to see the amount of data passed in the connection?
You have successfully backed up your Check Point configurations without the OS information. What command would you use to restore this backup?
Which of the following is a new R80.10 Gateway feature that had not been available in R77.X and older?
Which SmartConsole tab shows logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?
While enabling the Identity Awareness blade the Identity Awareness wizard does not automatically detect the windows domain Why does it not detect the windows domain?
When you upload a package or license to the appropriate repository in SmartUpdate. where is the package or license stored?
Both major kinds of NAT support Hide and Static NAT. However, one offers more flexibility. Which statement is true?
Which of the following is considered a "Subscription Blade", requiring renewal every 1-3 years?
SmartConsole provides a consolidated solution for everything that is necessary for the security of an organization, such as the following
Fill in the blank: In Security Gateways R75 and above, SIC uses ______________ for encryption.
Which configuration element determines which traffic should be encrypted into a VPN tunnel vs. sent in the clear?
Which one of the following is a way that the objects can be manipulated using the new API integration in R80 Management?
Fill in the blank: When a policy package is installed, ________ are also distributed to the target installation Security Gateways.
In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?
In which deployment is the security management server and Security Gateway installed on the same appliance?
Fill in the bank: In Office mode, a Security Gateway assigns a remote client to an IP address once___________.
What are valid authentication methods for mutual authenticating the VPN gateways?
Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?
An administrator can use section titles to more easily navigate between large rule bases. Which of these statements is FALSE?
A stateful inspection firewall works by registering connection data and compiling this information. Where is the information stored?
Which option in a firewall rule would only match and allow traffic to VPN gateways for one Community in common?
The “Hit count” feature allows tracking the number of connections that each rule matches. Will the Hit count feature work independently from logging and Track the hits even if the Track option is set to “None”?
To provide updated malicious data signatures to all Threat Prevention blades, the Threat Prevention gateway does what with the data?
Of all the Check Point components in your network, which one changes most often and should be backed up most frequently?
Which of the following blades is NOT subscription-based and therefore does not have to be renewed on a regular basis?
After the initial installation on Check Point appliance, you notice that the Management interface and default gateway are incorrect. Which commands could you use to set the IP to 192.168.80.200/24 and default gateway to 192.168.80.1.
True or False: More than one administrator can log into the Security Management Server with SmartConsole with write permission at the same time.
Fill in the blank: With the User Directory Software Blade, you can create user definitions on a(n) ___________ Server.
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
What Check Point tool is used to automatically update Check Point products for the Gaia OS?
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ___________.
When a Security Gateway sends its logs to an IP address other than its own, which deployment option is installed?
What are the three main components of Check Point security management architecture?
What does it mean if Deyra sees the gateway status:
Choose the BEST answer.
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?
For Automatic Hide NAT rules created by the administrator what is a TRUE statement?
In the Check Point three-tiered architecture, which of the following is NOT a function of the Security Management Server?
When installing a dedicated R80 SmartEvent server, what is the recommended size of the root partition?
Is it possible to have more than one administrator connected to a Security Management Server at once?
Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.
You have created a rule at the top of your Rule Base to permit Guest Wireless access to the Internet. However, when guest users attempt to reach the Internet, they are not seeing the splash page to accept your Terms of Service, and cannot access the Internet. How can you fix this?
What licensing feature is used to verify licenses and activate new licenses added to the License and Contracts repository?
When logging in for the first time to a Security management Server through SmartConsole, a fingerprint is saved to the:
You want to verify if there are unsaved changes in GAiA that will be lost with a reboot. What command can be used?
When URL Filtering is set, what identifying data gets sent to the Check Point Online Web Service?
When changes are made to a Rule base, it is important to _______________ to enforce changes.
Fill in the blank: The_____is used to obtain identification and security information about network users.
Which type of Endpoint Identity Agent includes packet tagging and computer authentication?
Which backup utility captures the most information and tends to create the largest archives?
Fill in the blank: SmartConsole, SmartEvent GUI client, and ___________ allow viewing of billions of consolidated logs and shows them as prioritized security events.
Which of the following technologies extracts detailed information from packets and stores that information in state tables?
The ______ software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware.
Which of the following is NOT an authentication scheme used for accounts created through SmartConsole?
What is the most recommended installation method for Check Point appliances?
Which is a main component of the Check Point security management architecture?
Which Check Point supported authentication scheme typically requires a user to possess a token?
Which of the following is used to extract state related information from packets and store that information in state tables?
You are asked to check the status of several user-mode processes on the management server and gateway. Which of the following processes can only be seen on a Management Server?
Which option will match a connection regardless of its association with a VPN community?
One of major features in R80.x SmartConsole is concurrent administration. Which of the following is NOT possible considering that AdminA, AdminB, and AdminC are editing the same Security Policy?
Fill in the blank: When LDAP is integrated with Check Point Security Management, it is then referred to as _______.
Which of the following commands is used to monitor cluster members in CLI?
What are the software components used by Autonomous Threat Prevention Profiles in R8I.20 and higher?
The Gateway Status view in SmartConsole shows the overall status of Security Gateways and Software Blades. What does the Status Attention mean?
True or False: The destination server for Security Gateway logs depends on a Security Management Server configuration.
Fill in the blanks: A ____ license requires an administrator to designate a gateway for attachment whereas a _____ license is automatically attached to a Security Gateway.
When a Security Gateways sends its logs to an IP address other than its own, which deployment option is installed?
Which Identity Source(s) should be selected in Identity Awareness for when there is a requirement for a higher level of security for sensitive servers?
What type of NAT is a one-to-one relationship where each host is translated to a unique address?
Fill in the blanks: There are ________ types of software containers ________.
Fill in the blank When LDAP is integrated with Check Point Security Management it is then referred to as_____
Which Check Point Software Wade provides visibility of users, groups and machines while also providing access control through identity-based policies?
What is the BEST command to view configuration details of all interfaces in Gaia CLISH?
Which Threat Prevention Profile is not included by default in R80 Management?
If there is an Accept Implied Policy set to "First", what is the reason Jorge cannot see any logs?
Which of the following is considered to be the more secure and preferred VPN authentication method?
Which of the following statements about Site-to-Site VPN Domain-based is NOT true?