Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which Check Point software blade provides Application Security and identity control?

A.

Identity Awareness

B.

Data Loss Prevention

C.

URL Filtering

D.

Application Control

You notice that your firewall is under a DDoS attack and would like to enable the Penalty Box feature, which command you use?

A.

sim erdos –e 1

B.

sim erdos – m 1

C.

sim erdos –v 1

D.

sim erdos –x 1

What mechanism can ensure that the Security Gateway can communicate with the Management Server with ease in situations with overwhelmed network resources?

A.

The corresponding feature is new to R81.20 and is called "Management Data Plane Separation"

B.

The corresponding feature is called "Dynamic Dispatching"

C.

There is a feature for ensuring stable connectivity to the management server and is done via Priority Queuing.

D.

The corresponding feature is called "Dynamic Split"

Which of the following is NOT a component of a Distinguished Name?

A.

Common Name

B.

Country

C.

User container

D.

Organizational Unit

You work as a security administrator for a large company. CSO of your company has attended a security conference where he has learnt how hackers constantly modify their strategies and techniques to evade detection and reach corporate resources. He wants to make sure that his company has the tight protections in place. Check Point has been selected for the security vendor.

Which Check Point product protects BEST against malware and zero-day attacks while ensuring quick delivery of safe content to your users?

A.

IPS AND Application Control

B.

IPS, anti-virus and anti-bot

C.

IPS, anti-virus and e-mail security

D.

SandBlast

The “MAC magic” value must be modified under the following condition:

A.

There is more than one cluster connected to the same VLAN

B.

A firewall cluster is configured to use Multicast for CCP traffic

C.

There are more than two members in a firewall cluster

D.

A firewall cluster is configured to use Broadcast for CCP traffic

On the following picture an administrator configures Identity Awareness:

After clicking “Next” the above configuration is supported by:

A.

Kerberos SSO which will be working for Active Directory integration

B.

Based on Active Directory integration which allows the Security Gateway to correlate Active Directory users and machines to IP addresses in a method that is completely transparent to the user.

C.

Obligatory usage of Captive Portal.

D.

The ports 443 or 80 what will be used by Browser-Based and configured Authentication.

True or False: In R81, more than one administrator can login to the Security Management Server with write permission at the same time.

A.

False, this feature has to be enabled in the Global Properties.

B.

True, every administrator works in a session that is independent of the other administrators.

C.

True, every administrator works on a different database that is independent of the other administrators.

D.

False, only one administrator can login with write permission.

In which scenario will an administrator need to manually define Proxy ARP?

A.

When they configure an "Automatic Static NAT" which translates to an IP address that does not belong to one of the firewall’s interfaces.

B.

When they configure an "Automatic Hide NAT" which translates to an IP address that does not belong to one of the firewall’s interfaces.

C.

When they configure a "Manual Static NAT" which translates to an IP address that does not belong to one of the firewall’s interfaces.

D.

When they configure a "Manual Hide NAT" which translates to an IP address that belongs to one of the firewall’s interfaces.

You have created a rule at the top of your Rule Base to permit Guest Wireless access to the Internet. However, when guest users attempt to reach the Internet, they are not seeing the splash page to accept your Terms of Service, and cannot access the Internet. How can you fix this?

A.

Right click Accept in the rule, select “More”, and then check ‘Enable Identity Captive Portal’.

B.

On the firewall object, Legacy Authentication screen, check ‘Enable Identity Captive Portal’.

C.

In the Captive Portal screen of Global Properties, check ‘Enable Identity Captive Portal’.

D.

On the Security Management Server object, check the box ‘Identity Logging’.

What is the biggest benefit of policy layers?

A.

To break one policy into several virtual policies

B.

Policy Layers and Sub-Policies enable flexible control over the security policy

C.

They improve the performance on OS kernel version 3.0

D.

To include Threat Prevention as a sub policy for the firewall policy

What is the main objective when using Application Control?

A.

To filter out specific content.

B.

To assist the firewall blade with handling traffic.

C.

To see what users are doing.

D.

Ensure security and privacy of information.

Fill in the blank: Authentication rules are defined for ________ .

A.

User groups

B.

Users using UserCheck

C.

Individual users

D.

All users in the database

What are the Threat Prevention software components available on the Check Point Security Gateway?

A.

IPS, Threat Emulation and Threat Extraction

B.

IPS, Anti-Bot, Anti-Virus, SandBlast and Macro Extraction

C.

IPS, Anti-Bot, Anti-Virus, Threat Emulation and Threat Extraction

D.

IDS, Forensics, Anti-Virus, Sandboxing

Name the file that is an electronically signed file used by Check Point to translate the features in the license into a code?

A.

Both License (.lic) and Contract (.xml) files

B.

cp.macro

C.

Contract file (.xml)

D.

license File (.lic)