Cuestiones
ayuda
option
Mi Daypo

TEST BORRADO, QUIZÁS LE INTERESECheckpoint CCSA R80

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del test:
Checkpoint CCSA R80

Descripción:
CCSA r80

Autor:
AVATAR

Fecha de Creación:
24/02/2020

Categoría:
Informática

Número preguntas: 57
Comparte el test:
Facebook
Twitter
Whatsapp
Comparte el test:
Facebook
Twitter
Whatsapp
Últimos Comentarios
No hay ningún comentario sobre este test.
Temario:
Which of the following blades is NOT subscription-based and therefore does not have to be renewed on a regular basis. Application Control Threat Emulation Antivirus Advanced Networking Blade.
Fill in the blanks: With each new policy layer, the ______ rule is automatically set to ______ all traffic Explicit default; drop Implicit default; accept Implicit cleanup; drop Explicit default; accept.
Fill in the blanks: Each cluster has ____ interfaces Five Two Three Four.
Fill in the blanks: A new license should be generated and installed in all of the foloowing situations EXCEPT when ___ The license is attached to the wrong Security Gateway The existing license expires The license is upgraded The IP address of the Security.
Fill in the blanks: A ________ VPN deployment is used to provide remote users with secure access to internal corporate resources by authenticating the user through an internet Clientless remote access Clientless direct acess Client-bases remote access Direct access.
You are going to perform a major upgrade. Wich back up solution should you use to ensure your database can be restored on that device? Backup Logswitch Database Revision Snapshot.
What are the three types of UserCheck messages? inform, ask, and block Block; action, and warm Action, inform, and ask Ask, block, and notify.
Wich of the following is NOT an alert option? SNMP High alert Mail User defined alert.
You are the Check Point adimistrator for Alpha Corp with an R80 Checkpoint estate.You have received a call by one of the management users statics through the Check Point Gateway. How do you review the logs to see what the problem may be? Open SmartLog and connect remotely to the IP of the wireless controller Open SmartVIiew tracker and filters the logs for the IP address of the tablet Open SmartViewTracker and check all the IP logs for the tablet Open SmartLog and query for the IP address of the Manager's tablet.
When Idenity Awareness is enabled, wich identity sources(s) is(are) used for Application Control? RADIUS Remote Access and RADIUS AD Query AD Query and Browser-based Authentication.
R80 is supported by wich of the following operating systems: Windows only Gaia only Gaia, SecurePlatform, and Windows SecurePlatform only.
What are the three conflict resolution rules in the Threat Prevention Policy Layers? Conflict on action, conflict on exception, and conflict on settings Conflict on scope, conflict on settings, and conflict on exception Conflict on settings, conflict on address, and conflict on exception Conflict on action, conflict on destination, and conflict on exception.
Phase 1 of the two-phase negotiation process conducted by IKE operates in___ mode Main Authentication Quick High Alert.
Access roles allow the firewall administrator to configure network access according to: A combination of computer or computer groups and network Users and user groups All of above Remote access clients.
Consider the following policy and select the BEST answer: Traffic that does not match any rule in the subpolicy is dropped All employees can access only Youtube and Vimeo Access to Youtube and Vimeo is allowed only once a day Anyone from internal network can access the internet, except the traffic defines in drop rules 5.2, 5.5. and 5.6.
How are the backups stored in Check Point appliances? Save as *.tar under /var/log/CPbackup/backups Save as *.tgz under /var/CPbackup Save as *.tar under /var/CPbackup Save as *.tgz under /var/log/CPbackup/backups.
Wich utility allows you to configure the DHCP service on Gaia from the command line? ifconfig dhcp_cfg sysconfig cpconfig.
Wich of the following is NOT a component of a Distinguished Name? Organizational Unit Country Common Name User container.
Fill in the blank: Once a license is activated, a ____ should be installed License Management file Security Gateway Contract file Service Contract file License Contract file.
Wich command shows the installed licenses? cplic print print cplic fwlic print show licenses.
What does it mean if Bob gets this result on an object search? Refer to the image below. Choose the BEST answer Search detailed is missing the subnet mask There is no object on the database with that name or that IP address There is no object on the database with that IP address Object does not have a NAT IP address.
Fill in the blank. The _____ is used to obtain identification and security information about network users User Directory User server UserCheck User index.
In wich VPN community is a satelite VPN gateway not allowed to create a VPN tunnel with another satelite VPN gateway Pentagon Combined Meshed Star.
Fill in the blank: In Security Gateways R75 and above, SIC uses ________ for encryption AES-128 AES-256 DES 3DES.
Fill in the blank:___________ information is included in " Full Log" tracking option, but is not included in "Log" tracking option? Destination port Data type File attributes Application.
How many sessions can be opened on the Management Server at the same time? Unlimited, Once per each licensed Gateway One Unconfirmed, Multiple per administrator Unlimted, one per administrator .
Wich option, when applied to a rule, allows traffic to VPN gateways in specific VPN communities All Connections (Clear or Encrpted) Accept all encrypted traffic Specific VPN Communities All Site-to-Site VPN Communities.
Fill in the blanks: A security Policy is created in ____, stored in the ______. and Distributed to the various_________ Rule base, Security Management Server, Security Gateways SmartConsole, Secuirty Gateways, Secuirty Management Servers SmartConsole, Secuirty Management Server, Secuirty Gateways The Check Point database, SamrtConsole, Security Gateways.
Fill in the blanks: A(n) ____ rule is created by an administrator and is located before the firts and before last rules in the Rule Base Firewall drop Explicit Implicit accept Implicit drop.
Check Point ClusterXL Active/Active deployment is used when Only when there is Multicast solution set up There is Load Sharing solution set up Only when there is Unicast solution set up There is High Availability solution set up.
What is the purpose of a Stealth Rule? A rule used to hide a server's IP address from the outside world A rule that allows administrators to access SmartDashboard from any device To drop any traffic destined for the firewall that is not otherwise explicitly allowed A rule at the end of your policy to drop any traffic that is not explicitly allowed.
The Gaia operating system supports wich routing protocols? BGP, OSPF, RIP BGP, OSPF, EIGRP, PIM, IGMP BGP, OSPF, RIP,PIM, IGMP BGP, OSPF,RIP, EIGRP.
Dirk is new to Check Point verison R80. He is looking for detailed information on the logs view, why is he having problem finding what he was use to see with older versions. Chooshe the BEST answer He configured the policy, but did not publish it He had configured the track column to log option He configured the policy but did not install it He is not setting the correct query on the new query search bar.
Fill in the blanks: A high Availability deployment is referred to as a ____ cluster and a Load Sharing deployment is referred to as a ______ cluster. Standby/standby; active/active Active/active; standby/standby Active/active; active/standby Active/standby; active/active.
What is the purpose of Captive Portal? It provides remote access to SmartConsole It managed user permission in SmartConsole It authenticates users, allowing them access to the Internet and corporate resources If authenticates users, allowing them access to the Gaia OS.
Fill in the blank: An identity server uses a____ for user authentication Shared secret Certificate One-time password Token.
Fill in the blanks: A Check Point software license consists of a _______ and _______ Software container, software package Software blade, software container Software package, signature Signature, software blade.
In wich deployment is the security management and Security Gateway installed on the same appliance Bridge Mode Remote Standalone Distributed.
Tina is a new administrator who is currently reviewing the new Check Point R80 Management console interface. In the Gateways view, she is reviewing the Summary Screen. Check Point software deployed on a non-Chek Point appliance The open Server Consortium approved Server Hardware used for the purposes of Security and Availability A Check Point Management Server Deployed using the Open Systems Interonnection (OSI) server and Security deployment model.
What are the three components for Check Point Capsule? Capsule Workspace, Capsule Cloud, Capsule Connect Capsule Docs, Capsule Cloud, Capsule Connect Capsule Workspace, Capsule Docs, Capsule Connect Capsule Workspace, Capsule Docs, Capsule Cloud.
Sticky Decision Function (SDF) is required to prevent wich of the following? Assume you set up an Active-Active cluster Symetric routing Anti-Spoofing Asymetric routing Failovers.
What is a reason for manual creation of a NAT rule? Network Address Translation of RFC1918-compliant networks is needed to access the Internet Network Address Translation is desired for some services, but not for others In R80 all Network Address Translation is done automatically and there is no need for manually defined NAT-rules The public IP- address is different from the gateway's external IP.
Wich of the following is NOT a policy type available for each policy package? Access Control Threat Prevention Desktop Security Threat Emulation.
Consider the Global Properties following settings UDP Queries will be accepted by the traffic allowed only through interfaces with external anti-spoofing topology and this will be done before first explicit rule written by Administrator in a Security Policy. All UDP Queries will be accepted by the traffic allowed through all interfaces and this will be done before first explicit rule written by Administrator in a Security Policy. No UDP Queries will be accepted by the traffic allowed through all interfaces and this will be done before first explicit rule written by Administrator in a Security Policy All UDP Queries will be accepted by the traffic allowed by first explicit rule written by Administrator in a Security Policy.
What are the steps to configure the HTTPS Inspection Policy? Go to Manage&Settings > Blades > HTTPS Inspection > Configure in SmartDashboard Go to Application&url filtering blade > Advanced > Https Inspection > Policy Go to Manage&Settings > Blades > HTTPS Inspection > Policy Go to Application&url filtering blade > Https Inspection > Policy.
What licensing feature is used to verify licenses and activate new licenses added to the License and Contracts repository? Verification tool Verification licensing Automatic licensing Automatic licensing and Verification tool.
What is a precedence of traffic inspection for the defined polices? A packet arrives at the gateway, it is checked against the rules in the networks policy layer and then if implicit Drop Rule drops the packet, it comes next to IPS layer and then after accepting the packet it passes to Threat Prevention layer. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and then if there is any rule which accepts the packet, it comes next to IPS layer and then after accepting the packet it passes to Threat Prevention layer A packet arrives at the gateway, it is checked against the rules in the networks policy layer and then if there is any rule which accepts the packet, it comes next to Threat Prevention layer and then after accepting the packet it passes to IPS layer. A packet arrives at the gateway, it is checked against the rules in IPS policy layer and then it comes next to the Network policy layer and then after accepting the packet it passes to Threat Prevention layer.
Where would an administrator enable Implied Rules logging? In Smart Log Rules View In SmartDashboard on each rule In Global Properties under Firewall In Global Properties under log and alert.
Joey is using the computer with IP address 192.168.20.13. He wants to access web page "www.CheckPoint.com", which is hosted on Web server with IP address 203.0.113. 111. How many rules on Check Point Firewall are required for this connection? Two rules – first one for the HTTP traffic and second one for DNS traffic Only one rule, because Check Point firewall is a Packet Filtering firewall Two rules – one for outgoing request and second one for incoming replay Only one rule, because Check Point firewall is using Stateful Inspection technology.
What needs to be configured if the NAT property Translate destination on client side’ is not enabled in Global properties? A host route to route to the destination IP Use the file local. arp to add the ARP entries for NAT to work Nothing, the Gateway takes care of all details necessary Enabling ‘Allow bi-directional NAT’ for NAT to work correctly.
From the Gaia web interface, which of the following operations CANNOT be performed on a Security Management Server? Verify a Security Policy Open a terminal shell Add a static route View Security Management GUI Clients.
Wich of the following is used to enforce changes made to a Rule Base? Activate policy Publish database Install policy Save changes.
True or False: The destination server for Security Gateway logs depends on a Security Management Server configuration. True, all Security Gateways forward logs automatically to the Security Management Server False, log servers are enabled on the Security Gateway General Properties True, all Security Gateways will only forward logs with a SmartCenter Server configuration False, log servers are configured on the Log Server General Properties.
What are the three components for Check Point Capsule? Capsule Docs, Capsule Cloud, Capsule Connect Capsule Workspace, Capsule Cloud, Capsule Connect Capsule Workspace, Capsule Docs, Capsule Connect Capsule Workspace, Capsule Docs, Capsule Cloud.
In SmartConsole, objects are used to represent physical and virtual network components and also some logical components. These objects are divided into several categories. Which of the following is NOT an objects category? Limit Resource Custom Application / Site Network Object.
Which statement is TRUE of anti-spoofing? Anti-spoofing is not needed when IPS software blade is enabled It is more secure to create anti-spoofing groups manually It is BEST Practice to have anti-spoofing groups in sync with the routing table With dynamic routing enabled, anti-spoofing groups are updated automatically whenever there is a routing change.
Which of the following is NOT a tracking option? Log Full Log Detailed Log Extended Log.
Denunciar test Consentimiento Condiciones de uso