Which type of Check Point license ties the package license to the IP address of the Security Management Server?
AFormal
BCorporate
CCentral
DLocal
Fill in the blanks: A Check Point software license consists of a _____ and _____.
ASoftware container; software package
BSoftware package; signature
CSignature; software blade
DSoftware blade; software container
What are the types of Software Containers?
ASmart Console, Security Management, and Security Gateway
BSecurity Management, Security Gateway, and Endpoint Security
CSecurity Management, Standalone, and Security Gateway
DSecurity Management, Log & Monitoring, and Security Policy
What default layers are included when creating a new policy layer?
AApplication Control, URL Filtering and Threat Prevention
BFirewall, Application Control and IPSec VPN
CFirewall, Application Control and IPS
DAccess Control, Threat Prevention and HTTPS Inspection
Question 6
Permissions
0
Question 7
SmartConsole
Question 8
Deployment
Question 9
Logging
Question 10
Security Management
Question 11
Security Management
Question 12
SmartConsole
Question 13
Application Control
Question 14
Gaia
Question 15
Application Control
Question 16
Gaia
Question 17
Object Management
Question 18
Traffic Inspection
Question 19
Traffic Inspection
Question 20
Policy Rule and Rulebase
Question 21
Licenses and Contracts
Question 22
Traffic Inspection
Question 23
Policy Layers
Question 24
Logging
Question 25
Traffic Inspection
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Which icon in the WebUI indicates that read/write access is enabled?
AEyeglasses
BPencil
CPadlock
DBook
Which SmartConsole tab is used to monitor network and security performance?
ALogs Monitor
BManage Settings
CSecurity Policies
DGateway Servers
Check Point Update Service Engine (CPUSE), also known as Deployment Agent [DA], is an advanced and intuitive mechanism for software deployment on Gaia OS. What software packages are supported for deployment?
AIt supports deployments of single HotFixes (HF), and of Major Versions. Blink Packages and HotFix Accumulators (Jumbo) are not supported.
BIt supports deployments of single HotFixes (HF), of HotFix Accumulators (Jumbo), and of Major Versions.
CIt supports deployments of Major Versions and Blink packages only.
DIt supports deployments of single HotFixes (HF), of HotFix Accumulators (Jumbo), but not of Major Versions.
What are the three types of UserCheck messages?
Aask, block, and notify
Bblock, action, and warn
Caction, inform, and ask
Dinform, ask, and drop
Which command shows detailed information about VPN tunnels?
Acat $FWDIR/conf/vpn.conf
Bvpn tu tlist
Cvpn tu
Dcpview
In the Check Point three-tiered architecture, which of the following is NOT a function of the Security Management Server?
AVerify and compile Security Policies.
BDisplay policies and logs on the administrator's workstation.
CStore firewall logs to hard drive storage.
DManage the object database.
One of major features in SmartConsole is concurrent administration. Which of the following is NOT possible considering that AdminA, AdminB and AdminC are editing the same Security Policy?
AAdminB sees a pencil icon next the rule that AdminB is currently editing.
BAdminA, AdminB and AdminC are editing three different rules at the same time.
CAdminA and AdminB are editing the same rule at the same time.
DAdminC sees a lock icon which indicates that the rule is locked for editing by another administrator.
Which software blade enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine?
AData Awareness
BThreat Emulation
CApplication Control
DIdentity Awareness
By default, which port is used to connect to the GAiA Portal?
A4434
B80
C8080
D443
URL Filtering cannot be used to:
AControl Data Security
BDecrease legal liability
CImprove organizational security
DControl Bandwidth issues
Rugged appliances are small appliances with ruggedized hardware and like Quantum Spark appliance they use which operating system?
AGaia iOS
BRed Hat Enterprise Linux version 4
CCentos Unix
DGaia embedded
A security zone is a group of one or more network interfaces from different centrally managed gateways. What is considered part of the zone?
ASecurity Zones are not supported by Check Point firewalls.
BThe firewall rule can be configured to include one or more subnets in a zone.
CThe zone is based on the network topology and determined according to where the interface leads to.
DThe local directly connected subnet defined by the subnet IP and subnet mask.
In HTTPS Inspection policy, what actions are available in the "Actions" column of a rule?
A"Inspect", "Bypass", "Block"
B"Inspect", "Bypass", "Categorize"
C"Inspect", "Bypass"
D"Detect", "Bypass"
Fill in the blanks: The Application Layer Firewalls inspect traffic through the _____ layer(s) of the TCP/IP model and up to and including the _____ layer.
AUpper; Application
BLower; Application
CFirst two; Internet
DFirst two; Transport
What is the default tracking option of a rule?
ANone
BAlert
CLog
DTracking
Fill in the blanks: A _____ license requires an administrator to designate a gateway for attachment whereas a license is automatically attached to a Security Gateway.
ALocal; formal
BCentral; local
CFormal; corporate
DLocal; central
What are the software components used by Autonomous Threat Prevention Profiles in R81.20 and higher?
ASandbox, ThreatCloud, Zero Phishing, Sanitization, C&C Protection, IPS, File and URL Reputation