To ensure that VMAC mode is enabled, which CLI command should you run on all cluster members?
The system administrator of a company is trying to find out why acceleration is not working for the traffic. The traffic is allowed according to the rule base and checked for viruses. But it is not accelerated.
What is the most likely reason that the traffic is not accelerated?
SmartEvent provides a convenient way to run common command line executables that can assist in investigating events. Right-clicking the IP address, source or destination, in an event provides a list of default and customized commands. They appear only on cells that refer to IP addresses because the IP address of the active cell is used as the destination of the command when run. The default commands are:
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?
SmartEvent uses it's event policy to identify events. How can this be customized?
Ken wants to obtain a configuration lock from other administrator on R81 Security Management Server. He can do this via WebUI or via CLI.
Which command should he use in CLI? (Choose the correct answer.)
Which file gives you a list of all security servers in use, including port number?
Vanessa is a Firewall administrator. She wants to test a backup of her company’s production Firewall cluster Dallas_GW. She has a lab environment that is identical to her production environment. She decided to restore production backup via SmartConsole in lab environment.
Which details she need to fill in System Restore window before she can click OK button and test the backup?
How would you enable VMAC Mode in ClusterXL?
How is communication between different Check Point components secured in R81? As with all questions, select the BEST answer.
What is the command to show SecureXL status?
To check overall SecureXL status:
[Expert@HostName]# fwaccel stat
What CLI command compiles and installs a Security Policy on the target’s Security Gateways?
Which view is NOT a valid CPVIEW view?
In a Client to Server scenario, which inspection point is the first point immediately following the tables and rule base check of a packet coming from outside of the network?
Can multiple administrators connect to a Security Management Server at the same time?
What is mandatory for ClusterXL to work properly?
What are the main stages of a policy installations?
What are types of Check Point APIs available currently as part of R81.10 code?
Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?
What is UserCheck?
Fill in the blanks. There are ________ types of software containers: ___________.
Bob needs to know if Alice was configuring the new virtual cluster interface correctly. Which of the following Check Point commands is true?
What does the Log "Views" tab show when SmartEvent is Correlating events?
Which of the following is NOT a type of Endpoint Identity Agent?
Fill in the blank: An identity server uses a __________ for user authentication.
When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.
What must you do first if “fwm sic_reset” could not be completed?
Which statement is correct about the Sticky Decision Function?
Which statements below are CORRECT regarding Threat Prevention profiles in SmartDashboard?
You need to see which hotfixes are installed on your gateway, which command would you use?
To add a file to the Threat Prevention Whitelist, what two items are needed?
When Dynamic Dispatcher is enabled, connections are assigned dynamically with the exception of:
Which of the following is a new R81 Gateway feature that had not been available in R77.X and older?
Using ClusterXL, what statement is true about the Sticky Decision Function?
What does it mean if Deyra sees the gateway status? (Choose the BEST answer.)
fwssd is a child process of which of the following Check Point daemons?
Which command will allow you to see the interface status?
Which statement is true regarding redundancy?
Which packet info is ignored with Session Rate Acceleration?
What is the minimum amount of RAM needed for a Threat Prevention Appliance?
Connections to the Check Point R81 Web API use what protocol?
What are the different command sources that allow you to communicate with the API server?
Which of the following describes how Threat Extraction functions?
In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies the type of traffic applicable to the chain module. For Stateful Mode configuration, chain modules marked with __________________ will not apply.
Where do you create and modify the Mobile Access policy in R81?
What are the steps to configure the HTTPS Inspection Policy?
John is using Management HA. Which Smartcenter should be connected to for making changes?
Which command shows detailed information about VPN tunnels?
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?
Synchronization works in two modes:
Full Sync transfers all Security Gateway kernel table information from one cluster member to another. It is handled by the fwd daemon using an encrypted TCP connection on port 256.
Delta Sync transfers changes in the kernel tables between cluster members. Delta sync is handled by the Security Gateway kernel using UDP connections on port 8116.
What is the SandBlast Agent designed to do?
R81.10 management server can manage gateways with which versions installed?
The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?
Which of the following process pulls application monitoring status?
When an encrypted packet is decrypted, where does this happen?
Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?
How do Capsule Connect and Capsule Workspace differ?
At what point is the Internal Certificate Authority (ICA) created?
What level of CPU load on a Secure Network Distributor would indicate that another may be necessary?
What traffic does the Anti-bot feature block?
Selecting an event displays its configurable properties in the Detail pane and a description of the event in the Description pane. Which is NOT an option to adjust or configure?
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
To find records in the logs that shows log records from the Application & URL Filtering Software Blade where traffic was dropped, what would be the query syntax?
Which component is NOT required to communicate with the Web Services API?
You have enabled “Full Log” as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?
How does the Anti-Virus feature of the Threat Prevention policy block traffic from infected websites?
In Threat Prevention, you can create new or clone profiles but you CANNOT change the out-of-the-box profiles of:
If there are two administration logged in at the same time to the SmartConsole, and there are objects locked for editing, what must be done to make them available or other administrators? (Choose the BEST answer.)
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?
Which feature is NOT provided by all Check Point Mobile Access solutions?
Types of Solutions
All of Check Point's Remote Access solutions provide:
What is the protocol and port used for Health Check and State Synchronization in ClusterXL?
When gathering information about a gateway using CPINFO, what information is included or excluded when using the “-x” parameter?
What are the blades of Threat Prevention?