Professional Documents
Culture Documents
156-315.80 Exam - Questions From Exam Topics Different Format
156-315.80 Exam - Questions From Exam Topics Different Format
Question #1 Topic 1
D. OPSEC SDK
Question #2 Topic 1
SandBlast Mobile identi es threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated
components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile
solution?
A. Management Dashboard
B. Gateway
Question #3 Topic 1
What are the different command sources that allow you to communicate with the API server?
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?
B. Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control Centers
D. Anti-Bot is a post-infection malware protection to prevent a host from establishing a connection to a Command & Control Center.
Question #5 Topic 1
A. 18191
B. 18190
C. 8983
D. 19009
Question #6 Topic 1
Which method below is NOT one of the ways to communicate using the Management API's?
B. Typing API commands from a dialog box inside the SmartConsole GUI application
Question #7 Topic 1
Your manager asked you to check the status of SecureXL, and its enabled templates and features. What command will you use to provide such
information to manager?
A. fw accel stat
B. fwaccel stat
C. fw acces stats
D. fwaccel stats
Question #8 Topic 1
SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user's machine via the web browser. What are the
two modes of
SNX?
Question #9 Topic 1
A. clusterXL_admin down
B. cphaprob_admin down
C. clusterXL_admin down-p
Which two of these Check Point Protocols are used by SmartEvent Processes?
Fill in the blank: The tool ________ generates a R80 Security Gateway con guration report.
A. infoCP
B. infoview
C. cpinfo
D. fw cpinfo
Question #12 Topic 1
Automatic a nity means that if SecureXL is running, the a nity for each interface is automatically reset every
A. 15 sec
B. 60 sec
C. 5 sec
D. 30 sec
A. cphaprob interface
C. cphaprob ""a if
D. cphaprob stat
Which command can you use to enable or disable multi-queue per interface?
A. cpmq set
B. Cpmqueue set
C. Cpmq con g
D. St cpmq enable
Question #16 Topic 1
To help SmartEvent determine whether events originated internally or externally you must de ne using the Initial Settings under General Settings in
the Policy
Tab. How many options are available to calculate the tra c direction?
C. 2 Internal; External
There are 4 ways to use the Management API for creating host object with R80 Management API. Which one is NOT correct?
C. Using CLISH
A. Route-based VPN
B. IPS
C. IPv6
D. Overlapping NAT
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don't have a budget to
perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you
enable them?
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console.
CPM allows the
GUI client and management server to communicate via web services using ___________.
B. source ip
C. source port
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?
A. Synchronized
C. Lagging
D. Collision
Question #24 Topic 1
During inspection of your Threat Prevention logs you nd four different computers having one event each with a Critical Severity. Which of those
hosts should you try to remediate rst?
A. Disguising an illegal IP address behind an authorized IP address through Port Address Translation.
Connections to the Check Point R80 Web API use what protocol?
A. HTTPS
B. RPC
C. VPN
D. SIC
A. fw tab ""t
B. fw tab ""list
C. fw-tab ""s
D. fw tab -1
Question #28 Topic 1
B. In R80, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict
D. In R80, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
A. Detects and blocks malware by correlating multiple detection engines before users are affected.
B. Con gure rules to limit the available network bandwidth for speci ed users or groups.
C. Use UserCheck to help users understand that certain websites are against the company's security policy.
D. Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.
What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful
Inspection?
A. Stateful Mode
C. Wire Mode
D. Stateless Mode
B. IPS
D. CoreXL
Question #32 Topic 1
In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate CLI command?
A. fw ctl sdstat
D. cpinfo
Check Pont Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster Members over Check Point SIC _____________ .
The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?
A. Threat Emulation
B. Threat Simulator
C. Threat Extraction
D. Threat Cloud
Question #36 Topic 1
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?
Fill in the blank: The command ___________ provides the most complete restoration of a R80 con guration.
A. upgrade_import
B. cpcon g
D. cpinfo ""recover
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidated management console. It
empowers the migration from legacy Client-side logic to Server-side logic. The cpm process:
A. Allow GUI Client and management server to communicate via TCP Port 19001
B. Allow GUI Client and management server to communicate via TCP Port 18191
C. Performs database tasks such as creating, deleting, and modifying objects and compiling policy.
D. Performs database tasks such as creating, deleting, and modifying objects and compiling as well as policy code generation.
Which of the following type of authentication on Mobile Access can NOT be used as the rst authentication method?
A. Dynamic ID
B. RADIUS
D. Certi cate
Question #40 Topic 1
A. Accept
B. Drop
C. NAT
D. None
What happen when IPS pro le is set in Detect Only Mode for troubleshooting?
B. VRRP can be used together with ClusterXL, but with degraded performance
The Security Gateway is installed on GAIA R80. The default port for the Web User Interface is ______.
A. TCP 18211
B. TCP 257
C. TCP 4433
D. TCP 443
Question #44 Topic 1
Fill in the blank: The R80 feature ______ permits blocking speci c IP addresses for a speci ed time period.
In a Client to Server scenario, which represents that the packet has already checked against the tables and the Rule Base?
A. Big l
B. Little o
C. Little i
D. Big O
A. This a new mechanism which extracts malicious les from a document to use it as a counter-attack against its sender.
B. This is a new mechanism which is able to collect malicious les out of any kind of le types to destroy it prior to sending it to the intended
recipient.
C. This is a new mechanism to identify the IP address of the sender of malicious codes and put it into the SAM database (Suspicious Activity
Monitoring).
D. Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the
intended recipient, which makes this solution very fast.
You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?
B. SecuRemote
A. IDA
B. RAD
C. PDP
D. VPN
Which of the following is a new R80.10 Gateway feature that had not been available in R77.X and older?
A. The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are de ned,
allowing control over the rule base ow and which security functionalities take precedence.
B. Limits the upload and download throughput for streaming media in the company to 1 Gbps.
C. Time object to a rule to make the rule active only during speci ed times.
D. Sub Policies ae sets of rules that can be created and attached to speci c rules. If the rule is matched, inspection will continue in the sub
policy attached to it rather than in the next rule.
A. fwd
B. cpwd
C. fwm
D. cpd
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
A. Symmetric routing
B. Failovers
C. Asymmetric routing
D. Anti-Spoo ng
Question #52 Topic 1
CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is:
A. MySQL
B. Postgres SQL
C. MarisDB
D. SOLR
If you needed the Multicast MAC address of a cluster, what command would you run?
A. cphaprob ""a if
D. cphaprob igmp
A. Gateway API
B. Management API
C. OPSC SDK
Which of the following Check Point processes within the Security Management Server is responsible for the receiving of log records from Security
Gateway?
A. logd
B. fwd
C. fwm
D. cpd
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?
You have successfully backed up Check Point con gurations without the OS information. What command would you use to restore this backup?
A. restore_backup
B. import backup
C. cp_merge
D. migrate import
The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to
achieve the requirement?
Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, how many machines will he
need if he does NOT include a SmartConsole machine in his calculations?
A. One machine, but it needs to be installed using SecurePlatform for compatibility purposes.
B. One machine
C. Two machines
D. Three machines
You can select the le types that are sent for emulation for all the Threat Prevention pro les. Each pro le de nes a(n) _____ or ______ action for
the le types.
A. Inspect/Bypass
B. Inspect/Prevent
C. Prevent/Bypass
D. Detect/Bypass
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
B. SmartConsole
C. SecureClient
D. Security Gateway
E. SmartEvent
On R80.10 when con guring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:
A. 18210
B. 18184
C. 257
D. 18191
Question #64 Topic 1
How many images are included with Check Point TE appliance in Recommended Mode?
A. 2(OS) images
A. 2
B. 1
C. 4
D. 6
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would
you choose?
A. Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.
B. Create a separate Security Policy package for each remote Security Gateway.
C. Create network objects that restricts all applicable rules to only certain networks.
D. Run separate SmartConsole instances to login and con gure each Security Gateway directly.
Which of the following authentication methods ARE NOT used for Mobile Access?
A. RADIUS server
C. SecurID
D. TACACS+
Question #68 Topic 1
What is the correct command to observe the Sync tra c in a VRRP environment?
What has to be taken into consideration when con guring Management HA?
A. The Database revisions will not be synchronized between the management servers
C. If you wanted to use Full Connectivity Upgrade, you must change the Implied Rules to allow FW1_cpredundant to pass before the Firewall
Control Connections.
D. For Management Server synchronization, only External Virtual Switches are supported. So, if you wanted to employ Virtual Routers instead,
you have to reconsider your design.
B. A log entry becomes an event when it matches any rule de ned in Event Policy
What are the attributes that SecureXL will check after the connection is allowed by Security Policy?
B. Source MAC address, Destination MAC address, Source port, Destination port, Protocol
B. the top events, destinations, sources, and users of the query results, either as a chart or in a tallied list.
A. It is not supported with either the Performance pack of a hardware based accelerator card
B. Does not support SPI's when con gured for Load Sharing
C. It is automatically disabled if the Mobile Access Software Blade is enabled on the cluster
A. System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob ""f if command.
B. ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.
D. Both ClusterXL and VRRP are fully supported by Gaia and available to all Check Point appliances, open servers, and virtualized
environments.
Question #76 Topic 1
A. 1, 2, 3, 4
B. 1, 4, 2, 3
C. 3, 1, 2, 4
D. 4, 3, 1, 2
C. From SmartDashboard
R80.10 management server can manage gateways with which versions installed?
Which command can you use to verify the number of active concurrent connections?
A. fw conn all
B. fw ctl pstat
D. show connections
Question #80 Topic 1
B. Installing a management plug-in requires a Snapshot, just like any upgrade process.
C. A management plug-in interacts with a Security Management Server to provide new features and support for new products.
D. Using a plug-in offers full central management only if special licensing is applied to speci c features of the plug-in.
A. api stat
B. api status
C. show api_status
D. app_get_status
Where you can see and search records of action done by R80 SmartConsole administrators?
B. In the Logs & Monitor view, select "Open Audit Log View"
C. In SmartAuditLog View
Fill in the blank: The R80 utility fw monitor is used to troubleshoot ________.
C. Tra c issues
A. The Firewall kernel only touches the packet if the connection is accelerated
C. The Firewall kernel is replicated only with new connections and deletes itself once the connection times out
Selecting an event displays its con gurable properties in the Detail pane and a description of the event in the Description pane. Which is NOT an
option to adjust or con gure?
A. Severity
B. Automatic reactions
C. Policy
D. Threshold
To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot:
B. fw ctl Dynamic_Priority_Queue on
A. Reports
B. Advanced
C. Checkups
D. Views
E. Summary
A. With SDF enabled, the involved VPN Gateways only supports IKEv1
B. Acceleration technologies, such as SecureXL and CoreXL are disabled when activating SDF
D. With SDF enabled, you can only have three Sync interfaces at most
Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, le share and emails?
A. fwd
B. fwm
C. cpwd
D. cpd
Question #92 Topic 1
B. Using cpcon g, update the Dynamic Dispatcher value to "full" under the CoreXL menu.
C. Edit/proc/interrupts to include multik set_mode 1 at the bottom of the le, save, and reboot.
Session unique identi ers are passed to the web api using which http header option?
A. X-chkp-sid
B. Accept-Charset
C. Proxy-Authorization
D. Application
D. fw tab connections
A. Consolidation Policy
B. Correlation Unit
C. SmartEvent Policy
D. SmartEvent GUI
Question #96 Topic 1
Which command collects diagnostic data for analyzing customer setup remotely?
A. cpinfo
B. migrate export
C. sysinfo
D. cpview
Which features are only supported with R80.10 Gateways but not R77.x?
A. Access Control policy uni es the Firewall, Application Control & URL Filtering, Data Awareness, and Mobile Access Software Blade policies
B. Limits the upload and download throughput for streaming media in the company to 1 Gbps.
C. The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are de ned,
allowing control over the rule base ow and which security functionalities take precedence.
D. Time object to a rule to make the rule active only during speci ed times.
Which CLI command will reset the IPS pattern matcher statistics?
When requiring certi cates for mobile devices, make sure the authentication method is set to one of the following, Username and Password,
RADIUS or _______.
A. SecureID
B. SecurID
C. Complexity
D. TacAcs
Question #100 Topic 1
Check Point recommends con guring Disk Space Management parameters to delete old log entries when available disk space is less than or
equal to?
A. 50%
B. 75%
C. 80%
D. 15%
SmartEvent has several components that function together to track security threats. What is the function of the Correlation Unit as a component
of this architecture?
A. Analyzes each log entry as it arrives at the log server according to the Event Policy. When a threat pattern is identi ed, an event is
forwarded to the SmartEvent Server.
C. Collects syslog data from third party devices and saves them to the database.
SecureXL improves non-encrypted rewall tra c throughput and encrypted VPN tra c throughput.
B. This statement is false because SecureXL does not improve this tra c but CoreXL does.
A. fw tab -t
B. fw tab -s
C. fw tab -n
D. fw tab -k
Question #104 Topic 1
When simulating a problem on ClusterXL cluster with cphaprob ""d STOP -s problem -t 0 register, to initiate a failover on an active cluster member,
what command allows you remove the problematic state?
How would you deploy TE250X Check Point appliance just for email tra c and in-line mode without a Check Point Security Gateway?
C. You can utilize only Check Point Cloud Services for this scenario.
D. It is not possible, always Check Point SGW is needed to forward emails to SandBlast appliance.
What is the main difference between Threat Extraction and Threat Emulation?
A. Threat Emulation never delivers a le and takes more than 3 minutes to complete.
B. Threat Extraction always delivers a le and takes less than a second to complete.
C. Threat Emulation never delivers a le that takes less than a second to complete.
D. Threat Extraction never delivers a le and takes more than 3 minutes to complete.
When Dynamic Dispatcher is enabled, connections are assigned dynamically with the exception of:
A. Threat Emulation
B. HTTPS
C. QOS
D. VoIP
Question #108 Topic 1
SandBlast offers exibility in implementation based on their individual business needs. What is an option for deployment of Check Point
SandBlast Zero-Day
Protection?
A. Capsule Docs
B. Capsule Cloud
C. Capsule Enterprise
D. Capsule Workspace
Which statements below are CORRECT regarding Threat Prevention pro les in SmartDashboard?
A. You can assign only one pro le per gateway and a pro le can be assigned to one rule Only.
B. You can assign multiple pro les per gateway and a pro le can be assigned to one rule only.
C. You can assign multiple pro les per gateway and a pro le can be assigned to one or more rules.
D. You can assign only one pro le per gateway and a pro le can be assigned to one or more rules.
Question #112 Topic 1
Using ClusterXL, what statement is true about the Sticky Decision Function?
What is the name of the secure application for Mail/Calendar for mobile devices?
A. Capsule Workspace
B. Capsule Mail
C. Capsule VPN
D. Secure Workspace
Where do you create and modify the Mobile Access policy in R80?
A. SmartConsole
B. SmartMonitor
C. SmartEndpoint
D. SmartDashboard
SmartConsole R80 requires the following ports to be open for SmartEvent R80 management:
A. 19090,22
B. 19190,22
C. 18190,80
D. 19009,443
Question #116 Topic 1
Which con guration le contains the structure of the Security Server showing the port numbers, corresponding protocol name, and status?
A. $FWDIR/database/fwauthd.conf
B. $FWDIR/conf/fwauth.conf
C. $FWDIR/conf/fwauthd.conf
D. $FWDIR/state/fwauthd.conf
What API command below creates a new host with the name "New Host" and IP address of "192.168.0.10"?
A. That is used to deploy the mobile device as a generator of one-time passwords for authenticating to an RSA Authentication Manager.
B. Fill Layer4 VPN ""SSL VPN that gives users network access to all mobile applications.
C. Full Layer3 VPN ""IPSec VPN that gives users network access to all mobile applications.
D. You can make sure that documents are sent to the intended recipients only.
You nd one of your cluster gateways showing "Down" when you run the "cphaprob stat" command. You then run the "clusterXL_admin up" on the
down member but unfortunately the member continues to show down. What command do you run to determine the cause?
In SmartEvent, what are the different types of automatic reactions that the administrator can con gure?
A. Mail, Block Source, Block Event Activity, External Script, SNMP Trap
D. Mail, Block Source, Block Event Activity, Packet Capture, SNMP Trap
Using mgmt_cli, what is the correct syntax to import a host object called Server_1 from the CLI?
What are the steps to con gure the HTTPS Inspection Policy?
A. Go to Manage&Settings > Blades > HTTPS Inspection > Con gure in SmartDashboard
B. Go to Application&url ltering blade > Advanced > Https Inspection > Policy
You want to store the GAIA con guration in a le for later reference. What command should you use?
A. Capsule Connect provides a Layer3 VPN. Capsule Workspace provides a Desktop with usable applications.
John detected high load on sync interface. Which is most recommended solution?
A. For short connections like http service "" delay sync for 2 seconds
D. For short connections like icmp service "" delay sync for 2 seconds
A. Primary-backup
C. Round robin
D. Load Sharing
You have existing dbedit scripts from R77. Can you use them with R80.10?
C. You can use dbedit to modify threat prevention or access policies, but not create or modify layers
A. Checkpoint Mobile
C. SecuRemote
A. fw ctl stat
B. clusterXL stat
C. clusterXL status
D. cphaprob stat
A. fwm
B. cpd
C. cpwd
D. fwssd
C. sysmess all
For Management High Availability, which of the following is NOT a valid synchronization status?
A. Collision
B. Down
C. Lagging
Can multiple administrators connect to a Security Management Server at the same time?
B. Yes, all administrators can modify a network object at the same time
C. Yes, every administrator has their own username, and works in a session that is independent of other administrators.
Which process is available on any management product and on products that require direct GUI access, such as SmartEvent and provides GUI
client communications, database manipulation, policy compilation and Management HA synchronization?
A. cpwd
B. fwd
C. cpd
D. fwm
Question #136 Topic 1
To add a le to the Threat Prevention Whitelist, what two items are needed?
A. Firewall logs
B. detect only
C. inline/prevent or detect
Tra c from source 192.168.1.1 is going to www.google.com. The Application Control Blade on the gateway is inspecting the tra c. Assuming
acceleration is enabled which path is handling the tra c?
A. Slow Path
B. Medium Path
C. Fast Path
D. Accelerated Path
A. Marks logs that individually are not events, but may be part of a larger pattern to be identi ed later.
D. Takes a new log entry that is part of a group of items that together make up an event, and adds it to an ongoing event.
D. IPSec VPN requires installation of a resident VPN client and SSL VPN requires only an installed Browser.
B. A 5-tuple match
C. Multicast packets
To accelerate the rate of connection establishment, SecureXL groups all connection that match a particular service and whose sole differentiating
element is the source port. The type of grouping enables even the very rst packets of a TCP handshake to be accelerated. The rst packets of the
rst connection on the same service will be forwarded to the Firewall kernel which will then create a template of the connection. Which of the
these is NOT a SecureXL template?
A. Accept Template
B. Deny Template
C. Drop Template
D. NAT Template
Which of the following is NOT a type of Check Point API available in R80.10?
B. OPSEC SDK
C. Mobile Access
D. Management
Question #148 Topic 1
A. Security policy
B. Inbound chain
C. Outbound chain
John is using Management HA. Which Smartcenter should be connected to for making changes?
A. secondary Smartcenter
B. active Smartenter
D. primary Smartcenter
You are asked to check the status of several user-mode processes on the management server and gateway. Which of the following processes can
only be seen on a Management Server?
A. fwd
B. fwm
C. cpd
D. cpwd
A. AES-128
B. AES-256
C. DES
D. 3DES
What is the command to check the status of the SmartEvent Correlation Unit?
B. cpstat cpsead
You need to see which hot xes are installed on your gateway, which command would you use?
VPN Link Selection will perform the following when the primary VPN link goes down?
B. The Firewall can update the Link Selection entries to start using a different link for the same tunnel.
D. The Firewall will inform the client that the tunnel is down.
Which of the following links will take you to the SmartView web application?
A. /opt/CPSmartlog-R80/log
B. /opt/CPshrd-R80/log
C. /opt/CPsuite-R80/fw1/log
D. /opt/CPsuite-R80/log
A. SmartProvisioning
B. SmartView Tracker
C. SmartView Monitor
D. SmartLog
Question #160 Topic 1
From SecureXL perspective, what are the tree paths of tra c ow:
To enable Dynamic Dispatch on Security Gateway without the Firewall Priority Queues, run the following command in Expert mode and reboot:
A. fw ctl Dyn_Dispatch on
What is the protocol and port used for Health Check and State Synchronization in ClusterXL?
B. fw ctl a nity -l
C. fw ctl instances -v
D. fw ctl i ist
Question #164 Topic 1
In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which speci es the type of tra c applicable to the chain module.
For Wire Mode con guration, chain modules marked with __________________ will not apply.
A. ffff
B. 1
C. 2
D. 3
A. Once a week
B. Once an hour
You are investigating issues with to gateway cluster members are not able to establish the rst initial cluster synchronization. What service is
used by the FWD daemon to do a Full Synchronization?
A. cat $FWDIR/conf/vpn.conf
B. vpn tu tlist
C. vpn tu
D. cpview
Which Check Point software blades could be enforced under Threat Prevention pro le using Check Point R80.10 SmartConsole application?
When gathering information about a gateway using CPINFO, what information is included or excluded when using the "-x" parameter?
A. DBSync
B. API Server
C. fwm
D. SOLR
After making modi cations to the $CVPNDIR/conf/cvpnd.C le, how would you restart the daemon?
A. cvpnd_restart
B. cvpnd_restart
C. cvpnd restart
D. cvpnrestart
SandBlast has several functional components that work together to ensure that attacks are prevented in real-time. Which the following is NOT part
of the
SandBlast component?
A. Threat Emulation
B. Mobile Access
D. Threat Cloud
Question #176 Topic 1
With Mobile Access enabled, administrators select the web-based and native applications that can be accessed by remote users and de ne the
actions that users can perform the applications. Mobile Access encrypts all tra c using:
A. HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, they
need to install the SSL Network Extender.
B. HTTPS for web-based applications and AES or RSA algorithm for native applications. For end users to access the native application, they
need to install the SSL Network Extender.
C. HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, no
additional software is required.
D. HTTPS for web-based applications and AES or RSA algorithm for native applications. For end users to access the native application, no
additional software is required.
C. With "fw monitor", you can see the inspection points, which cannot be seen in "tcpdump"
D. "fw monitor" can be used from the CLI of the Management Server to collect information from multiple gateways.
A. Summary
B. Views
C. Reports
D. Checkups
Question #180 Topic 1
What command can you use to have cpinfo display all installed hot xes?
A. cpinfo -hf
C. cpinfo ""get hf
D. cpinfo installed_jumbo
What is the port used for SmartConsole to connect to the Security Management Server?
D. High availability between the local SandBlast appliance and the cloud.
When setting up an externally managed log server, what is one item that will not be con gured on the R80 Security Management Server?
A. IP
B. SIC
C. NAT
D. FQDN
Question #184 Topic 1
Customer's R80 management server needs to be upgraded to R80.10. What is the best upgrade method when the management server is not
connected to the
Internet?
A. Export R80 con guration, clean install R80.10 and import the con guration
D. SmartUpdate upgrade
When installing a dedicated R80 SmartEvent server. What is the recommended size of the root partition?
A. Any size
D. At least 20GB
As an administrator, you may be required to add the company logo to reports. To do this, you would save the logo as a PNG le with the name
"˜cover-company-
[1]
A. SFWDIR/smartevent/conf
B. $RTDIR/smartevent/conf
C. $RTDIR/smartview/conf
D. $FWDIR/smartview/conf
C. Always delivers a le
Both ClusterXL and VRRP are fully supported by Gaia R80.10 and available to all Check Point appliances. Which the following command is NOT
related to redundancy and functions?
A. cphaprob stat
B. cphaprob ""a if
A. The SmartEvent Correlation Unit is designed to check the connection reliability from SmartConsole to the SmartEvent Server.
B. The SmartEvent Correlation Unit's task it to assign severity levels to the identi ed events.
C. The Correlation unit role is to evaluate logs from the log server component to identify patterns/threats and convert them to events.
D. The SmartEvent Correlation Unit is designed to check the availability of the SmartReporter Server.
What is a best practice before starting to troubleshoot using the "fw monitor" tool?
C. Disable CoreXL
D. Disable SecureXL
SmartEvent does NOT use which of the following procedures to identify events:
What is the most recommended way to install patches and hot xes?
B. rpm -Uv
D. UnixinstallScript
B. Automation involves the process of coordinating an exchange of information through web service interactions such as XML and JSON, but
orchestration does not involve processes.
C. Orchestration is concerned with executing a single task, whereas automation takes a series of tasks and puts them all together into a
process work ow.
An administrator would like to troubleshoot why templating is not working for some tra c. How can he determine at which rule templating is
disabled?
C. He can use the fwaccel stat command on the Security Management Server.
Which web services protocol is used to communicate to the Check Point R80 Identity Awareness Web API?
A. SOAP
B. REST
C. XLANG
D. XML-RPC
A. The number of cores must be the same on every participating cluster node
D. If you have "Non-monitored Private" interfaces, the number of those interfaces must be the same on all cluster members
Please choose correct command to add an "emailserver1" host with IP address 10.50.23.90 using GAiA management CLI?
Using Threat Emulation technologies, what is the best way to block .exe and .bat le types?
What is the recommended number of physical network interfaces in a Mobile Access cluster deployment?
A. 4 Interfaces "" an interface leading to the organization, a second interface leading to the internet, a third interface for synchronization, a
fourth interface leading to the Security Management Server.
B. 3 Interfaces "" an interface leading to the organization, a second interface leading to the Internet, a third interface for synchronization.
C. 1 Interface "" an interface leading to the organization and the Internet, and con gure for synchronization.
D. 2 Interfaces "" a data interface leading to the organization and the Internet, a second interface for synchronization.
A. fwm
B. cpmd
C. cpm
D. cpd
A. fwaccel status
B. fwaccel stats -m
C. fwaccel -s
D. fwaccel stat
Question #204 Topic 1
The SmartEvent R80 Web application for real-time event monitoring is called:
A. SmartView Monitor
B. SmartEventWeb
D. SmartView
A. Firewall
B. VPN
C. IPS
D. HTTPS
With MTA (Mail Transfer Agent) enabled the gateways manages SMTP tra c and holds external email with potentially malicious attachments.
What is required in order to enable MTA (Mail Transfer Agent) functionality in the Security Gateway?
D. Tra c on port 25
C. Create products that use and enhance the Check Point solution
You need to change the number of rewall Instances used by CoreXL. How can you achieve this goal?
Fill in the blank: Identity Awareness AD-Query is using the Microsoft _______________ API to learn users from AD.
A. WMI
B. Eventvwr
C. XML
D. Services.msc
A. Correlation Unit
B. SmartEvent Unit
C. SmartEvent Server
D. Log Server
The essential means by which state synchronization works to provide failover in the event an active member goes down, ____________ is used
speci cally for clustered environments to allow gateways to report their own state and learn about the states of other members in the cluster.
A. ccp
B. cphaconf
C. cphad
D. cphastart
Question #212 Topic 1
A. The CoreXL FW instances assignment mechanism is based on Source MAC addresses, Destination MAC addresses
B. The CoreXL FW instances assignment mechanism is based on the utilization of CPU cores
D. The CoreXl FW instances assignment mechanism is based on Source IP addresses, Destination IP addresses, and the IP "˜Protocol' type
What CLI command compiles and installs a Security Policy on the target's Security Gateways?
A. fwm compile
B. fwm load
C. fwm fetch
D. fwm install
Pamela is Cyber Security Engineer working for Global Instance Firm with large scale deployment of Check Point Enterprise Appliances using
GAiA/R80.10.
Company's Developer Team is having random access issue to newly deployed Application Server in DMZ's Application Server Farm Tier and
blames DMZ
Security Gateway as root cause. The ticket has been created and issue is at Pamela's desk for an investigation. Pamela decides to use Check
Point's Packet
Analyzer Tool-fw monitor to iron out the issue during approved Maintenance window.
What do you recommend as the best suggestion for Pamela to make sure she successfully captures entire tra c in context of Firewall and
problematic tra c?
A. Pamela should check SecureXL status on DMZ Security gateway and if it's turned ON. She should turn OFF SecureXL before using fw
monitor to avoid misleading tra c captures.
B. Pamela should check SecureXL status on DMZ Security Gateway and if it's turned OFF. She should turn ON SecureXL before using fw
monitor to avoid misleading tra c captures.
C. Pamela should use tcpdump over fw monitor tool as tcpdump works at OS-level and captures entire tra c.
D. Pamela should use snoop over fw monitor tool as snoop works at NIC driver level and captures entire tra c.
Question #215 Topic 1
Fill in the blank: The "fw monitor" tool can be best used to troubleshoot ____________________.
A. AV issues
B. VPN errors
C. Network issues
D. Authentication issues
A. only the primary member received packets sent to the cluster IP address
B. only the secondary member receives packets sent to the cluster IP address
C. packets sent to the cluster IP address are distributed equally between all members of the cluster
D. every member of the cluster received all of the packets sent to the cluster IP address
What kind of information would you expect to see using the sim a nity command?
B. The involved rewall kernel modules in inbound and outbound packet chain
What cloud-based SandBlast Mobile application is used to register new devices and users?
B. Management Dashboard
A. Stateful Packets
B. No Match
C. All Packets
D. Stateless Packets
Which le gives you a list of all security servers in use, including port number?
A. $FWDIR/conf/conf.conf
B. $FWDIR/conf/servers.conf
C. $FWDIR/conf/fwauthd.conf
D. $FWDIR/conf/serversd.conf
Question #223 Topic 1
A. cpwd_admin -l
B. cpwd -l
C. cpwd admin_list
D. cpwd_admin list
What is the valid range for VRID value in VRRP con guration?
A. 1 - 254
B. 1 - 255
C. 0 - 254
D. 0 - 255
A. By default the API-server is activated and does not have hardware requirements.
B. By default the API-server is not active and should be activated from the WebUI.
C. By default the API server is active on management and stand-alone servers with 16GB of RAM (or more).
D. By default, the API server is active on management servers with 4 GB of RAM (or more) and on stand-alone servers with 8GB of RAM (or
more).
To ensure that VMAC mode is enabled, which CLI command should you run on all cluster members?
B. fw ctl get int vmac global param enabled; result of command should return value 1
C. cphaprob-a if
For best practices, what is the recommended time for automatic unlocking of locked admin accounts?
A. 20 minutes
B. 15 minutes
D. 30 minutes at least
A. SmartEvent Server
B. Correlation Unit
C. Log Consolidator
D. Log Server
Check Point APIs allow system engineers and developers to make changes to their organization's security policy with CLI tools and Web Services
for all the following except:
D. Create products that use and enhance the Check Point Solution
When SecureXL is enabled, all packets should be accelerated, except packets that match the following conditions:
C. All packets that match a rule whose source or destination is the Outside Corporate Network
D. CIFS packets
Question #231 Topic 1
A. TCP 857
B. TCP 18192
C. TCP 900
D. TCP 19009
B. Ensure the Check Point SandBlast services is running on the end user's system
C. If malware enters an end user's system, the SandBlast Agent prevents the malware from spreading with the network
What is correct statement about Security Gateway and Security Management Server failover in Check Point R80.X in terms of Check Point
Redundancy driven solution?
A. Security Gateway failover is an automatic procedure but Security Management Server failover is a manual procedure.
B. Security Gateway failover as well as Security Management Server failover is a manual procedure.
C. Security Gateway failover is a manual procedure but Security Management Server failover is an automatic procedure.
D. Security Gateway failover as well as Security Management Server failover is an automatic procedure.
B. DMZ server
C. Cloud
D. Email servers
Question #235 Topic 1
A. cpm status
B. api restart
C. api status
In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log,
Detailed Log and Extended Log?
A. Accounting
B. Suppression
C. Accounting/Suppression
D. Accounting/Extended
Which le contains the host address to be published, the MAC address that needs to be associated with the IP Address, and the unique IP of the
interface that responds to ARP request?
A. /opt/CPshrd-R80/conf/local.arp
B. /var/opt/CPshrd-R80/conf/local.arp
C. $CPDIR/conf/local.arp
D. $FWDIR/conf/local.arp
With SecureXL enabled, accelerated packets will pass through the following:
A. Network Interface Card, OSI Network Layer, OS IP Stack, and the Acceleration Device
B. Network Interface Card, Check Point Firewall Kernal, and the Acceleration Device
D. Network Interface Card, OSI Network Layer, and the Acceleration Device
Question #239 Topic 1
Which command would you use to set the network interfaces' a nity in Manual mode?
A. sim a nity -m
B. sim a nity -l
C. sim a nity -a
D. sim a nity -s
You notice that your rewall is under a DDoS attack and would like to enable the Penalty Box feature, which command you use?
In SmartEvent, which of the following is NOT an option to calculate the tra c direction?
A. Incoming
B. Internal
C. External
D. Outgoing
A. cpmq get
C. cpmq set
When deploying SandBlast, how would a Threat Emulation appliance bene t from the integration of ThreatCloud?
A. ThreatCloud is a database-related application which is located on-premise to preserve privacy of company-related data
B. ThreatCloud is a collaboration platform for all the CheckPoint customers to form a virtual cloud consisting of a combination of all on-
premise private cloud environments
C. ThreatCloud is a collaboration platform for Check Point customers to bene t from VMWare ESXi infrastructure which supports the Threat
Emulation Appliances as virtual machines in the EMC Cloud
D. ThreatCloud is a collaboration platform for all the Check Point customers to share information about malicious and benign les that all of
the customers can bene t from as it makes emulation of known les unnecessary
During the Check Point Stateful Inspection Process, for packets that do not pass Firewall Kernel Inspection and are rejected by the rule de nition,
packets are:
Vanessa is rewall administrator in her company. Her company is using Check Point rewall on a central and several remote locations which are
managed centrally by R77.30 Security Management Server. On central location is installed R77.30 Gateway on Open server. Remote locations are
using Check Point UTM-
1570 series appliances with R75.30 and some of them are using a UTM-1-Edge-X or Edge-W with latest available rmware. She is in process of
migrating to R80.
What can cause Vanessa unnecessary problems, if she didn't check all requirements for migration to R80?
Please choose the path to monitor the compliance status of the Check Point R80.10 based management.
C. Logs & Monitor --> New Tab --> Open compliance View
When using CPSTAT, what is the default port used by the AMON server?
A. 18191
B. 18192
C. 18194
D. 18190
A. Cpstop then nd keyword "certi cate" in objects_5_0.C and delete the section
Check Point security components are divided into the following components:
You have a Geo-Protection policy blocking Australia and a number of other countries. Your network now requires a Check Point Firewall to be
installed in Sydney,
Australia.
What must you do to get SIC to work?
A. Remove Geo-Protection, as the IP-to-country database is updated externally, and you have no control of this.
B. Create a rule at the top in the Sydney rewall to allow control tra c from your network
D. Create a rule at the top in your Check Point rewall to bypass the Geo-Protection
Question #251 Topic 1
In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which speci es the type of tra c applicable to the chain module.
For Stateful
Mode con guration, chain modules marked with __________________ will not apply.
A. ffff
B. 1
C. 3
D. 2
A. SSL VPN is using HTTPS in addition to IKE, whereas IPSec VPN is clientless
B. SSL VPN adds an extra VPN header to the packet, IPSec VPN does not
C. IPSec VPN does not support two factor authentication, SSL VPN does support this
D. IPSec VPN uses an additional virtual adapter; SSL VPN uses the client network adapter only.
In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?
You have a Gateway is running with 2 cores. You plan to add a second gateway to build a cluster and used a device with 4 cores.
How many cores can be used in a Cluster for Firewall-kernel on the new device?
A. 3
B. 2
C. 1
D. 4
Question #255 Topic 1
B. Manual/Pre-Automatic NAT
What is the most ideal Synchronization Status for Security Management Server High Availability deployment?
A. Lagging
B. Synchronized
D. Collision
Joey wants to upgrade from R75.40 to R80 version of Security management. He will use Advanced Upgrade with Database Migration method to
achieve this.
What is one of the requirements for his success?
A. Size of the /var/log folder of the source machine must be at least 25% of the size of the /var/log directory on the target machine
B. Size of the /var/log folder of the target machine must be at least 25% of the size of the /var/log directory on the source machine
C. Size of the $FWDIR/log folder of the target machine must be at least 30% of the size of the $FWDIR/log directory on the source machine
D. Size of the /var/log folder of the target machine must be at least 25GB or more
A. Gateway API
B. Management API
C. OPSEC SDK
SmartEvent provides a convenient way to run common command line executables that can assist in investigating events. Right-clicking the IP
address, source or destination, in an event provides a list of default and customized commands. They appear only on cells that refer to IP
addresses because the IP address of the active cell is used as the destination of the command when run. The default commands are:
What is the minimum amount of RAM needed for a Threat Prevention Appliance?
A. 6 GB
C. 4 GB
A. Slow path
B. Firewall path
C. Medium path
D. Accelerated path
Capsule Connect and Capsule Workspace both offer secured connection for remote users who are using their mobile devices. However, there are
differences between the two.
Which of the following statements correctly identify each product's capabilities?
A. Workspace supports ios operating system, Android, and WP8, whereas Connect supports ios operating system and Android only
B. For compliance/host checking, Workspace offers the MDM cooperative enforcement, whereas Connect offers both jailbreak/root detection
and MDM cooperative enforcement.
C. For credential protection, Connect uses One-time Password login support and has no SSO support, whereas Workspace offers both One-
Time Password login support as well as SSO for speci c applications.
D. Workspace can support any application, whereas Connect has a limited number of application types which it will support.
A. migrate export
B. upgrade_tools verify
C. pre_upgrade_veri er
D. migrate import
GAiA Software update packages can be imported and installed o ine in situation where:
A. Security Gateway with GAiA does NOT have SFTP access to Internet
C. Security Gateway with GAiA does NOT have SSH access to Internet.
D. The desired CPUSE package is ONLY available in the Check Point CLOUD.
Question #267 Topic 1
What statement best describes the Proxy ARP feature for Manual NAT in R80.10?
The system administrator of a company is trying to nd out why acceleration is not working for the tra c. The tra c is allowed according to the
rule base and checked for viruses. But it is not accelerated.
What is the most likely reason that the tra c is not accelerated?
A. SmartEvent Maps
B. SmartEvent
C. Identity Awareness
D. SmartConsole Toolbars
A. SmartView Monitor
B. WebUI
C. SmartUpdate
D. SmartProvisioning
Question #271 Topic 1
Vanessa is a Firewall administrator. She wants to test a backup of her company's production Firewall cluster Dallas_GW. She has a lab
environment that is identical to her production environment. She decided to restore production backup via SmartConsole in lab environment.
Which details she need to ll in System Restore window before she can click OK button and test the backup?
Fill in the blanks. There are ________ types of software containers: ___________.
Which of the following technologies extracts detailed information from packets and stores that information in state tables?
A. INSPECT Engine
B. Stateful Inspection
C. Packet Filtering
Which tool provides a list of trusted les to the administrator so they can specify to the Threat Prevention blade that these les do not need to be
scanned or analyzed?
A. ThreatWiki
B. Whitelist Files
C. AppWiki
D. IPS Protections
Question #275 Topic 1
Which Check Point software blade provides Application Security and identity control?
A. Identity Awareness
C. URL Filtering
D. Application Control
What is UserCheck?
B. Communication tool used to inform a user about a website or application they are trying to access.
A. SNMP
B. High alert
C. Mail
What does it mean if Deyra sees the gateway status? (Choose the BEST answer.)
A. 2
B. 7
C. 6
D. 4
Ken wants to obtain a con guration lock from other administrator on R80 Security Management Server. He can do this via WebUI or via CLI.
Which command should he use in CLI? (Choose the correct answer.)
D. The database feature has two commands lock database override and unlock database. Both will work.
Question #282 Topic 1
What will be the effect of running the following command on the Security Management Server?
C. No effect.
Which of the following is NOT a VPN routing option available in a star community?
B. To center, or through the center to other satellites, to Internet and other VPN targets.
D. To center only.
Fill in the blank. Once a certi cate is revoked from the Security Gateway by the Security Management Server, the certi cate information is ________
.
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?
B. The Security Gateway name cannot be changed in command line without re-establishing trust.
C. The Security Management Server name cannot be changed in SmartConsole without re-establishing trust.
D. The Security Management Server IP-address cannot be changed without re-establishing the trust.
Question #286 Topic 1
Which Check Point feature enables application scanning and the detection?
A. Application Dictionary
B. AppWiki
C. Application Library
D. CPApp
A. Manage Setting
B. Security Policies
Fill in the blank: The R80 SmartConsole, SmartEvent GUI client, and _______ consolidate billions of logs and shows then as prioritized security
events.
A. SmartMonitor
C. SmartReporter
D. SmartTracker
Question #290 Topic 1
A. SecurID client assigns a routable MAC address. After the user authenticates for a tunnel, the VPN gateway assigns a routable IP address to
the remote client.
B. Users authenticate with an Internet browser and use secure HTTPS connection.
C. Local ISP (Internet service Provider) assigns a non-routable IP address to the remote user.
D. Allows a security gateway to assign a remote client an IP address. After the user authenticates for a tunnel, the VPN gateway assigns a
routable IP address to the remote client.
When attempting to start a VPN tunnel, in the logs the error "no proposal chosen" is seen numerous times. No other VPN-related entries are
present.
Which phase of the VPN negotiations has failed?
A. IKE Phase 1
B. IPSEC Phase 2
C. IPSEC Phase 1
D. IKE Phase 2
Which of the following Windows Security Events will not map a username to an IP address in Identity Awareness?
C. Account Logon
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ________ .
A. User Directory
C. Captive Portal
D. UserCheck
Question #294 Topic 1
The ____ software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware.
A. SmartUpdate
B. cpcon g
C. SmartConsole
D. syscon g
A. 2
B. 4
C. 1
D. 3
A. A lock icon shows that a rule or an object is locked and will be available.
B. AdminA and AdminB are editing the same rule at the same time.
C. A lock icon next to a rule informs that any Administrator is working on this particular rule.
D. AdminA, AdminB and AdminC are editing three different rules at the same time.
Question #298 Topic 1
After the initial installation on Check Point appliance, you notice that the Management-interface and default gateway are incorrect.
Which commands could you use to set the IP to 192.168.80.200/24 and default gateway to 192.168.80.1.
A. set interface Mgmt ipv4-address 192.168.80.200 mask-length 24 set static-route default nexthop gateway address 192.168.80.1 on save
con g
B. set interface Mgmt ipv4-address 192.168.80.200 255.255.255.0 add static-route 0.0.0.0. 0.0.0.0 gw 192.168.80.1 on save con g
C. set interface Mgmt ipv4-address 192.168.80.200 255.255.255.0 set static-route 0.0.0.0. 0.0.0.0 gw 192.168.80.1 on save con g
D. set interface Mgmt ipv4-address 192.168.80.200 mask-length 24 add static-route default nexthop gateway address 192.168.80.1 on save
con g
Tom has connected to the R80 Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when
he suddenly loses connectivity. Connectivity is restored shortly afterward.
What will happen to the changes already made?
A. Tom's changes will have been stored on the Management when he reconnects and he will not lose any of his work.
B. Tom will have to reboot his SmartConsole computer, and access the Management cache store on that computer, which is only accessible
after a reboot.
C. Tom's changes will be lost since he lost connectivity and he will have to start again.
D. Tom will have to reboot his SmartConsole computer, clear to cache, and restore changes.
What key is used to save the current CPView page in a lename format cpview_"cpview process ID".cap"number of captures"?
A. S
B. W
C. C
D. Space bar
Question #301 Topic 1
B. Based on Active Directory integration which allows the Security Gateway to correlate Active Directory users and machines to IP addresses
in a method that is completely transparent to the user.
D. The ports 443 or 80 what will be used by Browser-Based and con gured Authentication.
Question #302 Topic 1
Which of the completed statements is NOT true? The WebUI can be used to manage user accounts and:
D. assign user rights to their home directory in the Security Management Server.
In the Check Point Security Management Architecture, which component(s) can store logs?
A. SmartConsole
View the rule below. What does the lock-symbol in the left column mean? (Choose the BEST answer.)
C. Con guration lock is present. Click the lock symbol to gain read-write access.
D. The current administrator is logged in as read-only because someone else is editing the policy.
A. 80
B. 4434
C. 443
D. 8080
Question #306 Topic 1
Which VPN routing option uses VPN routing for every connection a satellite gateway handles?
B. To center only
D. To center, or through the center to other satellites, to Internet and other VPN targets
Ko , the administrator of the ALPHA Corp network wishes to change the default Gaia WebUI Portal port number currently set on the default HTTPS
port. Which
CLISH commands are required to be able to change this TCP port?
Joey want to con gure NTP on R80 Security Management Server. He decided to do this via WebUI. What is the correct address to access the Web
UI for Gaia platform via browser?
A. https://<Device_IP_Adress>
B. http://<Device IP_Address>:443
C. https://<Device_IP_Address>:10000
D. https://<Device_IP_Address>:4434
Question #309 Topic 1
The "Hit count" feature allows tracking the number of connections that each rule matches. Will the Hit count feature work independently from
logging and Track the hits if the Track option is set to "None"?
A. No, it will work independently. Hit Count will be shown only for rules Track option set as Log or alert.
B. Yes it will work independently as long as "analyze all rules" tick box is enabled on the Security Gateway.
C. No, it will not work independently because hit count requires all rules to be logged.
D. Yes it will work independently because when you enable Hit Count, the SMS collects the data from supported Security Gateways.
Fill in the blank: Permanent VPN tunnels can be set on all tunnels in the community, on all tunnels for speci c gateways, or ______ .
True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway.
D. True, Central License can be installed with CPLIC command on a Security Gateway
In which VPN community is a satellite VPN gateway not allowed to create a VPN tunnel with another satellite VPN gateway?
A. Pentagon
B. Combined
C. Meshed
D. Star
Question #313 Topic 1
When a packet arrives at the gateway, the gateway checks it against the rules in the hop Policy Layer, sequentially from top to bottom, and
enforces the rst rule that matches a packet. Which of the following statements about the order of rule enforcement is true?
A. If the Action is Accept, the gateway allows the packet to pass through the gateway.
B. If the Action is Drop, the gateway continues to check rules in the next Policy Layer down.
C. If the Action is Accept, the gateway continues to check rules in the next Policy Layer down.
D. If the Action is Drop, the gateway applies the Implicit Clean-up Rule for that Policy Layer.
Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?
A. UserCheck
A. A new Policy Package created on both the Management and Gateway will be deleted and must be backed up rst before proceeding.
B. A new Policy Package created on the Management is going to be installed to the existing Gateway.
C. A new Policy Package created on the Gateway is going to be installed on the existing Management.
D. A new Policy Package created on the Gateway and transferred to the Management will be overwritten by the Policy Package currently on the
Gateway but can be restored from a periodic backup on the Gateway.
Which option, when applied to a rule, allows tra c to VPN gateways in speci c VPN communities?
Fill in the blank: An identity server uses a __________ for user authentication.
A. Shared secret
B. Certi cate
C. One-time password
D. Token
In SmartConsole, objects are used to represent physical and virtual network components and also some logical components. These objects are
divided into several categories. Which of the following is NOT an objects category?
A. Limit
B. Resource
D. Network Object
Which of the following blades is NOT subscription-based and therefore does not have to be renewed on a regular basis?
A. Application Control
B. Threat Emulation
C. Anti-Virus
Fill in the blank: __________ information is included in "Full Log" tracking option, but is not included in "Log" tracking option?
A. Destination port
B. Data type
C. File attributes
D. Application
Which options are given on features, when editing a Role on Gaia Platform?
C. Read/Write, None
Fill in the blanks: Gaia can be con gured using the ______ or _____ .
A. Monitor
B. CLI.sh
C. Read-only
D. Bash
You have created a rule at the top of your Rule Base to permit Guest Wireless access to the Internet. However, when guest users attempt to reach
the Internet, they are not seeing the splash page to accept your Terms of Service, and cannot access the Internet. How can you x this?
A. Right click Accept in the rule, select "More", and then check "˜Enable Identity Captive Portal'.
B. On the rewall object, Legacy Authentication screen, check "˜Enable Identity Captive Portal'.
C. In the Captive Portal screen of Global Properties, check "˜Enable Identity Captive Portal'.
D. On the Security Management Server object, check the box "˜Identity Logging'.
Fill in the blank: A new license should be generated and installed in all of the following situations EXCEPT when ________ .
Which Check Point software blade provides protection from zero-day and undiscovered threats?
A. Firewall
B. Threat Emulation
C. Application Control
D. Threat Extraction
Question #329 Topic 1
If there are two administration logged in at the same time to the SmartConsole, and there are objects locked for editing, what must be done to
make them available or other administrators? (Choose the BEST answer.)
Fill in the blanks: A _______ license requires an administrator to designate a gateway for attachment whereas a ________ license is automatically
attached to a
Security Gateway.
A. Formal; corporate
B. Local; formal
C. Local; central
D. Central; local
An administrator is creating an IPsec site-to-site VPN between his corporate o ce and branch o ce. Both o ces are protected by Check Point
Security Gateway managed by the same Security Management Server. While con guring the VPN community to specify the pre-shared secret the
administrator found that the check box to enable pre-shared secret and cannot be enabled.
Why does it not allow him to specify the pre-shared secret?
B. Pre-shared can only be used while creating a VPN between a third party vendor and Check Point Security Gateway.
C. Certi cate based Authentication is the only authentication method available between two Security Gateway managed by the same SMS.
A. User groups
C. Individual users
How is communication between different Check Point components secured in R80? As with all questions, select the BEST answer.
A. By using IPSEC
B. By using SIC
C. By using ICA
D. By using 3DES
You work as a security administrator for a large company. CSO of your company has attended a security conference where he has learnt how
hackers constantly modify their strategies and techniques to evade detection and reach corporate resources. He wants to make sure that his
company has the tight protections in place. Check Point has been selected for the security vendor.
Which Check Point product protects BEST against malware and zero-day attacks while ensuring quick delivery of safe content to your users?
D. SandBlast
You have enabled "Full Log" as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST
likely reason?
A. Logging has disk space issues. Change logging storage options on the logging server or Security Management Server properties and install
database.
Which feature is NOT provided by all Check Point Mobile Access solutions?
D. Secure connectivity
A. Terminal
B. Light
C. Full
D. Custom
What can we infer about the recent changes made to the Rule Base?
B. 8 changes have been made by administrators since the last policy installation
In the R80 SmartConsole, on which tab are Permissions and Administrators de ned?
A. Security Policies
Fill in the blank: A ________ VPN deployment is used to provide remote users with secure access to internal corporate resources by authenticating
the user through an internet browser.
D. Direct access
What needs to be con gured if the NAT property "˜Translate destination or client side' is not enabled in Global Properties?
B. Use the le local.arp to add the ARP entries for NAT to work.
Which pre-de ned Permission Pro le should be assigned to an administrator that requires full access to audit all con gurations without modifying
them?
A. Auditor
C. Super User
D. Full Access
When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?
A. RADIUS
C. AD Query
True or False: In R80, more than one administrator can login to the Security Management Server with write permission at the same time.
B. True, every administrator works in a session that is independent of the other administrators.
C. True, every administrator works on a different database that is independent of the other administrators.
Which utility allows you to con gure the DHCP service on Gaia from the command line?
A. ifcon g
B. dhcp_ofg
C. syscon g
D. cpcon g
Question #348 Topic 1
There are two R77.30 Security Gateways in the Firewall Cluster. They are named FW_A and FW_B. The cluster is con gured to work as HA (High
availability) with default cluster con guration. FW_A is con gured to have higher priority than FW_B. FW_A was active and processing the tra c in
the morning. FW_B was standby. Around 1100 am, its interfaces went down and this caused a failover. FW_B became active. After an hour, FW_A's
interface issues were resolved and it became operational.
When it re-joins the cluster, will it become active automatically?
A. No, since "˜maintain' current active cluster member' option on the cluster object properties is enabled by default.
B. No, since "˜maintain' current active cluster member' option is enabled by default on the Global Properties.
C. Yes, since "˜Switch to higher priority cluster member' option on the cluster object properties is enabled by default.
D. Yes, since "˜Switch to higher priority cluster member' option is enabled by default on the Global Properties.
A. Standard Policies
B. Shared Policies
C. Inspection Policies
D. Uni ed Policies
Fill in the blank: The IPS policy for pre-R80 gateways is installed during the _______ .
How many users can have read/write access in Gaia at one time?
A. In nite
B. One
C. Three
D. Two
Question #352 Topic 1
Which software blade does NOT accompany the Threat Prevention policy?
A. Anti-virus
B. IPS
C. Threat Emulation
To optimize Rule Base e ciency, the most hit rules should be where?
What two ordered layers make up the Access Control Policy Layer?
Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is ____ all tra c. However, in the Application Control policy
layer, the default action is ______ all tra c.
A. Accept; redirect
B. Accept; drop
C. Redirect; drop
D. Drop; accept
A. Expert
B. Clish
C. Admin
D. Normal
You plan to automate creating new objects using new R80 Management API. You decide to use GAIA CLI for this task.
What is the rst step to run management API commands on GAIA's shell?
B. mgmt_login
B. Anti-Bot Blade
When users connect to the Mobile Access portal they are unable to open File Shares.
Which log le would you want to examine?
A. cvpnd.elg
B. httpd.elg
C. vpnd.elg
D. fw.elg
What is the correct order of the default "fw monitor" inspection points?
A. i, I, o, O
B. 1, 2, 3, 4
C. i, o, I, O
D. I, i, O, o
A. 20000
B. 35000
C. 25000
D. 10000
Question #364 Topic 1
What are types of Check Point APIs available currently as part of R80.10 code?
A. Security Gateway API Management API, Threat Prevention API and Identity Awareness Web Services API
B. Management API, Threat Prevention API, Identity Awareness Web Services API and OPSEC SDK API
C. OSE API, OPSEC SDK API, Threat Extraction API and Policy Editor API
D. CPMI API, Management API, Threat Prevention API and Identity Awareness Web Services API
Vanessa is expecting a very important Security Report. The Document should be sent as an attachment via e-mail. An e-mail with
Security_report.pdf le was delivered to her e-mail inbox. When she opened the PDF le, she noticed that the le is basically empty and only few
lines of text are in it. The report is missing some graphs, tables and links.
Which component of SandBlast protection is her company using on a Gateway?
B. SandBlast Agent
If an administrator wants to add manual NAT for addresses now owned by the Check Point rewall, what else is necessary to be completed for it
to function properly?
How many interfaces can you con gure to use the Multi-Queue feature?
A. 10 interfaces
B. 3 interfaces
C. 4 interfaces
D. 5 interfaces
Question #368 Topic 1
A. fwd
B. fwm
C. cpm
D. cpd
How long may veri cation of one le take for Sandblast Threat Emulation?
A. up to 1 minutes
C. up to 5 minutes
D. up to 3 minutes
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new CPU to replace the existing single core
CPU. After installation, is the administrator required to perform any additional tasks?
B. Go to clash-Run cpcon g | Con gure CoreXL to make use of the additional Cores | Exit cpcon g | Reboot Security Gateway
C. Administrator does not need to perform any task. Check Point will make use of the newly installed CPU and Cores
D. Go to clash-Run cpcon g | Con gure CoreXL to make use of the additional Cores | Exit cpcon g | Reboot Security Gateway | Install Security
Policy
GAIA greatly increases operational e ciency by offering an advanced and intuitive software update agent, commonly referred to as the:
Hit Count is a feature to track the number of connections that each rule matches, which one is not bene t of Hit Count.
B. Improve Firewall performance - You can move a rule that has hot count to a higher position in the Rule Base
D. Analyze a Rule Base - You can delete rules that have no matching connections
You need to change the MAC-address on eth2 interface of the gateway. What command and what mode will you use to achieve this goal?
C. Policy Installation Date, view install changes and install speci c version
You are the administrator for ABC Corp. You have logged into your R80 Management server. You are making some changes in the Rule Base and
notice that rule
No.6 has a pencil icon next to it.
What does this mean?
A. This rule No. 6 has been marked for deletion in your Management session.
B. This rule No. 6 has been marked for deletion in another Management session.
C. This rule No. 6 has been marked for editing in your Management session.
D. This rule No. 6 has been marked for editing in another Management session.
By default how often updates are checked when the CPUSE Software Updates Policy is set to Automatic?
In terms of Order Rule Enforcement, when a packet arrives at the gateway, the gateway checks it against the rules in the top Policy Layer,
sequentially from top to bottom. Which of the following statements is correct?
A. If the Action of the matching rule is Accept, the gateway will drop the packet.
B. If the Action of the matching rule is Drop, the gateway continues to check rules in the next Policy Layer down.
C. If the Action of the matching rule is Drop, the gateway stops matching against later rules in the Policy Rule Base and drops the packet.
D. If the rule does not matched in the Network policy it will continue to other enabled policies
Question #378 Topic 1
The back end database for Check Point R80 Management uses:
A. DBMS
B. MongoDB
C. PostgreSQL
D. MySQL
UserCheck objects in the Application Control and URL Filtering rules allow the gateway to communicate with the users. Which action is not
supported in
UserCheck objects?
A. Ask
B. Drop
C. Inform
D. Reject
Choose the correct syntax to add a new host named "emailserver1" with IP address 10.50.23.90 using GAiA Management CLI?
Within the Check Point Firewall Kernel resides Chain Modules, which are individually responsible for the inspection of a speci c blade or feature
that has been enabled in the con guration of the gateway. For Wire mode con guration, chain modules marked with _______ will not apply.
A. ffffffff
B. 00000001
C. 00000002
D. 00000003
Question #382 Topic 1
In Advanced Permanent Tunnel Con guration, to set the amount of time the tunnel test runs without a response before the peer host is declared
"˜down', you would set the_________?
C. life_sign_polling_interval
D. life_sign_timeout
A. Firewall > Correlation Unit > Log Server > SmartEvent Server Database > SmartEvent Client
B. Firewall > SmartEvent Server Database > Correlation Unit > Log Server > SmartEvent Client
C. Firewall > Log Server > SmartEvent Server Database > Correlation Unit > SmartEvent Client
D. Firewall > Log Server > Correlation Unit > SmartEvent Server Database > SmartEvent Client
CoreXL is NOT supported when one of the following features is enabled: (Choose three)
A. Route-based VPN
B. IPS
C. IPv6
D. Overlapping NAT
Question #386 Topic 1
Which Check Point daemon invokes and monitors critical processes and attempts to restart them if they fail?
A. fwm
B. cpd
C. cpwd
D. cpm
You have pushed policy to GW-3 and now cannot pass tra c through the gateway. As a last resort, to restore tra c ow, what command would
you run to remove the latest policy from GW-3?
A. fw unloadlocal
B. fw unloadpolicy
If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to
prevent data loss.
Providing the Active Security Management Server is responsive, which if these steps should NOT be performed:
A. Rename the hostname of the Standby member to match exactly the hostname of the Active member.
A. Authentication requests
B. CPMI dbsync
C. Logs
D. Event Policy
Which component is NOT required to communicate with the Web Services API?
A. API key
B. session ID token
C. content-type
D. Request payload
D. O ine installations
What are the available options for downloading Check Point hot xes in Gaia WebUI (CPUSE)?
Aaron is a Cyber Security Engineer working for Global Law Firm with large scale deployment of Check Point Enterprise Appliances running GaiA
R80.X. The
Network Security Developer Team is having an issue testing the API with a newly deployed R80.X Security Management Server. Aaron wants to
con rm API services are working properly. What should he do rst?
A. Aaron should check API Server status with "fwm api status" from Expert mode. If services are stopped, he should start them with "fwm api
start".
B. Aaron should check API Server status with "cpapi status" from Expert mode. If services are stopped, he should start them with "cpapi
start".
C. Aaron should check API Server status with "api status" from Expert mode. If services are stopped, he should start them with "api start".
D. Aaron should check API Server status with "cpm api status" from Expert mode. If services are stopped, he should start them with "cpi api
start".
A. top
B. cptop
C. cphaprob list
D. cpws_admin list
After verifying that API Server is not running, how can you start the API Server?
A. Passive path
B. Medium path
C. Firewall path
D. Accelerated path
Question #398 Topic 1
A. Cluster Object -> Edit -> ClusterXL and VRRP -> Use Virtual MAC
D. Cluster Object -> Edit -> Cluster Members -> Edit -> Use Virtual MAC
Installations and upgrades with CPUSE require that the CPUSE agent is up-to-date. Usually the latest build is downloaded automatically. How can
you verify the
CPUSE agent build?
A. In WebUI Status and Actions page or by running the following command in CLISH: show installer status build
B. In WebUI Status and Actions page or by running the following command in CLISH: show installer status version
C. In the Management Server or Gateway object in SmartConsole or by running the following command in CLISH: show installer status build
D. In the Management Server or Gateway object in SmartConsole or by running the following command in CLISH: show installer agent
When con guring SmartEvent Initial settings, you must specify a basic topology to SmartEvent to help it calculate tra c direction for events. What
is this setting called, and what are you de ning?
Steve is a Cyber Security Engineer working for Global Bank with a large scale deployment of Check Point Enterprise Appliances. Steve's manager,
Diana, asks him to provide rewall connection table details from one of the rewalls for which he is responsible. Which of these commands may
impact performance brie y and should not be used during heavy tra c times of day?
SandBlast offers busineses exibility in implementation based on their individual business needs. What is an option for deployment of Check
Point SandBlast
Zero-Day Protection?
John detected high load on sync interface. Which is most recommended solution?
D. For short connections like icmp service "" delay sync for 2 seconds
A. Source address
B. Protocol
C. Destination port
D. VLAN tag
Question #406 Topic 1
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing
single core CPU.
After installation, is the administrator required to perform any additional tasks?
B. After upgrading the hardware, increase the number of kernel instances using cpcon g
C. Administrator does not need to perform any task. Check Point will make use of the newly installed CPU and Cores
Packet acceleration (SecureXL) identi es connections by several attributes. Which of the attributes is NOT used for identifying connection?
A. Source Address
B. Destination Address
D. Source Port
There are 4 ways to use the Management API for creating host object with R80 Management API. Which one is NOT correct?
B. Using cpcon g
C. Using CLISH
Question #1 Topic 2
What is the valid range for VRID value in VRRP con guration?
A. 1-254
B. 1-255
C. 0-254
D. 0-255
Question #2 Topic 2
A. Incoming
B. Internal
C. External
D. Outgoing