You are on page 1of 88

Question #1Topic 1

Identify the API that is not supported by Check Point currently.

 A. R80 Management API


 B. Identity Awareness Web Services API
 C. Open REST API
 D. OPSEC SDK

Hide Solution    Discussion  

Correct Answer: C

Question #2Topic 1
SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-
based algorithms and has four dedicated components that constantly work together to protect
mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?

 A. Management Dashboard
 B. Gateway
 C. Personal User Storage
 D. Behavior Risk Engine

Hide Solution    Discussion  


Correct Answer: C
Reference:
https://community.checkpoint.com/docs/DOC-3072-sandblast-mobile-architecture-overview

Question #3Topic 1
What are the different command sources that allow you to communicate with the API server?

 A. SmartView Monitor, API_cli Tool, Gaia CLI, Web Services


 B. SmartConsole GUI Console, mgmt._cli Tool, Gaia CLI, Web Services
 C. SmartConsole GUI Console, API_cli Tool, Gaia CLI, Web Services
 D. API_cli Tool, Gaia CLI, Web Services

Hide Solution    Discussion  


Correct Answer: B
Reference:
https://sc1.checkpoint.com/documents/R80/APIs/#introduction%20
Question #4Topic 1
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL
Filtering, Anti-Virus, IPS, and Threat Emulation?

 A. Anti-Bot is the only countermeasure against unknown malware


 B. Anti-Bot is the only protection mechanism which starts a counter-attack against known
Command & Control Centers
 C. Anti-Bot is the only signature-based method of malware protection.
 D. Anti-Bot is a post-infection malware protection to prevent a host from establishing a
connection to a Command & Control Center.

Hide Solution    Discussion  


Correct Answer: D
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_AntiBotAntiVirus_AdminGuide/index.html

Question #5Topic 1
Which TCP-port does CPM process listen to?

 A. 18191
 B. 18190
 C. 8983
 D. 19009

Hide Solution    Discussion  


Correct Answer: D
Reference:
https://www.checkpoint.com/downloads/products/r80.10-security-management-architecture-
overview.pdf

Question #6Topic 1
Which method below is NOT one of the ways to communicate using the Management API's?

 A. Typing API commands using the "mgmt_cli" command


 B. Typing API commands from a dialog box inside the SmartConsole GUI application
 C. Typing API commands using Gaia's secure shell(clish)19+
 D. Sending API commands over an http connection using web-services
Hide Solution    Discussion  
Correct Answer: D
Reference:
https://sc1.checkpoint.com/documents/R80/APIs/#introduction%20

Question #7Topic 1
Your manager asked you to check the status of SecureXL, and its enable templates and features,
what command will you use to provide such information to manager?

 A. fw accel stat


 B. fwaccel stat
 C. fw acces stats
 D. fwaccel stats

Hide Solution    Discussion  


Correct Answer: B
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk41397

Question #8Topic 1
SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote
user's machine via the web browser. What are the two modes of
SNX?

 A. Application and Client Service


 B. Network and Application
 C. Network and Layers
 D. Virtual Adapter and Mobile App

Hide Solution    Discussion  


Correct Answer: B
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk67820

Question #9Topic 1
Which command would disable a Cluster Member permanently?
 A. clusterXL_admin down
 B. cphaprob_admin down
 C. clusterXL_admin down-p
 D. set clusterXL down-p

Hide Solution     Discussion   2

Correct Answer: C

Question #10Topic 1
Which two of these Check Point Protocols are used by SmartEvent Processes?

 A. ELA and CPD


 B. FWD and LEA
 C. FWD and CPLOG
 D. ELA and CPLOG

Hide Solution    Discussion  

Correct Answer: D

Question #11Topic 1
Fill in the blank: The tool ________ generates a R80 Security Gateway configuration report.

 A. infoCP
 B. infoview
 C. cpinfo
 D. fw cpinfo

Hide Solution    Discussion  

Correct Answer: C

Question #12Topic 1
Which of these statements describes the Check Point ThreatCloud?

 A. Blocks or limits usage of web applications


 B. Prevents or controls access to web sites based on category
 C. Prevents Cloud vulnerability exploits
 D. A worldwide collaborative security network

Hide Solution    Discussion  


Correct Answer: D

Question #13Topic 1
Automatic affinity means that if SecureXL is running, the affinity for each interface is automatically
reset every

 A. 15 sec
 B. 60 sec
 C. 5 sec
 D. 30 sec

Hide Solution    Discussion  


Correct Answer: B
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_PerformanceTuning_WebAdmin/6731.htm

Question #14Topic 1
Which command will allow you to see the interface status?

 A. cphaprob interface
 B. cphaprob -I interface
 C. cphaprob -a if
 D. cphaprob stat

Hide Solution    Discussion  


Correct Answer: C
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7298.htm

Question #15Topic 1
Which command can you use to enable or disable multi-queue per interface?

 A. cpmq set
 B. Cpmqueue set
 C. Cpmq config
 D. St cpmq enable

Hide Solution    Discussion  


Correct Answer: A
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_PerformanceTuning_WebAdmin/93689.htm

Question #16Topic 1
To help SmartEvent determine whether events originated internally you must define using the
Initial Settings under General Settings in the Policy Tab. How many options are available to
calculate the traffic direction?

 A. 5 Network; Host; Objects; Services; API


 B. 3 Incoming; Outgoing; Network
 C. 2 Internal; External
 D. 4 Incoming; Outgoing; Internal; Other

Hide Solution    Discussion  


Correct Answer: D
Reference:
http://dl3.checkpoint.com/paid/21/CP_R76_SmartEventIntro_AdminGuide.pdf?
HashKey=1538417023_7cb74dfe0e109c21f130f556d419faaf&xtn=.pdf

Question #17Topic 1
There are 4 ways to use the Management API for creating host object with R80 Management API.
Which one is NOT correct?

 A. Using Web Services


 B. Using Mgmt_cli tool
 C. Using CLISH
 D. Using SmartConsole GUI console
 E. Events are collected with SmartWorkflow from Trouble Ticket systems

Hide Solution    Discussion  


Correct Answer: E
Reference:
https://sc1.checkpoint.com/documents/R80/APIs/#introduction%20

Question #18Topic 1
CoreXL is supported when one of the following features is enabled:

 A. Route-based VPN
 B. IPS
 C. IPv6
 D. Overlapping NAT

Hide Solution    Discussion  


Correct Answer: B
CoreXL does not support Check Point Suite with these features:
✑ Check Point QoS (Quality of Service)
✑ Route-based VPN
✑ IPv6 on IPSO
✑ Overlapping NAT
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_PerformanceTuning_WebAdmin/6731.htm

Question #19Topic 1
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets
were dropped. You don't have a budget to perform a hardware upgrade at this time. To optimize
drops you decide to use Priorities Queues and fully enable Dynamic Dispatcher. How can you
enable them?

 A. fw ctl multik dynamic_dispatching on


 B. fw ctl multik dynamic_dispatching set_mode 9
 C. fw ctl multik set_mode 9
 D. fw ctl multik pq enable

Hide Solution     Discussion   4


Correct Answer: C
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk105261

Question #20Topic 1
Check Point Management (cpm) is the main management process in that it provides the
architecture for a consolidates management console. CPM allows the
GUI client and management server to communicate via web services using ___________.

 A. TCP port 19009


 B. TCP Port 18190
 C. TCP Port 18191
 D. TCP Port 18209

Hide Solution    Discussion  


Correct Answer: A

Question #21Topic 1
Which command is used to set the CCP protocol to Multicast?

 A. cphaprob set_ccp multicast


 B. cphaconf set_ccp multicast
 C. cphaconf set_ccp no_broadcast
 D. cphaprob set_ccp no_broadcast

Hide Solution    Discussion  


Correct Answer: B
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk20576

Question #22Topic 1
Which packet info is ignored with Session Rate Acceleration?

 A. source port ranges


 B. source ip
 C. source port
 D. same info from Packet Acceleration is used

Hide Solution    Discussion  


Correct Answer: C
Reference:
http://trlj.blogspot.com/2015/10/check-point-acceleration.html

Question #23Topic 1
Which is the least ideal Synchronization Status for Security Management Server High Availability
deployment?

 A. Synchronized
 B. Never been synchronized
 C. Lagging
 D. Collision

Hide Solution    Discussion  


Correct Answer: D
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?
topic=documents/R80/CP_R80_SecMGMT/120712

Question #24Topic 1
During inspection of your Threat Prevention logs you find four different computers having one
event each with a Critical Severity. Which of those hosts should you try to remediate first?

 A. Host having a Critical event found by Threat Emulation


 B. Host having a Critical event found by IPS
 C. Host having a Critical event found by Antivirus
 D. Host having a Critical event found by Anti-Bot

Hide Solution    Discussion  

Correct Answer: D

Question #25Topic 1
In R80 spoofing is defined as a method of:

 A. Disguising an illegal IP address behind an authorized IP address through Port Address


Translation.
 B. Hiding your firewall from unauthorized users.
 C. Detecting people using false or wrong authentication logins
 D. Making packets appear as if they come from an authorized IP address.

Hide Solution    Discussion  


Correct Answer: D
IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack
connections to your network. Attackers use IP spoofing to send malware and bots to your
protected network, to execute DoS attacks, or to gain unauthorized access.
Reference:
http://dl3.checkpoint.com/paid/74/74d596decb6071a4ee642fbdaae7238f/CP_R80_SecurityManag
ement_AdminGuide.pdf?HashKey=1479584563_6f823c8ea1514609148aa4fec5425db2&xtn=.pdf

Question #26Topic 1
Connections to the Check Point R80 Web API use what protocol?

 A. HTTPS
 B. RPC
 C. VPN
 D. SIC
Hide Solution    Discussion  

Correct Answer: A

Question #27Topic 1
Which command lists all tables in Gaia?

 A. fw tab -t
 B. fw tab -list
 C. fw-tab -s
 D. fw tab -1

Hide Solution     Discussion   1


Correct Answer: C
Reference:
http://dl3.checkpoint.com/paid/c7/c76b823d81bab77e1e40ac086fa81411/CP_R77_versions_CLI_
ReferenceGuide.pdf?HashKey=1538418170_96def40f213f24a8b273cc77b408dd3f&xtn=.pdf

To see the names and IDs of the available kernel tables, run: fw tab -s

Question #28Topic 1
What is true about the IPS-Blade?

 A. In R80, IPS is managed by the Threat Prevention Policy


 B. In R80, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict
 C. In R80, IPS Exceptions cannot be attached to "all rules"
 D. In R80, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same

Hide Solution    Discussion  

Correct Answer: A

Question #29Topic 1
Which one of these features is NOT associated with the Check Point URL Filtering and Application
Control Blade?

 A. Detects and blocks malware by correlating multiple detection engines before users are
affected.
 B. Configure rules to limit the available network bandwidth for specified users or groups.
 C. Use UserCheck to help users understand that certain websites are against the
company's security policy.
 D. Make rules to allow or block applications and Internet sites for individual applications,
categories, and risk levels.

Hide Solution    Discussion  


Correct Answer: A
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_AppControl_WebAdmin/60902.htm

Question #30Topic 1
What is a feature that enables VPN connections to successfully maintain a private and secure
VPN session without employing Stateful Inspection?

 A. Stateful Mode
 B. VPN Routing Mode
 C. Wire Mode
 D. Stateless Mode

Hide Solution    Discussion  


Correct Answer: C
Wire Mode is a VPN-1 NGX feature that enables VPN connections to successfully fail over,
bypassing Security Gateway enforcement. This improves performance and reduces downtime.
Based on a trusted source and destination, Wire Mode uses internal interfaces and VPN
Communities to maintain a private and secure VPN session, without employing Stateful
Inspection. Since Stateful Inspection no longer takes place, dynamic-routing protocols that do not
survive state verification in non-Wire Mode configurations can now be deployed. The VPN
connection is no different from any other connections along a dedicated wire, thus the meaning of
"Wire Mode".
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk30974

Question #31Topic 1
What Factor preclude Secure XL Templating?

 A. Source Port Ranges/Encrypted Connections


 B. IPS
 C. ClusterXL in load sharing Mode
 D. CoreXL

Hide Solution    Discussion  

Correct Answer: A
Question #32Topic 1
In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most
accurate CLI command?

 A. fw ctl sdstat


 B. fw ctl affinity -l a -r -v
 C. fw ctl multik stat
 D. cpinfo

Hide Solution     Discussion   1

Correct Answer: B

Degenhardt

 7 months ago
should be fw ctl affinity -l -a -v -r.

Question #33
Check Pont Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster
Members over Check Point SIC _____________ .

 A. TCP Port 18190


 B. TCP Port 18209
 C. TCP Port 19009
 D. TCP Port 18191

Hide Solution     Discussion   5

Correct Answer: B

Question #34Topic 1
The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?

 A. Secure Internal Communication (SIC)


 B. Restart Daemons if they fail
 C. Transfers messages between Firewall processes
 D. Pulls application monitoring status

Hide Solution     Discussion   2


Correct Answer: B
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk97638

Question #35Topic 1
What is not a component of Check Point SandBlast?

 A. Threat Emulation
 B. Threat Simulator
 C. Threat Extraction
 D. Threat Cloud

Hide Solution    Discussion  

Correct Answer: B

Question #36Topic 1
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used
for this?

 A. UDP port 265


 B. TCP port 265
 C. UDP port 256
 D. TCP port 256

Hide Solution    Discussion  


Correct Answer: D
Synchronization works in two modes:
Full Sync transfers all Security Gateway kernel table information from one cluster member to
another. It is handled by the fwd daemon using an encrypted TCP connection on port 256.
Delta Sync transfers changes in the kernel tables between cluster members. Delta sync is handled
by the Security Gateway kernel using UDP connections on port
8116.
Reference:
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_ClusterXL_Adm
inGuide/html_frameset.htm?
topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_ClusterXL_AdminGuide/7288

Question #37Topic 1
Fill in the blank: The command ___________ provides the most complete restoration of a R80
configuration.
 A. upgrade_import
 B. cpconfig
 C. fwm dbimport -p <export file>
 D. cpinfo -recover

Hide Solution    Discussion  

Correct Answer: A

Question #38Topic 1
Check Point Management (cpm) is the main management process in that it provides the
architecture for a consolidated management console. It empowers the migration from legacy
Client-side logic to Server-side logic. The cpm process:

 A. Allow GUI Client and management server to communicate via TCP Port 19001
 B. Allow GUI Client and management server to communicate via TCP Port 18191
 C. Performs database tasks such as creating, deleting, and modifying objects and
compiling policy.
 D. Performs database tasks such as creating, deleting, and modifying objects as well as
policy code generation.

Hide Solution    Discussion  

Correct Answer: C

Question #39Topic 1
Which of the following type of authentication on Mobile Access can NOT be used as the first
authentication method?

 A. Dynamic ID
 B. RADIUS
 C. Username and Password
 D. Certificate

Hide Solution    Discussion  


Correct Answer: A
Reference:
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_MobileAccess_
AdminGuide/html_frameset.htm?
topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_MobileAccess_AdminGuide/41587

Question #40Topic 1
Which of the SecureXL templates are enabled by default on Security Gateway?

 A. Accept
 B. Drop
 C. NAT
 D. None

Hide Solution     Discussion   2

Correct Answer: A

Question #41Topic 1
What happen when IPS profile is set in Detect Only Mode for troubleshooting?

 A. It will generate Geo-Protection traffic


 B. Automatically uploads debugging logs to Check Point Support Center
 C. It will not block malicious traffic
 D. Bypass licenses requirement for Geo-Protection control

Hide Solution    Discussion  


Correct Answer: C
It is recommended to enable Detect-Only for Troubleshooting on the profile during the initial
installation of IPS. This option overrides any protections that are set to
Prevent so that they will not block any traffic.
During this time you can analyze the alerts that IPS generates to see how IPS will handle network
traffic, while avoiding any impact on the flow of traffic.
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_IPS_AdminGuide/12750.htm

Question #42Topic 1
What is true about VRRP implementations?

 A. VRRP membership is enabled in cpconfig


 B. VRRP can be used together with ClusterXL, but with degraded performance
 C. You cannot have a standalone deployment
 D. You cannot have different VRIDs in the same physical network

Hide Solution    Discussion  


Correct Answer: C
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_Gaia_WebAdmin/87911.htm
Question #43Topic 1
The Security Gateway is installed on GAIA R80. The default port for the Web User interface is
______.

 A. TCP 18211
 B. TCP 257
 C. TCP 4433
 D. TCP 443

Hide Solution    Discussion  

Correct Answer: D

Question #44Topic 1
Fill in the blank: The R80 feature ______ permits blocking specific IP addresses for a specific time
period.

 A. Block Port Overflow


 B. Local Interface Spoofing
 C. Suspicious Activity Monitoring
 D. Adaptive Threat Prevention

Hide Solution    Discussion  


Correct Answer: C
Suspicious Activity Rules Solution
Suspicious Activity Rules is a utility integrated into SmartView Monitor that is used to modify
access privileges upon detection of any suspicious network activity
(for example, several attempts to gain unauthorized access).
The detection of suspicious activity is based on the creation of Suspicious Activity rules.
Suspicious Activity rules are Firewall rules that enable the system administrator to instantly block
suspicious connections that are not restricted by the currently enforced security policy. These
rules, once set (usually with an expiration date), can be applied immediately without the need to
perform an Install Policy operation
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_SmartViewMonitor_AdminGuide/17670.htm

Question #45Topic 1
In a Client to Server scenario, which represents that the packet has already checked against the
tables and the Rule Base?

 A. Big l
 B. Little o
 C. Little i
 D. Big O

Hide Solution     Discussion   2


Correct Answer: A
I think A is the right one as: http://dkcheckpoint.blogspot.com/2016/07/chapter-2-chain-module.html In
client to server scenario, 'i' represent the packet as it left the client. 'I' represent the packet already checked
against the tables and rule base.

Question #46Topic 1
What is the mechanism behind Threat Extraction?

 A. This a new mechanism which extracts malicious files from a document to use it as a
counter-attack against its sender.
 B. This is a new mechanism which is able to collect malicious files out of any kind of file
types to destroy it prior to sending it to the intended recipient.
 C. This is a new mechanism to identify the IP address of the sender of malicious codes and
put it into the SAM database (Suspicious Activity Monitoring).
 D. Any active contents of a document, such as JavaScripts, macros and links will be
removed from the document and forwarded to the intended recipient, which makes this solution
very fast.

Hide Solution    Discussion  

Correct Answer: D

Question #47Topic 1
You want to gather and analyze threats to your mobile device. It has to be a lightweight app.
Which application would you use?

 A. SmartEvent Client Info


 B. SecuRemote
 C. Check Point Protect
 D. Check Point Capsule Cloud

Hide Solution    Discussion  


Correct Answer: C
Reference:
https://www.insight.com/content/dam/insight-web/en_US/pdfs/check-point/mobile-threat-
prevention-behavioral-risk-analysis.pdf

Question #48Topic 1
Which view is NOT a valid CPVIEW view?

 A. IDA
 B. RAD
 C. PDP
 D. VPN

Hide Solution    Discussion  

Correct Answer: C
https://dl3.checkpoint.com/paid/fa/fa3f0ac5078c30eda84a14275768ae79/CP_CPView_R77.20_Guide.pdf?
HashKey=1576490725_9147e96e31031f27d02d277542a64c8a&xtn=.pdf

Question #49Topic 1
Which of the following is a new R80.10 Gateway feature that had not been available in R77.X and
older?

 A. The rule base can be built of layers, each containing a set of the security rules. Layers
are inspected in the order in which they are defined, allowing control over the rule base flow and
which security functionalities take precedence.
 B. Limits the upload and download throughput for streaming media in the company to 1
Gbps.
 C. Time object to a rule to make the rule active only during specified times.
 D. Sub Policies ae sets of rules that can be created and attached to specific rules. If the
rule is matched, inspection will continue in the sub policy attached to it rather than in the next rule.

Hide Solution     Discussion   3


Correct Answer: D
Reference:
http://dl3.checkpoint.com/paid/1f/1f850d1640792cf885336cc6ae8b2743/CP_R80_ReleaseNotes.p
df?HashKey=1517092603_dd917544d92dccc060e5b25d28a46f79&xtn=.pdf

Question #50Topic 1
fwssd is a child process of which of the following Check Point daemons?

 A. fwd
 B. cpwd
 C. fwm
 D. cpd

Hide Solution    Discussion  


Correct Answer: A

Question #51Topic 1
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up
an Active-Active cluster.

 A. Symmetric routing
 B. Failovers
 C. Asymmetric routing
 D. Anti-Spoofing

Hide Solution    Discussion  

Correct Answer: C

Question #52Topic 1
CPM process stores objects, policies, users, administrators, licenses and management data in a
database. The database is:

 A. MySQL
 B. Postgres SQL
 C. MarisDB
 D. SOLR

Hide Solution    Discussion  


Correct Answer: B
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_MultiDomainSecurity/html_frameset.htm?
topic=documents/R80/CP_R80_MultiDomainSecurity/15420

Question #53Topic 1
If you needed the Multicast MAC address of a cluster, what command would you run?

 A. cphaprob -a if
 B. cphaconf ccp multicast
 C. cphaconf debug data
 D. cphaprob igmp

Hide Solution    Discussion  

Correct Answer: D
Question #54Topic 1
Which is NOT an example of a Check Point API?

 A. Gateway API
 B. Management API
 C. OPSC SDK
 D. Threat Prevention API

Hide Solution    Discussion  


Correct Answer: A
Reference:
https://sc1.checkpoint.com/documents/R80/APIs/#introduction%20

Question #55Topic 1
What are the three components for Check Point Capsule?

 A. Capsule Docs, Capsule Cloud, Capsule Connect


 B. Capsule Workspace, Capsule Cloud, Capsule Connect
 C. Capsule Workspace, Capsule Docs, Capsule Connect
 D. Capsule Workspace, Capsule Docs, Capsule Cloud

Hide Solution    Discussion  


Correct Answer: D
Reference:
https://www.checkpoint.com/products-solutions/mobile-security/check-point-capsule/

Question #56Topic 1
Which of the following Check Point processes within the Security Management Server is
responsible for the receiving of log records from Security Gateway?

 A. logd
 B. fwd
 C. fwm
 D. cpd

Hide Solution    Discussion  


Correct Answer: B
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk97638

Question #57Topic 1
The fwd process on the Security Gateway sends logs to the fwd process on the Management
Server via which 2 processes?

 A. fwd via cpm


 B. fwm via fwd
 C. cpm via cpd
 D. fwd via cpd

Hide Solution     Discussion   1

Correct Answer: D
I believe the right answer should be D.

Question #58Topic 1
You have successfully backed up Check Point configurations without the OS information. What
command would you use to restore this backup?

 A. restore_backup
 B. import backup
 C. cp_merge
 D. migrate import

Hide Solution    Discussion  

Correct Answer: D

Question #59Topic 1
The Firewall Administrator is required to create 100 new host objects with different IP addresses.
What API command can he use in the script to achieve the requirement?

 A. add host name <New HostName> ip-address <ip address>


 B. add hostname <New HostName> ip-address <ip address>
 C. set host name <New HostName> ip-address <ip address>
 D. set hostname <New HostName> ip-address <ip address>

Hide Solution    Discussion  


Correct Answer: A
Reference:
https://sc1.checkpoint.com/documents/R80/APIs/#intro_gui_cli%20

Question #60Topic 1
Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs
the systems this way, how many machines will he need if he does NOT include a SmartConsole
machine in his calculations?

 A. One machine, but it needs to be installed using SecurePlatform for compatibility


purposes.
 B. One machine
 C. Two machines
 D. Three machines

Hide Solution    Discussion  


Correct Answer: C
One for Security Management Server and the other one for the Security Gateway.

Question #61Topic 1
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each
profile defines a(n) _____ or ______ action for the file types.

 A. Inspect/Bypass
 B. Inspect/Prevent
 C. Prevent/Bypass
 D. Detect/Bypass

Hide Solution    Discussion  


Correct Answer: A
Reference:
https://sc1.checkpoint.com/documents/R77/CP_R77_ThreatPrevention_WebAdmin/101703.htm
Question #62Topic 1
When doing a Stand-Alone Installation, you would install the Security Management Server with
which other Check Point architecture component?

 A. None, Security Management Server would be installed by itself.


 B. SmartConsole
 C. SecureClient
 D. Security Gateway
 E. SmartEvent

Hide Solution    Discussion  


Correct Answer: D
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_Installation_and_Upgrade_Guide-
webAdmin/89230.htm

Question #63Topic 1
On R80.10 when configuring Third-Party devices to read the logs using the LEA (Log Export API)
the default Log Server uses port:

 A. 18210
 B. 18184
 C. 257
 D. 18191

Hide Solution    Discussion  


Correct Answer: B
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R8Q_LoggingAndMonitorinq/html_frameset.htm?
topic=documents/R80/CP_R80_LoggingAndMonitoring/120829

Question #64Topic 1
How many images are included with Check Point TE appliance in Recommended Mode?

 A. 2(OS) images
 B. images are chosen by administrator during installation
 C. as many as licensed for
 D. the most new image

Hide Solution    Discussion  


Correct Answer: A

Question #65Topic 1
What is the least amount of CPU cores required to enable CoreXL?

 A. 2
 B. 1
 C. 4
 D. 6

Hide Solution     Discussion   1


Correct Answer: A
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_PerformanceTuning_WebAdmin/6731.htm
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk98737&partition=Advanced&product=CoreX
L%22

Question #66Topic 1
You are working with multiple Security Gateways enforcing an extensive number of rules. To
simplify security administration, which action would you choose?

 A. Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.
 B. Create a separate Security Policy package for each remote Security Gateway.
 C. Create network objects that restricts all applicable rules to only certain networks.
 D. Run separate SmartConsole instances to login and configure each Security Gateway
directly.

Hide Solution    Discussion  

Correct Answer: B

Question #67Topic 1
Which of the following authentication methods ARE NOT used for Mobile Access?

 A. RADIUS server
 B. Username and password (internal, LDAP)
 C. SecurID
 D. TACACS+

Hide Solution    Discussion  


Correct Answer: D
Reference:
https://sc1.checkpoint.com/documents/R77/CP_R77_Mobile_Access_WebAdmin/41587.htm

Question #68Topic 1
What is the correct command to observe the Sync traffic in a VRRP environment?

 A. fw monitor -e "accept[12:4,b]=224.0.0.18;"


 B. fw monitor -e "accept(6118;"
 C. fw monitor -e "accept proto=mcVRRP;"
 D. fw monitor -e "accept dst=224.0.0.18;"

Hide Solution    Discussion  

Correct Answer: D

Question #69Topic 1
What has to be taken into consideration when configuring Management HA?

 A. The Database revisions will not be synchronized between the management servers
 B. SmartConsole must be closed prior to synchronized changes in the objects database
 C. If you wanted to use Full Connectivity Upgrade, you must change the Implied Rules to
allow FW1_cpredundant to pass before the Firewall Control Connections.
 D. For Management Server synchronization, only External Virtual Switches are supported.
So, if you wanted to employ Virtual Routers instead, you have to reconsider your design.

Hide Solution    Discussion  

Correct Answer: A

Question #70Topic 1
What is the difference between an event and a log?

 A. Events are generated at gateway according to Event Policy


 B. A log entry becomes an event when it matches any rule defined in Event Policy
 C. Events are collected with SmartWorkflow form Trouble Ticket systems
 D. Log and Events are synonyms

Hide Solution    Discussion  

Correct Answer: B
Question #71Topic 1
What are the attributes that SecureXL will check after the connection is allowed by Security
Policy?

 A. Source address, Destination address, Source port, Destination port, Protocol


 B. Source MAC address, Destination MAC address, Source port, Destination port, Protocol
 C. Source address, Destination address, Source port, Destination port
 D. Source address, Destination address, Destination port, Protocol

Hide Solution    Discussion  

Correct Answer: A

Question #72Topic 1
Which statement is NOT TRUE about Delta synchronization?

 A. Using UDP Multicast or Broadcast on port 8161


 B. Using UDP Multicast or Broadcast on port 8116
 C. Quicker than Full sync
 D. Transfers changes in the Kernel tables between cluster members.

Hide Solution     Discussion   3


Correct Answer: A
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7288.htm

Question #73Topic 1
The Event List within the Event tab contains:

 A. a list of options available for running a query.


 B. the top events, destinations, sources, and users of the query results, either as a chart or
in a tallied list.
 C. events generated by a query.
 D. the details of a selected event.

Hide Solution    Discussion  


Correct Answer: C
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_LoggingAndMonitoring/html_frameset.htm?
topic=documents/R80/CP_R80_LoggingAndMonitoring/131915

Question #74Topic 1
Which statement is correct about the Sticky Decision Function?

 A. It is not supported with either the Performance pack of a hardware based accelerator
card
 B. Does not support SPI's when configured for Load Sharing
 C. It is automatically disabled if the Mobile Access Software Blade is enabled on the cluster
 D. It is not required L2TP traffic

Hide Solution     Discussion   1


Correct Answer: A
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7290.htm

Question #75Topic 1
Which statement is true regarding redundancy?

 A. System Administrators know their cluster has failed over and can also see why it failed
over by using the cphaprob -f if command.
 B. ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and
Multicast.
 C. Machines in a ClusterXL High Availability configuration must be synchronized.
 D. Both ClusterXL and VRRP are fully supported by Gaia and available to all Check Point
appliances, open servers, and virtualized environments.

Hide Solution    Discussion  


Correct Answer: D
Reference:
https://www.checkpoint.com/download/public-files/gaia-technical-brief.pdf

Question #76Topic 1
NAT rules are prioritized in which order?
1. Automatic Static NAT
2. Automatic Hide NAT
3. Manual/Pre-Automatic NAT
4. Post-Automatic/Manual NAT rules

 A. 1, 2, 3, 4
 B. 1, 4, 2, 3
 C. 3, 1, 2, 4
 D. 4, 3, 1, 2
Hide Solution     Discussion   3
Correct Answer: C

Question #77Topic 1
In R80.10, how do you manage your Mobile Access Policy?

 A. Through the Unified Policy


 B. Through the Mobile Console
 C. From SmartDashboard
 D. From the Dedicated Mobility Tab

Hide Solution     Discussion   3

Correct Answer: C

Question #78Topic 1
R80.10 management server can manage gateways with which versions installed?

 A. Versions R77 and higher


 B. Versions R76 and higher
 C. Versions R75.20 and higher
 D. Versions R75 and higher

Hide Solution     Discussion   1


Correct Answer: C
Reference:
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_ReleaseNotes/html_frame
set.htm?topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_ReleaseNotes/195189

Question #79Topic 1
Which command can you use to verify the number of active concurrent connections?

 A. fw conn all


 B. fw ctl pstat
 C. show all connections
 D. show connections

Hide Solution    Discussion  


Correct Answer: B
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk103496
Question #80Topic 1
Which of the following statements is TRUE about R80 management plug-ins?

 A. The plug-in is a package installed on the Security Gateway.


 B. Installing a management plug-in requires a Snapshot, just like any upgrade process.
 C. A management plug-in interacts with a Security Management Server to provide new
features and support for new products.
 D. Using a plug-in offers full central management only if special licensing is applied to
specific features of the plug-in.

Hide Solution    Discussion  

Correct Answer: C

Question #81Topic 1
How can SmartView application accessed?

 A. http://<Security Management IP Address>/smartview


 B. http://<Security Management IP Address>:4434/smartview
 C. https://<Security Management IP Address>/smartview/
 D. https://<Security Management host name>:4434/smartview

Hide Solution     Discussion   1

Correct Answer: C

Question #82Topic 1
What command verifies that the API server is responding?

 A. api stat
 B. api status
 C. show api_status
 D. app_get_status

Hide Solution    Discussion  


Correct Answer: B
Reference:
https://www.hurricanelabs.com/blog/check-point-api-merging-management-servers-with-r80-10

Question #83Topic 1
Where you can see and search records of action done by R80 SmartConsole administrators?
 A. In SmartView Tracker, open active log
 B. In the Logs & Monitor view, select "Open Audit Log View"
 C. In SmartAuditLog View
 D. In Smartlog, all logs

Hide Solution    Discussion  


Correct Answer: B
Reference:
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_LoggingAndMo
nitoring_AdminGuide/html_frameset.htm?
topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_LoggingAndMonitoring_AdminGuide/
188029

Question #84Topic 1
Fill in the blank: The R80 utility fw monitor is used to troubleshoot ________.

 A. User data base corruption


 B. LDAP conflicts
 C. Traffic issues
 D. Phase two key negotiations

Hide Solution    Discussion  


Correct Answer: C
Check Point's FW Monitor is a powerful built-in tool for capturing network traffic at the packet level.
The FW Monitor utility captures network packets at multiple capture points along the FireWall
inspection chains. These captured packets can be inspected later using the WireShark
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk30583

Question #85Topic 1
The Firewall kernel is replicated multiple times, therefore:

 A. The Firewall kernel only touches the packet if the connection is accelerated
 B. The Firewall can run different policies per core
 C. The Firewall kernel is replicated only with new connections and deletes itself once the
connection times out
 D. The Firewall can run the same policy on all cores.

Hide Solution    Discussion  


Correct Answer: D
On a Security Gateway with CoreXL enabled, the Firewall kernel is replicated multiple times. Each
replicated copy, or instance, runs on one processing core.
These instances handle traffic concurrently, and each instance is a complete and independent
inspection kernel. When CoreXL is enabled, all the kernel instances in the Security Gateway
process traffic through the same interfaces and apply the same security policy.
Reference:
https://sc1.checkpoint.com/documents/R77/CP_R77_PerformanceTuning_WebAdmin/6731.htm

Question #86Topic 1
Selecting an event displays its configurable properties in the Detail pane and a description of the
event in the Description pane. Which is NOT an option to adjust or configure?

 A. Severity
 B. Automatic reactions
 C. Policy
 D. Threshold

Hide Solution    Discussion  


Correct Answer: C
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_SmartEvent_AdminGuide/17401.htm

Question #87Topic 1
To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the
following command in Expert mode then reboot:

 A. fw ctl multik set_mode 1


 B. fw ctl Dynamic_Priority_Queue on
 C. fw ctl Dynamic_Priority_Queue enable
 D. fw ctl multik set_mode 9

Hide Solution    Discussion  


Correct Answer: D
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk105762

Question #88Topic 1
Advanced Security Checkups can be easily conducted within:
 A. Reports
 B. Advanced
 C. Checkups
 D. Views
 E. Summary

Hide Solution    Discussion  

Correct Answer: A

Question #89Topic 1
What is the limitation of employing Sticky Decision Function?

 A. With SDF enabled, the involved VPN Gateways only supports IKEv1
 B. Acceleration technologies, such as SecureXL and CoreXL are disabled when activating
SDF
 C. With SDF enabled, only ClusterXL in legacy mode is supported
 D. With SDF enabled, you can only have three Sync interfaces at most

Hide Solution    Discussion  


Correct Answer: B
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7290.htm

Question #90Topic 1
Which Mobile Access Application allows a secure container on Mobile devices to give users
access to internal website, file share and emails?

 A. Check Point Remote User


 B. Check Point Capsule Workspace
 C. Check Point Mobile Web Portal
 D. Check Point Capsule Remote

Hide Solution     Discussion   4


Correct Answer: B
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_Mobile_Access_WebAdmin/41723.htm

Question #91Topic 1
Which of the following process pulls application monitoring status?
 A. fwd
 B. fwm
 C. cpwd
 D. cpd

Hide Solution     Discussion   1

Correct Answer: D
Yes! TCP Port 18192 (CPD_amon) is used by the CPD process FireWall Application Monitoring.

Question #92Topic 1
To fully enable Dynamic Dispatcher on a Security Gateway:

 A. run fw ctl multik set_mode 9 in Expert mode and then Reboot.


 B. Using cpconfig, update the Dynamic Dispatcher value to "full" under the CoreXL menu.
 C. Edit/proc/interrupts to include multik set_mode 1 at the bottom of the file, save, and
reboot.
 D. run fw multik set_mode 1 in Expert mode and then reboot.

Hide Solution    Discussion  


Correct Answer: A
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk105261

Question #93Topic 1
Session unique identifiers are passed to the web api using which http header option?

 A. X-chkp-sid
 B. Accept-Charset
 C. Proxy-Authorization
 D. Application

Hide Solution     Discussion   3

Correct Answer: A

Question #94Topic 1
Which command shows actual allowed connections in state table?

 A. fw tab -t StateTable


 B. fw tab -t connections
 C. fw tab -t connection
 D. fw tab connections

Hide Solution    Discussion  

Correct Answer: B

Question #95Topic 1
What SmartEvent component creates events?

 A. Consolidation Policy
 B. Correlation Unit
 C. SmartEvent Policy
 D. SmartEvent GUI

Hide Solution    Discussion  


Correct Answer: B
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_SmartEvent_AdminGuide/17401.htm

Question #96Topic 1
Which command collects diagnostic data for analyzing customer setup remotely?

 A. cpinfo
 B. migrate export
 C. sysinfo
 D. cpview

Hide Solution    Discussion  


Correct Answer: A
CPInfo is an auto-updatable utility that collects diagnostics data on a customer's machine at the
time of execution and uploads it to Check Point servers (it replaces the standalone cp_uploader
utility for uploading files to Check Point servers).
The CPInfo output file allows analyzing customer setups from a remote location. Check Point
support engineers can open the CPInfo file in a demo mode, while viewing actual customer
Security Policies and Objects. This allows the in-depth analysis of customer's configuration and
environment settings.
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk92739

Question #97Topic 1
Which features are only supported with R80.10 Gateways but not R77.x?

 A. Access Control policy unifies the Firewall, Application Control & URL Filtering, Data
Awareness, and Mobile Access Software Blade policies
 B. Limits the upload and download throughput for streaming media in the company to 1
Gbps.
 C. The rule base can be built of layers, each containing a set of the security rules. Layers
are inspected in the order in which they are defined, allowing control over the rule base flow and
which security functionalities take precedence.
 D. Time object to a rule to make the rule active only during specified times.

Hide Solution     Discussion   2


Correct Answer: A
Reference:
http://slideplayer.com/slide/12183998/

I can't make friends with C, because A is absolute precisely correct and C is more ambiguous. "In R80 the
Access Control policy unifies the policies of these pre-R80 Software Blades: Firewall and VPN Application
Control and URL Filtering Identity Awareness Data Awareness Mobile Access Security Zones" I refer to:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?
topic=documents/R80/CP_R80_SecMGMT/126197
   upvoted 3 times

Question #98Topic 1
Which CLI command will reset the IPS pattern matcher statistics?

 A. ips reset pmstat


 B. ips pstats reset
 C. ips pmstats refresh
 D. ips pmstats reset

Hide Solution    Discussion  


Correct Answer: D
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_CLI_WebAdmin/84627.htm

Question #99Topic 1
When requiring certificates for mobile devices, make sure the authentication method is set to one
of the following, Username and Password, RADIUS or _______.

 A. SecureID
 B. SecurID
 C. Complexity
 D. TacAcs

Hide Solution     Discussion   1


Correct Answer: B
Reference:
https://sc1.checkpoint.com/documents/R77/CP_R77_Mobile_Access_WebAdmin/41587.htm

https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_MobileAccess_AdminGuid
e/html_frameset.htm?
topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_MobileAccess_AdminGuide/41587

Question #100Topic 1
Check Point recommends configuring Disk Space Management parameters to delete old log
entries when available disk space is less than or equal to?

 A. 50%
 B. 75%
 C. 80%
 D. 15%

Hide Solution     Discussion   4

Correct Answer: D
https://sc1.checkpoint.com/documents/R80/CP_R80_Gaia_IUG/html_frameset.htm?
topic=documents/R80/CP_R80_Gaia_IUG/130169

Question #101Topic 1
SmartEvent has several components that function together to track security threats. What is the
function of the Correlation Unit as a component of this architecture?

 A. Analyzes each log entry as it arrives at the log server according to the Event Policy.
When a threat pattern is identified, an event is forwarded to the SmartEvent Server.
 B. Correlates all the identified threats with the consolidation policy.
 C. Collects syslog data from third party devices and saves them to the database.
 D. Connects with the SmartEvent Client when generating threat reports.

Hide Solution    Discussion  

Correct Answer: A
Question #102Topic 1
SecureXL improves non-encrypted firewall traffic throughput and encrypted VPN traffic throughput.

 A. This statement is true because SecureXL does improve all traffic.


 B. This statement is false because SecureXL does not improve this traffic but CoreXL does.
 C. This statement is true because SecureXL does improve this traffic.
 D. This statement is false because encrypted traffic cannot be inspected.

Hide Solution    Discussion  


Correct Answer: C
SecureXL improved non-encrypted firewall traffic throughput, and encrypted VPN traffic
throughput, by nearly an order-of-magnitude- particularly for small packets flowing in long duration
connections.
Reference:
https://downloads.checkpoint.com/fileserver/SOURCE/direct/ID/10001/FILE/SecureXL_and_Nokia
_IPSO_White_Paper_20080401.pdf

Question #103Topic 1
Which command gives us a perspective of the number of kernel tables?

 A. fw tab -t
 B. fw tab -s
 C. fw tab -n
 D. fw tab -k

Hide Solution    Discussion  

Correct Answer: B

Question #104Topic 1
When simulating a problem on ClusterXL cluster with cphaprob -d STOP -s problem -t 0 register,
to initiate a failover on an active cluster member, what command allows you remove the
problematic state?

 A. cphaprob -d STOP unregister


 B. cphaprob STOP unregister
 C. cphaprob unregister STOP
 D. cphaprob -d unregister STOP

Hide Solution     Discussion   1


Correct Answer: A
esting a failover in a controlled manner using following command;
# cphaprob -d STOP -s problem -t 0 register
This will register a problem state on the cluster member this was entered on; If you then run;
# cphaprob list
this will show an entry named STOP.
to remove this problematic register run following;
# cphaprob -d STOP unregister
Reference:
https://fwknowledge.wordpress.com/2013/04/04/manual-failover-of-the-fw-cluster/

The answer is correct but clusterXL_admin down/up is a better way to do this then registering a pnote.

Question #105Topic 1
How would you deploy TE250X Check Point appliance just for email traffic and in-line mode
without a Check Point Security Gateway?

 A. Install appliance TE250X on SpanPort on LAN switch in MTA mode.


 B. Install appliance TE250X in standalone mode and setup MTA.
 C. You can utilize only Check Point Cloud Services for this scenario.
 D. It is not possible, always Check Point SGW is needed to forward emails to SandBlast
appliance.

Hide Solution     Discussion   1

Correct Answer: C?

No. It's A: "Inline: This is a stand-alone option that deploys a SandBlast Appliance inline as MTA or as an
ICAP server or on a SPAN port, utilizing all NGTX Software Blades including IPS, Antivirus, Anti-Bot, Threat
Emulation, Threat Extraction, URL Filtering and Application Control"
https://www.checkpoint.com/downloads/products/sandblast-appliances-datasheet.pdf

Question #106Topic 1
What is the main difference between Threat Extraction and Threat Emulation?

 A. Threat Emulation never delivers a file and takes more than 3 minutes to complete.
 B. Threat Extraction always delivers a file and takes less than a second to complete.
 C. Threat Emulation never delivers a file that takes less than a second to complete.
 D. Threat Extraction never delivers a file and takes more than 3 minutes to complete.

Hide Solution    Discussion  


Correct Answer: B

Question #107Topic 1
When Dynamic Dispatcher is enabled, connections are assigned dynamically with the exception
of:

 A. Threat Emulation
 B. HTTPS
 C. QOS
 D. VoIP

Hide Solution     Discussion   1

Correct Answer: D

Right! "The following types of traffic are not load-balanced by the CoreXL Dynamic Dispatcher (this traffic
will always be handled by the same CoreXL FW instance): VoIP VPN encrypted packets"
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk105261#Limitations

Question #108Topic 1
SandBlast offers flexibility in implementation based on their individual business needs. What is an
option for deployment of Check Point SandBlast Zero-Day Protection?

 A. Smart Cloud Services


 B. Load Sharing Mode Services
 C. Threat Agent Solution
 D. Public Cloud Services

Hide Solution     Discussion   2

Correct Answer: A

Shouldn't this be D?
   upvoted 2 times
 

FedoLFS

 1 month, 1 week ago


Sandblast is a cloud service yes but not a public cloud service. To me it is C with Sandblast Agent which
makes more sense... This question is really badly written.
Question #109Topic 1
Which of the following is NOT a component of Check Point Capsule?

 A. Capsule Docs
 B. Capsule Cloud
 C. Capsule Enterprise
 D. Capsule Workspace

Hide Solution    Discussion  

Correct Answer: C

Question #110Topic 1
What is the purpose of Priority Delta in VRRP?

 A. When a box up, Effective Priority = Priority + Priority Delta


 B. When an Interface is up, Effective Priority = Priority + Priority Delta
 C. When an Interface fail, Effective Priority = Priority - Priority Delta
 D. When a box fail, Effective Priority = Priority - Priority Delta

Hide Solution    Discussion  


Correct Answer: C
Each instance of VRRP running on a supported interface may monitor the link state of other
interfaces. The monitored interfaces do not have to be running VRRP.
If a monitored interface loses its link state, then VRRP will decrement its priority over a VRID by
the specified delta value and then will send out a new VRRP
HELLO packet. If the new effective priority is less than the priority a backup platform has, then the
backup platform will beging to send out its own HELLO packet.
Once the master sees this packet with a priority greater than its own, then it releases the VIP.
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk38524

Question #111Topic 1
Which statements below are CORRECT regarding Threat Prevention profiles in SmartDashboard?

 A. You can assign only one profile per gateway and a profile can be assigned to one rule
Only.
 B. You can assign multiple profiles per gateway and a profile can be assigned to one rule
only.
 C. You can assign multiple profiles per gateway and a profile can be assigned to one or
more rules.
 D. You can assign only one profile per gateway and a profile can be assigned to one or
more rules.

Hide Solution    Discussion  

Correct Answer: C

Question #112Topic 1
Using ClusterXL, what statement is true about the Sticky Decision Function?

 A. Can only be changed for Load Sharing implementations


 B. All connections are processed and synchronized by the pivot
 C. Is configured using cpconfig
 D. Is only relevant when using SecureXL

Hide Solution    Discussion  

Correct Answer: A

Question #113Topic 1
What is the name of the secure application for Mail/Calendar for mobile devices?

 A. Capsule Workspace
 B. Capsule Mail
 C. Capsule VPN
 D. Secure Workspace

Hide Solution    Discussion  


Correct Answer: A
Reference:
https://www.checkpoint.com/products/mobile-secure-workspace/

Question #114Topic 1
Where do you create and modify the Mobile Access policy in R80?

 A. SmartConsole
 B. SmartMonitor
 C. SmartEndpoint
 D. SmartDashboard
Hide Solution     Discussion   4

Correct Answer: A

Question #115Topic 1
SmartConsole R80 requires the following ports to be open for SmartEvent R80 management:

 A. 19090,22
 B. 19190,22
 C. 18190,80
 D. 19009,443

Hide Solution    Discussion  

Correct Answer: D

Question #116Topic 1
Which configuration file contains the structure of the Security Server showing the port numbers,
corresponding protocol name, and status?

 A. $FWDIR/database/fwauthd.conf
 B. $FWDIR/conf/fwauth.conf
 C. $FWDIR/conf/fwauthd.conf
 D. $FWDIR/state/fwauthd.conf

Hide Solution    Discussion  

Correct Answer: C

Question #117Topic 1
What API command below creates a new host with the name "New Host" and IP address of
"192.168.0.10"?

 A. new host name "New Host" ip-address "192.168.0.10"


 B. set host name "New Host" ip-address "192.168.0.10"
 C. create host name "New Host" ip-address "192.168.0.10"
 D. add host name "New Host" ip-address "192.168.0.10"

Hide Solution    Discussion  

Correct Answer: D

Question #118Topic 1
As a valid Mobile Access Method, what feature provides Capsule Connect/VPN?
 A. That is used to deploy the mobile device as a generator of one-time passwords for
authenticating to an RSA Authentication Manager.
 B. Fill Layer4 VPN -SSL VPN that gives users network access to all mobile applications.
 C. Full Layer3 VPN -IPSec VPN that gives users network access to all mobile applications.
 D. You can make sure that documents are sent to the intended recipients only.

Hide Solution    Discussion  


Correct Answer: C
Reference:
https://sc1.checkpoint.com/documents/R77/CP_R77_Mobile_Access_WebAdmin/82201.htm

Question #119Topic 1
You find one of your cluster gateways showing "Down" when you run the "cphaprob stat"
command. You then run the "clusterXL_admin up" on the down member but unfortunately the
member continues to show down. What command do you run to determine the cause?

 A. cphaprob -f register
 B. cphaprob -d -s report
 C. cpstat -f all
 D. cphaprob -a list

Hide Solution     Discussion   2

Correct Answer: D

Question #120Topic 1
In SmartEvent, what are different types of automatic reactions that the administrator can
configure?

 A. Mail, Block Source, Block Event Activity, External Script, SNMP Trap
 B. Mail, Block Source, Block Destination, Block Services, SNMP Trap
 C. Mail, Block Source, Block Destination, External Script, SNMP Trap
 D. Mail, Block Source, Block Event Activity, Packet Capture, SNMP Trap

Hide Solution     Discussion   1


Correct Answer: A
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_SmartEvent_AdminGuide/17401.htm

Correct. Over here is the R80 doc:


https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_LoggingAndMonitoring_A
dminGuide/html_frameset.htm?
topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_LoggingAndMonitoring_AdminGuide/131915

Question #121Topic 1
Using mgmt_cli, what is the correct syntax to import a host object called Server_1 from the CLI?

 A. mgmt_cli add-host "Server_1" ip_address "10.15.123.10" --format txt


 B. mgmt_cli add host name "Server_1" ip-address "10.15.123.10" --format json
 C. mgmt_cli add object-host "Server_1" ip-address "10.15.123.10" --format json
 D. mgmt._cli add object "Server-1" ip-address "10.15.123.10" --format json

Hide Solution    Discussion  


Correct Answer: B
Example:
mgmt_cli add host name "New Host 1" ip-address "192.0.2.1" --format json "¢ "--format json" is
optional. By default the output is presented in plain text.
Reference:
https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/add-host~v1.1%20

Question #122Topic 1
What are the steps to configure the HTTPS Inspection Policy?

 A. Go to Manage&Settings > Blades > HTTPS Inspection > Configure in SmartDashboard
 B. Go to Application&url filtering blade > Advanced > Https Inspection > Policy
 C. Go to Manage&Settings > Blades > HTTPS Inspection > Policy
 D. Go to Application&url filtering blade > Https Inspection > Policy

Hide Solution    Discussion  

Correct Answer: A

Question #123Topic 1
You want to store the GAIA configuration in a file for later reference. What command should you
use?

 A. write mem <filename>


 B. show config -f <filename>
 C. save config -o <filename>
 D. save configuration <filename>

Hide Solution    Discussion  

Correct Answer: D
Question #124Topic 1
How do Capsule Connect and Capsule Workspace differ?

 A. Capsule Connect provides a Layer3 VPN. Capsule Workspace provides a Desktop with
usable applications.
 B. Capsule Workspace can provide access to any application.
 C. Capsule Connect provides Business data isolation.
 D. Capsule Connect does not require an installed application at client.

Hide Solution    Discussion  

Correct Answer: A

Question #125Topic 1
John detected high load on sync interface. Which is most recommended solution?

 A. For short connections like http service - delay sync for 2 seconds
 B. Add a second interface to handle sync traffic
 C. For short connections like http service - do not sync
 D. For short connections like icmp service - delay sync for 2 seconds

Hide Solution     Discussion   2

Correct Answer: A

It's not clearly stated in the documentation. But I would say C -> don't sync short connections. "Some TCP
services (for example, HTTP) are characterized by connections with a very short duration. There is no point
to synchronize these connections, because every synchronized connection consumes resources on Cluster
Members, and the connection is likely to have finished by the time a cluster failover occurs." And "You may
choose not to synchronize a service if these conditions are true: [...] The service typically opens short
connections, whose loss may not be noticed. DNS (over UDP) and HTTP are typically responsible for most
connections, frequently have short life, and inherent recoverability in the application level. Services that
open long connections, such as FTP, should always be synchronized."
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_ClusterXL_AdminGuide/ht
ml_frameset.htm?
topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_ClusterXL_AdminGuide/7288 ... Further I can't
find a recommendation for any service to set the delay to specificaly two seconds...
   upvoted 1 times
 

wongex23
 6 months, 3 weeks ago
For short-lived services, you can use the Delayed Notifications feature to delay telling the Cluster Member
about a connection, so that the connection is only synchronized, if it still exists X seconds after the
connection was initiated. Well, X might be the 2. But.... ON YOUR GUESS.

Question #126Topic 1
Which of these is an implicit MEP option?

 A. Primary-backup
 B. Source address based
 C. Round robin
 D. Load Sharing

Hide Solution     Discussion   1


Correct Answer: A
Reference:
https://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/13812.htm

Correct. All options according to R80 docs: - Implicit First-To-Respond - Implicit Primary-Backup - Load
Distribution

Question #127Topic 1
You have existing dbedit scripts from R77. Can you use them with R80.10?

 A. dbedit is not supported in R80.10


 B. dbedit is fully supported in R80.10
 C. You can use dbedit to modify threat prevention or access policies, but not create or
modify layers
 D. dbedit scripts are being replaced by mgmt_cli in R80.10

Hide Solution    Discussion  


Correct Answer: D
Reference:
https://www.checkpoint.com/downloads/product-related/r80.10-mgmt-architecture-overview.pdf

Question #128Topic 1
Which remote Access Solution is clientless?

 A. Checkpoint Mobile
 B. Endpoint Security Suite
 C. SecuRemote
 D. Mobile Access Portal

Hide Solution    Discussion  


Correct Answer: D
Reference:
https://sc1.checkpoint.com/documents/R77/CP_R77_Firewall_WebAdmin/92708.htm

Question #129Topic 1
What is the command to see cluster status in cli expert mode?

 A. fw ctl stat


 B. clusterXL stat
 C. clusterXL status
 D. cphaprob stat

Hide Solution    Discussion  

Correct Answer: D

Question #130Topic 1
Which Check Point daemon monitors the other daemons?

 A. fwm
 B. cpd
 C. cpwd
 D. fwssd

Hide Solution    Discussion  


Correct Answer: C
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk97638

Question #131Topic 1
Which command is used to display status information for various components?

 A. show all systems


 B. show system messages
 C. sysmess all
 D. show sysenv all

Hide Solution    Discussion  


Correct Answer: D
Reference:
https://sc1.checkpoint.com/documents/R77/CP_R77_Gaia_AdminWebAdminGuide/html_frameset
.htm?topic=documents/R77/CP_R77_Gaia_AdminWebAdminGuide/120709

Question #132Topic 1
What are the blades of Threat Prevention?

 A. IPS, DLP, AntiVirus, AntiBot, Sandblast Threat Emulation/Extraction


 B. DLP, AntiVirus, QoS, AntiBot, Sandblast Threat Emulation/Extraction
 C. IPS, AntiVirus, AntiBot
 D. IPS, AntiVirus, AntiBot, Sandblast Threat Emulation/Extraction

Hide Solution    Discussion  


Correct Answer: D
Reference:
https://www.checkpoint.com/products/next-generation-threat-prevention/

Question #133Topic 1
For Management High Availability, which of the following is NOT a valid synchronization status?

 A. Collision
 B. Down
 C. Lagging
 D. Never been synchronized

Hide Solution    Discussion  


Correct Answer: B
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_SecMan_WebAdmin/html_frameset.htm?
topic=documents/R76/CP_R76_SecMan_WebAdmin/13132

Question #134Topic 1
Can multiple administrators connect to a Security Management Server at the same time?

 A. No, only one can be connected


 B. Yes, all administrators can modify a network object at the same time
 C. Yes, every administrator has their own username, and works in a session that is
independent of other administrators.
 D. Yes, but only one has the right to write.
Hide Solution    Discussion  
Correct Answer: C
Reference:
https://sc1.checkpoint.com/documents/R80.20_M1/WebAdminGuides/EN/CP_R80.20_M1_Smart
Provisioning_AdminGuide/html_frameset.htm?
topic=documents/R80.20_M1/WebAdminGuides/EN/CP_R80.20_M1_SmartProvisioning_AdminG
uide/16727

Question #135Topic 1
Which process is available on any management product and on products that require direct GUI
access, such as SmartEvent and provides GUI client communications, database manipulation,
policy compilation and Management HA synchronization?

 A. cpwd
 B. fwd
 C. cpd
 D. fwm

Hide Solution    Discussion  


Correct Answer: D
Firewall Management (fwm) is available on any management product, including Multi-Domain and
on products that requite direct GUI access, such as
SmartEvent, It provides the following:
- GUI Client communication
- Database manipulation
- Policy Compilation
- Management HA sync

Question #136Topic 1
To add a file to the Threat Prevention Whitelist, what two items are needed?

 A. File name and Gateway


 B. Object Name and MD5 signature
 C. MD5 signature and Gateway
 D. IP address of Management Server and Gateway

Hide Solution    Discussion  


Correct Answer: B
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80BC_ThreatPrevention/html_frameset.htm?
topic=documents/R80/CP_R80BC_ThreatPrevention/101703
Question #137Topic 1
Under which file is the proxy arp configuration stored?

 A. $FWDIR/state/proxy_arp.conf on the management server


 B. $FWDIR/conf/local.arp on the management server
 C. $FWDIR/state/_tmp/proxy.arp on the security gateway
 D. $FWDIR/conf/local.arp on the gateway

Hide Solution    Discussion  

Correct Answer: D

Question #138Topic 1
What information is NOT collected from a Security Gateway in a Cpinfo?

 A. Firewall logs
 B. Configuration and database files
 C. System message logs
 D. OS and network statistics

Hide Solution    Discussion  


Correct Answer: A
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk92739

Question #139Topic 1
SandBlast appliances can be deployed in the following modes:

 A. using a SPAN port to receive a copy of the traffic only


 B. detect only
 C. inline/prevent or detect
 D. as a Mail Transfer Agent and as part of the traffic flow only

Hide Solution    Discussion  

Correct Answer: C

Question #140Topic 1
Traffic from source 192.168.1.1 is going to www.google.com. The Application Control Blade on the
gateway is inspecting the traffic. Assuming acceleration is enabled which path is handling the
traffic?

 A. Slow Path
 B. Medium Path
 C. Fast Path
 D. Accelerated Path

Hide Solution    Discussion  

Correct Answer: A

Question #141Topic 1
The Correlation Unit performs all but the following actions:

 A. Marks logs that individually are not events, but may be part of a larger pattern to be
identified later.
 B. Generates an event based on the Event policy.
 C. Assigns a severity level to the event.
 D. Takes a new log entry that is part of a group of items that together make up an event,
and adds it to an ongoing event.

Hide Solution     Discussion   1

Correct Answer: B

According CCSE manual, page 438, the correct answer is B.

Question #142Topic 1
What is the difference between SSL VPN and IPSec VPN?

 A. IPSec VPN does not require installation of a resilient VPN client.


 B. SSL VPN requires installation of a resident VPN client.
 C. SSL VPN and IPSec VPN are the same.
 D. IPSec VPN requires installation of a resident VPN client and SSL VPN requires only an
installed Browser.

Hide Solution    Discussion  

Correct Answer: D

Question #143Topic 1
Which of the following will NOT affect acceleration?

 A. Connections destined to or originated from the Security gateway


 B. A 5-tuple match
 C. Multicast packets
 D. Connections that have a Handler (ICMP, FTP, H.323, etc.)

Hide Solution    Discussion  

Correct Answer: B

Question #144Topic 1
The following command is used to verify the CPUSE version:

 A. HostName:0>show installer status build


 B. [Expert@HostName:0]#show installer status
 C. [Expert@HostName:0]#show installer status build
 D. HostName:0>show installer build

Hide Solution    Discussion  


Correct Answer: A
Reference:
http://dkcheckpoint.blogspot.com/2017/11/how-to-fix-deployment-agent-issues.html

Question #145Topic 1
How do you enable virtual mac (VMAC) on-the-fly on a cluster member?

 A. cphaprob set int fwha_vmac_global_param_enabled 1


 B. clusterXL set int fwha_vmac_global_param_enabled 1
 C. fw ctl set int fwha_vmac_global_param_enabled 1
 D. cphaconf set int fwha_vmac_global_param_enabled 1

Hide Solution    Discussion  


Correct Answer: C
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk50840

Question #146Topic 1
To accelerate the rate of connection establishment, SecureXL groups all connection that match a
particular service and whose sole differentiating element is the source port. The type of grouping
enables even the very first packets of a TCP handshake to be accelerated. The first packets of the
first connection on the same service will be forwarded to the Firewall kernel which will then create
a template of the connection. Which of the these is NOT a SecureXL template?

 A. Accept Template
 B. Deny Template
 C. Drop Template
 D. NAT Template

Hide Solution    Discussion  


Correct Answer: B
Reference:
https://community.checkpoint.com/thread/7894-nat-templates-securexl

Question #147Topic 1
Which of the following is NOT a type of Check Point API available in R80.10?

 A. Identity Awareness Web Services


 B. OPSEC SDK
 C. Mobile Access
 D. Management

Hide Solution    Discussion  

Correct Answer: C

Question #148Topic 1
When an encrypted packet is decrypted, where does this happen?

 A. Security policy
 B. Inbound chain
 C. Outbound chain
 D. Decryption is not supported

Hide Solution     Discussion   1

Correct Answer: B
This is done in Inbound Chain. B is correct

Question #149Topic 1
John is using Management HA. Which Smartcenter should be connected to for making changes?
 A. secondary Smartcenter
 B. active Smartenter
 C. connect virtual IP of Smartcenter HA
 D. primary Smartcenter

Hide Solution    Discussion  

Correct Answer: B

Question #150Topic 1
You are asked to check the status of several user-mode processes on the management server
and gateway. Which of the following processes can only be seen on a Management Server?

 A. fwd
 B. fwm
 C. cpd
 D. cpwd

Hide Solution    Discussion  

Correct Answer: B

Question #151Topic 1
What scenario indicates that SecureXL is enabled?

 A. Dynamic objects are available in the Object Explorer


 B. SecureXL can be disabled in cpconfig
 C. fwaccel commands can be used in clish
 D. Only one packet in a stream is seen in a fw monitor packet capture

Hide Solution     Discussion   2

Correct Answer: C

Question #152Topic 1
What processes does CPM control?

 A. Object-Store, Database changes, CPM Process and web-services


 B. web-services, CPMI process, DLEserver, CPM process
 C. DLEServer, Object-Store, CP Process and database changes
 D. web_services, dle_server and object_Store

Hide Solution    Discussion  


Correct Answer: D
• Check Point Management (cpm) is the main management process. It provides the architecture for a
unified security environment. CPM allows the GUI client and management server to communicate
via web services using TCP port 19009. It empowers the migration from legacy Client-side logic to
Server-side logic. The cpm process performs database tasks, such as creating, deleting, and
modifying objects, and compiling policy. Processes controlled by CPM include:
web_services — Transfers requests to the dle_server.
dle_server — Contains all the logic of the server and validates information before it is written into the
database.
object_store — Translates and writes data to the database.

Question #153Topic 1
Which encryption algorithm is the least secured?

 A. AES-128
 B. AES-256
 C. DES
 D. 3DES

Hide Solution    Discussion  

Correct Answer: C

Question #154Topic 1
What is the command to check the status of the SmartEvent Correlation Unit?

 A. fw ctl get int cpsead_stat


 B. cpstat cpsead
 C. fw ctl stat cpsemd
 D. cp_conf get_stat cpsemd

Hide Solution    Discussion  


Correct Answer: B
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk113265

Question #155Topic 1
You need to see which hotfixes are installed on your gateway, which command would you use?

 A. cpinfo -h all
 B. cpinfo -o hotfix
 C. cpinfo -l hotfix
 D. cpinfo -y all

Hide Solution     Discussion   2


Correct Answer: D
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk72800

Answer is correct but exact command is cpinfo -y all

Question #156Topic 1
VPN Link Selection will perform the following when the primary VPN link goes down?

 A. The Firewall will drop the packets.


 B. The Firewall can update the Link Selection entries to start using a different link for the
same tunnel.
 C. The Firewall will send out the packet on all interfaces.
 D. The Firewall will inform the client that the tunnel is down.

Hide Solution    Discussion  

Correct Answer: B

Question #157Topic 1
Which of the following links will take you to the SmartView web application?

 A. https://<Security Management Server host name>/smartviewweb/


 B. https://<Security Management Server IP Address>/smartview/
 C. https://<Security Management Server host name>smartviewweb
 D. https://<Security Management Server IP Address>/smartview

Hide Solution     Discussion   1


Correct Answer: B
Reference:
https://community.checkpoint.com/thread/5212-smartview-accessing-check-point-logs-from-web

B, cuz it requires the / at the end

Question #158Topic 1
Which directory below contains log files?
 A. /opt/CPSmartlog-R80/log
 B. /opt/CPshrd-R80/log
 C. /opt/CPsuite-R80/fw1/log
 D. /opt/CPsuite-R80/log

Hide Solution    Discussion  

Correct Answer: C

Question #159Topic 1
Which GUI client is supported in R80?

 A. SmartProvisioning
 B. SmartView Tracker
 C. SmartView Monitor
 D. SmartLog

Hide Solution    Discussion  

Correct Answer: C

Question #160Topic 1
From SecureXL perspective, what are the tree paths of traffic flow:

 A. Initial Path; Medium Path; Accelerated Path


 B. Layer Path; Blade Path; Rule Path
 C. Firewall Path; Accept Path; Drop Path
 D. Firewall Path; Accelerated Path; Medium Path

Hide Solution    Discussion  

Correct Answer: D
https://sc1.checkpoint.com/documents/R76/CP_R76_Firewall_WebAdmin/92711.htm

Question #161Topic 1
To enable Dynamic Dispatch on Security Gateway without the Firewall Priority Queues, run the
following command in Expert mode and reboot:

 A. fw ctl Dyn_Dispatch on


 B. fw ctl Dyn_Dispatch enable
 C. fw ctl multik set_mode 4
 D. fw ctl multik set_mode 1
Hide Solution    Discussion  
Correct Answer: X(應為 fw ctl multik set_mode 0)
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk105261#Confiquration%20R80.10

Question #162Topic 1
What is the protocol and port used for Health Check and State Synchronization in ClusterXL?

 A. CCP and 18190


 B. CCP and 257
 C. CCP and 8116
 D. CPC and 8116

Hide Solution    Discussion  


Correct Answer: C
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/index.html

Question #163Topic 1
Which command shows the current connections distributed by CoreXL FW instances?

 A. fw ctl multik stat


 B. fw ctl affinity -l
 C. fw ctl instances -v
 D. fw ctl iflist

Hide Solution    Discussion  

Correct Answer: A

Question #164Topic 1
What is the purpose of extended master key extension/session hash?

 A. UDP VOIP protocol extension


 B. In case of TLS1.x it is a prevention of a Man-in-the-Middle attack/disclosure of the client-
server communication
 C. Special TCP handshaking extension
 D. Supplement DLP data watermark

Hide Solution    Discussion  


Correct Answer: B

Question #165Topic 1
In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies
the type of traffic applicable to the chain module. For Wire Mode configuration, chain modules
marked with __________________ will not apply.

 A. ffff
 B. 1
 C. 2
 D. 3

Hide Solution     Discussion   3

Correct Answer: B

https://dkcheckpoint.blogspot.com/2016/07/chapter-2-chain-module.html

Question #166Topic 1
Which one of the following is true about Capsule Connect?

 A. It is a full layer 3 VPN client


 B. It offers full enterprise mobility management
 C. It is supported only on iOS phones and Windows PCs
 D. It does not support all VPN authentication methods

Hide Solution    Discussion  

Correct Answer: A

Question #167Topic 1
How often does Threat Emulation download packages by default?

 A. Once a week
 B. Once an hour
 C. Twice per day
 D. Once per day

Hide Solution    Discussion  


Correct Answer: D
Reference:
https://sc1.checkpoint.com/documents/R77/CP_R77_ThreatPrevention_WebAdmin/101703.htm
Question #168Topic 1
You are investigating issues with to gateway cluster members are not able to establish the first
initial cluster synchronization. What service is used by the PWO daemon to do a Full
Synchronization?

 A. TCP port 443


 B. TCP port 257
 C. TCP port 256
 D. UDP port 8116

Hide Solution    Discussion  

Correct Answer: C
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_ClusterXL_AdminGuide/
html_frameset.htm?
topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_ClusterXL_AdminGuide/7288

Question #169Topic 1
Which statement is true about ClusterXL?

 A. Supports Dynamic Routing (Unicast and Multicast)


 B. Supports Dynamic Routing (Unicast Only)
 C. Supports Dynamic Routing (Multicast Only)
 D. Does not support Dynamic Routing

Hide Solution    Discussion  


Correct Answer: A
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7300.htm

Question #170Topic 1
Which command shows detailed information about VPN tunnels?

 A. cat $FWDIR/conf/vpn.conf
 B. vpn tu tlist
 C. vpn tu
 D. cpview

Hide Solution    Discussion  


Correct Answer: B
Reference:
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_Refere
nceGuide/html_frameset.htm?
topic=documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_ReferenceGuide/209239

Question #171Topic 1
Which Check Point software blades could be enforced under Threat Prevention profile using
Check Point R80.10 SmartConsole application?

 A. IPS, Anti-Bot, URL Filtering, Application Control, Threat Emulation.


 B. Firewall, IPS, Threat Emulation, Application Control.
 C. IPS, Anti-Bot, Anti-Virus, Threat Emulation, Threat Extraction.
 D. Firewall, IPS, Anti-Bot, Anti-Virus, Threat Emulation.

Hide Solution    Discussion  

Correct Answer: C

Question #172Topic 1
When gathering information about a gateway using CPINFO, what information is included or
excluded when using the "-x" parameter?

 A. Includes the registry


 B. Gets information about the specified Virtual System
 C. Does not resolve network addresses
 D. Output excludes connection table

Hide Solution    Discussion  


Correct Answer: B
Reference:
https://www.networksecurityplus.net/2015/02/check-point-how-to-collect-cpinfo-cli.html

Question #173Topic 1
What component of R80 Management is used for indexing?

 A. DBSync
 B. API Server
 C. fwm
 D. SOLR

Hide Solution    Discussion  


Correct Answer: D
Reference:
https://www.checkpoint.com/downloads/product-related/r80.10-mgmt-architecture-overview.pdf

Question #174Topic 1
After making modifications to the $CVPNDIR/conf/cvpnd.C file, how would you restart the
daemon?

 A. cvpnd_restart
 B. cvpnd_restart
 C. cvpnd restart
 D. cvpnrestart

Hide Solution     Discussion   2


Correct Answer: D
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk34939

Question #175Topic 1
SandBlast has several functional components that work together to ensure that attacks are
prevented in real-time. Which the following is NOT part of the SandBlast component?

 A. Threat Emulation
 B. Mobile Access
 C. Mail Transfer Agent
 D. Threat Cloud

Hide Solution     Discussion   2

Correct Answer: B
Correct Answer is B
   upvoted 3 times
 

wongex23

 7 months ago
Agree, "C" should be wrong as this support case mentioned: Enhanced control over MTA actions in cases of
failures: MTA is often configured to block emails in case SandBlast fails to scan them. Administrators can
now configure MTA so that in the event of specific failure types, the emails will bypass SandBlast and not be
blocked. https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk123174

Question #176Topic 1
With Mobile Access enabled, administrators select the web-based and native applications that can
be accessed by remote users and define the actions that users can perform the applications.
Mobile Access encrypts all traffic using:

 A. HTTPS for web-based applications and 3DES or RC4 algorithm for native applications.
For end users to access the native applications, they need to install the SSL. Network Extender.
 B. HTTPS for web-based applications and AES or RSA algorithm for native applications.
For end users to access the native application, they need to install the SSL. Network Extender.
 C. HTTPS for web-based applications and 3DES or RC4 algorithm for native applications.
For end users to access the native applications, no additional software is required.
 D. HTTPS for web-based applications and AES or RSA algorithm for native applications.
For end users to access the native application, no additional software is required.

Hide Solution    Discussion  


Correct Answer: A
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_Mobile_Access_WebAdmin/23024.htm

Question #177Topic 1
What is the benefit of "tw monitor" over "tcpdump"?

 A. "fw monitor" reveals Layer 2 information, while "tcpdump" acts at Layer 3.


 B. "fw monitor" is also available for 64-Bit operating systems.
 C. With "fw monitor", you can see the inspection points, which cannot be seen in "tcpdump"
 D. "fw monitor" can be used from the CLI of the Management Server to collect information
from multiple gateways.

Hide Solution    Discussion  

Correct Answer: C

Question #178Topic 1
Which of the following describes how Threat Extraction functions?

 A. Detect threats and provides a detailed report of discovered threats.


 B. Proactively detects threats.
 C. Delivers file with original content.
 D. Delivers PDF versions of original files with active content removed.

Hide Solution     Discussion   2

Correct Answer: D
Correct answer is B
   upvoted 1 times
 

Ang7

 4 months ago
D should be the answer.

Question #179Topic 1
Security Checkup Summary can be easily conducted within:

 A. Summary
 B. Views
 C. Reports
 D. Checkups

Hide Solution     Discussion   1

Correct Answer: C
C is the answer

Question #180Topic 1
What command can you use to have cpinfo display all installed hotfixes?

 A. cpinfo -hf
 B. cpinfo -y all
 C. cpinfo -get hf
 D. cpinfo installed_jumbo

Hide Solution    Discussion  

Correct Answer: B

Question #181Topic 1
What is the port used for SmartConsole to connect to the Security Management Server?

 A. CPMI port 18191/TCP


 B. CPM port/TCP port 19009
 C. SIC port 18191/TCP
 D. https port 4434/TCP

Hide Solution     Discussion   3

Correct Answer: B

Correct answer is B
   upvoted 3 times
 

wongex23

 6 months, 3 weeks ago


Agree.
   upvoted 1 times
 

MHU

 6 months ago
Correct is B, CPMI use 18190 and not 18191

Question #182Topic 1
What is considered Hybrid Emulation Mode?

 A. Manual configuration of file types on emulation location.


 B. Load sharing of emulation between an on premise appliance and the cloud.
 C. Load sharing between OS behavior and CPU Level emulation.
 D. High availability between the local SandBlast appliance and the cloud.

Hide Solution    Discussion  

Correct Answer: B

Question #183Topic 1
When setting up an externally managed log server, what is one item that will not be configured on
the R80 Security Management Server?

 A. IP
 B. SIC
 C. NAT
 D. FQDN

Hide Solution     Discussion   1

Correct Answer: C

Question #184Topic 1
Customer's R80 management server needs to be upgraded to R80.10. What is the best upgrade
method when the management server is not connected to the
Internet?

 A. Export R80 configuration, clean install R80.10 and import the configuration
 B. CPUSE offline upgrade
 C. CPUSE online upgrade
 D. SmartUpdate upgrade

Hide Solution     Discussion   2

Correct Answer: B

Question #185Topic 1
When installing a dedicated R80 SmartEvent server. What is the recommended size of the root
partition?

 A. Any size
 B. Less than 20GB
 C. More than 10GB and less than 20GB
 D. At least 20GB

Hide Solution    Discussion  


Correct Answer: D
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_LoggingAndMonitoring/html_frameset.htm?
topic=documents/R80/CP_R80_LoggingAndMonitoring/120829

Question #186Topic 1
As an administrator, you may be required to add the company logo to reports. To do this, you
would save the logo as a PNG file with the name "˜cover-company-
[1]

 A. SFWDIR/smartevent/conf
 B. $RTDIR/smartevent/conf
 C. $RTDIR/smartview/conf
 D. $FWDIR/smartview/conf

Hide Solution    Discussion  


Correct Answer: C
Reference:
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_LoggingAndMo
nitoring_AdminGuide/html_frameset.htm?
topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_LoggingAndMonitoring_AdminGuide/
188029

Question #187Topic 1
Which one of the following is true about Threat Extraction?

 A. Always delivers a file to user


 B. Works on all MS Office, Executables, and PDF files
 C. Can take up to 3 minutes to complete
 D. Delivers file only if no threats found

Hide Solution    Discussion  

Correct Answer: A

Question #188Topic 1
Which one of the following is true about Threat Emulation?

 A. Takes less than a second to complete


 B. Works on MS Office and PDF files only
 C. Always delivers a file
 D. Takes minutes to complete (less than 3 minutes)

Hide Solution    Discussion  

Correct Answer: D

Question #189Topic 1
Both ClusterXL and VRRP are fully supported by Gaia R80.10 and available to all Check Point
appliances. Which the following command is NOT related to redundancy and functions?

 A. cphaprob stat
 B. cphaprob -a if
 C. cphaprob -l list
 D. cphaprob all show stat

Hide Solution    Discussion  

Correct Answer: D

Question #190Topic 1
What is the purpose of a SmartEvent Correlation Unit?

 A. The SmartEvent Correlation Unit is designed to check the connection reliability from
SmartConsole to the SmartEvent Server.
 B. The SmartEvent Correlation Unit's task it to assign severity levels to the identified
events.
 C. The Correlation unit role is to evaluate logs from the log server component to identify
patterns/threats and convert them to events.
 D. The SmartEvent Correlation Unit is designed to check the availability of the
SmartReporter Server.

Hide Solution    Discussion  

Correct Answer: C

Question #191Topic 1
What are the main stages of a policy installations?

 A. Verification & Compilation, Transfer and Commit


 B. Verification & Compilation, Transfer and Installation
 C. Verification, Commit, Installation
 D. Verification, Compilation & Transfer, Installation

Hide Solution     Discussion   1

Correct Answer: A

According to the CCSE manual, at page 252, A is correct !


https://community.checkpoint.com/t5/General-Management-Topics/Policy-Installation-Stages/td-p/23105

Question #192Topic 1
What is a best practice before starting to troubleshoot using the "fw monitor" tool?

 A. Run the command: fw monitor debug on


 B. Clear the connections table
 C. Disable CoreXL
 D. Disable SecureXL

Hide Solution    Discussion  

Correct Answer: D

Question #193Topic 1
SmartEvent does NOT use which of the following procedures to identify events:

 A. Matching a log against each event definition


 B. Create an event candidate
 C. Matching a log against local exclusions
 D. Matching a log against global exclusions

Hide Solution    Discussion  


Correct Answer: C
Events are detected by the SmartEvent Correlation Unit. The Correlation Unit task is to scan logs
for criteria that match an Event Definition. SmartEvent uses these procedures to identify events: "¢
Matching a Log Against Global Exclusions "¢ Matching a Log Against Each Event Definition "¢
Creating an Event Candidate "¢ When a Candidate Becomes an Event
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_SmartEvent_AdminGuide/17401.htm

Question #194Topic 1
What is the most recommended way to install patches and hotfixes?

 A. CPUSE Check Point Update Service Engine


 B. rpm-Uv
 C. Software Update Service
 D. UnixinstallScript

Hide Solution    Discussion  

Correct Answer: A

Question #195Topic 1
Automation and Orchestration differ in that:

 A. Automation relates to codifying tasks, whereas orchestration relates to codifying


processes.
 B. Automation involves the process of coordinating an exchange of information through web
service interactions such as XML and JSON, but orchestration does not involve processes.
 C. Orchestration is concerned with executing a single task, whereas automation takes a
series of tasks and puts them all together into a process workflow.
 D. Orchestration relates to codifying tasks, whereas automation relates to codifying
processes.

Hide Solution    Discussion  

Correct Answer: A

Question #196Topic 1
An administrator would like to troubleshoot why templating is not working for some traffic. How can
he determine at which rule templating is disabled?

 A. He can use the fw accel stat command on the gateway.


 B. He can use the fw accel statistics command on the gateway.
 C. He can use the fwaccel stat command on the Security Management Server.
 D. He can use the fwaccel stat command on the gateway

Hide Solution    Discussion  

Correct Answer: D

Question #197Topic 1
Which web services protocol is used to communicate to the Check Point R80 Identity Awareness
Web API?

 A. SOAP
 B. REST
 C. XLANG
 D. XML-RPC

Hide Solution    Discussion  


Correct Answer: B
The Identity Web API uses the REST protocol over SSL. The requests and responses are HTTP
and in JSON format.
Reference:
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_IdentityAwaren
ess_AdminGuide/html_frameset.htm?
topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_IdentityAwareness_AdminGuide/148
699

Question #198Topic 1
What is mandatory for ClusterXL to work properly?
 A. The number of cores must be the same on every participating cluster node
 B. The Magic MAC number must be unique per cluster node
 C. The Sync interface must not have an IP address configured
 D. If you have "Non-monitored Private" interfaces, the number of those interfaces must be
the same on all cluster members

Hide Solution     Discussion   2

Correct Answer: A
Question #199Topic 1
Please choose correct command to add an "emailserver1" host with IP address 10.50.23.90 using
GAiA management CLI?

 A. host name myHost12 ip-address 10.50.23.90


 B. mgmt: add host name ip-address 10.50.23.90
 C. add host name emailserver1 ip-address 10.50.23.90
 D. mgmt: add host name emailserver1 ip-address 10.50.23.90

Hide Solution    Discussion  

Correct Answer: D

Question #200Topic 1
Using Threat Emulation technologies, what is the best way to block .exe and .bat file types?

 A. enable DLP and select.exe and .bat file type


 B. enable .exe & .bat protection in IPS Policy
 C. create FW rule for particular protocol
 D. tecli advanced attributes set prohibited_file_types exe.bat

Hide Solution     Discussion   3

Correct Answer: D
Correct answer should be "D"
https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/taiwan/422/1/Check%20Point
%20Sandblast%20PoC%20Guide%20v91.pdf
   upvoted 2 times
 

pfunkylol

 4 months, 2 weeks ago


tecli refers to scanning archives. 10.10.3 Blocking filetypes inside archives To block certain filetypes inside
archives (which is currently not possible with AV filetype blocking) use the following TECLI command:
Enabling prohibited file types in archives On the gateway, run the command: tecli advanced attribute set
prohibited_file_types <file_type1>,<file_type2>
   upvoted 1 times
 

eliteone11

 2 months, 3 weeks ago


I agree with wongex23. DLP has nothing to do with the "Threat Emulation" blade whatsoever.

Question #201Topic 1
What is the recommended number of physical network interfaces in a Mobile Access cluster
deployment?

 A. 4 Interfaces - an interface leading to the organization, a second interface leading to the
internet, a third interface for synchronization, a fourth interface leading to the Security
Management Server.
 B. 3 Interfaces - an interface leading to the organization, a second interface leading to the
Internet, a third interface for synchronization.
 C. 1 Interface - an interface leading to the organization and the Internet, and configure for
synchronization.
 D. 2 Interfaces - a data interface leading to the organization and the Internet, a second
interface for synchronization.

Hide Solution    Discussion  


Correct Answer: B
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_Mobile_Access_WebAdmin/41723.htm

Question #202Topic 1
Which process handles connection from SmartConsole R80?

 A. fwm
 B. cpmd
 C. cpm
 D. cpd

Hide Solution    Discussion  

Correct Answer: C
Question #203Topic 1
What is the command to show SecureXL status?

 A. fwaccel status
 B. fwaccel stats -m
 C. fwaccel -s
 D. fwaccel stat

Hide Solution    Discussion  


Correct Answer: D
To check overall SecureXL status:
[Expert@HostName]# fwaccel stat
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk41397

Question #204Topic 1
The SmartEvent R80 Web application for real-time event monitoring is called:

 A. SmartView Monitor
 B. SmartEventWeb
 C. There is no Web application for SmartEvent
 D. SmartView

Hide Solution     Discussion   2

Correct Answer: D
D. SmartView
   upvoted 4 times
 

secadmin44

 2 weeks, 2 days ago


Due to Check Point D Smart View is correct!

Question #205Topic 1
What will SmartEvent automatically define as events?

 A. Firewall
 B. VPN
 C. IPS
 D. HTTPS

Hide Solution    Discussion  


Correct Answer: C
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_LoggingAndMonitoring/html_frameset.htm?
topic=documents/R80/CP_R80_LoggingAndMonitoring/131915

Question #206Topic 1
With MTA (Mail Transfer Agent) enabled the gateways manages SMTP traffic and holds external
email with potentially malicious attachments. What is required in order to enable MTA (Mail
Transfer Agent) functionality in the Security Gateway?

 A. Threat Cloud Intelligence


 B. Threat Prevention Software Blade Package
 C. Endpoint Total Protection
 D. Traffic on port 25

Hide Solution    Discussion  

Correct Answer: B

Question #207Topic 1
What is not a purpose of the deployment of Check Point API?

 A. Execute an automated script to perform common tasks


 B. Create a customized GUI Client for manipulating the objects database
 C. Create products that use and enhance the Check Point solution rd
 D. Integrate Check Point products with 3 party solution

Hide Solution    Discussion  


Correct Answer: B
Reference:
http://dl3.checkpoint.com/paid/29/29532b9eec50d0a947719ae631f640d0/CP_R80_CheckPoint_A
PI_ReferenceGuide.pdf?HashKey=1553448816_5e9549c0106f3111f72548e036dd8ef7&xtn=.pdf

Question #208Topic 1
You need to change the number of firewall Instances used by CoreXL. How can you achieve this
goal?

 A. edit fwaffinity.conf; reboot required


 B. cpconfig; reboot required
 C. edit fwaffinity.conf; reboot not required
 D. cpconfig; reboot not required

Hide Solution    Discussion  


Correct Answer: B
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_PerformanceTuning_WebAdmin/6731.htm#o
94530

Question #209Topic 1
Fill in the blank: Identity Awareness AD-Query is using the Microsoft _______________ API to
learn users from AD.

 A. WMI
 B. Eventvwr
 C. XML
 D. Services.msc

Hide Solution    Discussion  


Correct Answer: A
Reference:
http://dl3.checkpoint.com/paid/e0/e01d7daa665096a4941f930f2567d29e/CP_R80.10_IdentityAwa
reness_AdminGuide.pdf?
HashKey=1553448919_104b8593c2a2087ec2ffe8e86b314d66&xtn=.pdfpage 17

Question #210Topic 1
Which is not a blade option when configuring SmartEvent?

 A. Correlation Unit
 B. SmartEvent Unit
 C. SmartEvent Server
 D. Log Server

Hide Solution    Discussion  


Correct Answer: B
On the Management tab, enable these Software Blades:
✑ Logging & Status
✑ SmartEvent Server
✑ SmartEvent Correlation Unit
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_LoggingAndMonitoring/html_frameset.htm?
topic=documents/R80/CP_R80_LoggingAndMonitoring/120829

Question #211Topic 1
The essential means by which state synchronization works to provide failover in the event an
active member goes down, ____________ is used specifically for clustered environments to allow
gateways to report their own state and learn about the states of other members in the cluster.

 A. ccp
 B. cphaconf
 C. cphad
 D. cphastart

Hide Solution    Discussion  


Correct Answer: A
Reference:
https://etherealmind.com/checkpoint-nokia-firewall-cluster-xl/?
doing_wp_cron=1553442264.8447830677032470703125

Question #212Topic 1
Which statement is most correct regarding about "CoreXL Dynamic Dispatcher"?

 A. The CoreXL FW instances assignment mechanism is based on Source MAC addresses,


Destination MAC addresses
 B. The CoreXL FW instances assignment mechanism is based on the utilization of CPU
cores
 C. The CoreXL FW instances assignment mechanism is based on IP Protocol type
 D. The CoreXl FW instances assignment mechanism is based on Source IP addresses,
Destination IP addresses, and the IP "˜Protocol' type

Hide Solution    Discussion  


Correct Answer: B
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk105261

Question #213Topic 1
What CLI command compiles and installs a Security Policy on the target's Security Gateways?

 A. fwm compile
 B. fwm load
 C. fwm fetch
 D. fwm install

Hide Solution    Discussion  


Correct Answer: B
Reference:
http://dl3.checkpoint.com/paid/7e/CheckPoint_R65_CLI_AdminGuide.pdf?
HashKey=1540653105_b07751355cf424cd738b8409d23ad59c&xtn=.pdf

uestion #214Topic 1
Pamela is Cyber Security Engineer working for Global Instance Firm with large scale deployment
of Check Point Enterprise Appliances using GAiA/R80.10.
Company's Developer Team is having random access issue to newly deployed Application Server
in DMZ's Application Server Farm Tier and blames DMZ
Security Gateway as root cause. The ticket has been created and issue is at Pamela's desk for an
investigation. Pamela decides to use Check Point's Packet
Analyzer Tool-fw monitor to iron out the issue during approved Maintenance window. What do you
recommend as the best suggestion for Pamela to make sure she successfully captures entire
traffic in context of Firewall and problematic traffic?

 A. Pamela should check SecureXL status on DMZ Security gateway and if it's turned ON.
She should turn OFF SecureXL before using fw monitor to avoid misleading traffic captures.
 B. Pamela should check SecureXL status on DMZ Security Gateway and if it's turned OFF.
She should turn ON SecureXL before using fw monitor to avoid misleading traffic captures.
 C. Pamela should use tcpdump over fw monitor tool as tcpdump works at OS-level and
captures entire traffic.
 D. Pamela should use snoop over fw monitor tool as snoop works at NIC driver level and
captures entire traffic.

Hide Solution    Discussion  

Correct Answer: A

Question #215Topic 1
Fill in the blank: The "fw monitor" tool can be best used to troubleshoot ____________________.

 A. AV issues
 B. VPN errors
 C. Network issues
 D. Authentication issues
Hide Solution    Discussion  

Correct Answer: C

Question #216Topic 1
In which formats can Threat Emulation forensics reports be viewed in?

 A. TXT, XML and CSV


 B. PDF and TXT
 C. PDF, HTML, and XML
 D. PDF and HTML

Hide Solution     Discussion   2

Correct Answer: D

Should be D
   upvoted 1 times
 

secadmin44

 2 weeks, 2 days ago


Due to Check Point D "PDF and HTML" is correct

Question #217Topic 1
In ClusterXL Load Sharing Multicast Mode:

 A. only the primary member received packets sent to the cluster IP address
 B. only the secondary member receives packets sent to the cluster IP address
 C. packets sent to the cluster IP address are distributed equally between all members of the
cluster
 D. every member of the cluster received all of the packets sent to the cluster IP address

Hide Solution    Discussion  


Correct Answer: D
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/html_frameset.htm

Question #218Topic 1
What kind of information would you expect to see using the sim affinity command?

 A. The VMACs used in a Security Gateway cluster


 B. The involved firewall kernel modules in inbound and outbound packet chain
 C. Overview over SecureXL templated connections
 D. Network interfaces and core distribution used for CoreXL

Hide Solution    Discussion  

Correct Answer: D

Question #219Topic 1
What cloud-based SandBlast Mobile application is used to register new devices and users?

 A. Check Point Protect Application


 B. Management Dashboard
 C. Behavior Risk Engine
 D. Check Point Gateway

Hide Solution     Discussion   2

Correct Answer: D
https://community.checkpoint.com/t5/SandBlast-Mobile/SandBlast-Mobile-Architecture-Overview/td-
p/40322

Question #220Topic 1
What is the responsibility of SOLR process on R80.10 management server?

 A. Validating all data before it's written into the database


 B. It generates indexes of data written to the database
 C. Communication between SmartConsole applications and the Security Management
Server
 D. Writing all information into the database

Hide Solution    Discussion  

Correct Answer: B

Question #221Topic 1
In the Firewall chain mode FFF refers to:

 A. Stateful Packets
 B. No Match
 C. All Packets
 D. Stateless Packets
Hide Solution    Discussion  
Correct Answer: C
Reference:
http://dkcheckpoint.blogspot.com/2016/07/chapter-2-chain-module.html

Question #222Topic 1
Which file gives you a list of all security servers in use, including port number?

 A. $FWDIR/conf/conf.conf
 B. $FWDIR/conf/servers.conf
 C. $FWDIR/conf/fwauthd.conf
 D. $FWDIR/conf/serversd.conf

Hide Solution    Discussion  

Correct Answer: C

Question #223Topic 1
Which of the following commands shows the status of processes?

 A. cpwd_admin -l
 B. cpwd -l
 C. cpwd admin_list
 D. cpwd_admin list

Hide Solution    Discussion  


Correct Answer: D
Reference:
https://community.checkpoint.com/thread/8054-cpwdadmin-list-overview-sms

Question #224

Question #224Topic 1
What is the valid range for VRID value in VRRP configuration?

 A. 1-254
 B. 1-255
 C. 0-254
 D. 0-255

Hide Solution     Discussion   3


Correct Answer: B
Virtual Router ID - Enter a unique ID number for this virtual router. The range of valid values is 1 to
255.
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_Gaia_WebAdmin/87911.htm
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_Gaia_AdminGui
de/html_frameset.htm?
topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_Gaia_AdminGuide/161554

Question #225Topic 1
What is true of the API server on R80.10?

 A. By default the API-server is activated and does not have hardware requirements.
 B. By default the API-server is not active and should be activated from the WebUI.
 C. By default the API server is active on management and stand-alone servers with 16GB
of RAM (or more).
 D. By default, the API server is active on management servers with 4 GB of RAM (or more)
and on stand-alone servers with 8GB of RAM (or more).

Hide Solution    Discussion  


Correct Answer: D
Reference:
https://sc1.checkpoint.com/documents/R80/APIs/#introduction%20

Question #226Topic 1
To ensure that VMAC mode is enabled, which CLI command should you run on all cluster
members?

 A. fw ctl set int fwha vmac global param enabled


 B. fw ctl get int vmac global param enabled; result of command should return value 1
 C. cphaprob-a if
 D. fw ctl get int fwha_vmac_global_param_enabled; result of command should return value
1

Hide Solution    Discussion  


Correct Answer: D
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7292.htm

Question #227Topic 1
For best practices, what is the recommended time for automatic unlocking of locked admin
accounts?

 A. 20 minutes
 B. 15 minutes
 C. Admin account cannot be unlocked automatically
 D. 30 minutes at least

Hide Solution    Discussion  

Correct Answer: D

Question #228Topic 1
Which is NOT a SmartEvent component?

 A. SmartEvent Server
 B. Correlation Unit
 C. Log Consolidator
 D. Log Server

Hide Solution    Discussion  

Correct Answer: C
Question #229Topic 1
Check Point APIs allow system engineers and developers to make changes to their organization's
security policy with CLI tools and Web Services for all the following except: rd

 A. Create new dashboards to manage 3 party task


 B. Create products that use and enhance 3 rd party solutions
 C. Execute automated scripts to perform common tasks
 D. Create products that use and enhance the Check Point Solution

Hide Solution    Discussion  


Correct Answer: A
Check Point APIs let system administrators and developers make changes to the security policy
with CLI tools and web-services. You can use an API to: "¢ Use an automated script to perform
common tasks "¢ Integrate Check Point products with 3rd party solutions "¢ Create products that
use and enhance the Check Point solution
Reference:
http://dl3.checkpoint.com/paid/29/29532b9eec50d0a947719ae631f640d0/CP_R80_CheckPoint_A
PI_ReferenceGuide.pdf?HashKey=1522190468_125d63ea5296b7dadd3e4fd81c708cc5&xtn=.pdf
Question #230Topic 1
When SecureXL is enabled, all packets should be accelerated, except packets that match the
following conditions:

 A. All UDP packets


 B. All IPv6 Traffic
 C. All packets that match a rule whose source or destination is the Outside Corporate
Network
 D. CIFS packets

Hide Solution    Discussion  

Correct Answer: D

Question #231Topic 1
On what port does the CPM process run?

 A. TCP 857
 B. TCP 18192
 C. TCP 900
 D. TCP 19009

Hide Solution    Discussion  


Correct Answer: D
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_MultiDomainSecurity/html_frameset.htm?
topic=documents/R80/CP_R80_MultiDomainSecurity/15420

Question #232Topic 1
What is the SandBlast Agent designed to do?

 A. Performs OS-level sandboxing for SandBlast Cloud architecture


 B. Ensure the Check Point SandBlast services is running on the end user's system
 C. If malware enters an end user's system, the SandBlast Agent prevents the malware from
spreading with the network
 D. Clean up email sent with malicious attachments

Hide Solution    Discussion  


Correct Answer: C
Reference:
https://www.checkpoint.com/downloads/product-related/datasheets/ds-sandblast-agent.pdf
Question #233Topic 1
What is correct statement about Security Gateway and Security Management Server failover in
Check Point R80.X in terms of Check Point Redundancy driven solution?

 A. Security Gateway failover is an automatic procedure but Security Management Server


failover is a manual procedure.
 B. Security Gateway failover as well as Security Management Server failover is a manual
procedure.
 C. Security Gateway failover is a manual procedure but Security Management Server
failover is an automatic procedure.
 D. Security Gateway failover as well as Security Management Server failover is an
automatic procedure.

Hide Solution    Discussion  

Correct Answer: A

Question #234Topic 1
Fill in the blank. The R80 feature ___________________ permits blocking specific IP addresses
for a specified time period.

 A. Block Port Overflow


 B. Local Interface Spoofing
 C. Suspicious Activity Monitoring
 D. Adaptive Threat Prevention

Hide Solution    Discussion  

Correct Answer: C

Question #235Topic 1
What command would show the API server status?

 A. cpm status
 B. api restart
 C. api status
 D. show api status

Hide Solution    Discussion  


Correct Answer: C
Reference:
https://community.checkpoint.com/thread/6524-can-anybody-let-me-know-how-can-we-import-
policyrules-via-csv-file

Question #236Topic 1
In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of
the following options can you add to each Log, Detailed Log and Extended Log?

 A. Accounting
 B. Suppression
 C. Accounting/Suppression
 D. Accounting/Extended

Hide Solution    Discussion  


Correct Answer: C
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_LoggingAndMonitoring/html_frameset.htm?
topic=documents/R80/CP_R80_LoggingAndMonitoring/131914

Question #237Topic 1
Which file contains the host address to be published, the MAC address that needs to be
associated with the IP Address, and the unique IP of the interface that responds to ARP request?

 A. /opt/CPshrd-R80/conf/local.arp
 B. /var/opt/CPshrd-R80/conf/local.arp
 C. $CPDIR/conf/local.arp
 D. $FWDIR/conf/local.arp

Hide Solution    Discussion  

Correct Answer: D

Question #238Topic 1
With SecureXL enabled, accelerated packets will pass through the following:

 A. Network Interface Card, OSI Network Layer, OS IP Stack, and the Acceleration Device
 B. Network Interface Card, Check Point Firewall Kernal, and the Acceleration Device
 C. Network Interface Card and the Acceleration Device
 D. Network Interface Card, OSI Network Layer, and the Acceleration Device

Hide Solution    Discussion  

Correct Answer: C
Question #239Topic 1
Which command would you use to set the network interfaces' affinity in Manual mode?

 A. sim affinity -m
 B. sim affinity -l
 C. sim affinity -a
 D. sim affinity -s

Hide Solution    Discussion  

Correct Answer: D

Question #240Topic 1
You notice that your firewall is under a DDoS attack and would like to enable the Penalty Box
feature, which command you use?

 A. sim erdos -e 1
 B. sim erdos - m 1
 C. sim erdos -v 1
 D. sim erdos -x 1

Hide Solution    Discussion  

Correct Answer: A

Question #241Topic 1
Which of the following is NOT an option to calculate the traffic direction?

 A. Incoming
 B. Internal
 C. External
 D. Outgoing

Hide Solution     Discussion   2

Correct Answer: C

Should be C?
https://sc1.checkpoint.com/documents/R80/CP_R80_LoggingAndMonitoring/html_frameset.htm?
topic=documents/R80/CP_R80_LoggingAndMonitoring/131915
   upvoted 1 times
 
MHU

 6 months ago
If we refer to question 16, must be C

Question #242Topic 1
What command lists all interfaces using Multi-Queue?

 A. cpmq get
 B. show interface all
 C. cpmq set
 D. show multiqueue all

Hide Solution    Discussion  


Correct Answer: A
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_PerformanceTuning_WebAdmin/93689.htm

Question #243Topic 1
When deploying SandBlast, how would a Threat Emulation appliance benefit from the integration
of ThreatCloud?

 A. ThreatCloud is a database-related application which is located on-premise to preserve


privacy of company-related data
 B. ThreatCloud is a collaboration platform for all the CheckPoint customers to form a virtual
cloud consisting of a combination of all on-premise private cloud environments
 C. ThreatCloud is a collaboration platform for Check Point customers to benefit from
VMWare ESXi infrastructure which supports the Threat Emulation Appliances as virtual machines
in the EMC Cloud
 D. ThreatCloud is a collaboration platform for all the Check Point customers to share
information about malicious and benign files that all of the customers can benefit from as it makes
emulation of known files unnecessary

Hide Solution    Discussion  

Correct Answer: D

Question #244Topic 1
During the Check Point Stateful Inspection Process, for packets that do not pass Firewall Kernel
Inspection and are rejected by the rule definition, packets are:

 A. Dropped without sending a negative acknowledgment


 B. Dropped without logs and without sending a negative acknowledgment
 C. Dropped with negative acknowledgment
 D. Dropped with logs and without sending a negative acknowledgment

Hide Solution    Discussion  

Correct Answer: C

Question #245Topic 1
Vanessa is firewall administrator in her company. Her company is using Check Point firewall on a
central and several remote locations which are managed centrally by R77.30 Security
Management Server. On central location is installed R77.30 Gateway on Open server. Remote
locations are using Check Point UTM-1 570 series appliances with R75.30 and some of them are
using a UTM-1-Edge-X or Edge-W with latest available firmware. She is in process of migrating to
R80.What can cause Vanessa unnecessary problems, if she didn't check all requirements for
migration to R80?

 A. Missing an installed R77.20 Add-on on Security Management Server


 B. Unsupported firmware on UTM-1 Edge-W appliance
 C. Unsupported version on UTM-1 570 series appliance
 D. Unsupported appliances on remote locations

Hide Solution    Discussion  

Correct Answer: A
Question #246Topic 1
Please choose the path to monitor the compliance status of the Check Point R80.10 based
management.

 A. Gateways & Servers --> Compliance View


 B. Compliance blade not available under R80.10
 C. Logs & Monitor --> New Tab --> Open compliance View
 D. Security & Policies --> New Tab --> Compliance View

Hide Solution    Discussion  

Correct Answer: C

You might also like