CheckPoint Firewall Questions
CheckPoint Firewall Questions
CheckPoint Firewall Questions
77
QUESTION NO: 1
In the following cluster configuration; if you reboot sglondon_1 which device will be active when
sglondon_1 is back up and running? Why?
A. sglondon_1 because it the first configured object with the lowest IP.
B. sglondon_2 because sglondon_1 has highest IP.
C. sglondon_1, because it is up again, sglondon_2 took over during reboot.
D. sglondon_2 because it has highest priority.
Answer: D
Explanation:
QUESTION NO: 2
You find that Gateway fw2 can NOT be added to the cluster object.
A. 2 or 3
B. 1 or 2
C. 1 or 3
D. All
Answer: C
Explanation:
QUESTION NO: 3
A. Rules 2 and 5
B. Rules 2 through 5
C. Rule 2 only
D. All rules except Rule 3
Answer: D
Explanation:
QUESTION NO: 4
You are trying to configure Directional VPN Rule Match in the Rule Base. But the Match column
does not have the option to see the Directional Match. You see the following window. What must
you enable to see the Directional Match?
Answer: C
Explanation:
QUESTION NO: 5
MultiCorp is running Smartcenter R71 on an IPSO platform and wants to upgrade to a new
Appliance with R77. Which migration tool is recommended?
A. Download Migration Tool R77 for IPSO and Splat/Linux from Check Point website.
B. Use already installed Migration Tool.
C. Use Migration Tool from CD/ISO
D. Fetch Migration Tool R71 for IPSO and Migration Tool R77 for Splat/Linux from CheckPoint
Answer: A
Explanation:
QUESTION NO: 6
MegaCorp is running Smartcenter R70, some Gateways at R65 and some other Gateways with
R60. Management wants to upgrade to the most comprehensive IPv6 support. What should the
administrator do first?
Answer: D
Explanation:
QUESTION NO: 7
MicroCorp experienced a security appliance failure. (LEDs of all NICs are off.) The age of the unit
required that the RMA-unit be a different model. Will a revert to an existing snapshot bring the new
unit up and running?
Answer: D
Explanation:
QUESTION NO: 8
A. R65
Answer: A
Explanation:
QUESTION NO: 9
Can you implement a complete R77 IPv6 deployment without IPv4 addresses?
Answer: C
Explanation:
QUESTION NO: 10
A. There is no limit.
B. 16
C. 6
D. 2
Answer: C
Explanation:
QUESTION NO: 11
Select the command set best used to verify proper failover function of a new ClusterXL
configuration.
A. reboot
B. cphaprob -d failDevice -s problem -t 0 register / cphaprob -d failDevice unregister
Answer: C
Explanation:
QUESTION NO: 12
You are troubleshooting a HTTP connection problem. You've started fw monitor -o http.pcap.
When you open http.pcap with Wireshark there is only one line. What is the most likely reason?
Answer: D
Explanation:
QUESTION NO: 13
Answer: D
Explanation:
QUESTION NO: 14
4) same policy
A. 1, 3, and 4
B. 1, 2, and 4
C. 2, 3, and 4
D. 1, 2, and 3
Answer: B
Explanation:
Fill in the blank. You can set Acceleration to ON or OFF using command syntax ___________ .
QUESTION NO: 16
You run cphaprob -a if. When you review the output, you find the word DOWN. What does DOWN
mean?
Answer: D
Explanation:
QUESTION NO: 17
Which three of the following components are required to get a SmartEvent up and running?
1) SmartEvent SIC
3) SmartEvent Server
5) SmartEvent Client
A. 2, 3, and 5
B. 1, 2, and 4
C. 1, 2, and 3
D. 3, 4, and 5
Answer: A
Explanation:
QUESTION NO: 18
MegaCorp is using SmartCenter Server with several gateways. Their requirements result in a
heavy log load. Would it be feasible to add the SmartEvent Correlation Unit and SmartEvent
Server to their SmartCenter Server?
Answer: B
Explanation:
Fill in the blank. To verify that a VPN Tunnel is properly established, use the command _________
MultiCorp is located in Atlanta. It has a branch office in Europe, Asia, and Africa. Each location
has its own AD controller for local user login. How many ADqueries have to be configured?
Answer: 4
Fill in the blank. The command that typically generates the firewall application, operating system,
and hardware specific drivers is _________ .
Answer: snapshot
Fill in the blanks. To view the number of concurrent connections going through your firewall, you
would use the command and syntax __ ___ __ __________ __ .
Fill in the blanks. To view the number of concurrent connections going through core 0 on the
firewall, you would use the command and syntax __ __ _ ___ __ ___________ __ .
QUESTION NO: 24
Which Check Point tool allows you to open a debug file and see the VPN packet exchange details.
A. PacketDebug.exe
B. VPNDebugger.exe
C. IkeView.exe
D. IPSECDebug.exe
Answer: C
Explanation:
QUESTION NO: 25
When a packet is flowing through the security gateway, which one of the following is a valid
A. Acceleration Path
B. Small Path
C. Firewall Path
D. Medium Path
Answer: D
Explanation:
QUESTION NO: 26
A. 1 and 3
B. 1 and 2
C. 2 and 3
D. 1, 2, and 3
Answer: B
Explanation:
QUESTION NO: 27
If your firewall is performing a lot of IPS inspection and the CPUs assigned to fw_worker_thread
are at or near 100%, which of the following could you do to improve performance?
Answer: C
Explanation:
QUESTION NO: 28
Which of the following CLISH commands would you use to set the admin user's shell to bash?
Answer: B
Explanation:
QUESTION NO: 29
Answer: D
Explanation:
Fill in the blank. What is the correct command and syntax used to view a connection table
summary on a Check Point Firewall?
QUESTION NO: 31
Answer: C
Explanation:
QUESTION NO: 32
A. Assessments
B. Maintenance
C. Transparency
D. Compliance
Answer: D
Explanation:
QUESTION NO: 33
1.Verification
3.Initiation
4.Commit
5. Conversion
6. CPTA
A. 1, 2, 3, 4, 5, 6
B. 3, 1, 5, 2, 6, 4
C. 4, 2, 3, 5, 6, 1
D. 6, 5, 4, 3, 2, 1
Answer: B
Explanation:
QUESTION NO: 34
Answer: C
Explanation:
QUESTION NO: 35
A. weekly
B. 12 hours
C. 24 hours
D. 1 hour
Answer: C
Explanation:
QUESTION NO: 36
A. [expert@HostName]#>./cpsizeme -h
B. [expert@HostName]# ./cpsizeme -R
C. This is not possible on SPLAT
D. [expert@HostName]# ./cpsizeme
Answer: D
Explanation:
QUESTION NO: 37
A. [expert@HostName]# ./cpsizeme.exe v
B. [expert@HostName]# ./cpsizeme.exe version
C. [expert@HostName]# ./cpsizeme V
D. [expert@HostName]# ./cpsizeme version
Answer: C
Explanation:
QUESTION NO: 38
How do you upload the results of CPSIZEME to Check Point when using a PROXY server with
authentication?
Answer: B
Explanation:
QUESTION NO: 39
By default, what happens to the existing connections on a firewall when a new policy is installed?
A. All existing data connections will be kept open until the connections have ended.
B. Existing connections are always allowed
C. All existing control and data connections will be kept open until the connections have ended.
D. All existing connections not allowed under the new policy will be terminated.
Answer: D
Explanation:
QUESTION NO: 40
Answer: B
Explanation:
QUESTION NO: 41
Answer: D
Explanation:
QUESTION NO: 42
The process _______ provides service to access the GAIA configuration database.
A. configdbd
B. confd
C. fwm
D. ipsrd
Answer: B
Explanation:
QUESTION NO: 43
A. fw stat
B. fw ctl sync
C. fw ctl pstat
D. cphaprob stat
Answer: C
Explanation:
QUESTION NO: 44
The connection to the ClusterXL member A breaks. The ClusterXL member A status is now
down. Afterwards the switch admin set a port to ClusterXL member B to down. What will
happen?
Answer: B
Explanation:
QUESTION NO: 45
Which command will only show the number of entries in the connection table?
A. fw tab -t connections -s
B. fw tab -t connections -u
C. fw tab -t connections
D. fw tab
Answer: A
Explanation:
A. 1 and 4
B. 2 and 3
C. 1 and 2
D. 3 and 4
Answer: C
Explanation:
QUESTION NO: 47
A. sdm
B. cpd
C. fwd
D. fwm
Answer: D
Explanation:
QUESTION NO: 48
Paul has just joined the MegaCorp security administration team. Natalie, the administrator, creates
a new administrator account for Paul in SmartDashboard and installs the policy. When Paul tries
to login it fails. How can Natalie verify whether Pauls IP address is predefined on the security
management server?
A. Login to Smart Dashboard, access Properties of the SMS, and verify whether Pauls IP address
is listed.
B. Type cpconfig on the Management Server and select the option GUI client List to see if Pauls
Answer: B
Explanation:
QUESTION NO: 49
MultiCorp has bought company OmniCorp and now has two active AD domains. How would you
deploy Identity Awareness in this environment?
Answer: A
Explanation:
QUESTION NO: 50
Which of the following is the preferred method for adding static routes in GAiA?
Answer: B
Explanation:
QUESTION NO: 51
Answer: C
Explanation:
QUESTION NO: 52
A. SmartLog has a Top Results pane showing things like top sources, rules, and users.
B. SmartLog displays query results across multiple log files, reducing the need to open previous
files to view results.
C. SmartLog requires less disk space by consolidating log entries into fewer records.
D. SmartLog creates an index of log entries, increasing query speed.
Answer: C
Explanation:
Write the full fw command and syntax that you would use to troubleshoot ClusterXL sync issues.
Type the full cphaprob command and syntax that will show full synchronization status.
Type the full fw command and syntax that will show full synchronization status.
Type the full fw command and syntax that allows you to disable only sync on a cluster firewall
member.
Type the command and syntax you would use to verify that your Check Point cluster is functioning
correctly.
Type the command and syntax that you would use to view the virtual cluster interfaces of a
ClusterXL environment.
Answer: cphaprob -a if
Type the command and syntax to view critical devices on a cluster member in a ClusterXL
environment.
Type the command and syntax to configure the Cluster Control Protocol (CCP) to use Broadcast.
Fill in the blank. In New Mode HA, the internal cluster IP VIP address is 10.4.8.3. The internal
interfaces on two members are 10.4.8.1 and 10.4.8.2 Internal host 10.4.8.108 pings 10.4.8.3, and
receives replies.
Review the ARP table from the internal Windows host 10.4.8.108. According to the output, which
member is the standby machine?
Answer: 10.4.8.1
Fill in the blank. In New Mode HA, the internal cluster IP VIP address is 10.4.8.3. An internal host
10.4.8.108 successfully pings its Cluster and receives replies.
Review the ARP table from the internal Windows host 10.4.8.108. Based on this information, what
is the active cluster members IP address?
Answer: 10.4.8.2
Fill in the blank. In Load Sharing Unicast mode, the internal cluster IP address is 10.4.8.3. The
internal interfaces on two members are 10.4.8.1 and 10.4.8.2. Internal host 10.4.8.108 Pings
10.4.8.3, and receives replies. The following is the ARP table from the internal Windows host
10.4.8.108.
Review the exhibit and type the IP address of the member serving as the pivot machine in the
space below.
Answer: 10.4.8.2
To bind a NIC to a single processor when using CoreXL on GAiA, you would use the command
Fill in the blank. To verify SecureXL statistics, you would use the command ________ .
Fill in the blank. To verify the SecureXL status, you would enter command _____________ .
Fill in the blank. To enter the router shell, use command __________ .
Answer: cligated
Fill in the blank. To save your OSPF configuration in GAiA, enter the command ___________ .
Fill in the blank. To remove site-to-site IKE and IPSEC keys you would enter command ____ ___
and select the option to delete all IKE and IPSec SAs.
Answer: vpn tu
QUESTION NO: 71
How could you compare the Fingerprint shown to the Fingerprint on the server? Run cpconfig and
Exhibit:
Answer: C
Explanation:
QUESTION NO: 72
Control connections between the Security Management Server and the Gateway are not
encrypted by the VPN Community. How are these connections secured?
QUESTION NO: 73
If Bob wanted to create a Management High Availability configuration, what is the minimum
number of Security Management servers required in order to achieve his goal?
A. Two
B. One
C. Four
D. Three
Answer: A
Explanation:
QUESTION NO: 74
David wants to manage hundreds of gateways using a central management tool. What tool would
David use to accomplish his goal?
A. SmartDashboard
B. SmartBlade
C. SmartLSM
D. SmartProvisioning
Answer: D
Explanation:
QUESTION NO: 75
Exhibit:
A. Unicast mode
B. Multicast mode
C. New mode
D. Legacy mode
Answer: A
Explanation:
QUESTION NO: 76
A. Transparent upgrades
B. Zero downtime for mission-critical environments with State Synchronization
C. Enhanced throughput in all ClusterXL modes (2 gateway cluster compared with 1 gateway)
D. Transparent failover in case of device failures
Answer: A
Explanation:
QUESTION NO: 77
Answer: A
Explanation:
QUESTION NO: 78
You configure a Check Point QoS Rule Base with two rules: an HTTP rule with a weight of 40, and
A. 80%
B. 50%
C. 40%
D. 100%
Answer: D
Explanation:
QUESTION NO: 79
You have pushed a policy to your firewall and you are not able to access the firewall. What
command will allow you to remove the current policy from the machine?
A. fw purge active
B. fw purge policy
C. fw fetch policy
D. fw unloadlocal
Answer: D
Explanation:
QUESTION NO: 80
A. fw ver -k
B. fw ctl pstat
C. fw ctl get kernel
D. fw kernel
Answer: B
Explanation:
QUESTION NO: 81
A. fwd
B. fw gen
C. cpd
D. fwm
Answer: B
Explanation:
QUESTION NO: 82
A. Initiation
B. Validation
C. Code compilation
D. Code generation
Answer: B
Explanation:
QUESTION NO: 83
When, during policy installation, does the atomic load task run?
Answer: C
Explanation:
QUESTION NO: 84
What process is responsible for transferring the policy file from SmartCenter to the Gateway?
Answer: A
Explanation:
QUESTION NO: 85
What firewall kernel table stores information about port allocations for Hide NAT connections?
A. NAT_dst_any_list
B. NAT_alloc
C. NAT_src_any_list
D. fwx_alloc
Answer: D
Explanation:
QUESTION NO: 86
Where do you define NAT properties so that NAT is performed either client side or server side? In
SmartDashboard under:
A. Gateway Setting
B. NAT Rules
C. Global Properties > NAT definition
D. Implied Rules
Answer: C
Explanation:
QUESTION NO: 87
The process ___________ is responsible for all other security server processes run on the
Gateway.
Answer: C
Explanation:
QUESTION NO: 88
The process ________ is responsible for GUIClient communication with the SmartCenter.
A. CPGUI
B. CPD
C. FWD
D. FWM
Answer: D
Explanation:
QUESTION NO: 89
A. FWM
B. CPD
C. FWCMP
D. CPLMD
Answer: A
Explanation:
QUESTION NO: 90
A. CPD
B. FWSYNC
Answer: D
Explanation:
QUESTION NO: 91
_________ is the called process that starts when opening SmartView Tracker application.
A. FWM
B. CPLMD
C. logtrackerd
D. fwlogd
Answer: B
Explanation:
QUESTION NO: 92
Anytime a client initiates a connection to a server, the firewall kernel signals the FWD process
using a trap. FWD spawns the ________ child service, which runs the security server.
A. FWSD
B. FWD
C. In.httpd
D. FWSSD
Answer: D
Explanation:
QUESTION NO: 93
A. $FWDIR/conf/fwauthd.conf
B. $FWDIR/conf/AMT.conf
C. $FWDIR/conf/fwopsec.conf
Answer: A
Explanation:
QUESTION NO: 94
A. $FWDIR/conf/users.NDB
B. $FWDIR/conf/fwmuser.conf
C. $FWDIR/conf/fwusers.conf
D. $FWDIR/conf/fwauth.NDB
Answer: D
Explanation:
QUESTION NO: 95
Jon is explaining how the inspection module works to a colleague. If a new connection passes
through the inspection module and the packet matches the rule, what is the next step in the
process?
Answer: B
Explanation:
QUESTION NO: 96
A. upgrade_export is used when upgrading the Security Gateway, and allows certain files to be
included or excluded before exporting.
B. Used primarily when upgrading the Security Management Server, migrate stores all object
Answer: B
Explanation:
QUESTION NO: 97
Answer: B
Explanation:
QUESTION NO: 98
A snapshot delivers a complete backup of GAiA. How do you restore a local snapshot named
MySnapshot.tgz?
A. Reboot the system and call the start menu. Select option Snapshot Management, provide the
Expert password and select [L] for a restore from a local file. Then, provide the correct file name.
B. As Expert user, type command snapshot - R to restore from a local file. Then, provide the
correct file name.
C. As Expert user, type command revert --file MySnapshot.tgz.
D. As Expert user, type command snapshot -r MySnapshot.tgz.
Answer: C
Explanation:
QUESTION NO: 99
What is the primary benefit of using upgrade_export over either backup or snapshot?
Answer: B
Explanation:
A. 1. Insert the R77 CD-ROM and select the option to export the configuration using the latest
upgrade utilities.
2. Follow steps suggested by upgrade_verification and re-export the configuration if needed.
3. Save the exported file *.tgz to a local directory c:/temp.
4. Uninstall all packages using Add/Remove Programs and reboot.
5. Install again using the R77 CD-ROM as a primary Security Management Server and reboot.
6. Run upgrade_import to import the configuration.
B. 1. Create a data base revision control back up using SmartDashboard.
2. Create a compressed archive of the directories %FWDIR%/conf and %FWDIR%/lib and copy
them to another networked machine.
3. Uninstall all packages using Add/Remove Programs and reboot.
4. Install again as a primary Security Management Server using the R77 CD-ROM.
5. Reboot and restore the two archived directories over the top of the new installation, choosing to
overwrite existing files.
C. 1. Download the latest utility upgrade_export and run from a local directory c:/temp to export
the configuration into a *.tgz file.
2. Skip any upgrade_verification warnings since you are not upgrading.
3. Transfer the file *.tgz to another networked machine.
4. Download and run the utility cpclean and reboot.
5. Use the R77 CD-ROM to select option upgrade_import to import the configuration.
D. 1. Download the latest utility upgrade_export and run from directory c:/temp to export the
configuration into a *.tgz file.
2. Follow steps suggested by upgrade_verification.
3. Uninstall all packages using Add/Remove Programs and reboot.
Answer: A
Explanation:
Topic 2, Volume B
Your primary Security Management Server runs on GAiA. What is the fastest way to back up your
Security Gateway R77 configuration, including routing and network configuration files?
Answer: D
Explanation:
You need to back up the routing, interface, and DNS configuration information from your R77
GAiA Security Gateway. Which backup-and-restore solution do you use?
Answer: B
Explanation:
Which of the following methods will provide the most complete backup of an R77 configuration?
Answer: C
Explanation:
When restoring R77 using the command upgrade_import, which of the following items are NOT
restored?
A. Route tables
B. Gateway topology
C. Licenses
D. User db
Answer: A
Explanation:
You are running a R77 Security Gateway on GAiA. In case of a hardware failure, you have a
server with the exact same hardware and firewall version installed. What backup method could be
used to quickly put the secondary firewall into production?
A. backup
B. snapshot
C. migrate_import
D. manual backup
Answer: B
Explanation:
An administrator has installed the latest HFA on the system for fixing traffic problems after creating
a backup file. A large number of routes were added or modified, causing network problems. The
Answer: D
Explanation:
Your R77 enterprise Security Management Server is running abnormally on Windows 2008
Server. You decide to try reinstalling the Security Management Server, but you want to try keeping
the critical Security Management Server configuration settings intact (i.e., all Security Policies,
databases, SIC, licensing etc.) What is the BEST method to reinstall the Server and keep its
critical configuration?
A. 1. Insert the R77 CD-ROM and select the option to export the configuration using the latest
upgrade utilities.
2. Complete steps suggested by upgrade_verification and re-export the configuration if needed.
3. Save the exported file *.tgz to a local directory c:/temp.
4. Uninstall all packages using Add/Remove Programs and reboot.
5. Install again using the R77 CD-ROM as a primary Security Managment Server and reboot.
6. Run upgrade_import to import configuration.
B. 1. Download the latest utility upgrade_export and run from directory c:\temp to export the
configuration to a *.tgz file.
2. Complete steps suggested by upgrade_verification.
3. Uninstall all packages using Add/Remove Programs and reboot.
4. Use SmartUpdate to reinstall the Security Management Server and reboot.
5. Transfer file *.tgz back to local directory /temp.
6. Run upgrade_import to import configuration.
C. 1. Download the latest utility upgrade_export and run from directory c:\temp to export the
configuration to a *.tgz file.
2. Skip upgrade_verification warnings since you are not upgrading.
3. Transfer file *.tgz to another networked machine.
4. Download and run utility cpclean and reboot.
5. Use the R77 CD-ROM to select option upgrade_import to import the configuration.
D. 1. Create a data base revision control back up using SmartDashboard.
2. Create a compressed archive of the directories %FWDIR%/conf and %FWDIR%/lib and copy
them to another networked machine.
Answer: A
Explanation:
Check Point recommends that you back up systems running Check Point products. Run your back
ups during maintenance windows to limit disruptions to services, improve CPU usage, and
simplify time allotment. Which back up method does Check Point recommend before major
changes, such as upgrades?
A. upgrade_export
B. migrate export
C. snapshot
D. backup
Answer: C
Explanation:
Check Point recommends that you back up systems running Check Point products. Run your back
ups during maintenance windows to limit disruptions to services, improve CPU usage, and simplify
time allotment. Which back up method does Check Point recommend every couple of months,
depending on how frequently you make changes to the network or policy?
A. migrate export
B. upgrade_export
C. snapshot
D. backup
Answer: D
Explanation:
Check Point recommends that you back up systems running Check Point products. Run your back
ups during maintenance windows to limit disruptions to services, improve CPU usage, and simplify
time allotment. Which back up method does Check Point recommend anytime outside a
maintenance window?
A. snapshot
B. backup
C. backup_export
D. migrate export
Answer: D
Explanation:
The file snapshot generates is very large, and can only be restored to:
Answer: B
Explanation:
Restoring a snapshot-created file on one machine that was created on another requires which of
the following to be the same on both machines?
Answer: B
Explanation:
When restoring a Security Management Server from a backup file, the restore package can be
retrieved from which source?
Answer: D
Explanation:
When using migrate to upgrade a Secure Management Server, which of the following is included
in the migration?
Answer: C
Explanation:
Typically, when you upgrade the Security Management Server, you install and configure a fresh
R77 installation on a new computer and then migrate the database from the original machine.
When doing this, what is required of the two machines? They must both have the same:
A. Products installed.
B. Interfaces configured.
C. State.
D. Patch level.
Typically, when you upgrade the Security Management Server, you install and configure a fresh
R77 installation on a new computer and then migrate the database from the original machine.
What is the correct order of the steps below to successfully complete this procedure?
A. 3, 1, 5, 4, 2, 6
B. 5, 2, 6, 3, 1, 4
C. 3, 5, 1, 4, 6, 2
D. 6, 5, 3, 1, 4, 2
Answer: C
Explanation:
Answer: B
Explanation:
If no flags are defined during a back up on the Security Management Server, where does the
system store the *.tgz file?
A. /var/backups
B. /var/CPbackup/backups
C. /var/opt/backups
D. /var/tmp/backups
Answer: B
Explanation:
Answer: A
Explanation:
John is upgrading a cluster from NGX R65 to R77. John knows that you can verify the upgrade
process using the pre-upgrade verifier tool. When John is running Pre-Upgrade Verification, he
sees the warning message:
What is happening?
A. The actual configuration contains user defined patterns in IPS that are not supported in R77. If
the patterns are not fixed after upgrade, they will not be used with R77 Security Gateways.
B. R77 uses a new pattern matching engine. Incompatible patterns should be deleted before
upgrade process to complete it successfully.
C. Pre-Upgrade Verification tool only shows that message but it is only informational.
D. Pre-Upgrade Verification process detected a problem with actual configuration and upgrade will
Answer: A
Explanation:
Which command would you use to save the interface information before upgrading a GAiA
Gateway?
Answer: D
Explanation:
Which command would you use to save the IP address and routing information before upgrading a
GAiA Gateway?
Answer: C
Explanation:
Which command would you use to save the routing information before upgrading a Windows
Gateway?
A. cp /etc/sysconfig/network.C [location]
B. ifconfig > [filename].txt
Answer: D
Explanation:
When upgrading a cluster in Full Connectivity Mode, the first thing you must do is see if all cluster
members have the same products installed. Which command should you run?
A. fw fcu
B. cpconfig
C. cphaprob fcustat
D. fw ctl conn a
Answer: D
Explanation:
Answer: C
Explanation:
Answer: A
Explanation:
Answer: C
Explanation:
How does Check Point recommend that you secure the sync interface between gateways?
Answer: A
Explanation:
Steve is troubleshooting a connection problem with an internal application. If he knows the source
IP address is 192.168.4.125, how could he filter this traffic?
Answer: B
Explanation:
Check Point support has asked Tony for a firewall capture of accepted packets. What would be
the correct syntax to create a capture file to a filename called monitor.out?
Answer: C
Explanation:
There are several SmartDirectory (LDAP) features that can be applied to further enhance
SmartDirectory (LDAP) functionality, which of the following is NOT one of those features?
Answer: A
Explanation:
Choose the BEST sequence for configuring user management in SmartDashboard, using an
LDAP server.
A. Configure a server object for the LDAP Account Unit, and create an LDAP resource object.
B. Configure a workstation object for the LDAP server, configure a server object for the LDAP
Account Unit, and enable LDAP in Global Properties.
C. Configure a server object for the LDAP Account Unit, enable LDAP in Global Properties, and
create an LDAP resource object.
D. Enable LDAP in Global Properties, configure a host-node object for the LDAP server, and
configure a server object for the LDAP Account Unit.
Answer: D
Explanation:
The User Directory Software Blade is used to integrate which of the following with a R77 Security
Gateway?
A. UserAuthority server
Answer: D
Explanation:
Your users are defined in a Windows 2008 Active Directory server. You must add LDAP users to a
Client Authentication rule. Which kind of user group do you need in the Client Authentication rule
in R77?
A. LDAP group
B. All Users
C. External-user group
D. A group with a generic user
Answer: A
Explanation:
Which of the following commands do you run on the AD server to identify the DN name before
configuring LDAP integration with the Security Gateway?
Answer: A
Explanation:
Answer: C
Explanation:
When defining SmartDirectory for High Availability (HA), which of the following should you do?
A. Configure Secure Internal Communications with each server and fetch branches from each.
B. Replicate the same information on multiple Active Directory servers.
C. Configure a SmartDirectory Cluster object.
D. Configure the SmartDirectory as a single object using the LDAP cluster IP. Actual HA
functionality is configured on the servers.
Answer: B
Explanation:
The set of rules that governs the types of objects in the directory and their associated attributes is
called the:
A. Schema
B. SmartDatabase
C. Access Control List
D. LDAP Policy
Answer: A
Explanation:
When using SmartDashboard to manage existing users in SmartDirectory, when are the changes
applied?
Answer: B
Explanation:
Where multiple SmartDirectory servers exist in an organization, a query from one of the clients for
user information is made to the servers based on a priority. By what category can this priority be
defined?
Answer: C
Explanation:
A. Container
B. Distinguished Name
C. Organizational Unit
D. Schema
Answer: B
Explanation:
With the User Directory Software Blade, you can create R77 user definitions on a(n) _________
Server.
Answer: D
Explanation:
A. An Account Unit is the Check Point account that SmartDirectory uses to access an (LDAP)
server
B. An Account Unit is a system account on the Check Point gateway that SmartDirectory uses to
access an (LDAP) server
C. An Account Unit is the administration account on the LDAP server that SmartDirectory uses to
access to (LDAP) server
D. An Account Unit is the interface which allows interaction between the Security Management
server and Security Gateways, and the SmartDirectory (LDAP) server.
Answer: D
Explanation:
An organization may be distributed across several SmartDirectory (LDAP) servers. What provision
do you make to enable a Gateway to use all available resources? Each SmartDirectory (LDAP)
server must be:
Answer: B
Explanation:
Which is NOT a method through which Identity Awareness receives its identities?
A. AD Query
B. Group Policy
C. Identity Agent
D. Captive Portal
Answer: B
Explanation:
If using AD Query for seamless identity data reception from Microsoft Active Directory (AD), which
of the following methods is NOT Check Point recommended?
Answer: A
Explanation:
When using Captive Portal to send unidentified users to a Web portal for authentication, which of
the following is NOT a recommended use for this method?
Answer: D
Explanation:
Identity Agent is a lightweight endpoint agent that authenticates securely with Single Sign-On
(SSO). Which of the following is NOT a recommended use for this method?
Answer: C
Explanation:
Which of the following access options would you NOT use when configuring Captive Portal?
Answer: A
Explanation:
Answer: D
Explanation:
Remote clients are using IPSec VPN to authenticate via LDAP server to connect to the
organization. Which gateway process is responsible for the authentication?
A. fwm
B. fwd
C. vpnd
D. cvpnd
Answer: C
Explanation:
Remote clients are using SSL VPN to authenticate via LDAP server to connect to the organization.
Which gateway process is responsible for the authentication?
A. vpnd
B. cvpnd
C. fwm
D. fwd
Answer: B
Explanation:
A. Standard_DS
B. Novell_DS
C. Netscape_DS
D. OPSEC_DS
Answer: A
Explanation:
An Account Unit is the interface between the __________ and the __________.
A. System, Database
B. Clients, Server
C. Users, Domain
D. Gateway, Resources
Answer: B
Explanation:
Which of the following is a valid Active Directory designation for user John Doe in the Sales
department of AcmeCorp.com?
A. Cn=john_doe,ca=Sales,ou=acmecorp,dc=com
B. Cn=john_doe,ou=Sales,ou=acmecorp,dc=com
C. Cn=john_doe,ou=Sales,dc=acmecorp,dc=com
D. Cn=john_doe,ca=Sales,dc=acmecorp,dc=com
Answer: C
Explanation:
Which of the following is a valid Active Directory designation for user Jane Doe in the MIS
department of AcmeCorp.com?
A. Cn=jane_doe,ou=MIS,dc=acmecorp,dc=com
B. Cn= jane_doe,ou=MIS,cn=acmecorp,dc=com
C. Cn= jane_doe,ca=MIS,dc=acmecorp,dc=com
D. Cn= jane_doe,ca=MIS,cn=acmecorp,dc=com
Answer: A
Explanation:
You can NOT use SmartDashboards SmartDirectory features to connect to the LDAP server.
What should you investigate?
1. Verify you have read-only permissions as administrator for the operating system.
2. Verify there are no restrictions blocking SmartDashboard's User Manager from connecting to
the LDAP server.
3. Check that the login Distinguished Name configured has at least write permission in the
access control configuration of the LDAP server.
A. 2 and 3
B. 1, 2, and 3
C. 1 and 2
D. 1 and 3
Answer: A
Explanation:
If you are experiencing LDAP issues, which of the following should you check?
Answer: D
Explanation:
How are cached usernames and passwords cleared from the memory of a Security Gateway?
Answer: D
Explanation:
When an Endpoint user is able to authenticate but receives a message from the client that it is
unable to enforce the desktop policy, what is the most likely scenario?
A. The gateway could not locate the user in SmartDirectory and is allowing the connection with
limitations based on a generic profile.
B. The users rights prevent access to the protected network.
C. A Desktop Policy is not configured.
D. The user is attempting to connect with the wrong Endpoint client.
Answer: D
Explanation:
When using a template to define a user in SmartDirectory, the users password should be defined
in the ______________ object.
A. VPN Community
B. LDAP
C. Template
D. User
Answer: D
Explanation:
When configuring an LDAP Group object, select the option ____________ if you want the gateway
to reference all groups defined on the LDAP server for authentication purposes.
Answer: D
Explanation:
When configuring an LDAP Group object, select option _______________ if you want the gateway
to reference a specific group defined on the LDAP server for authentication purposes.
A. Group Agnostic
B. All Account-Unit's Users
C. Only Sub Tree
D. Only Group in Branch
Answer: C
Explanation:
A. fwm
B. vpnd
C. cpd
D. cvpnd
Answer: A
Explanation:
The process __________ is responsible for the authentication for Remote Access clients.
A. fwm
Answer: B
Explanation:
The process that performs the authentication for SSL VPN Users is:
A. cpd
B. cvpnd
C. fwm
D. vpnd
Answer: B
Explanation:
The process that performs the authentication for legacy session authentication is:
A. cvpnd
B. fwm
C. vpnd
D. fwssd
Answer: D
Explanation:
While authorization for users managed by SmartDirectory is performed by the gateway, the
authentication mostly occurs in __________.
A. ldapauth
B. cpauth
Answer: B
Explanation:
When troubleshooting user authentication, you may see the following entries in a debug of the
user authentication process. In which order are these messages likely to appear?
Answer: B
Explanation:
A. Legacy
B. Unicast
C. Broadcast
D. New
Answer: C
Explanation:
Answer: B
Explanation:
What is the supported ClusterXL configuration when configuring a cluster synchronization network
on a VLAN interface?
Answer: A
Explanation:
Answer: B
Explanation:
Which process is responsible for kernel table information sharing across all cluster members?
A. cpd
B. fwd daemon
C. CPHA
D. fw kernel
Answer: B
Explanation:
Answer: A
Explanation:
The ________ Check Point ClusterXL mode must synchronize the virtual IP and MAC addresses
on all clustered interfaces.
A. HA Mode Legacy
B. HA Mode New
C. Mode Unicast Load Sharing
D. Mode Multicast Load Sharing
__________ is a proprietary Check Point protocol. It is the basis for Check Point ClusterXL inter-
module communication.
A. CPP
B. CPHA
C. CKPP
D. CCP
Answer: D
Explanation:
After you add new interfaces to a cluster, how can you check if the new interfaces and the
associated virtual IP address are recognized by ClusterXL?
Exhibit:
Answer: B
Explanation:
Which of the following is a supported Sticky Decision Function of Sticky Connections for Load
Sharing?
Answer: A
Explanation:
Included in the customers network are some firewall systems with the Performance Pack in use.
The customer wishes to use these firewall systems in a cluster (Load Sharing mode). He is not
sure if he can use the Sticky Decision Function in this cluster. Explain the situation to him.
A. The customer can use the firewalls with Performance Pack inside the cluster, which should
support the Sticky Decision Function. It is just necessary to configure it with the
clusterXL_SDF_enable command.
B. ClusterXL always supports the Sticky Decision Function in the Load Sharing mode.
C. The customer can use the firewalls with Performance Pack inside the cluster, which should
support the Sticky Decision Function. It is just necessary to enable the Sticky Decision Function in
the SmartDashboard cluster object in the ClusterXL page, Advanced Load Sharing Configuration
window.
D. Sticky Decision Function is not supported when employing either Performance Pack or a
hardware-based accelerator card. Enabling the Sticky Decision Function disables these
acceleration products.
Answer: D
Explanation:
A. A copy of each packet in the connection sticks in the connection table until a corresponding
reply packet is received from the other side.
B. A connection is not terminated by either side by FIN or RST packet.
C. All the connection packets are handled, in either direction, by a single cluster member.
D. The connection information sticks in the connection table even after the connection has ended.
Answer: C
Explanation:
How does a cluster member take over the VIP after a failover event?
A. Gratuitous ARP
B. Broadcast storm
C. arp -s
D. Ping the sync interface
Answer: A
Explanation:
A. UDP 18184
B. TCP 8116
C. UDP 8116
D. TCP 18184
Answer: C
Explanation:
A customer called to report one cluster members status as Down. What command should you use
to identify the possible cause?
A. tcpdump/snoop
B. cphaprob list
C. fw ctl pstat
D. fw ctl debug -m cluster + forward
Answer: B
Explanation:
A customer calls saying that a Load Sharing cluster shows drops with the error First packet is not
SYN. Complete the following sentence. You will recommend:
Answer: C
Explanation:
A. fwm
B. assld
C. cpp
D. fwd
Answer: D
Explanation:
A. fw.d
B. vpnd
C. Filter
D. cpd
Answer: C
Explanation:
Answer: A
Explanation:
A. In the case of a failover, accounting information on the failed member may be lost despite a
properly working synchronization.
B. An SMTP resource connection using CVP will be maintained by the cluster.
C. User Authentication connections will be lost by the cluster.
D. Only cluster members running on the same OS platform can be synchronized.
Answer: B
When a failed cluster member recovers, which of the following actions is NOT taken by the
recovering member?
A. It will not check for any updated policy and load the last installed policy with a warning message
indicating that the Security Policy needs to be installed from the Security Management Server.
B. It will try to take the policy from one of the other cluster members.
C. It compares its local policy to the one on the Security Management Server.
D. If the Security Management Server has a newer policy, it will be retrieved, else the local policy
will be loaded.
Answer: A
Explanation:
Organizations are sometimes faced with the need to locate cluster members in different
geographic locations that are distant from each other. A typical example is replicated data centers
whose location is widely separated for disaster recovery purposes. What are the restrictions of
this solution?
A. There are two restrictions: 1. The synchronization network must guarantee no more than
100ms latency and no more than 5% packet loss. 2. The synchronization network may only
include switches and hubs.
B. There is one restriction: The synchronization network must guarantee no more than 150 ms
latency (ITU Standard G.114).
C. There is one restriction: The synchronization network must guarantee no more than 100 ms
latency.
D. There are no restrictions.
Answer: A
Explanation:
A. ifconfig -a
B. arping <IP address of the synchronization interface on the other cluster member>
C. telnet <IP address of the synchronization interface on the other cluster member>
D. ping <IP address of the synchronization interface on the other cluster member>
Answer: B
Explanation:
You have a High Availability ClusterXL configuration. Machines are not synchronized. What
happens to connections on failover?
Answer: A
Explanation:
When using ClusterXL in Load Sharing, what is the default sharing method based on?
A. IPs
B. IPs, SPIs
C. IPs, Ports
D. IPs, Ports, SPIs
Answer: D
Explanation:
If ClusterXL Load Sharing is enabled with state synchronization enabled, what will happen if one
member goes down?
A. The processing of all connections handled by the faulty machine is immediately taken over by
the other member(s).
B. The processing of all connections handled by the faulty machine is dropped, so all connections
need to be re-established through the other machine(s).
C. There is no state synchronization on Load Sharing, only on High Availability.
D. The connections are dropped as Load Sharing does not support High Availability.
Answer: A
Explanation:
A. A Sticky Connection is one in which a reply packet returns through the same gateway as the
original packet.
B. A Sticky Connection is a connection that remains the same.
C. A Sticky Connection is a VPN connection that remains up until you manually bring it down.
D. A Sticky Connection is a connection that always chooses the same gateway to set up the initial
connection.
Answer: A
Explanation:
Exhibit:
A. No, the Security Management Servers must reside on the same network.
B. No, the Security Management Servers do not have the same number of NICs.
C. No, the Security Management Servers must be installed on the same operating system.
D. No, a R77 Security Management Server cannot run on Red Hat Linux 9.0.
Answer: C
Explanation:
Topic 3, Volume C
A. primary-domain
B. hot-standby
C. acceleration
D. load-balancing
Answer: B
Explanation:
A. The active member responds to the virtual address and is the only member that passes traffic.
Answer: A
Explanation:
Review the cphaprob state command output from one New Mode High Availability ClusterXL
member.
Which member will be active after member 192.168.1.2 fails over and is rebooted?
Answer: C
Explanation:
Review the cphaprob state command output from a New Mode High Availability cluster member.
Which machine has the highest priority?
Exhibit:
A. This output does not indicate which machine has the highest priority.
B. 192.168.1.1, because it is <local>
C. 192.168.1.2, because its state is active
D. 192.168.1.1, because its number is 1
Answer: D
Explanation:
By default Check Point High Availability components send updates about their state every:
A. 0.5 second.
B. 1 second.
C. 5 seconds.
D. 0.1 second.
Answer: D
Explanation:
You have just upgraded your Load Sharing gateway cluster (both members) from NGX R65 to
R77. cphaprob stat shows:
2 172.16.185.22 0% Ready
Answer: B
Explanation:
Answer: D
Explanation:
For Management High Availability, if an Active SMS goes down, does the Standby SMS
automatically take over?
Answer: C
Explanation:
For Management High Availability synchronization, what does the Advance status mean?
Answer: C
Explanation:
Which of the following would be a result of having more than one active Security Management
Server in a Management High Availability (HA) configuration?
A. An error notification will popup during SmartDashboard login if the two machines can
communicate indicating Collision status.
B. The need to manually synchronize the secondary Security Management Server with the
Primary Security Management Server is eliminated.
C. Allows for faster seamless failover: from active-to-active instead of standby-to-active.
D. Creates a High Availability implementation between the Gateways installed on the Security
Management Servers.
Answer: A
Explanation:
When Load Sharing Multicast mode is defined in a ClusterXL cluster object, how are packets
being handled by cluster members?
A. Only one member at a time is active. The active cluster member processes all packets.
B. All members receive all packets. All members run an algorithm which determines which
member processes packets further and which members delete the packet from memory.
C. The pivot machine will handle it.
D. All cluster members process all packets and members synchronize with each other.
Answer: B
Explanation:
Answer: C
Explanation:
When distributing IPSec packets to gateways in a Load Sharing Multicast mode cluster, which
valid Load Sharing method will consider VPN information?
Answer: C
Explanation:
By default, the Cluster Control Protocol (CCP) uses this to send delta sync messages to other
cluster members.
A. Multicast
B. Unicast
C. Anycast
D. Broadcast
Answer: A
Explanation:
Exhibit:
A. HA (New mode).
B. 3rd party cluster
C. Load Sharing (multicast mode)
D. Load Sharing Unicast (Pivot) mode
Answer: A
Explanation:
Exhibit:
Answer: D
Explanation:
Answer: B
Explanation:
Answer: D
Explanation:
State Synchronization is enabled on both members in a cluster, and the Security Policy is
successfully installed. No protocols or services have been unselected for selective sync.
Review the fw tab -t connections -s output from both members. Is State Synchronization working
properly between the two members?
A. Members A and B are synchronized, because ID for both members is identical in the
connections table.
B. Members A and B are not synchronized, because #VALS in the connections table are not
Answer: B
Explanation:
You want to upgrade a cluster with two members to R77. The Security Management Server and
both members are version NGX R65, with the latest Hotfix Accumulator. What is the correct
upgrade procedure?
3. Run cpstop on one member, while leaving the other member running. Upgrade one member at
a time and reboot after upgrade.
A. 3, 2, 1, 4
B. 2, 4, 3, 1
C. 2, 3, 1, 4
D. 1, 3, 2, 4
Answer: C
Explanation:
Included in the clients network are some switches, which rely on IGMP snooping. You must find a
solution to work with these switches. Which of the following answers does NOT lead to a
successful solution?
The customer wishes to install a cluster. In his network, there is a switch which is incapable of
forwarding multicast. Is it possible to install a cluster in this situation?
A. No, the customer needs to replace the switch with a new switch, which supports multicast
forwarding.
B. Yes, you can toggle on ClusterXL between broadcast and multicast using the command
cphaconf set_ccp broadcast/multicast.
C. Yes, the ClusterXL changes automatically to the broadcast mode if the multicast is not
forwarded.
D. Yes, you can toggle on ClusterXL between broadcast and multicast by setting the multicast
mode using the command cphaconf set_ccp multicast onoff. The default setting is broadcast.
Answer: B
Explanation:
What could be a reason why synchronization between primary and secondary Security
Management Servers does not occur?
A. If the set of installed products differ from each other, the Security Management Servers do not
synchronize the database to each other.
B. You have installed both Security Management Servers on different server systems (e. g. one
machine on HP hardware and the other one on DELL).
C. You are using different time zones.
D. You did not activate synchronization within Global Properties.
Answer: A
Explanation:
What is the proper command for importing users into the R77 User Database?
Answer: B
Explanation:
In a R75 Management High Availability (HA) configuration, you can configure synchronization to
occur automatically, when:
3. The Security Administrator logs in to the seconday Security Management Server and changes
its status to Active.
A. 1, 2, 4
B. 1, 3, 4
C. 1, 2, 5
D. 1, 2, 3, 4
Answer: A
Explanation:
You are preparing computers for a new ClusterXL deployment. For your cluster, you plan to use
three machines with the following configurations:
Cluster Member 1: OS - GAiA; NICs - QuadCard; Memory - 1 GB; Security Gateway - version:
R71 and primary Security Management Server installed, version: R77
Cluster Member 2: OS - GAiA; NICs - 4 Intel 3Com; Memory - 1 GB; Security Gateway only,
version: R77
Cluster Member 3: OS - GAiA; NICs - 4 other manufacturers; Memory - 512 MB; Security Gateway
only, version: R77
Answer: D
Explanation:
You are preparing computers for a new ClusterXL deployment. For your cluster, you plan to use
four machines with the following configurations:
Cluster Member 1: OS - GAiA; NICs - QuadCard; Memory - 1 GB; Security Gateway only, version:
R77
Cluster Member 2: OS - GAiA; NICs - 4 Intel 3Com; Memory - 1 GB; Security Gateway only,
version: R77
Cluster Member 3: OS - GAiA; NICs - 4 other manufacturers; Memory: 512 MB; Security Gateway
only, version: R77
Security Management Server: MS Windows 2008; NIC - Intel NIC (1); Security Gateway and
Answer: D
Explanation:
External interfaces 192.168.10.1 and 192.168.10.2 connect to a VLAN switch. The upstream
router connects to the same VLAN switch. Internal interfaces 172.16.10.1 and 172.16.10.2
connect to a hub. 10.10.10.0 is the synchronization network. The Security Management Server is
located on the internal network with IP 172.16.10.3. What is the problem with this configuration?
A. The Cluster interface names must be identical across all cluster members.
B. Cluster members cannot use the VLAN switch. They must use hubs.
C. The Security Management Server must be in the dedicated synchronization network, not the
internal network.
D. There is an IP address conflict.
Answer: D
Explanation:
Answer: B
Explanation:
In which ClusterXL Load Sharing mode, does the pivot machine get chosen automatically by
ClusterXL?
Answer: C
Explanation:
What configuration change must you make to change an existing ClusterXL cluster object from
A. Change the cluster mode to Unicast on the cluster object. Reinstall the Security Policy.
B. Change the cluster mode to Unicast on each of the cluster-member objects.
C. Run cpstop and cpstart, to re-enable High Availability on both objects. Select Pivot mode in
cpconfig.
D. Reset Secure Internal Communications (SIC) on the cluster-member objects. Reinstall the
Security Policy.
Answer: A
Explanation:
In a R77 ClusterXL Load Sharing configuration, which type of ARP related problem can force the
use of Unicast Mode (Pivot) configuration due to incompatibility on some adjacent routers and
switches?
Answer: B
Explanation:
How do new connections get established through a Security Gateway with SecureXL enabled?
A. New connections are always inspected by the firewall and if they are accepted, the subsequent
packets of the same connection will be passed through SecureXL
B. New connection packets never reach the SecureXL module.
C. The new connection will be first inspected by SecureXL and if it does not match the drop table
of SecureXL, then it will be passed to the firewall module for a rule match.
D. If the connection matches a connection or drop template in SecureXL, it will either be
established or dropped without performing a rule match, else it will be passed to the firewall
module for a rule match.
Answer: D
Your customer asks you about the Performance Pack. You explain to him that a Performance
Pack is a software acceleration product which improves the performance of the Security Gateway.
You may enable or disable this acceleration by either:
A. The fwaccel command determines the default setting. The command cpconfig can dynamically
change the setting, but after the reboot it reverts to the default setting.
B. Both commands function identically.
C. The command cpconfig works on the Security Platform only. The command fwaccel can be
Answer: D
Explanation:
Your customer complains of the weak performance of his systems. He has heard that Connection
Templates accelerate traffic. How do you explain to the customer about template restrictions and
how to verify that they are enabled?
Answer: B
Explanation:
Frank is concerned with performance and wants to configure the affinities settings. His gateway
does not have the Performance Pack running. What would Frank need to perform in order
configure those settings?
Answer: C
You are concerned that the processor for your firewall running R71 SecurePlatform may be
overloaded. What file would you view to determine the speed of your processor(s)?
A. cat /etc/sysconfig/cpuinfo
B. cat /proc/cpuinfo
C. cat /etc/cpuinfo
D. cat /var/opt/CPsuite-R71/fw1/conf/cpuinfo
Answer: B
Explanation:
A. SYN Defender
B. UDP services with no protocol type or source port mentioned in advanced properties
C. ISN Spoofing
D. VPN Connections
Answer: B
Explanation:
In CoreXL, what process is responsible for processing incoming traffic from the network interfaces,
securely accelerating authorized packets, and distributing non-accelerated packets among kernel
instances?
Due to some recent performance issues, you are asked to add additional processors to your
firewall. If you already have CoreXL enabled, how are you able to increase Kernel instances?
Answer: A
Explanation:
A. Route-based VPN
B. SmartView Tracker
C. IPS
D. IPV4
Answer: A
Explanation:
If the number of kernel instances for CoreXL shown is 6, how many cores are in the physical
machine?
A. 6
B. 8
C. 3
Answer: B
Explanation:
A. SSH
B. HTTPS
C. FTP
D. Telnet
Answer: C
Explanation:
How can you disable SecureXL via the command line (it does not need to survive a reboot)?
Answer: C
Explanation:
A. QoS
B. FTP
C. connection rate
D. GRE
Answer: A
Explanation:
A. HTTPS
B. LDAP
C. FTP
D. TELNET
Answer: C
Explanation:
A. fwaccel on
B. fw securexl on
C. fw accel on
D. fwsecurexl on
Answer: A
Explanation:
Exhibit:
A. fwsecurexl stats
B. fwaccel stats
C. fw securexl stats
D. fw accel stats
Answer: B
Explanation:
After Travis added new processing cores on his server, CoreXL did not use them. What would be
the most plausible reason why? Travis did not:
Answer: C
4) Meshed Community
A. 2 only
B. 2 and 3
C. 1, 2 and 3
D. All
Answer: B
Explanation:
What process manages the dynamic routing protocols (OSPF, RIP, etc.) on GAiA?
A. gated
B. There's no separate process, but the Linux default router can take care of that.
C. routerd
D. arouted
Answer: A
Explanation:
Answer: B
Explanation:
A. $FWDIR/VPN/route_conf.c
B. $FWDIR/conf/vpn_route.conf
C. $FWDIR/bin/vpn_route.conf
D. $FWDIR/conf/vpn_route.c
Answer: B
Explanation:
If both domain-based and route-based VPNs are configured, which will take precedence?
A. Route-based
B. Must be chosen/configured manually by the Administrator in the Policy > Global Properties
C. Domain-based
D. Must be chosen/configured manually by the Administrator in the VPN community object
Answer: C
Explanation:
Which of the following is TRUE concerning unnumbered VPN Tunnel Interfaces (VTIs)?
Answer: A
Explanation:
Which of the following is TRUE concerning unnumbered VPN Tunnel Interfaces (VTIs)?
Answer: A
Explanation:
Which of the following is TRUE concerning unnumbered VPN Tunnel Interfaces (VTIs)?
Answer: C
Explanation:
Which of the following is TRUE concerning numbered VPN Tunnel Interfaces (VTIs)?
Which of the following is TRUE concerning numbered VPN Tunnel Interfaces (VTIs)?
Answer: D
Explanation:
When configuring numbered VPN Tunnel Interfaces (VTIs) in a clustered environment, what
issues need to be considered?
3) All VTI's going to the same remote peer must have the same name.
A. 1, 2, and 4
B. 2 and 3
C. 1, 2, 3 and 4
D. 1, 3, and 4
Answer: C
Explanation:
Answer: D
Explanation:
A. IPsec
B. CRL
C. PKCS
D. S/MIME
Answer: B
Explanation:
A. by authentication.
B. via both private and public keys, without the use of digital Certificates.
C. by Certificate Authorities, digital certificates, and public key encryption.
D. by Certificate Authorities, digital certificates, and two-way symmetric-key encryption.
Answer: C
Explanation:
You want to establish a VPN, using certificates. Your VPN will exchange certificates with an
external partner. Which of the following activities should you do first?
A. Exchange exported CA keys and use them to create a new server object to represent your
Answer: A
Explanation:
You want VPN traffic to match packets from internal interfaces. You also want the traffic to exit the
Security Gateway bound for all site-to-site VPN Communities, including Remote Access
Communities. How should you configure the VPN match rule?
Answer: A
Explanation:
If you need strong protection for the encryption of user data, what option would be the BEST
choice?
A. Use Diffie-Hellman for key construction and pre-shared keys for Quick Mode. Choose SHA in
Quick Mode and encrypt with AES. Use AH protocol. Switch to Aggressive Mode.
B. When you need strong encryption, IPsec is not the best choice. SSL VPNs are a better choice.
C. Use certificates for Phase 1, SHA for all hashes, AES for all encryption and PFS, and use ESP
protocol.
D. Disable Diffie-Hellman by using stronger certificate based key-derivation. Use AES-256 bit on
all encrypted channels and add PFS to QuickMode. Use double encryption by implementing AH
and ESP as protocols.
Answer: C
Explanation:
Review the following list of actions that Security Gateway R75 can take when it controls packets.
The Policy Package has been configured for Simplified Mode VPN. Select the response below that
includes the available actions:
Answer: C
Explanation:
Your organization maintains several IKE VPNs. Executives in your organization want to know
which mechanism Security Gateway R77 uses to guarantee the authenticity and integrity of
messages. Which technology should you explain to the executives?
Answer: D
Explanation:
There are times when you want to use Link Selection to manage high-traffic VPN connections.
With Link Selection you can:
Answer: B
Explanation:
There are times when you want to use Link Selection to manage high-traffic VPN connections.
With Link Selection you can:
Answer: B
Explanation:
There are times when you want to use Link Selection to manage high-traffic VPN connections.
With Link Selection you can:
Answer: B
Explanation:
There are times when you want to use Link Selection to manage high-traffic VPN connections.
With Link Selection you can:
Answer: C
Answer: A
Explanation:
MEP VPNs use the Proprietary Probing Protocol to send special UDP RDP packets to port ____
to discover if an IP is accessible.
A. 259
B. 256
C. 264
D. 201
Answer: A
Explanation:
A. The VPN Client is assigned a Security Gateway to connect to based on a priority list, should the
first connection fail.
B. MEP VPNs are not restricted to the location of the gateways.
C. MEP Security Gateways cannot be managed by separate Management Servers.
D. State synchronization between Security Gateways is required.
Answer: B
Answer: A
Explanation:
Answer: A
Explanation:
A. The VPN Client selects which Security Gateway takes over, should the first connection fail.
B. MEP VPNs are restricted to the location of the gateways.
C. State synchronization betweened Security Gateways is required.
D. MEP Security Gateways cannot be managed by separate Management Servers.
Answer: A
A. localhost.localdomain(config-router-ospf)#
B. localhost.localdomain(config-if)#
C. localhost.localdomain(config)#
D. localhost.localdomain#
Answer: D
Explanation:
Answer: C
Explanation:
A. 10.10.0.1 is the local Gateways internal interface, and 10.10.0.2 is the internal interface of the
remote Gateway.
B. The peer Security Gateways name is madrid.cp.
C. The VTI name is madrid.cp.
Answer: B
Explanation:
Which type of VPN routing relies on a VPN Tunnel Interface (VTI) to route traffic?
A. Host-based VPN
B. Route-based VPN
C. Domain-based VPN
D. Subnet-based VPN
Answer: B
Explanation:
You have three Gateways in a mesh community. Each gateways VPN Domain is their internal
network as defined on the Topology tab setting All IP Addresses behind Gateway based on
Topology information.
You want to test the route-based VPN, so you created VTIs among the Gateways and created
static route entries for the VTIs. However, when you test the VPN, you find out the VPN still go
through the regular domain IPsec tunnels instead of the routed VTI tunnels.
What is the problem and how do you make the VPN use the VTI tunnels?
A. Domain VPN takes precedence over the route-based VTI. To make the VPN go through VTI,
remove the Gateways out of the mesh community and replace with a star community
B. Domain VPN takes precedence over the route-based VTI. To make the VPN go through VTI,
use an empty group object as each Gateways VPN Domain
C. Route-based VTI takes precedence over the Domain VPN. To make the VPN go through VTI,
use dynamic-routing protocol like OSPF or BGP to route the VTI address to the peer instead of
static routes
D. Route-based VTI takes precedence over the Domain VPN. Troubleshoot the static route entries
to insure that they are correctly pointing to the VTI gateway IP.
Answer: B
Explanation:
When configuring a Permanent Tunnel between two gateways in a Meshed VPN community, in
what object is the tunnel managed?
Answer: A
Explanation:
Which of the following log files contains only information about the negotiation process for
encryption?
A. iked.elg
B. ike.elg
C. vpn.elg
D. vpnd.elg
Answer: B
Explanation:
Which of the following log files contains verbose information regarding the negotiation process and
other encryption failures?
A. ike.elg
B. vpn.elg
C. iked.elg
D. vpnd.elg
Answer: D
What is the most common cause for a Quick mode packet 1 failing with the error No Proposal
Chosen error?
A. The encryption strength and hash settings of one peer does not match the other.
B. The previously established Permanent Tunnel has failed.
C. There is a network connectivity issue.
D. The OS and patch level of one gateway does not match the other.
Answer: A
Explanation:
Which component receives events and assigns severity levels to the events; invokes any defined
automatic reactions, and adds the events to the Events Data Base?
Answer: B
Explanation:
A. SmartEvent Server
B. SmartEvent DataServer
C. SmartEvent Client
D. SmartEvent Correlation Unit
Answer: A
Answer: A
Explanation:
Answer: A
Explanation:
Answer: D
Explanation:
Answer: A
Explanation:
Answer: A
Explanation:
Answer: D
Explanation:
1) Correlation Unit
2) Correlation Client
3) Correlation Server
4) Analyzer Server
5) Analyzer Client
6) Analyzer Unit
A. 1, 3, 4
B. 1, 4, 5
C. 1, 2, 3
D. 4, 5, 6
Answer: B
Explanation:
How many Events can be shown at one time in the Event preview pane?
A. 5,000
B. 15,000
C. 30,000
D. 1,000
Answer: C
Explanation:
You are reviewing computer information collected in ClientInfo. You can NOT:
Answer: C
Explanation:
A. No Access
B. Events Database
C. View
D. Read/Write
Answer: C
Explanation:
Answer: A
Explanation:
Answer: C
Explanation:
Answer: D
Explanation:
A tracked SmartEvent Candidate in a Candidate Pool becomes an Event. What does NOT happen
in the Analyzer Server?
Answer: D
Explanation:
How many pre-defined exclusions are included by default in SmartEvent R77 as part of the
product installation?
A. 5
B. 0
C. 10
Answer: D
Explanation:
What is the purpose of the pre-defined exclusions included with SmartEvent R77?
A. To allow SmartEvent R77 to function properly with all other R71 devices.
B. To avoid incorrect event generation by the default IPS event definition; a scenario that may
occur in deployments that include Security Gateways of versions prior to R71.
C. As a base for starting and building exclusions.
D. To give samples of how to write your own exclusion.
Answer: B
Explanation:
Answer: B
Explanation:
A. SNMP Trap
B. Block Access
C. Mail
D. External Script
A. Read only
B. Write only
C. No Access
D. Events Database
Answer: B
Explanation:
_______________ manages Standard Reports and allows the administrator to specify automatic
uploads of reports to a central FTP server.
A. SmartReporter Database
B. SmartReporter
C. SmartDashboard Log Consolidator
D. Security Management Server
Answer: B
Explanation:
Answer: B
Which SmartReporter report type is generated from the SmartView Monitor history file?
A. Standard
B. Traditional
C. Express
D. Custom
Answer: C
Explanation:
Which Check Point product is used to create and save changes to a Log Consolidation Policy?
A. SmartEvent Server
B. SmartDashboard Log Consolidator
C. SmartReporter Client
D. Security Management Server
Answer: B
Explanation:
A. SmartLSM
B. SmartView Tracker
C. SmartView Monitor
D. SmartReporter
Answer: D
Explanation:
You have selected the event Port Scan from Internal Network in SmartEvent, to detect an event
when 30 port scans have occurred within 60 seconds. You also want to detect two port scans from
a host within 10 seconds of each other. How would you accomplish this?
Answer: A
Explanation:
Answer: B
Explanation:
To back up all events stored in the SmartEvent Server, you should back up the contents of which
folder(s)?
A. $FWDIR/distrib
B. $FWDIR/distrib_db and $FWDIR/events
C. $RTDIR/distrib and $RTDIR/events_db
D. $RTDIR/events_db
Answer: C
To clean the system of all SmartEvent events, you should delete the files in which folder(s)?
A. $RTDIR/events_db
B. $FWDIR/distrib_db and $FWDIR/events
C. $RTDIR/distrib and $RTDIR/events_db
D. $FWDIR/distrib
Answer: C
Explanation:
A. SmartDashboard
B. SmartReporter
C. SmartEvent Server
D. SmartUpdate
Answer: A
Explanation:
A. In SmartDashboard, the SmartView Monitor page in the R77 Security Gateway object
B. In SmartReporter, under Express > Network Activity
C. In SmartReporter, under Standard > Custom
D. In SmartView Monitor, under Global Properties > Log and Masters
Answer: A
Explanation:
A. $CPDIR/Database/conf/conf.C
B. $RTDIR/Database/conf/my.cnf
C. $ERDIR/conf/my.cnf
D. $FWDIR/Eventia/conf/ini.C
Answer: B
Explanation:
A. $FWDIR/Eventia/conf/ini.C
B. $ERDIR/conf/my.cnf
C. %RTDIR%\Database\conf\my.ini
D. $CPDIR/Database/conf/conf.C
Answer: C
Explanation:
Which specific R77 GUI would you use to view the length of time a TCP connection was open?
A. SmartReporter
B. SmartView Status
C. SmartView Monitor
D. SmartView Tracker
Answer: D
Explanation:
SmartReporter reports can be used to analyze data from a penetration-testing regimen in all of the
following examples, EXCEPT:
Answer: C
Explanation:
What is the best tool to produce a report which represents historical system information?
A. SmartReporter-Standard Reports
B. SmartView Tracker
C. Smartview Monitor
D. SmartReporter-Express Reports
Answer: D
Explanation:
If Jack was concerned about the number of log entries he would receive in the SmartReporter
system, which policy would he need to modify?
Answer: D
Explanation:
Your company has the requirement that SmartEvent reports should show a detailed and accurate
view of network activity but also performance should be guaranteed. Which actions should be
taken to achieve that?
1) Use same hard drive for database directory, log files, and temporary directory.
A. 2, 4
B. 1, 3, 4
C. 1, 2, 4
D. 1, 2
Answer: A
Explanation:
To help organize events, SmartReporter uses filtered queries. Which of the following is NOT an
SmartEvent event property you can query?
Answer: A
Explanation:
When migrating the SmartEvent data base from one server to another, the first step is to back up
the files on the original server. Which of the following commands should you run to back up the
SmartEvent data base?
A. migrate export
Answer: B
Explanation:
When migrating the SmartEvent data base from one server to another, the last step is to save the
files on the new server. Which of the following commands should you run to save the SmartEvent
data base files on the new server?
A. cp
B. restore
C. migrate import
D. eva_db_restore
Answer: D
Explanation:
Which file defines the fields for each object used in the file objects.C (color, num/string, default
value)?
A. $FWDIR/conf/classes.C
B. $FWDIR/conf/scheam.C
C. $FWDIR/conf/fields.C
D. $FWDIR/conf/table.C
Answer: A
Explanation:
Exhibit:
Answer: C
Explanation:
Your expanding network currently includes ClusterXL running Multicast mode on two members, as
shown in this topology:
A. You need to add interfaces: 10.10.10.1/24 on Member A, and 10.10.10.2/24 on Member B. The
virtual IP address for these interfaces is 10.10.10.3/24. Both cluster gateways have a Quad card
with an available eth3 interface. What is the correct procedure to add these interfaces?
B. 1. Disable "Cluster membership" from one Gateway via cpconfig.
2. Configure the new interface via sysconfig from the "non-member" Gateway.
3. Re-enable "Cluster membership" on the Gateway.
4. Perform the same steps on the other Gateway.
5. Update the topology in the cluster object.
6. Install the Security Policy.
C. 1. Configure the new interface on both members using WebUI.
2. Update the new topology in the cluster object from SmartDashboard.
3. Define virtual IP in the Dashboard
4. Install the Security Policy.
D. 1. Use WebUI to configure the new interfaces on both member.
2. Update the topology in the cluster object.
3. Reboot both gateways.
4. Install the Security Policy.
E. 1. Use the command ifconfig to configure and enable the new interface on both members.
2. Update the topology in the cluster object for the cluster and both members.
3. Install the Security Policy.
4. Reboot the gateway.
Use the table to match the BEST Management High Availability synchronication-status
descriptions for your Security Management Server (SMS).
Answer: D
Explanation:
MegaCorps' disaster recovery plan is past due for an update to the backup and restore section to
enjoy the benefits of the new distributed R77 installation. You must propose a plan that meets the
following required and desired objectives:
Required: Security Policy repository must be backed up no less frequently than every 24 hours.
Desired: Back up R77 components enforcing the Security Policies at least once a week.
* Use the utility cron to run the command upgrade_export each night on the Security Management
Servers.
* Configure GAiA back up utility to back up Security Gateways every Saturday night.
* Use the utility cron to run the command upgrade_export each Saturday night on the log servers.
* Configure the organization's routine back up software to back up the switched logs every night.
Answer: B
Explanation:
Match the VPN-related terms with their definitions. Each correct term is only used once.
Exhibit:
Answer: B
Explanation:
In a zero downtime firewall cluster environment, what command syntax do you run to avoid
switching problems around the cluster for command cphaconf?
In a zero downtime scenario, which command do you run manually after all cluster members are
upgraded?
Complete this statement. To save interface information before upgrading a Windows Gateway,
use command
Fill in the blank with a numeric value. The default port number for standard TCP connections with
the LDAP server is
Answer: 389
Fill in the blank with a numeric value. The default port number for Secure Sockets Layer (SSL)
connections with the LDAP Server is
The command useful for debugging by capturing packet information, including verifying LDAP
authentication on all Check Point platforms is
Answer: fw monitor
John is configuring a new R77 Gateway cluster but he can not configure the cluster as Third Party
IP Clustering because this option is not available in Gateway Cluster Properties. Whats
happening?
Exhibit:
Answer: A
Explanation:
A. B.Used primarily when upgrading the Security Management Server, migrate stores all object
databases and the conf directories for importing to a newer version of the Security Management
Server.
B. Used when upgrading the Security Gateway, upgrade_export includes modified files, such as in
the directories /lib and /conf.
C. upgrade_export stores network-configuration data, objects, global properties, and the database
revisions prior to upgrading the Security Management Server.
Answer: B
Explanation:
Which command would you use to save the interface information before upgrading a GAiA
Gateway?
A. save configuration
B. cp /etc/sysconfig/network.C [location]
C. netstat rn > [filename].txt
D. ifconfig > [filename].txt
Answer: A
Explanation:
Answer: C
Explanation:
What process manages the dynamic routing protocols (OSPF, RIP, etc.) on GAiA?
A. There's no separate process, but the Linux default router can take care of that.
B. routerd
C. arouted
Answer: A
Explanation:
You are running a R77.10 Security Gateway on GAiA. In case of a hardware failure, you have a
server with the exact same hardware and firewall version installed. What backup method could
you use to quickly put the secondary firewall into production?
A. snapshot
B. migrate_import
C. manual backup
Answer: B
Explanation:
When migrating the SmartEvent data base from one server to another, the first step is to back up
the files on the original server. Which of the following commands should you run to back up the
SmartEvent data base?
Answer: B
Explanation:
A. B.active-standby
B. C.acceleration
C. D.load-balancing
Answer: B
Explanation:
If Jack was concerned about the number of log entries he would receive in the SmartReporter
system, which policy would he need to modify?
A. Smartreporter Policy
B. Log Consolidator Policy
C. Consolidation Policy
Answer: B
Explanation:
Answer: D