156-315.80 : Check Point Certified Security Expert – R80 : Part 14
-
You want to verify if your management server is ready to upgrade to R80.10.
What tool could you use in this process?
- migrate export
- upgrade_tools verify
- pre_upgrade_verifier
- migrate import
-
GAiA Software update packages can be imported and installed offline in situation where:
- Security Gateway with GAiA does NOT have SFTP access to Internet
- Security Gateway with GAiA does NOT have access to Internet.
- Security Gateway with GAiA does NOT have SSH access to Internet.
- The desired CPUSE package is ONLY available in the Check Point CLOUD.
-
What statement best describes the Proxy ARP feature for Manual NAT in R80.10?
- Automatic proxy ARP configuration can be enabled
- Translate Destination on Client Side should be configured
- fw ctl proxy should be configured
- local.arp file must always be configured
-
The system administrator of a company is trying to find out why acceleration is not working for the traffic. The traffic is allowed according to the rule base and checked for viruses. But it is not accelerated.
What is the most likely reason that the traffic is not accelerated?
- There is a virus found. Traffic is still allowed but not accelerated.
- The connection required a Security server.
- Acceleration is not enabled.
- The traffic is originating from the gateway itself.
-
Which blades and or features are not supported in R80?
- SmartEvent Maps
- SmartEvent
- Identity Awareness
- SmartConsole Toolbars
-
Which application should you use to install a contract file?
- SmartView Monitor
- WebUI
- SmartUpdate
- SmartProvisioning
-
Vanessa is a Firewall administrator. She wants to test a backup of her company’s production Firewall cluster Dallas_GW. She has a lab environment that is identical to her production environment. She decided to restore production backup via SmartConsole in lab environment.
Which details she need to fill in System Restore window before she can click OK button and test the backup?
- Server, SCP, Username, Password, Path, Comment, Member
- Server, TFTP, Username, Password, Path, Comment, All Members
- Server, Protocol, Username, Password, Path, Comment, All Members
- Server, Protocol, username Password, Path, Comment, Member
-
Fill in the blanks. There are ________ types of software containers: ___________.
- Three; security management, Security Gateway, and endpoint security
- Three; Security Gateway, endpoint security, and gateway management
- Two; security management and endpoint security
- Two; endpoint security and Security Gateway
-
Which of the following technologies extracts detailed information from packets and stores that information in state tables?
- INSPECT Engine
- Stateful Inspection
- Packet Filtering
- Application Layer Firewall
-
Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?
- ThreatWiki
- Whitelist Files
- AppWiki
- IPS Protections
-
Which Check Point software blade provides Application Security and identity control?
- Identity Awareness
- Data Loss Prevention
- URL Filtering
- Application Control
-
What is UserCheck?
- Messaging tool used to verify a user’s credentials.
- Communication tool used to inform a user about a website or application they are trying to access.
- Administrator tool used to monitor users on their network.
- Communication tool used to notify an administrator when a new user is created.
-
Which of the following is NOT an alert option?
- SNMP
- High alert
- User defined alert
-
What does it mean if Deyra sees the gateway status? (Choose the BEST answer.)
- SmartCenter Server cannot reach this Security Gateway.
- There is a blade reporting a problem.
- VPN software blade is reporting a malfunction.
- Security Gateway’s MGNT NIC card is disconnected.
-
How many layers make up the TCP/IP model?
- 2
- 7
- 6
- 4
-
What is the Implicit Clean-up Rule?
- A setting is defined in the Global Properties for all policies.
- A setting that is configured per Policy Layer.
- Another name for the Clean-up Rule.
- Automatically created when the Clean-up Rule is defined.
-
Ken wants to obtain a configuration lock from other administrator on R80 Security Management Server. He can do this via WebUI or via CLI.
Which command should he use in CLI? (Choose the correct answer.)
-
remove database lock
- The database feature has one command lock database override.
-
override database lock
- The database feature has two commands lock database override and unlock database. Both will work.
-
-
What will be the effect of running the following command on the Security Management Server?
- Remove the installed Security Policy.
- Remove the local ACL lists.
- No effect.
- Reset SIC on all gateways.
-
Which of the following is NOT a VPN routing option available in a star community?
- To satellites through center only.
- To center, or through the center to other satellites, to Internet and other VPN targets.
- To center and to other satellites through center.
- To center only.
-
Fill in the blank. Once a certificate is revoked from the Security Gateway by the Security Management Server, the certificate information is ________ .
- Sent to the Internal Certificate Authority.
- Sent to the Security Administrator.
- Stored on the Security Management Server.
- Stored on the Certificate Revocation List.
Subscribe
0 Comments
Newest