AStarting R81, the QoS Policy installation process is accelerated thereby reducing the duration of the process significantly
BStarting in R81, the Threat Prevention Policy installation process is accelerated thereby reducing the duration of the process significantly
CStarting R81, the Desktop Security Policy installation process is accelerated thereby reducing the duration of the process significantly
DStarting R81, the Access Control Policy installation process is accelerated thereby reducing the duration of the process significantly
What is the biggest benefit of policy layers?
ATo break one policy into several virtual policies.
BTo include Threat Prevention as a sub policy for the firewall policy
CPolicy Layers and Sub-Policies enable flexible control over the security policy
DThey improve the performance on OS kernel version 3.0
Aaron is a Cyber Security Engineer working for Global Law Firm with large scale deployment of Check Point Enterprise Appliances running GAiA R80.X. The Network Security Developer Team is having an issue testing the API with a newly deployed R80.X Security Management Server. Aaron wants to confirm API services are working properly. What should he do first?
AAaron should check API Server status with “api status" from Expert mode. If services are stopped, he should start them with “api start".
BAaron should check API Server status with “cpapi status" from Expert mode. If services are stopped, he should start them with "cpapi start”.
CAaron should check API Server status with “fwm api status” from Expert mode. If services are stopped, he should start them with “fwm api start".
DAaron should check API Server status with "cpm api status” from Expert mode. If services are stopped, he should start them with “cpi api start".
What command lists all interfaces using Multi-Queue?
Ashow interface all
Bmq_mng –show
Cshow multiqueue all
Dcpmq set
Which of the following cannot be configured in an Access Role Object?
ANetworks
BMachines
CUsers
DTime
Which of the following is NOT a type of Check Point API available in R80.x?
AIdentity Awareness Web Services
BOPSEC SDK
CManagement
DMobile Access
Which User-mode process is responsible for the FW CLI commands?
Acpm
Bcpd
Cfwm
Dfwd
What order should be used when upgrading a Management High Availability Cluster?
ASecondary Management, then Primary Management
BActive Management, then Standby Management
CStandby Management, then Active Management
DPrimary Management, then Secondary Management
What could NOT be a reason for synchronization issues in a Management HA environment?
AHardware clocks do not match even with adjustments for different time zones
BAccidentally, you have configured unique IP addresses per Management Server which invalidates the CA Certificate
CThere is a network connectivity failure between the servers
DThe products installed on the servers do not match: one device is a Standalone Server while the other is only a Security Management server.
Which command shows only the table names of all kernel tables?
Afw tab –t
Bfw tab –n
Cfw tab –s
Dfw tab –k
What is the command to check the status of Check Point processes?
Acphaprob list
Btop
Ccpwd_admin list
Dcptop
What solution is Multi-queue intended to provide?
AReduce the confusion for traffic capturing in FW Monitor
BReduce the performance of network interfaces
CImprove the efficiency of CoreXL Kernel Instances
DImprove the efficiency of traffic handling by SecureXL SNDs
Which of the following is true regarding the Proxy ARP feature for Manual NAT?
AThe local.arp file must always be configured
BAutomatic proxy ARP configuration can be enabled
Cfw ctl proxy should be configured
DTranslate Destination on Client Side should be configured
What object type would you use to grant network access to an LDAP user group?
AAccess Role
BGroup Template
CSmartDirectory Group
DUser Group
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using _______.
AUserCheck
BUser Directory
CCaptive Portal and Transparent Kerberos Authentication
DCaptive Portal
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server, where it is forwarded to ______ via ______.
Acpm, cpd
Bcpwd, fwssd
Cfwm, cpd
Dcpd, fwm
What are the correct steps upgrading a HA cluster (M1 is active, M2 is passive) using Multi-Version Cluster(MVC)Upgrade?
A
In SmartConsole, change the version of the cluster object2) Upgrade the passive node M2 to R81.203) Enable the MVC mechanism on the upgraded R81.20 Cluster Member M2 in CLISH: set cluster member mvc on4) Install the Access Control Policy and make sure that the installation will not stop if installation on one cluster member fails5) After examine the cluster states upgrade node M1 to R81.206) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy SmartConsole, change the version of the cluster object,
B
Enable the MVC mechanism on both cluster members #cphaprob mvc on2) Upgrade the passive node M2 to R81.203) In SmartConsole, change the version of the cluster object4) Install the Access Control Policy5) After examine the cluster states upgrade node M1 to R81.206) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy
C
Enable the MVC mechanism on both cluster members in CLISH: set cluster member mvc on2) Upgrade the passive node M2 to R81.203) In SmartConsole, change the version of the cluster object4) Install the Access Control Policy and make sure that the installation will not stop if installation on one cluster member fails5) After examine the cluster states upgrade node M1 to R81.206) On each Cluster Member, disable the MVC mechanism
D
Upgrade the passive node M2 to R81.202) Enable the MVC mechanism on the upgraded R81.20 Cluster Member M2 #cphaconf mvc on3) In SmartConsole, change the version of the cluster object4) Install the Access Control Policy5) After examine the cluster states upgrade node M1 to R81.206) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy upgrade the passive node M2 to R81.20
What destination versions are supported for a Multi-Version Cluster Upgrade?
AR77.30 and later
BR80.10 and Later
CR70 and Later
DR76 and later
You have used the SmartEvent GUI to create a custom Event policy. What is the best way to display the correlated Events generated by SmartEvent Policies?
AIn the SmartConsole / Logs & Monitor –> open the Logs View and use type:Correlated as query filter.
BSelect the Events tab in the SmartEvent GUI or use the Events tab in the SmartView web interface.
COpen SmartView Monitor and select the SmartEvent Window from the main menu.
DIn the SmartConsole / Logs & Monitor –> open a new Tab and select External Apps / SmartEvent.
In SmartConsole, where do you manage your Mobile Access Policy?
AThrough the Mobile Console
BShared Gateways Policy
CFrom the Dedicated Mobility Tab
DSmart Dashboard
What is the difference between Updatable Objects and Dynamic Objects
AUpdatable Objects is a Threat Cloud Service. The provided Objects are updated automatically. Dynamic Objects are created and maintained locally. In both cases there is no need to install policy for the changes to take effect.
BDynamic Objects are maintained automatically by the Threat Cloud. For Dynamic Objects there is no need to install policy for the changes to take effect. Updatable Objects are created and maintained locally.
CUpdatable Objects is a Threat Cloud Service. The provided Objects are updated automatically. Dynamic Objects are created and maintained locally. For Dynamic Objects there is no need to install policy for the changes to take effect.
DDynamic Objects are maintained automatically by the Threat Cloud. Updatable Objects are created and maintained locally. In both cases there is no need to install policy for the changes to take effect.
What mechanism can ensure that the Security Gateway can communicate with the Management Server with ease in situations with overwhelmed network resources?
AThere is a feature for ensuring stable connectivity to the management server and is done via Priority Queuing.
BThe corresponding feature is new to R81.10 and is called “Management Data Plane Separation”
CThe corresponding feature is called “Dynamic Split”
DThe corresponding feature is called “Dynamic Dispatching”
You are asked to check the status of several user-mode processes on the management server and gateway. Which of the following processes can only be seen on a Management Server?
Acpd
Bfwd
Ccpwd
Dfwm
CoreXL is NOT supported when one of the following features is enabled:
AOverlapping NAT
BRoute-based VPN
CIPv6
DIPS
The Check Point Central Deployment Tool (CDT) communicates with the Security Gateway(s) over Check Point SIC via ___________.