Check Point Certified Security Administrator R81.20 CCSA (156-215.81.20) Questions and Answers
Secure Internal Communication (SIC) is handled by what process?
For Automatic Hide NAT rules created by the administrator what is a TRUE statement?
Fill in the blank: Service blades must be attached to a ______________.
What is a reason for manual creation of a NAT rule?
How can the changes made by an administrator before publishing the session be seen by a superuser administrator?
Which Check Point supported authentication scheme typically requires a user to possess a token?
Which icon in the WebUI indicates that read/write access is enabled?
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?
You are asked to check the status of several user-mode processes on the management server and gateway. Which of the following processes can only be seen on a Management Server?
What is the purpose of the CPCA process?
Session unique identifiers are passed to the web api using which http header option?
When configuring LDAP with User Directory integration, changes applied to a User Directory template are:
When a gateway requires user information for authentication, what order does it query servers for user information?
Which option will match a connection regardless of its association with a VPN community?
When defining group-based access in an LDAP environment with Identity Awareness, what is the BEST object type to represent an LDAP group in a Security Policy?
Fill in the blank Backup and restores can be accomplished through
Which one of the following is the preferred licensing model? Select the BEST answer
What is a role of Publishing?
If an administrator wants to restrict access to a network resource only allowing certain users to access it, and only when they are on a specific network what is the best way to accomplish this?
You want to verify if there are unsaved changes in GAiA that will be lost with a reboot. What command can be used?
When should you generate new licenses?
Fill in the blank: An Endpoint identity agent uses a ___________ for user authentication.
Fill in the blank: Once a certificate is revoked from the Security Gateway by the Security Management Server, the certificate information is _____.
If there are two administrators logged in at the same time to the SmartConsole, and there are objects locked for editing, what must be done to make them available to other administrators? Choose the BEST answer
In SmartEvent, a correlation unit (CU) is used to do what?
What is the BEST command to view configuration details of all interfaces in Gaia CLISH?
To ensure that VMAC mode is enabled, which CLI command you should run on all cluster members? Choose the best answer.
Both major kinds of NAT support Hide and Static NAT. However, one offers more flexibility. Which statement is true?
Check Point ClusterXL Active/Active deployment is used when:
Fill in the blank: With the User Directory Software Blade, you can create user definitions on a(n) ___________ Server.
Which of the following is NOT a component of a Distinguished Name?
Which option, when applied to a rule, allows all encrypted and non-VPN traffic that matches the rule?
What is true about the IPS-Blade?
Which back up method uses the command line to create an image of the OS?
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
Rugged appliances are small appliances with ruggedized hardware and like Quantum Spark appliance they use which operating system?
The ______ software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware.
Please choose correct command syntax to add an “emailserver1” host with IP address 10.50.23.90 using GAiA management CLI?
What is the default shell for the command line interface?
Fill in the blanks: The _______ collects logs and sends them to the _______.
Fill in the blank RADIUS Accounting gets_____data from requests generated by the accounting client
In the Check Point three-tiered architecture, which of the following is NOT a function of the Security Management Server?
When changes are made to a Rule base, it is important to _______________ to enforce changes.
If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsible, which of these steps should NOT be performed:
Which of the following is NOT a valid deployment option for R80?
From the Gaia web interface, which of the following operations CANNOT be performed on a Security Management Server?
What kind of NAT enables Source Port Address Translation by default?
What is the main difference between Static NAT and Hide NAT?
What is the default shell for the Gaia command line interface?
In order to modify Security Policies, the administrator can use which of the following tools? (Choose the best answer.)
Which Check Point software blade prevents malicious files from entering a network using virus signatures and anomaly-based protections from ThreatCloud?
Fill in the blanks: The Application Layer Firewalls inspect traffic through the ______ layer(s) of the TCP/IP model and up to and including the ______ layer.
What are the two elements of address translation rules?
Which command shows detailed information about VPN tunnels?
Can you use the same layer in multiple policies or rulebases?
What data MUST be supplied to the SmartConsole System Restore window to restore a backup?
Which backup utility captures the most information and tends to create the largest archives?
Which of the following commands is used to verify license installation?
What protocol is specifically used for clustered environments?
Which of the following is NOT a valid application navigation tab in the R80 SmartConsole?
Name the file that is an electronically signed file used by Check Point to translate the features in the license into a code?
Which software blade does NOT accompany the Threat Prevention policy?
Application Control/URL filtering database library is known as:
Which two Identity Awareness commands are used to support identity sharing?
Which Threat Prevention Profile is not included by default in R80 Management?
You are the Check Point administrator for Alpha Corp with an R80 Check Point estate. You have received a call by one of the management users stating that they are unable to browse the Internet with their new tablet connected to the company Wireless. The Wireless system goes through the Check Point Gateway. How do you review the logs to see what the problem may be?
Using ClusterXL, what statement is true about the Sticky Decision Function?
What are the advantages of a “shared policy” in R80?
What are the types of Software Containers?
URL Filtering cannot be used to:
What SmartEvent component creates events?
Which command shows the installed licenses?
Consider the Global Properties following settings:
The selected option “Accept Domain Name over UDP (Queries)” means:
Check Point licenses come in two forms. What are those forms?
In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?
The SIC Status “Unknown” means
One of major features in R80.x SmartConsole is concurrent administration. Which of the following is NOT possible considering that AdminA, AdminB, and AdminC are editing the same Security Policy?
R80 is supported by which of the following operating systems:
Which of the following is NOT supported by Bridge Mode Check Point Security Gateway
What is the purpose of a Clean-up Rule?
To increase security, the administrator has modified the Core protection ‘Host Port Scan’ from ‘Medium’ to ‘High’ Predefined Sensitivity. Which Policy should the administrator install after Publishing the changes?
Which of the following is a new R80.10 Gateway feature that had not been available in R77.X and older?
Fill in the blanks: A ____ license requires an administrator to designate a gateway for attachment whereas a _____ license is automatically attached to a Security Gateway.
Which of the following describes how Threat Extraction functions?
To quickly review when Threat Prevention signatures were last updated, which Threat Tool would an administrator use?
When configuring Spoof Tracking, which tracking actions can an administrator select to be done when spoofed packets are detected?
Which firewall daemon is responsible for the FW CLI commands?
Customer’s R80 management server needs to be upgraded to R80.10. What is the best upgrade method when the management server is not connected to the Internet?
Which statement is NOT TRUE about Delta synchronization?
When you upload a package or license to the appropriate repository in SmartUpdate. where is the package or license stored?
A SAM rule Is implemented to provide what function or benefit?
You are going to perform a major upgrade. Which back up solution should you use to ensure your database can be restored on that device?
Which statement describes what Identity Sharing is in Identity Awareness?
Fill in the blank: Each cluster, at a minimum, should have at least ___________ interfaces.
In SmartConsole, objects are used to represent physical and virtual network components and also some logical components. These objects are divided into several categories. Which of the following is NOT an objects category?
How do logs change when the "Accounting" tracking option is enabled on a traffic rule?
What are the Threat Prevention software components available on the Check Point Security Gateway?
In which scenario will an administrator need to manually define Proxy ARP?
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?
After the initial installation on Check Point appliance, you notice that the Management interface and default gateway are incorrect. Which commands could you use to set the IP to 192.168.80.200/24 and default gateway to 192.168.80.1.
Which of the following is NOT a component of Check Point Capsule?
The Network Operations Center administrator needs access to Check Point Security devices mostly for troubleshooting purposes. You do not want to give her access to the expert mode, but she still should be able to run tcpdump. How can you achieve this requirement?
Which of the following is NOT a valid deployment option for R80?
What is the Transport layer of the TCP/IP model responsible for?
Which command shows detailed information about VPN tunnels?
Which GUI tool can be used to view and apply Check Point licenses?
Name the pre-defined Roles included in Gaia OS.
Vanessa is attempting to log into the Gaia Web Portal. She is able to login successfully. Then she tries the same username and password for SmartConsole but gets the message in the screenshot image below. She has checked that the IP address of the Server is correct and the username and password she used to login into Gaia is also correct.
What is the most likely reason?
Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.
Which two Identity Awareness daemons are used to support identity sharing?
When an encrypted packet is decrypted, where does this happen?
Which application is used for the central management and deployment of licenses and packages?
What is the purpose of Captive Portal?
At what point is the Internal Certificate Authority (ICA) created?
Which Check Point software blade monitors Check Point devices and provides a picture of network and security performance?
True or False: More than one administrator can log into the Security Management Server with SmartConsole with write permission at the same time.
While enabling the Identity Awareness blade the Identity Awareness wizard does not automatically detect the windows domain Why does it not detect the windows domain?
What is the default tracking option of a rule?
When dealing with policy layers, what two layer types can be utilized?
Which of the following are types of VPN communities?
Which product correlates logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?
Which of the following is used to initially create trust between a Gateway and Security Management Server?
Which tool is used to enable ClusterXL?