156-315.80 : Check Point Certified Security Expert – R80 : Part 15

  1. After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?

    • Security Gateway IP-address cannot be changed without re-establishing the trust.
    • The Security Gateway name cannot be changed in command line without re-establishing trust.
    • The Security Management Server name cannot be changed in SmartConsole without re-establishing trust.
    • The Security Management Server IP-address cannot be changed without re-establishing the trust.
  2. What is the order of NAT priorities?

    • Static NAT, IP pool NAT, hide NAT
    • IP pool NAT, static NAT, hide NAT
    • Static NAT, automatic NAT, hide NAT
    • Static NAT, hide NAT, IP pool NAT
  3. Which Check Point feature enables application scanning and the detection?

    • Application Dictionary
    • AppWiki
    • Application Library
    • CPApp
  4. Which SmartConsole tab is used to monitor network and security performance?

    • Manage Setting
    • Security Policies
    • Gateway and Servers
    • Logs and Monitor
  5. Fill in the blank: The R80 SmartConsole, SmartEvent GUI client, and _______ consolidate billions of logs and shows then as prioritized security events.

    • SmartMonitor
    • SmartView Web Application
    • SmartReporter
    • SmartTracker
  6. Office mode means that:

    • SecurID client assigns a routable MAC address. After the user authenticates for a tunnel, the VPN gateway assigns a routable IP address to the remote client.
    • Users authenticate with an Internet browser and use secure HTTPS connection.
    • Local ISP (Internet service Provider) assigns a non-routable IP address to the remote user.
    • Allows a security gateway to assign a remote client an IP address. After the user authenticates for a tunnel, the VPN gateway assigns a routable IP address to the remote client.
  7. When attempting to start a VPN tunnel, in the logs the error “no proposal chosen” is seen numerous times. No other VPN-related entries are present.

    Which phase of the VPN negotiations has failed?

    • IKE Phase 1
    • IPSEC Phase 2
    • IPSEC Phase 1
    • IKE Phase 2
  8. Which of the following Windows Security Events will not map a username to an IP address in Identity Awareness?

    • Kerberos Ticket Renewed
    • Kerberos Ticket Requested
    • Account Logon
    • Kerberos Ticket Timed Out
  9. Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ________ .

    • User Directory
    • Captive Portal and Transparent Kerberos Authentication
    • Captive Portal
    • UserCheck
  10. The ____ software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware.

    • Next Generation Threat Prevention
    • Next Generation Threat Emulation
    • Next Generation Threat Extraction
    • Next Generation Firewall
  11. Which tool is used to enable ClusterXL?

    • SmartUpdate
    • cpconfig
    • SmartConsole
    • sysconfig
  12. How many policy layers do Access Control policy support?

    • 2
    • 4
    • 1
    • 3
    Explanation:

    Two policy layers:
    – Network Policy Layer
    – Application Control Policy Layer

  13. One of major features in R80 SmartConsole is concurrent administration.

    Which of the following is NOT possible considering that AdminA, AdminB and AdminC are editing the same Security Policy?

    • A lock icon shows that a rule or an object is locked and will be available.
    • AdminA and AdminB are editing the same rule at the same time.
    • A lock icon next to a rule informs that any Administrator is working on this particular rule.
    • AdminA, AdminB and AdminC are editing three different rules at the same time.
  14. After the initial installation on Check Point appliance, you notice that the Management-interface and default gateway are incorrect.

    Which commands could you use to set the IP to 192.168.80.200/24 and default gateway to 192.168.80.1.

    • set interface Mgmt ipv4-address 192.168.80.200 mask-length 24
      set static-route default nexthop gateway address 192.168.80.1 on
      save config
    • set interface Mgmt ipv4-address 192.168.80.200 255.255.255.0
      add static-route 0.0.0.0. 0.0.0.0 gw 192.168.80.1 on
      save config
    • set interface Mgmt ipv4-address 192.168.80.200 255.255.255.0
      set static-route 0.0.0.0. 0.0.0.0 gw 192.168.80.1 on
      save config
    • set interface Mgmt ipv4-address 192.168.80.200 mask-length 24
      add static-route default nexthop gateway address 192.168.80.1 on
      save config
  15. Tom has connected to the R80 Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored shortly afterward.

    What will happen to the changes already made?

    • Tom’s changes will have been stored on the Management when he reconnects and he will not lose any of his work.
    • Tom will have to reboot his SmartConsole computer, and access the Management cache store on that computer, which is only accessible after a reboot.
    • Tom’s changes will be lost since he lost connectivity and he will have to start again.
    • Tom will have to reboot his SmartConsole computer, clear to cache, and restore changes.
  16. What key is used to save the current CPView page in a filename format cpview_”cpview process ID”.cap”number of captures”?

    • S
    • W
    • C
    • Space bar
  17. On the following picture an administrator configures Identity Awareness:

    156-315.80 Check Point Certified Security Expert – R80 Part 15 Q17 003
    156-315.80 Check Point Certified Security Expert – R80 Part 15 Q17 003

    After clicking “Next” the above configuration is supported by:

    • Kerberos SSO which will be working for Active Directory integration
    • Based on Active Directory integration which allows the Security Gateway to correlate Active Directory users and machines to IP addresses in a method that is completely transparent to the user.
    • Obligatory usage of Captive Portal.
    • The ports 443 or 80 what will be used by Browser-Based and configured Authentication.
  18. Which of the completed statements is NOT true? The WebUI can be used to manage user accounts and:

    • assign privileges to users.
    • edit the home directory of the user.
    • add users to your Gaia system.
    • assign user rights to their home directory in the Security Management Server.
  19. In the Check Point Security Management Architecture, which component(s) can store logs?

    • SmartConsole
    • Security Management Server and Security Gateway
    • Security Management Server
    • SmartConsole and Security Management Server
  20. View the rule below. What does the lock-symbol in the left column mean? (Choose the BEST answer.)

    156-315.80 Check Point Certified Security Expert – R80 Part 15 Q20 004
    156-315.80 Check Point Certified Security Expert – R80 Part 15 Q20 004
    • The current administrator has read-only permissions to Threat Prevention Policy.
    • Another user has locked the rule for editing.
    • Configuration lock is present. Click the lock symbol to gain read-write access.
    • The current administrator is logged in as read-only because someone else is editing the policy.
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments