Check Point Certified Security Administrator R81.20 Questions and Answers
You have discovered suspicious activity in your network. What is the BEST immediate action to take?
When configuring LDAP with User Directory integration, changes applied to a User Directory template are:
Security Zones do no work with what type of defined rule?
Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?
You want to store the GAiA configuration in a file for later reference. What command should you use?
In Unified SmartConsole Gateways and Servers tab you can perform the following functions EXCEPT ________.
What is the purpose of a Clean-up Rule?
You can see the following graphic:
What is presented on it?
Which Check Point software blade prevents malicious files from entering a network using virus signatures and anomaly-based protections from ThreatCloud?
By default, which port does the WebUI listen on?
Which SmartConsole tab shows logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?
Which backup utility captures the most information and tends to create the largest archives?
Which of the following is used to initially create trust between a Gateway and Security Management Server?
How is communication between different Check Point components secured in R80? As with all questions, select the best answer.
Which message indicates IKE Phase 2 has completed successfully?
Fill in the blanks: The _______ collects logs and sends them to the _______.
Fill in the blank When LDAP is integrated with Check Point Security Management it is then referred to as_____
Which Threat Prevention Software Blade provides comprehensive protection against malicious and unwanted network traffic, focusing on application and server vulnerabilities?
Fill in the blank: Back up and restores can be accomplished through_________.
To provide updated malicious data signatures to all Threat Prevention blades, the Threat Prevention gateway does what with the data?
What are the two elements of address translation rules?
Which option, when applied to a rule, allows traffic to VPN gateways in specific VPN communities?
When using Automatic Hide NAT, what is enabled by default?
Fill in the blank: Once a certificate is revoked from the Security GateWay by the Security Management Server, the certificate information is _______.
From the Gaia web interface, which of the following operations CANNOT be performed on a Security Management Server?
A layer can support different combinations of blades What are the supported blades:
Which of the completed statements is NOT true? The WebUI can be used to manage Operating System user accounts and
How would you determine the software version from the CLI?
How can the changes made by an administrator before publishing the session be seen by a superuser administrator?
What is the default tracking option of a rule?
Which of the following is used to enforce changes made to a Rule Base?
Name one limitation of using Security Zones in the network?
Which Check Point Software Wade provides visibility of users, groups and machines while also providing access control through identity-based policies?
CPU-level of your Security gateway is peaking to 100% causing problems with traffic. You suspect that the problem might be the Threat Prevention settings.
The following Threat Prevention Profile has been created.
How could you tune the profile in order to lower the CPU load still maintaining security at good level? Select the BEST answer.
In which scenario will an administrator need to manually define Proxy ARP?
One of major features in R80.x SmartConsole is concurrent administration. Which of the following is NOT possible considering that AdminA, AdminB, and AdminC are editing the same Security Policy?
Which part of SmartConsole allows administrators to add, edit delete, and clone objects?
When should you generate new licenses?
You want to verify if there are unsaved changes in GAiA that will be lost with a reboot. What command can be used?
To view the policy installation history for each gateway, which tool would an administrator use?
What are the three types of UserCheck messages?
Which is NOT an encryption algorithm that can be used in an IPSEC Security Association (Phase 2)?
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
To view statistics on detected threats, which Threat Tool would an administrator use?
Which Threat Prevention Profile is not included by default in R80 Management?
In the Check Point three-tiered architecture, which of the following is NOT a function of the Security Management Server?
What is the order of NAT priorities?
What is the difference between SSL VPN and IPSec VPN?
Fill in the blank RADIUS Accounting gets_____data from requests generated by the accounting client
Which type of Check Point license is tied to the IP address of a specific Security Gateway and cannot be transferred to a gateway that has a different IP address?
In a Distributed deployment, the Security Gateway and the Security Management software are installed on what platforms?
A security zone is a group of one or more network interfaces from different centrally managed gateways. What is considered part of the zone?
Which one of the following is the preferred licensing model? Select the BEST answer
Gaia has two default user accounts that cannot be deleted. What are those user accounts?
Which of the following is NOT an authentication scheme used for accounts created through SmartConsole?
Which statement is TRUE of anti-spoofing?
Which type of Check Point license ties the package license to the IP address of the Security Management Server?
Which of the following is NOT a component of a Distinguished Name?
What command would show the API server status?
What does it mean if Deyra sees the gateway status:
Choose the BEST answer.
Core Protections are installed as part of what Policy?
The ______ software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware.
In ____________ NAT, the ____________ is translated.
True or False: More than one administrator can log into the Security Management Server with SmartConsole with write permission at the same time.
What are the three deployment considerations for a secure network?
URL Filtering cannot be used to:
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?
View the rule below. What does the pen-symbol in the left column mean?
You are the Check Point administrator for Alpha Corp with an R80 Check Point estate. You have received a call by one of the management users stating that they are unable to browse the Internet with their new tablet connected to the company Wireless. The Wireless system goes through the Check Point Gateway. How do you review the logs to see what the problem may be?
Which tool is used to enable cluster membership on a Gateway?
How do you manage Gaia?
Choose what BEST describes the reason why querying logs now is very fast.
Fill in the blank: In order to install a license, it must first be added to the ____________.
Fill in the blanks: The Application Layer Firewalls inspect traffic through the ______ layer(s) of the TCP/IP model and up to and including the ______ layer.
What is the most recommended installation method for Check Point appliances?
Which one of the following is TRUE?
Which Identity Source(s) should be selected in Identity Awareness for when there is a requirement for a higher level of security for sensitive servers?
A stateful inspection firewall works by registering connection data and compiling this information. Where is the information stored?
What type of NAT is a one-to-one relationship where each host is translated to a unique address?
What is required for a certificate-based VPN tunnel between two gateways with separate management systems?
If there is an Accept Implied Policy set to "First", what is the reason Jorge cannot see any logs?
Identity Awareness allows easy configuration for network access and auditing based on what three items?
Where can administrator edit a list of trusted SmartConsole clients?
Stateful Inspection compiles and registers connections where?
An administrator wishes to enable Identity Awareness on the Check Point firewalls. However they allow users to use company issued or personal laptops. Since the administrator cannot manage the personal laptops, which of the following methods would BEST suit this company?
An administrator can use section titles to more easily navigate between large rule bases. Which of these statements is FALSE?
Which of the following is NOT a role of the SmartCenter:
What are the three components for Check Point Capsule?
R80 is supported by which of the following operating systems:
Vanessa is attempting to log into the Gaia Web Portal. She is able to login successfully. Then she tries the same username and password for SmartConsole but gets the message in the screenshot image below. She has checked that the IP address of the Server is correct and the username and password she used to login into Gaia is also correct.
What is the most likely reason?
Fill in the blank: Permanent VPN tunnels can be set on all tunnels in the community, on all tunnels for specific gateways, or__________.
Fill in the blank: The position of an implied rule is manipulated in the __________________ window.
Which two Identity Awareness commands are used to support identity sharing?
Which Check Point supported authentication scheme typically requires a user to possess a token?
Choose what BEST describes users on Gaia Platform.
At what point is the Internal Certificate Authority (ICA) created?
What is UserCheck?
What Check Point technologies deny or permit network traffic?
What is the default shell of Gaia CLI?
What is the main objective when using Application Control?
Identity Awareness lets an administrator easily configure network access and auditing based on three items Choose the correct statement.
When logging in for the first time to a Security management Server through SmartConsole, a fingerprint is saved to the:
Which Threat Prevention profile uses sanitization technology?
Which of the following is NOT an option to calculate the traffic direction?
Which of the following is NOT an identity source used for Identity Awareness?
The default shell of the Gaia CLI is cli.sh. How do you change from the cli.sh shell to the advanced shell to run Linux commands?
Which is a main component of the Check Point security management architecture?
In HTTPS Inspection policy, what actions are available in the "Actions" column of a rule?
A Check Point Software license consists of two components, the Software Blade and the Software Container. There are ______ types of Software Containers: ________.
URL Filtering employs a technology, which educates users on web usage policy in real time. What is the name of that technology?
Which key is created during Phase 2 of a site-to-site VPN?
Which information is included in the “Extended Log” tracking option, but is not included in the “Log” tracking option?
Both major kinds of NAT support Hide and Static NAT. However, one offers more flexibility. Which statement is true?
Fill in the blank: Authentication rules are defined for ____________.
Which of the following is NOT a method used by Identity Awareness for acquiring identity?
Fill in the blanks: Gaia can be configured using _______ the ________.
Which of the following Windows Security Events will NOT map a username to an IP address in Identity Awareness?
Which Security Blade needs to be enabled in order to sanitize and remove potentially malicious content from files, before those files enter the network?
What are valid authentication methods for mutual authenticating the VPN gateways?
Fill in the blank: By default, the SIC certificates issued by R80 Management Server are based on the ____________ algorithm.