Exam 156-315.80: Check Point Certified Security Expert - R80
Exam 156-315.80: Check Point Certified Security Expert - R80
Exam 156-315.80
Check Point Certified Security Expert - R80
Version: 14.0
Answer: C
A. Accept
B. Drop
C. NAT
D. None
Answer: D
3. What happen when IPS profile is set in Detect Only Mode for troubleshooting?
Answer: C
Explanation:
It is recommended to enable Detect-Only for Troubleshooting on the profile during the initial installation of
IPS. This option overrides any protections that are set to Prevent so that they will not block any traffic.
During this time you can analyze the alerts that IPS generates to see how IPS will handle network traffic,
4. The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via
which 2 processes?
1
Certify For Sure with IT Exam Dumps
B. fwm via fwd
Answer: A
5. What is the recommended configuration when the customer requires SmartLog indexing for 14 days and
D. it is not possible.
Answer: B
6. In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies the type
of traffic applicable to the chain module. For Wire Mode configuration, chain modules marked with _______
A. ffff
B. 1
C. 2
D. 3
Answer: B
7. What is UserCheck?
B. Communication tool used to inform a user about a website or application they are trying to access.
Answer: B
2
Certify For Sure with IT Exam Dumps
A. Capsule Docs
B. Capsule Cloud
C. Capsule Enterprise
D. Capsule Workspace
Answer: C
9. Using mgmt_cli, what is the correct syntax to import a host object called Server_1 from the CLI?
Answer: B
Explanation: Example:
mgmt_cli add host name "New Host 1" ip-address "192.0.2.1" --format json
• "--format json" is optional. By default the output is presented in plain text. References:
10. Using Threat Emulation technologies, what is the best way to block .exe and .bat file types?
Answer: A
11. How many interfaces can you configure to use the Multi-Queue feature?
A. 10 interfaces
B. 3 interfaces
C. 4 interfaces
D. 5 interfaces
Answer: D
3
Certify For Sure with IT Exam Dumps
12. When using the Mail Transfer Agent, where are the debug logs stored?
A. $FWDIR/bin/emaild.mta. elg
B. $FWDIR/log/mtad elg
C. /var/log/mail.mta elg
D. $CPDIR/log/emaild elg
Answer: A
13. To help SmartEvent determine whether events originated internally or externally you must define using
the Initial Settings under General Settings in the Policy Tab. How many options are available to calculate
C. 2 Internal; External
Answer: D
A. 20000
B. 35000
C. 25000
D. 10000
Answer: C
15. In a Client to Server scenario, which represents that the packet has already checked against the tables
A. Big l
B. Little o
C. Little i
D. Big O
4
Certify For Sure with IT Exam Dumps
Answer: D
Answer: D
17. From SecureXL perspective, what are the tree paths of traffic flow:
Answer: D
18. In terms of Order Rule Enforcement, when a packet arrives at the gateway, the gateway checks it
against the rules in the top Policy Layer, sequentially from top to bottom Which of the following statements
is correct?
A. If the Action of the matching rule is Accept the gateway will drop the packet
B. If the Action of the matching rule is Drop, the gateway continues to check rules in the next Policy Layer
down
C. If the Action of the matching rule is Drop the gateway stops matching against later rules in the Policy
D. If the rule does not matched in the Network policy it will continue to other enabled polices
Answer: C
Explanation:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R8
0/CP_
5
Certify For Sure with IT Exam Dumps
19. After making modifications to the $CVPNDIR/conf/cvpnd.C file, how would you restart the daemon?
A. cvpnd_restart
B. cvpnd_restart
C. cvpnd restart
D. cvpnrestart
Answer: B
20. What is a best practice before starting to troubleshoot using the “fw monitor” tool?
C. Disable CoreXL
D. Disable SecureXL
Answer: D
21. John detected high load on sync interface. Which is most recommended solution?
A. For short connections like http service – delay sync for 2 seconds
D. For short connections like icmp service – delay sync for 2 seconds
Answer: A
22. Which configuration file contains the structure of the Security Server showing the port numbers,
A. $FWDIR/database/fwauthd.conf
B. $FWDIR/conf/fwauth.conf
C. $FWDIR/conf/fwauthd.conf
D. $FWDIR/state/fwauthd.conf
Answer: C
23. You want to verify if your management server is ready to upgrade to R80.10. What tool could you use in
6
Certify For Sure with IT Exam Dumps
this process?
A. migrate export
B. upgrade_tools verify
C. pre_upgrade_verifier
D. migrate import
Answer: C
B. Using cpconfig, update the Dynamic Dispatcher value to “full” under the CoreXL menu.
C. Edit/proc/interrupts to include multik set_mode 1 at the bottom of the file, save, and reboot.
Answer: A
A. Invoke and monitor critical processes and attempts to restart them if they fail
C. Log forwarding
Answer: A
Explanation:
https://sc1.checkpoint.com/documents/R76/CP_R76_CLI_WebAdmin/12496.htm
A. SmartEvent Maps
B. SmartEvent
C. Identity Awareness
D. SmartConsole Toolbars
Answer: A
7
Certify For Sure with IT Exam Dumps
27. Which command can you use to enable or disable multi-queue per interface?
A. cpmq set
B. Cpmqueue set
C. Cpmq config
D. St cpmq enable
Answer: A
C. Create products that use and enhance the Check Point solution
Answer: B
Answer: B
A. Disguising an illegal IP address behind an authorized IP address through Port Address Translation.
Answer: D
Explanation:
IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack connections to your
network. Attackers use IP spoofing to send malware and bots to your protected network, to execute DoS
8
Certify For Sure with IT Exam Dumps
attacks, or to gain unauthorized access.
3. Manual/Pre-Automatic NAT
A. 1, 2, 3, 4
B. 1, 4, 2, 3
C. 3, 1, 2, 4
D. 4, 3, 1, 2
Answer: A
32. Please choose correct command to add an “emailserver1” host with IP address 10.50.23.90 using GAiA
management CLI?
Answer: D
33. The SmartEvent R80 Web application for real-time event monitoring is called:
A. SmartView Monitor
B. SmartEventWeb
D. SmartView
Answer: B
34. Which of the following Windows Security Events will not map a username to an IP address in Identity
Awareness?
9
Certify For Sure with IT Exam Dumps
A. Kerberos Ticket Renewed
C. Account Logon
Answer: D
A. Terminal
B. Light
C. Full
D. Custom
Answer: A
A. fw tab –t
B. fw tab –list
C. fw-tab –s
D. fw tab -1
Answer: C
37. The essential means by which state synchronization works to provide failover in the event an active
member goes down, _______ is used specifically for clustered environments to allow gateways to report
their own state and learn about the states of other members in the cluster.
A. ccp
B. cphaconf
C. cphad
D. cphastart
Answer: A
38. What statement best describes the Proxy ARP feature for Manual NAT in R80.10?
10
Certify For Sure with IT Exam Dumps
A. Automatic proxy ARP configuration can be enabled
Answer: D
39. What is the minimum amount of RAM needed for a Threat Prevention Appliance?
A. 6 GB
C. 4 GB
Answer: C
40. The Check Point history feature in R80 provides the following:
C. Policy Installation Date, view install changes and install specific version
Answer: C
41. SmartEvent provides a convenient way to run common command line executables that can assist in
investigating events. Right-clicking the IP address, source or destination, in an event provides a list of
default and customized commands. They appear only on cells that refer to IP addresses because the IP
address of the active cell is used as the destination of the command when run. The default commands are:
Answer: C
11
Certify For Sure with IT Exam Dumps
42. You need to see which hotfixes are installed on your gateway, which command would you use?
A. cpinfo –h all
B. cpinfo –o hotfix
C. cpinfo –l hotfix
D. cpinfo –y all
Answer: D
43. As an administrator, you may be required to add the company logo to reports. To do this, you would
save the logo as a PNG file with the name ‘cover-company-logo.png’ and then copy that image file to which
A. SFWDIR/smartevent/conf
B. $RTDIR/smartevent/conf
C. $RTDIR/smartview/conf
D. $FWDIR/smartview/conf
Answer: C
44. In the Check Point Security Management Architecture, which component(s) can store logs?
A. SmartConsole
Answer: B
45. What is the valid range for VRID value in VRRP configuration?
A. 1 - 254
B. 1 - 255
C. 0 - 254
D. 0 - 255
Answer: B
Explanation:
12
Certify For Sure with IT Exam Dumps
Virtual Router ID - Enter a unique ID number for this virtual router. The range of valid values is 1 to 255. \
46. Which of the following is NOT a VPN routing option available in a star community?
B. To center, or through the center to other satellites, to Internet and other VPN targets.
D. To center only.
Answer: AD
47. What are the different command sources that allow you to communicate with the API server?
Answer: B
48. If there are two administration logged in at the same time to the SmartConsole, and there are objects
locked for editing, what must be done to make them available or other administrators? (Choose the BEST
answer.)
Answer: A
49. Which command can you use to verify the number of active concurrent connections?
A. fw conn all
B. fw ctl pstat
D. show connections
13
Certify For Sure with IT Exam Dumps
Answer: B
50. Fill in the blanks: A ________ license requires an administrator to designate a gateway for attachment
A. Formal; corporate
B. Local; formal
C. Local; central
D. Central; local
Answer: D
C. From SmartDashboard
Answer: A
52. SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s
machine via the web browser. What are the two modes of SNX?
Answer: B
53. You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify
A. Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.
B. Create a separate Security Policy package for each remote Security Gateway.
C. Create network objects that restricts all applicable rules to only certain networks.
14
Certify For Sure with IT Exam Dumps
D. Run separate SmartConsole instances to login and configure each Security Gateway directly.
Answer: B
A. By default the API-server is activated and does not have hardware requirements.
B. By default the API-server is not active and should be activated from the WebUI.
C. By default the API server is active on management and stand-alone servers with 16GB of RAM (or
more).
D. By default, the API server is active on management servers with 4 GB of RAM (or more) and on
Answer: D
B. the top events, destinations, sources, and users of the query results, either as a chart or in a tallied list.
Answer: C
56. What kind of information would you expect to see using the sim affinity command?
B. The involved firewall kernel modules in inbound and outbound packet chain
Answer: D
15
Certify For Sure with IT Exam Dumps
D. Only one packet in a stream is seen in a fw monitor packet capture
Answer: C
58. Which of the completed statements is NOT true? The WebUI can be used to manage user accounts
and:
D. assign user rights to their home directory in the Security Management Server.
Answer: D
A. only the primary member received packets sent to the cluster IP address
B. only the secondary member receives packets sent to the cluster IP address
C. packets sent to the cluster IP address are distributed equally between all members of the cluster
D. every member of the cluster received all of the packets sent to the cluster IP address
Answer: D
60. The system administrator of a company is trying to find out why acceleration is not working for the traffic.
The traffic is allowed according to the rule base and checked for viruses. But it is not accelerated.
What is the most likely reason that the traffic is not accelerated?
Answer: D
61. What must you do first if “fwm sic_reset” could not be completed?
A. Cpstop then find keyword “certificate” in objects_5_0.C and delete the section
16
Certify For Sure with IT Exam Dumps
C. Reset SIC from Smart Dashboard
Answer: D
62. What is the name of the secure application for Mail/Calendar for mobile devices?
A. Capsule Workspace
B. Capsule Mail
C. Capsule VPN
D. Secure Workspace
Answer: A
Answer: D
64. You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were
dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you
decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?
Answer: C
A. cpm status
B. api restart
17
Certify For Sure with IT Exam Dumps
C. api status
Answer: C
Answer: D
67. You plan to automate creating new objects using new R80 Management API. You decide to use GAIA
What is the first step to run management API commands on GAIA’s shell?
B. mgmt_login
Answer: B
68. When attempting to start a VPN tunnel, in the logs the error “no proposal chosen” is seen numerous
A. IKE Phase 1
B. IPSEC Phase 2
C. IPSEC Phase 1
D. IKE Phase 2
Answer: A
18
Certify For Sure with IT Exam Dumps
A. cpwd_admin -l
B. cpwd -l
C. cpwd admin_list
D. cpwd_admin list
Answer: D
70. What is the correct order of the default “fw monitor” inspection points?
A. i, I, o, O
B. 1, 2, 3, 4
C. i, o, I, O
D. I, i, O, o
Answer: C
Answer: D
Explanation:
ClusterXL has four working modes. This section briefly describes each mode and its relative advantages
and disadvantages.
72. Which component is NOT required to communicate with the Web Services API?
A. API key
B. session ID token
C. content-type
D. Request payload
Answer: A
19
Certify For Sure with IT Exam Dumps
73. Fill in the blank. Once a certificate is revoked from the Security Gateway by the Security Management
Answer: D
74. You need to change the number of firewall Instances used by CoreXL. How can you achieve this goal?
Answer: B
B. Automation involves the process of coordinating an exchange of information through web service
interactions such as XML and JSON, but orchestration does not involve processes.
C. Orchestration is concerned with executing a single task, whereas automation takes a series of tasks and
Answer: A
76. Which VPN routing option uses VPN routing for every connection a satellite gateway handles?
B. To center only
D. To center, or through the center to other satellites, to Internet and other VPN targets
Answer: D
20
Certify For Sure with IT Exam Dumps
A. Gateway API
B. Management API
C. OPSC SDK
Answer: A
78. The Security Gateway is installed on GAIA R80. The default port for the Web User Interface is ______.
A. TCP 18211
B. TCP 257
C. TCP 4433
D. TCP 443
Answer: D
79. You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which
B. SecuRemote
Answer: C
A. It is not supported with either the Performance pack of a hardware based accelerator card
C. It is automatically disabled if the Mobile Access Software Blade is enabled on the cluster
Answer: A
21
Certify For Sure with IT Exam Dumps
81. What is the port used for SmartConsole to connect to the Security Management Server?
Answer: A
Answer: D
Answer: A
84. What is the most ideal Synchronization Status for Security Management Server High Availability
deployment?
A. Lagging
B. Synchronized
D. Collision
Answer: B
22
Certify For Sure with IT Exam Dumps
A. Validating all data before it’s written into the database
Answer: B
86. Which of the following Check Point processes within the Security Management Server is responsible for
A. logd
B. fwd
C. fwm
D. cpd
Answer: B
87. Which of the following is NOT a type of Check Point API available in R80.10?
B. OPSEC SDK
C. Mobile Access
D. Management
Answer: C
88. The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?
Answer: D
89. Which file gives you a list of all security servers in use, including port number?
A. $FWDIR/conf/conf.conf
23
Certify For Sure with IT Exam Dumps
B. $FWDIR/conf/servers.conf
C. $FWDIR/conf/fwauthd.conf
D. $FWDIR/conf/serversd.conf
Answer: C
90. There are two R77.30 Security Gateways in the Firewall Cluster. They are named FW_A and FW_B.
The cluster is configured to work as HA (High availability) with default cluster configuration. FW_A is
configured to have higher priority than FW_B. FW_A was active and processing the traffic in the morning.
FW_B was standby. Around 1100 am, its interfaces went down and this caused a failover. FW_B became
active. After an hour, FW_A’s interface issues were resolved and it became operational.
A. No, since ‘maintain’ current active cluster member’ option on the cluster object properties is enabled by
default.
B. No, since ‘maintain’ current active cluster member’ option is enabled by default on the Global Properties.
C. Yes, since ‘Switch to higher priority cluster member’ option on the cluster object properties is enabled by
default.
D. Yes, since ‘Switch to higher priority cluster member’ option is enabled by default on the Global
Properties.
Answer: A
91. To add a file to the Threat Prevention Whitelist, what two items are needed?
Answer: B
92. What is the command to check the status of the SmartEvent Correlation Unit?
B. cpstat cpsead
24
Certify For Sure with IT Exam Dumps
C. fw ctl stat cpsemd
Answer: B
93. Check Point recommends configuring Disk Space Management parameters to delete old log entries
A. 50%
B. 75%
C. 80%
D. 15%
Answer: D
94. During inspection of your Threat Prevention logs you find four different computers having one event
each with a Critical Severity. Which of those hosts should you try to remediate first?
Answer: D
95. You need to change the MAC-address on eth2 interface of the gateway. What command and what
Answer: A
96. To enable Dynamic Dispatch on Security Gateway without the Firewall Priority Queues, run the
25
Certify For Sure with IT Exam Dumps
A. fw ctl Dyn_Dispatch on
Answer: C
A. fwaccel status
B. fwaccel stats -m
C. fwaccel -s
D. fwaccel stat
Answer: D
Explanation:
98. What can we infer about the recent changes made to the Rule Base?
B. 8 changes have been made by administrators since the last policy installation
26
Certify For Sure with IT Exam Dumps
C. The rules 1, 5 and 6 cannot be edited by the ‘admin’ administrator
Answer: D
A. SmartProvisioning
B. SmartView Tracker
C. SmartView Monitor
D. SmartLog
Answer: C
100. When a packet arrives at the gateway, the gateway checks it against the rules in the hop Policy Layer,
sequentially from top to bottom, and enforces the first rule that matches a packet. Which of the following
A. If the Action is Accept, the gateway allows the packet to pass through the gateway.
B. If the Action is Drop, the gateway continues to check rules in the next Policy Layer down.
C. If the Action is Accept, the gateway continues to check rules in the next Policy Layer down.
D. If the Action is Drop, the gateway applies the Implicit Clean-up Rule for that Policy Layer.
Answer: C
A. 18191
B. 18190
C. 8983
D. 19009
Answer: D
102. You are investigating issues with to gateway cluster members are not able to establish the first initial
cluster synchronization. What service is used by the FWD daemon to do a Full Synchronization?
27
Certify For Sure with IT Exam Dumps
B. TCP port 257
Answer: C
103. In SmartConsole, objects are used to represent physical and virtual network components and also
some logical components. These objects are divided into several categories. Which of the following is NOT
an objects category?
A. Limit
B. Resource
D. Network Object
Answer: B
B. A 5-tuple match
C. Multicast packets
Answer: B
A. fwm
B. cpmd
C. cpm
D. cpd
Answer: C
106. You work as a security administrator for a large company. CSO of your company has attended a
security conference where he has learnt how hackers constantly modify their strategies and techniques to
28
Certify For Sure with IT Exam Dumps
evade detection and reach corporate resources. He wants to make sure that his company has the tight
protections in place. Check Point has been selected for the security vendor.
Which Check Point product protects BEST against malware and zero-day attacks while ensuring quick
D. SandBlast
Answer: D
107. Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for
this?
Answer: D
Explanation:
Full Sync transfers all Security Gateway kernel table information from one cluster member to another. It is
handled by the fwd daemon using an encrypted TCP connection on port 256.
Delta Sync transfers changes in the kernel tables between cluster members. Delta sync is handled by the
108. When users connect to the Mobile Access portal they are unable to open File Shares. Which log file
A. cvpnd.elg
B. httpd.elg
C. vpnd.elg
D. fw.elg
29
Certify For Sure with IT Exam Dumps
Answer: A
109. As a valid Mobile Access Method, what feature provides Capsule Connect/VPN?
A. That is used to deploy the mobile device as a generator of one-time passwords for authenticating to an
B. Fill Layer4 VPN –SSL VPN that gives users network access to all mobile applications.
C. Full Layer3 VPN –IPSec VPN that gives users network access to all mobile applications.
D. You can make sure that documents are sent to the intended recipients only.
Answer: C
110. What is the correct command to observe the Sync traffic in a VRRP environment?
A. fw monitor –e “accept[12:4,b]=224.0.0.18;”
Answer: D
111. Vanessa is expecting a very important Security Report. The Document should be sent as an
attachment via e-m ail. An e-mail with Security_report.pdf file was delivered to her e-mail inbox. When she
opened the PDF file, she noticed that the file is basically empty and only few lines of text are in it. The report
B. SandBlast Agent
Answer: D
112. SandBlast agent extends 0 day prevention to what part of the network?
30
Certify For Sure with IT Exam Dumps
B. DMZ server
C. Cloud
D. Email servers
Answer: A
113. Which of the following is an identity acquisition method that allows a Security Gateway to identify
A. UserCheck
Answer: B
Explanation:
Reference :
https://sc1.checkpoint.com/documents/R76/CP_R76_IdentityAwareness_AdminGuide/62402.htm
114. In order to get info about assignment (FW, SND) of all CPUs in your SGW, what is the most accurate
CLI command?
A. fw ctl sdstat
B. fw ctl affinity –l –a –r –v
D. cpinfo
Answer: B
115. When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?
A. RADIUS
C. AD Query
Answer: D
31
Certify For Sure with IT Exam Dumps
Explanation:
116. SecureXL improves non-encrypted firewall traffic throughput and encrypted VPN traffic throughput.
B. This statement is false because SecureXL does not improve this traffic but CoreXL does.
Answer: C
Explanation:
SecureXL improved non-encrypted firewall traffic throughput, and encrypted VPN traffic throughput, by
nearly an order-of-magnitude- particularly for small packets flowing in long duration connections.
117. Which file contains the host address to be published, the MAC address that needs to be associated
with the IP Address, and the unique IP of the interface that responds to ARP request?
A. /opt/CPshrd-R80/conf/local.arp
B. /var/opt/CPshrd-R80/conf/local.arp
C. $CPDIR/conf/local.arp
D. $FWDIR/conf/local.arp
Answer: D
118. You are asked to check the status of several user-mode processes on the management server and
gateway. Which of the following processes can only be seen on a Management Server?
A. fwd
B. fwm
C. cpd
D. cpwd
Answer: B
119. What is the command to check the status of Check Point processes?
32
Certify For Sure with IT Exam Dumps
A. top
B. cptop
C. cphaprob list
D. cpwd_admin list
Answer: D
Answer: C
Explanation:
Each instance of VRRP running on a supported interface may monitor the link state of other interfaces. The
If a monitored interface loses its link state, then VRRP will decrement its priority over a VRID by the
specified delta value and then will send out a new VRRP HELLO packet. If the new effective priority is less
than the priority a backup platform has, then the backup platform will beging to send out its own HELLO
packet.
Once the master sees this packet with a priority greater than its own, then it releases the VIP. References:
121. Which one of these features is NOT associated with the Check Point URL Filtering and Application
Control Blade?
A. Detects and blocks malware by correlating multiple detection engines before users are affected.
B. Configure rules to limit the available network bandwidth for specified users or groups.
C. Use UserCheck to help users understand that certain websites are against the company’s security
policy.
D. Make rules to allow or block applications and Internet sites for individual applications, categories, and
risk levels.
Answer: A
33
Certify For Sure with IT Exam Dumps
122. You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each
profile defines a(n) ______ or _______ action for the file types.
A. Inspect/Bypass
B. Inspect/Prevent
C. Prevent/Bypass
D. Detect/Bypass
Answer: A
123. John is using Management HA. Which Smartcenter should be connected to for making changes?
A. secondary Smartcenter
B. active Smartenter
D. primary Smartcenter
Answer: B
Answer: A
125. Selecting an event displays its configurable properties in the Detail pane and a description of the event
A. Severity
B. Automatic reactions
C. Policy
D. Threshold
Answer: C
34
Certify For Sure with IT Exam Dumps
126. What CLI command compiles and installs a Security Policy on the target’s Security Gateways?
A. fwm compile
B. fwm load
C. fwm fetch
D. fwm install
Answer: B
127. Fill in the blank: The “fw monitor” tool can be best used to troubleshoot _______.
A. AV issues
B. VPN errors
C. Network issues
D. Authentication issues
Answer: C
128. An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office.
Both offices are protected by Check Point Security Gateway managed by the same Security Management
Server. While configuring the VPN community to specify the pre-shared secret the administrator found that
B. Pre-shared can only be used while creating a VPN between a third party vendor and Check Point
Security Gateway.
C. Certificate based Authentication is the only authentication method available between two Security
Answer: C
129. What needs to be configured if the NAT property ‘Translate destination or client side’ is not enabled in
Global Properties?
35
Certify For Sure with IT Exam Dumps
A. A host route to route to the destination IP.
B. Use the file local.arp to add the ARP entries for NAT to work.
Answer: C
130. R80.10 management server can manage gateways with which versions installed?
Answer: C
B. Ensure the Check Point SandBlast services is running on the end user’s system
C. If malware enters an end user’s system, the SandBlast Agent prevents the malware from spreading with
the network
Answer: C
132. Check Point Support in many cases asks you for a configuration summary of your Check Point system.
A. cpexport
B. sysinfo
C. cpsizeme
D. cpinfo
Answer: C
133. What is the least amount of CPU cores required to enable CoreXL?
36
Certify For Sure with IT Exam Dumps
A. 2
B. 1
C. 4
D. 6
Answer: B
134. Session unique identifiers are passed to the web api using which http header option?
A. X-chkp-sid
B. Accept-Charset
C. Proxy-Authorization
D. Application
Answer: C
135. What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering,
B. Anti-Bot is the only protection mechanism which starts a counter-attack against known Command &
Control Centers
Answer: D
136. Fill in the blanks: Gaia can be configured using the ________ or _______.
Answer: C
37
Certify For Sure with IT Exam Dumps
137. Fill in the blank: Identity Awareness AD-Query is using the Microsoft _______ API to learn users from
AD.
A. WMI
B. Eventvwr
C. XML
D. Services.msc
Answer: A
138. When doing a Stand-Alone Installation, you would install the Security Management Server with which
B. SmartConsole
C. SecureClient
D. Security Gateway
E. SmartEvent
Answer: D
139. What is the protocol and port used for Health Check and State Synchronization in ClusterXL?
Answer: C
140. Which Check Point feature enables application scanning and the detection?
A. Application Dictionary
B. AppWiki
C. Application Library
D. CPApp
Answer: B
38
Certify For Sure with IT Exam Dumps
141. Fill in the blanks. There are________ types of software containers: ________.
Answer: A
142. Vanessa is firewall administrator in her company. Her company is using Check Point firewall on a
central and several remote locations which are managed centrally by R77.30 Security Management Server.
On central location is installed R77.30 Gateway on Open server. Remote locations are using Check Point
UTM-1570 series appliances with R75.30 and some of them are using a UTM-1-Edge-X or Edge-W with
What can cause Vanessa unnecessary problems, if she didn’t check all requirements for migration to R80?
Answer: A
143. Please choose the path to monitor the compliance status of the Check Point R80.10 based
management.
C. Logs & Monitor --> New Tab --> Open compliance View
Answer: C
A. Once a week
39
Certify For Sure with IT Exam Dumps
B. Once an hour
Answer: D
145. True or False: In R80, more than one administrator can login to the Security Management Server with
B. True, every administrator works in a session that is independent of the other administrators.
C. True, every administrator works on a different database that is independent of the other administrators.
Answer: B
A. Firewall
B. VPN
C. IPS
D. HTTPS
Answer: C
147. Fill in the blank: Authentication rules are defined for ________.
A. User groups
C. Individual users
Answer: A
148. You have successfully backed up Check Point configurations without the OS information. What
A. restore_backup
40
Certify For Sure with IT Exam Dumps
B. import backup
C. cp_merge
D. migrate import
Answer: D
149. How many users can have read/write access in Gaia at one time?
A. Infinite
B. One
C. Three
D. Two
Answer: B
A. fw tab –t StateTable
B. fw tab –t connections
C. fw tab –t connection
D. fw tab connections
Answer: B
A. Gateway API
B. Management API
C. OPSEC SDK
Answer: A
152. What are the three components for Check Point Capsule?
41
Certify For Sure with IT Exam Dumps
D. Capsule Workspace, Capsule Docs, Capsule Cloud
Answer: D
A. DBSync
B. API Server
C. fwm
D. SOLR
Answer: D
A. fw tab -t
B. fw tab -s
C. fw tab -n
D. fw tab -k
Answer: B
155. On R80.10 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the
A. 18210
B. 18184
C. 257
D. 18191
Answer: B
156. Which software blade does NOT accompany the Threat Prevention policy?
A. Anti-virus
B. IPS
C. Threat Emulation
42
Certify For Sure with IT Exam Dumps
Answer: D
157. True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security
Gateway.
D. True, Central License can be installed with CPLIC command on a Security Gateway
Answer: D
158. How do you enable virtual mac (VMAC) on-the-fly on a cluster member?
Answer: C
159. To optimize Rule Base efficiency, the most hit rules should be where?
Answer: C
160. Which feature is NOT provided by all Check Point Mobile Access solutions?
D. Secure connectivity
Answer: A
43
Certify For Sure with IT Exam Dumps
Explanation: Types of Solutions
B. Anti-Bot Blade
Answer: C
162. GAiA Software update packages can be imported and installed offline in situation where:
A. Security Gateway with GAiA does NOT have SFTP access to Internet
C. Security Gateway with GAiA does NOT have SSH access to Internet.
D. The desired CPUSE package is ONLY available in the Check Point CLOUD.
Answer: B
163. SandBlast has several functional components that work together to ensure that attacks are prevented
A. Threat Emulation
B. Mobile Access
D. Threat Cloud
Answer: C
164. Which statement is most correct regarding about “CoreXL Dynamic Dispatcher”?
A. The CoreXL FW instances assignment mechanism is based on Source MAC addresses, Destination
MAC addresses
B. The CoreXL FW instances assignment mechanism is based on the utilization of CPU cores
44
Certify For Sure with IT Exam Dumps
D. The CoreXl FW instances assignment mechanism is based on Source IP addresses, Destination IP
Answer: B
A. 2
B. 4
C. 1
D. 3
Answer: A
166. Fill in the blank: The R80 feature _______ permits blocking specific IP addresses for a specified time
period.
Answer: C
Explanation:
Suspicious Activity Rules is a utility integrated into SmartView Monitor that is used to modify access
privileges upon detection of any suspicious network activity (for example, several attempts to gain
unauthorized access).
The detection of suspicious activity is based on the creation of Suspicious Activity rules. Suspicious Activity
rules are Firewall rules that enable the system administrator to instantly block suspicious connections that
are not restricted by the currently enforced security policy. These rules, once set (usually with an expiration
date), can be applied immediately without the need to perform an Install Policy operation.
45
Certify For Sure with IT Exam Dumps
References:
167. SmartConsole R80 requires the following ports to be open for SmartEvent R80 management:
A. 19090,22
B. 19190,22
C. 18190,80
D. 19009,443
Answer: D
168. The “Hit count” feature allows tracking the number of connections that each rule matches. Will the Hit
count feature work independently from logging and Track the hits if the Track option is set to “None”?
A. No, it will work independently. Hit Count will be shown only for rules Track option set as Log or alert.
B. Yes it will work independently as long as “analyze all rules” tick box is enabled on the Security Gateway.
C. No, it will not work independently because hit count requires all rules to be logged.
D. Yes it will work independently because when you enable Hit Count, the SMS collects the data from
Answer: D
169. When configuring SmartEvent Initial settings, you must specify a basic topology for SmartEvent to help
it calculate traffic direction for events. What is this setting called and what are you defining?
Answer: B
170. What two ordered layers make up the Access Control Policy Layer?
46
Certify For Sure with IT Exam Dumps
D. Network and Application Control
Answer: D
171. Identify the API that is not supported by Check Point currently.
D. OPSEC SDK
Answer: C
172. You want to store the GAIA configuration in a file for later reference. What command should you use?
Answer: D
173. What command can you use to have cpinfo display all installed hotfixes?
A. cpinfo -hf
B. cpinfo –y all
C. cpinfo –get hf
D. cpinfo installed_jumbo
Answer: B
174. After the initial installation on Check Point appliance, you notice that the Management-interface and
Which commands could you use to set the IP to 192.168.80.200/24 and default gateway to 192.168.80.1.
A. set interface Mgmt ipv4-address 192.168.80.200 mask-length 24set static-route default nexthop gateway
47
Certify For Sure with IT Exam Dumps
192.168.80.1 onsave config
D. set interface Mgmt ipv4-address 192.168.80.200 mask-length 24add static-route default nexthop
Answer: A
175. There are 4 ways to use the Management API for creating host object with R80 Management API.
C. Using CLISH
Answer: E
176. GAIA greatly increases operational efficiency by offering an advanced and intuitive software update
Answer: A
177. When Dynamic Dispatcher is enabled, connections are assigned dynamically with the exception of:
A. Threat Emulation
B. HTTPS
C. QOS
D. VoIP
Answer: D
48
Certify For Sure with IT Exam Dumps
178. Which Mobile Access Application allows a secure container on Mobile devices to give users access to
Answer: C
179. You have enabled “Full Log” as a tracking option to a security rule. However, you are still not seeing
A. Logging has disk space issues. Change logging storage options on the logging server or Security
Answer: A
180. Which of the following blades is NOT subscription-based and therefore does not have to be renewed
on a regular basis?
A. Application Control
B. Threat Emulation
C. Anti-Virus
Answer: B
181. Pamela is Cyber Security Engineer working for Global Instance Firm with large scale deployment of
Check Point Enterprise Appliances using GAiA/R80.10. Company’s Developer Team is having random
access issue to newly deployed Application Server in DMZ’s Application Server Farm Tier and blames DMZ
Security Gateway as root cause. The ticket has been created and issue is at Pamela’s desk for an
49
Certify For Sure with IT Exam Dumps
investigation. Pamela decides to use Check Point’s Packet Analyzer Tool-fw monitor to iron out the issue
What do you recommend as the best suggestion for Pamela to make sure she successfully captures entire
A. Pamela should check SecureXL status on DMZ Security gateway and if it’s turned ON. She should turn
B. Pamela should check SecureXL status on DMZ Security Gateway and if it’s turned OFF. She should turn
C. Pamela should use tcpdump over fw monitor tool as tcpdump works at OS-level and captures entire
traffic.
D. Pamela should use snoop over fw monitor tool as snoop works at NIC driver level and captures entire
traffic.
Answer: A
A. With SDF enabled, the involved VPN Gateways only supports IKEv1
B. Acceleration technologies, such as SecureXL and CoreXL are disabled when activating SDF
D. With SDF enabled, you can only have three Sync interfaces at most
Answer: B
50
Certify For Sure with IT Exam Dumps
A. A new Policy Package created on both the Management and Gateway will be deleted and must be
B. A new Policy Package created on the Management is going to be installed to the existing Gateway.
C. A new Policy Package created on the Gateway is going to be installed on the existing Management.
D. A new Policy Package created on the Gateway and transferred to the Management will be overwritten by
the Policy Package currently on the Gateway but can be restored from a periodic backup on the Gateway.
Answer: B
A. AES-128
B. AES-256
C. DES
D. 3DES
Answer: C
A. clusterXL_admin down
51
Certify For Sure with IT Exam Dumps
B. cphaprob_admin down
C. clusterXL_admin down-p
Answer: C
186. DLP and Geo Policy are examples of what type of Policy?
A. Standard Policies
B. Shared Policies
C. Inspection Policies
D. Unified Policies
Answer: B
187. Which web services protocol is used to communicate to the Check Point R80 Identity Awareness Web
API?
A. SOAP
B. REST
C. XLANG
D. XML-RPC
Answer: B
Explanation:
The Identity Web API uses the REST protocol over SSL. The requests and responses are HTTP and in
JSON format.
188. For best practices, what is the recommended time for automatic unlocking of locked admin accounts?
A. 20 minutes
B. 15 minutes
D. 30 minutes at least
Answer: D
52
Certify For Sure with IT Exam Dumps
189. Check Point security components are divided into the following components:
Answer: B
Answer: A
191. Packet acceleration (SecureXL) identifies connections by several attributes- Which of the attributes is
A. Source Address
B. Destination Address
D. Source Port
Answer: C
Explanation:
192. When running a query on your logs, to find records for user Toni with machine IP of 10.0.4.210 but
exclude her tablet IP of 10.0.4.76, which of the following query syntax would you use?
53
Certify For Sure with IT Exam Dumps
Answer: B
193. SmartEvent uses it's event policy to identify events. How can this be customized?
Answer: C
194. Which options are given on features, when editing a Role on Gaia Platform?
C. Read/Write, None
Answer: B
195. What is the main difference between Threat Extraction and Threat Emulation?
A. Threat Emulation never delivers a file and takes more than 3 minutes to complete.
B. Threat Extraction always delivers a file and takes less than a second to complete.
C. Threat Emulation never delivers a file that takes less than a second to complete.
D. Threat Extraction never delivers a file and takes more than 3 minutes to complete.
Answer: B
A. TCP 857
B. TCP 18192
C. TCP 900
D. TCP 19009
Answer: D
54
Certify For Sure with IT Exam Dumps
197. Fill in the blank: A new license should be generated and installed in all of the following situations
Answer: A
198. When using CPSTAT, what is the default port used by the AMON server?
A. 18191
B. 18192
C. 18194
D. 18190
Answer: B
A. Slow path
B. Firewall path
C. Medium path
D. Accelerated path
Answer: C
200. The Correlation Unit performs all but the following actions:
A. Marks logs that individually are not events, but may be part of a larger pattern to be identified later.
D. Takes a new log entry that is part of a group of items that together make up an event, and adds it to an
ongoing event.
Answer: C
55
Certify For Sure with IT Exam Dumps
201. What key is used to save the current CPView page in a filename format cpview_”cpview process
ID”.cap”number of captures”?
A. S
B. W
C. C
D. Space bar
Answer: C
202. Fill in the blank: ________ information is included in “Full Log” tracking option, but is not included in
A. Destination port
B. Data type
C. File attributes
D. Application
Answer: B
B. detect only
C. inline/prevent or detect
Answer: C
204. Vanessa is a Firewall administrator. She wants to test a backup of her company’s production Firewall
cluster Dallas_GW. She has a lab environment that is identical to her production environment. She decided
Which details she need to fill in System Restore window before she can click OK button and test the
backup?
56
Certify For Sure with IT Exam Dumps
C. Server, Protocol, Username, Password, Path, Comment, All Members
Answer: C
A. System Administrators know when their cluster has failed over and can also see why it failed over by
B. ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.
D. Both ClusterXL and VRRP are fully supported by Gaia and available to all Check Point appliances, open
Answer: D
206. You have created a rule at the top of your Rule Base to permit Guest Wireless access to the Internet.
However, when guest users attempt to reach the Internet, they are not seeing the splash page to accept
your Terms of Service, and cannot access the Internet. How can you fix this?
A. Right click Accept in the rule, select “More”, and then check ‘Enable Identity Captive Portal’.
B. On the firewall object, Legacy Authentication screen, check ‘Enable Identity Captive Portal’.
C. In the Captive Portal screen of Global Properties, check ‘Enable Identity Captive Portal’.
D. On the Security Management Server object, check the box ‘Identity Logging’.
Answer: A
207. Fill in the blank: The command _______ provides the most complete restoration of a R80
configuration.
A. upgrade_import
B. cpconfig
D. cpinfo –recover
57
Certify For Sure with IT Exam Dumps
Answer: A
A. Route-based VPN
B. IPS
C. IPv6
D. Overlapping NAT
Answer: B
Explanation:
CoreXL does not support Check Point Suite with these features: References:
209. To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the
B. fw ctl Dynamic_Priority_Queue on
Answer: D
210. Which Check Point software blade provides Application Security and identity control?
A. Identity Awareness
C. URL Filtering
D. Application Control
Answer: D
A. fwd
B. fwm
C. cpwd
58
Certify For Sure with IT Exam Dumps
D. cpd
Answer: D
212. Fill in the blank: Permanent VPN tunnels can be set on all tunnels in the community, on all tunnels for
Answer: C
A. SNMP
B. High alert
C. Mail
Answer: B
214. View the rule below. What does the lock-symbol in the left column mean? (Choose the BEST answer.)
C. Configuration lock is present. Click the lock symbol to gain read-write access.
D. The current administrator is logged in as read-only because someone else is editing the policy.
Answer: B
Explanation:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R8
0/CP_
59
Certify For Sure with IT Exam Dumps
215. In SmartEvent, what are the different types of automatic reactions that the administrator can
configure?
A. Mail, Block Source, Block Event Activity, External Script, SNMP Trap
D. Mail, Block Source, Block Event Activity, Packet Capture, SNMP Trap
Answer: A
A. cpmq get
C. cpmq set
Answer: A
217. Ken wants to obtain a configuration lock from other administrator on R80 Security Management Server.
D. The database feature has two commands lock database override and unlock database. Both will work.
Answer: D
218. With Mobile Access enabled, administrators select the web-based and native applications that can be
accessed by remote users and define the actions that users can perform the applications. Mobile Access
A. HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to
access the native applications, they need to install the SSL Network Extender.
B. HTTPS for web-based applications and AES or RSA algorithm for native applications. For end users to
60
Certify For Sure with IT Exam Dumps
access the native application, they need to install the SSL Network Extender.
C. HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to
D. HTTPS for web-based applications and AES or RSA algorithm for native applications. For end users to
Answer: A
A. Consolidation Policy
B. Correlation Unit
C. SmartEvent Policy
D. SmartEvent GUI
Answer: B
A. Reports
B. Advanced
C. Checkups
D. Views
E. Summary
Answer: A
221. What is the default shell for the command line interface?
A. Expert
B. Clish
C. Admin
D. Normal
Answer: B
Explanation:
61
Certify For Sure with IT Exam Dumps
222. Which process is available on any management product and on products that require direct GUI
access, such as SmartEvent and provides GUI client communications, database manipulation, policy
A. cpwd
B. fwd
C. cpd
D. fwm
Answer: D
Explanation:
Firewall Management (fwm) is available on any management product, including Multi-Domain and on
products that requite direct GUI access, such as SmartEvent, It provides the following:
– Database manipulation
– Policy Compilation
– Management HA sync
223. What does the Log "Views" tab show when SmartEvent is Correlating events?
Answer: C
224. Which command shows the current connections distributed by CoreXL FW instances?
B. fw ctl affinity -l
C. fw ctl instances -v
D. fw ctl iflist
Answer: A
62
Certify For Sure with IT Exam Dumps
225. What is the command to see cluster status in cli expert mode?
A. fw ctl stat
B. clusterXL stat
C. clusterXL status
D. cphaprob stat
Answer: D
226. What is the difference between SSL VPN and IPSec VPN?
D. IPSec VPN requires installation of a resident VPN client and SSL VPN requires only an installed
Browser.
Answer: D
227. SmartEvent does NOT use which of the following procedures to identify events:
Answer: C
Explanation:
Events are detected by the SmartEvent Correlation Unit. The Correlation Unit task is to scan logs for criteria
that match an Event Definition. SmartEvent uses these procedures to identify events:
63
Certify For Sure with IT Exam Dumps
228. In what way are SSL VPN and IPSec VPN different?
A. SSL VPN is using HTTPS in addition to IKE, whereas IPSec VPN is clientless
B. SSL VPN adds an extra VPN header to the packet, IPSec VPN does not
C. IPSec VPN does not support two factor authentication, SSL VPN does support this
D. IPSec VPN uses an additional virtual adapter; SSL VPN uses the client network adapter only.
Answer: D
229. Capsule Connect and Capsule Workspace both offer secured connection for remote users who are
using their mobile devices. However, there are differences between the two.
A. Workspace supports ios operating system, Android, and WP8, whereas Connect supports ios operating
B. For compliance/host checking, Workspace offers the MDM cooperative enforcement, whereas Connect
C. For credential protection, Connect uses One-time Password login support and has no SSO support,
whereas Workspace offers both One-Time Password and certain SSO login support.
D. Workspace can support any application, whereas Connect has a limited number of application types
Answer: C
230. Fill in the blank: The tool _______ generates a R80 Security Gateway configuration report.
A. infoCP
B. infoview
C. cpinfo
D. fw cpinfo
Answer: C
64
Certify For Sure with IT Exam Dumps
C. Load sharing between OS behavior and CPU Level emulation.
D. High availability between the local SandBlast appliance and the cloud.
Answer: B
232. After trust has been established between the Check Point components, what is TRUE about name and
IP-address changes?
B. The Security Gateway name cannot be changed in command line without re-establishing trust.
C. The Security Management Server name cannot be changed in SmartConsole without re-establishing
trust.
D. The Security Management Server IP-address cannot be changed without re-establishing the trust.
Answer: A
233. When deploying SandBlast, how would a Threat Emulation appliance benefit from the integration of
ThreatCloud?
company-related data
B. ThreatCloud is a collaboration platform for all the CheckPoint customers to form a virtual cloud
C. ThreatCloud is a collaboration platform for Check Point customers to benefit from VMWare ESXi
infrastructure which supports the Threat Emulation Appliances as virtual machines in the EMC Cloud
D. ThreatCloud is a collaboration platform for all the Check Point customers to share information about
malicious and benign files that all of the customers can benefit from as it makes emulation of known files
unnecessary
Answer: D
234. Which of the following links will take you to the SmartView web application?
65
Certify For Sure with IT Exam Dumps
D. https://<Security Management Server IP Address>/smartview
Answer: B
Answer: B
236. Check Point Management (cpm) is the main management process in that it provides the architecture
for a consolidated management console. It empowers the migration from legacy Client-side logic to
A. Allow GUI Client and management server to communicate via TCP Port 19001
B. Allow GUI Client and management server to communicate via TCP Port 18191
C. Performs database tasks such as creating, deleting, and modifying objects and compiling policy.
D. Performs database tasks such as creating, deleting, and modifying objects and compiling as well as
Answer: C
237. SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based
algorithms and has four dedicated components that constantly work together to protect mobile devices and
their data. Which component is NOT part of the SandBlast Mobile solution?
A. Management Dashboard
B. Gateway
Answer: C
238. When setting up an externally managed log server, what is one item that will not be configured on the
66
Certify For Sure with IT Exam Dumps
R80 Security Management Server?
A. IP
B. SIC
C. NAT
D. FQDN
Answer: C
239. What will be the effect of running the following command on the Security Management Server?
C. No effect.
Answer: A
240. In the R80 SmartConsole, on which tab are Permissions and Administrators defined?
A. Security Policies
Answer: C
241. Fill in the blank: A _______ VPN deployment is used to provide remote users with secure access to
67
Certify For Sure with IT Exam Dumps
B. Clientless direct access
D. Direct access
Answer: A
242. How long may verification of one file take for Sandblast Threat Emulation?
A. up to 1 minutes
C. up to 5 minutes
D. up to 3 minutes
Answer: B
243. Which command will allow you to see the interface status?
A. cphaprob interface
B. cphaprob –I interface
C. cphaprob –a if
D. cphaprob stat
Answer: C
244. Which of the following is a new R80.10 Gateway feature that had not been available in R77.X and
older?
A. The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in
the order in which they are defined, allowing control over the rule base flow and which security
B. Limits the upload and download throughput for streaming media in the company to 1 Gbps.
C. Time object to a rule to make the rule active only during specified times.
D. Sub Policies ae sets of rules that can be created and attached to specific rules. If the rule is matched,
inspection will continue in the sub policy attached to it rather than in the next rule.
Answer: D
68
Certify For Sure with IT Exam Dumps
245. For Management High Availability, which of the following is NOT a valid synchronization status?
A. Collision
B. Down
C. Lagging
Answer: B
A. SmartEvent Server
B. Correlation Unit
C. Log Consolidator
D. Log Server
Answer: C
Answer: D
248. Hit Count is a feature to track the number of connections that each rule matches, which one is not
B. Improve Firewall performance - You can move a rule that has hot count to a higher position in the Rule
Base
D. Analyze a Rule Base - You can delete rules that have no matching connections
Answer: C
69
Certify For Sure with IT Exam Dumps
249. Which of the following type of authentication on Mobile Access can NOT be used as the first
authentication method?
A. Dynamic ID
B. RADIUS
D. Certificate
Answer: A
Answer: A
251. What is correct statement about Security Gateway and Security Management Server failover in Check
A. Security Gateway failover is an automatic procedure but Security Management Server failover is a
manual procedure.
B. Security Gateway failover as well as Security Management Server failover is a manual procedure.
C. Security Gateway failover is a manual procedure but Security Management Server failover is an
automatic procedure.
D. Security Gateway failover as well as Security Management Server failover is an automatic procedure.
Answer: A
252. Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a
new CPU to replace the existing single core CPU. After installation, is the administrator required to perform
B. Go to clash-Run cpconfig | Configure CoreXL to make use of the additional Cores | Exit cpconfig |
70
Certify For Sure with IT Exam Dumps
Reboot Security Gateway
C. Administrator does not need to perform any task. Check Point will make use of the newly installed CPU
and Cores
D. Go to clash-Run cpconfig | Configure CoreXL to make use of the additional Cores | Exit cpconfig |
Answer: B
253. You find one of your cluster gateways showing “Down” when you run the “cphaprob stat” command.
You then run the “clusterXL_admin up” on the down member but unfortunately the member continues to
A. cphaprob –f register
B. cphaprob –d –s report
C. cpstat –f all
D. cphaprob –a list
Answer: D
254. To ensure that VMAC mode is enabled, which CLI command should you run on all cluster members?
B. fw ctl get int vmac global param enabled; result of command should return value 1
C. cphaprob-a if
Answer: D
A. 80
B. 4434
C. 443
D. 8080
Answer: C
71
Certify For Sure with IT Exam Dumps
256. The _______ software blade package uses CPU-level and OS-level sandboxing in order to detect and
block malware.
Answer: B
257. What cloud-based SandBlast Mobile application is used to register new devices and users?
B. Management Dashboard
Answer: D
258. Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using
______ .
A. User Directory
C. Captive Portal
D. UserCheck
Answer: B
259. Which two of these Check Point Protocols are used by SmartEvent Processes?
Answer: D
72
Certify For Sure with IT Exam Dumps
260. Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the
systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his
calculations?
A. One machine, but it needs to be installed using SecurePlatform for compatibility purposes.
B. One machine
C. Two machines
D. Three machines
Answer: C
Explanation:
One for Security Management Server and the other one for the Security Gateway.
261. When gathering information about a gateway using CPINFO, what information is included or excluded
Answer: B
Which of the following is NOT possible considering that AdminA, AdminB and AdminC are editing the same
Security Policy?
A. A lock icon shows that a rule or an object is locked and will be available.
B. AdminA and AdminB are editing the same rule at the same time.
C. A lock icon next to a rule informs that any Administrator is working on this particular rule.
D. AdminA, AdminB and AdminC are editing three different rules at the same time.
Answer: C
263. You are the administrator for ABC Corp. You have logged into your R80 Management server. You are
making some changes in the Rule Base and notice that rule No.6 has a pencil icon next to it.
73
Certify For Sure with IT Exam Dumps
What does this mean?
A. This rule No. 6 has been marked for deletion in your Management session.
B. This rule No. 6 has been marked for deletion in another Management session.
C. This rule No. 6 has been marked for editing in your Management session.
D. This rule No. 6 has been marked for editing in another Management session.
Answer: C
Answer: D
A. This a new mechanism which extracts malicious files from a document to use it as a counter-attack
B. This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy it
74
Certify For Sure with IT Exam Dumps
C. This is a new mechanism to identify the IP address of the sender of malicious codes and put it into the
D. Any active contents of a document, such as JavaScripts, macros and links will be removed from the
document and forwarded to the intended recipient, which makes this solution very fast.
Answer: D
266. To accelerate the rate of connection establishment, SecureXL groups all connection that match a
particular service and whose sole differentiating element is the source port. The type of grouping enables
even the very first packets of a TCP handshake to be accelerated. The first packets of the first connection
on the same service will be forwarded to the Firewall kernel which will then create a template of the
A. Accept Template
B. Deny Template
C. Drop Template
D. NAT Template
Answer: B
267. What is the most recommended way to install patches and hotfixes?
B. rpm -Uv
D. UnixinstallScript
Answer: A
268. In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies the
type of traffic applicable to the chain module. For Stateful Mode configuration, chain modules marked with
A. ffff
B. 1
C. 3
75
Certify For Sure with IT Exam Dumps
D. 2
Answer: D
269. Which command is used to display status information for various components?
C. sysmess all
Answer: D
270. Which of the following is NOT an option to calculate the traffic direction?
A. Incoming
B. Internal
C. External
D. Outgoing
Answer: D
271. VPN Link Selection will perform the following when the primary VPN link goes down?
B. The Firewall can update the Link Selection entries to start using a different link for the same tunnel.
D. The Firewall will inform the client that the tunnel is down.
Answer: B
272. Which of the following technologies extracts detailed information from packets and stores that
A. INSPECT Engine
B. Stateful Inspection
C. Packet Filtering
76
Certify For Sure with IT Exam Dumps
Answer: A
273. What are the attributes that SecureXL will check after the connection is allowed by Security Policy?
B. Source MAC address, Destination MAC address, Source port, Destination port, Protocol
Answer: A
274. How would you deploy TE250X Check Point appliance just for email traffic and in-line mode without a
C. You can utilize only Check Point Cloud Services for this scenario.
D. It is not possible, always Check Point SGW is needed to forward emails to SandBlast appliance.
Answer: C
275. SmartEvent has several components that function together to track security threats. What is the
A. Analyzes each log entry as it arrives at the log server according to the Event Policy. When a threat
C. Collects syslog data from third party devices and saves them to the database.
Answer: A
A. The number of cores must be the same on every participating cluster node
77
Certify For Sure with IT Exam Dumps
D. If you have “Non-monitored Private” interfaces, the number of those interfaces must be the same on all
cluster members
Answer: B
277. Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is ______ all
traffic. However, in the Application Control policy layer, the default action is _______ all traffic.
A. Accept; redirect
B. Accept; drop
C. Redirect; drop
D. Drop; accept
Answer: D
278. Which tool provides a list of trusted files to the administrator so they can specify to the Threat
A. ThreatWiki
B. Whitelist Files
C. AppWiki
D. IPS Protections
Answer: B
B. source ip
C. source port
Answer: C
280. Which option, when applied to a rule, allows traffic to VPN gateways in specific VPN communities?
78
Certify For Sure with IT Exam Dumps
C. Specific VPN Communities
Answer: B
281. When requiring certificates for mobile devices, make sure the authentication method is set to one of
A. SecureID
B. SecurID
C. Complexity
D. TacAcs
Answer: B
282. What are the steps to configure the HTTPS Inspection Policy?
B. Go to Application&url filtering blade > Advanced > Https Inspection > Policy
Answer: A
283. Connections to the Check Point R80 Web API use what protocol?
A. HTTPS
B. RPC
C. VPN
D. SIC
Answer: A
284. When simulating a problem on ClusterXL cluster with cphaprob –d STOP -s problem -t 0 register, to
initiate a failover on an active cluster member, what command allows you remove the problematic state?
79
Certify For Sure with IT Exam Dumps
C. cphaprob unregister STOP
Answer: A
Explanation:
This will register a problem state on the cluster member this was entered on; If you then run;
# cphaprob list
A. Checkpoint Mobile
C. SecuRemote
Answer: D
286. In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?
Answer: C
287. What is the recommended number of physical network interfaces in a Mobile Access cluster
deployment?
A. 4 Interfaces – an interface leading to the organization, a second interface leading to the internet, a third
interface for synchronization, a fourth interface leading to the Security Management Server.
80
Certify For Sure with IT Exam Dumps
B. 3 Interfaces – an interface leading to the organization, a second interface leading to the Internet, a third
C. 1 Interface – an interface leading to the organization and the Internet, and configure for synchronization.
D. 2 Interfaces – a data interface leading to the organization and the Internet, a second interface for
synchronization.
Answer: B
288. An administrator would like to troubleshoot why templating is not working for some traffic. How can he
C. He can use the fwaccel stat command on the Security Management Server.
Answer: D
289. Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an
Active-Active cluster.
A. Symmetric routing
B. Failovers
C. Asymmetric routing
D. Anti-Spoofing
Answer: C
Answer: A
81
Certify For Sure with IT Exam Dumps
291. What command verifies that the API server is responding?
A. api stat
B. api status
C. show api_status
D. app_get_status
Answer: B
292. When SecureXL is enabled, all packets should be accelerated, except packets that match the
following conditions:
C. All packets that match a rule whose source or destination is the Outside Corporate Network
D. CIFS packets
Answer: D
293. Joey want to configure NTP on R80 Security Management Server. He decided to do this via WebUI.
What is the correct address to access the Web UI for Gaia platform via browser?
A. https://<Device_IP_Adress>
B. http://<Device IP_Address>:443
C. https://<Device_IP_Address>:10000
D. https://<Device_IP_Address>:4434
Answer: A
294. In which formats can Threat Emulation forensics reports be viewed in?
Answer: C
82
Certify For Sure with IT Exam Dumps
295. With SecureXL enabled, accelerated packets will pass through the following:
A. Network Interface Card, OSI Network Layer, OS IP Stack, and the Acceleration Device
B. Network Interface Card, Check Point Firewall Kernal, and the Acceleration Device
D. Network Interface Card, OSI Network Layer, and the Acceleration Device
Answer: C
296. Automatic affinity means that if SecureXL is running, the affinity for each interface is automatically
reset every
A. 15 sec
B. 60 sec
C. 5 sec
D. 30 sec
Answer: B
297. Check Pont Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster
Answer: D
298. Which features are only supported with R80.10 Gateways but not R77.x?
A. Access Control policy unifies the Firewall, Application Control & URL Filtering, Data Awareness, and
B. Limits the upload and download throughput for streaming media in the company to 1 Gbps.
C. The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in
the order in which they are defined, allowing control over the rule base flow and which security
83
Certify For Sure with IT Exam Dumps
D. Time object to a rule to make the rule active only during specified times.
Answer: C
A. SmartUpdate
B. cpconfig
C. SmartConsole
D. sysconfig
Answer: B
Answer: B
A. Primary-backup
C. Round robin
D. Load Sharing
Answer: A
302. fwssd is a child process of which of the following Check Point daemons?
A. fwd
B. cpwd
C. fwm
D. cpd
Answer: A
84
Certify For Sure with IT Exam Dumps
303. The Firewall Administrator is required to create 100 new host objects with different IP addresses. What
Answer: A
304. Can multiple administrators connect to a Security Management Server at the same time?
B. Yes, all administrators can modify a network object at the same time
C. Yes, every administrator has their own username, and works in a session that is independent of other
administrators.
Answer: C
305. How is communication between different Check Point components secured in R80? As with all
A. By using IPSEC
B. By using SIC
C. By using ICA
D. By using 3DES
Answer: B
B. A log entry becomes an event when it matches any rule defined in Event Policy
85
Certify For Sure with IT Exam Dumps
Answer: B
307. Tom has connected to the R80 Management Server remotely using SmartConsole and is in the
process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored
shortly afterward.
A. Tom’s changes will have been stored on the Management when he reconnects and he will not lose any
of his work.
B. Tom will have to reboot his SmartConsole computer, and access the Management cache store on that
C. Tom’s changes will be lost since he lost connectivity and he will have to start again.
D. Tom will have to reboot his SmartConsole computer, clear to cache, and restore changes.
Answer: A
308. Fill in the blank: An identity server uses a ______ for user authentication.
A. Shared secret
B. Certificate
C. One-time password
D. Token
Answer: A
A. Correlation Unit
B. SmartEvent Unit
C. SmartEvent Server
D. Log Server
Answer: B
Explanation:
86
Certify For Sure with IT Exam Dumps
310. How many layers make up the TCP/IP model?
A. 2
B. 7
C. 6
D. 4
Answer: D
A. Firewall logs
Answer: A
B. In R80, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict
D. In R80, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same
Answer: A
313. What API command below creates a new host with the name “New Host” and IP address of
“192.168.0.10”?
Answer: D
314. What is the valid range for Virtual Router Identifier (VRID) value in a Virtual Routing Redundancy
87
Certify For Sure with IT Exam Dumps
Protocol (VRRP) configuration?
A. 1-254
B. 1-255
C. 0-254
D. 0 – 255
Answer: B
315. Which of the following statements is TRUE about R80 management plug-ins?
B. Installing a management plug-in requires a Snapshot, just like any upgrade process.
C. A management plug-in interacts with a Security Management Server to provide new features and
D. Using a plug-in offers full central management only if special licensing is applied to specific features of
the plug-in.
Answer: C
A. Monitor
B. CLI.sh
C. Read-only
D. Bash
Answer: B
317. Which command collects diagnostic data for analyzing customer setup remotely?
A. cpinfo
B. migrate export
C. sysinfo
D. cpview
Answer: A
Explanation:
88
Certify For Sure with IT Exam Dumps
CPInfo is an auto-updatable utility that collects diagnostics data on a customer's machine at the time of
execution and uploads it to Check Point servers (it replaces the standalone cp_uploader utility for uploading
The CPInfo output file allows analyzing customer setups from a remote location. Check Point support
engineers can open the CPInfo file in a demo mode, while viewing actual customer Security Policies and
Objects. This allows the in-depth analysis of customer's configuration and environment settings.
318. Which utility allows you to configure the DHCP service on Gaia from the command line?
A. ifconfig
B. dhcp_ofg
C. sysconfig
D. cpconfig
Answer: C
319. Which pre-defined Permission Profile should be assigned to an administrator that requires full access
A. Auditor
C. Super User
D. Full Access
Answer: B
A. The SmartEvent Correlation Unit is designed to check the connection reliability from SmartConsole to
B. The SmartEvent Correlation Unit’s task it to assign severity levels to the identified events.
C. The Correlation unit role is to evaluate logs from the log server component to identify patterns/threats
D. The SmartEvent Correlation Unit is designed to check the availability of the SmartReporter Server.
Answer: C
89
Certify For Sure with IT Exam Dumps
321. Which CLI command will reset the IPS pattern matcher statistics?
Answer: D
322. In which VPN community is a satellite VPN gateway not allowed to create a VPN tunnel with another
A. Pentagon
B. Combined
C. Meshed
D. Star
Answer: D
323. If an administrator wants to add manual NAT for addresses now owned by the Check Point firewall,
Answer: D
324. Which method below is NOT one of the ways to communicate using the Management API’s?
B. Typing API commands from a dialog box inside the SmartConsole GUI application
Answer: D
90
Certify For Sure with IT Exam Dumps
A. fwm
B. cpd
C. cpwd
D. fwssd
Answer: C
A. Stateful Packets
B. No Match
C. All Packets
D. Stateless Packets
Answer: C
327. What does it mean if Deyra sees the gateway status? (Choose the BEST answer.)
Answer: B
328. Which statements below are CORRECT regarding Threat Prevention profiles in SmartDashboard?
A. You can assign only one profile per gateway and a profile can be assigned to one rule Only.
B. You can assign multiple profiles per gateway and a profile can be assigned to one rule only.
C. You can assign multiple profiles per gateway and a profile can be assigned to one or more rules.
91
Certify For Sure with IT Exam Dumps
D. You can assign only one profile per gateway and a profile can be assigned to one or more rules.
Answer: C
329. If you needed the Multicast MAC address of a cluster, what command would you run?
A. cphaprob –a if
D. cphaprob igmp
Answer: D
Answer: A
B. IPS
D. CoreXL
Answer: A
332. Where do you create and modify the Mobile Access policy in R80?
A. SmartConsole
B. SmartMonitor
C. SmartEndpoint
D. SmartDashboard
Answer: A
92
Certify For Sure with IT Exam Dumps
Answer: B
334. You have a Geo-Protection policy blocking Australia and a number of other countries. Your network
A. Remove Geo-Protection, as the IP-to-country database is updated externally, and you have no control of
this.
B. Create a rule at the top in the Sydney firewall to allow control traffic from your network
D. Create a rule at the top in your Check Point firewall to bypass the Geo-Protection
Answer: C
335. Which command would you use to set the network interfaces’ affinity in Manual mode?
A. sim affinity -m
B. sim affinity -l
C. sim affinity -a
D. sim affinity -s
Answer: D
A. SecurID client assigns a routable MAC address. After the user authenticates for a tunnel, the VPN
B. Users authenticate with an Internet browser and use secure HTTPS connection.
C. Local ISP (Internet service Provider) assigns a non-routable IP address to the remote user.
93
Certify For Sure with IT Exam Dumps
D. Allows a security gateway to assign a remote client an IP address. After the user authenticates for a
tunnel, the VPN gateway assigns a routable IP address to the remote client.
Answer: D
337. Joey wants to upgrade from R75.40 to R80 version of Security management. He will use Advanced
A. Size of the /var/log folder of the source machine must be at least 25% of the size of the /var/log directory
B. Size of the /var/log folder of the target machine must be at least 25% of the size of the /var/log directory
C. Size of the $FWDIR/log folder of the target machine must be at least 30% of the size of the
D. Size of the /var/log folder of the target machine must be at least 25GB or more
Answer: B
338. Which is the least ideal Synchronization Status for Security Management Server High Availability
deployment?
A. Synchronized
C. Lagging
D. Collision
Answer: D
339. You have a Gateway is running with 2 cores. You plan to add a second gateway to build a cluster and
How many cores can be used in a Cluster for Firewall-kernel on the new device?
A. 3
B. 2
C. 1
94
Certify For Sure with IT Exam Dumps
D. 4
Answer: D
340. SandBlast agent extends 0 day prevention to what part of the network?
B. DMZ server
C. Cloud
D. Email servers
Answer: A
Answer: C
342. Using ClusterXL, what statement is true about the Sticky Decision Function?
Answer: A
A. SmartView Monitor
B. WebUI
C. SmartUpdate
D. SmartProvisioning
Answer: C
95
Certify For Sure with IT Exam Dumps
344. Fill in the blank: The R80 utility fw monitor is used to troubleshoot _______ .
B. LDAP conflicts
C. Traffic issues
Answer: C
Explanation:
Check Point’s FW Monitor is a powerful built-in tool for capturing network traffic at the packet level. The FW
Monitor utility captures network packets at multiple capture points along the FireWall inspection chains.
345. Both ClusterXL and VRRP are fully supported by Gaia R80.10 and available to all Check Point
appliances. Which the following command is NOT related to redundancy and functions?
A. cphaprob stat
B. cphaprob –a if
C. cphaprob –l list
Answer: D
346. When installing a dedicated R80 SmartEvent server. What is the recommended size of the root
partition?
A. Any size
D. At least 20GB
Answer: D
347. Where you can see and search records of action done by R80 SmartConsole administrators?
96
Certify For Sure with IT Exam Dumps
B. In the Logs & Monitor view, select “Open Audit Log View”
C. In SmartAuditLog View
Answer: B
348. SandBlast offers flexibility in implementation based on their individual business needs. What is an
Answer: A
A. Summary
B. Views
C. Reports
D. Checkups
Answer: B
350. You notice that your firewall is under a DDoS attack and would like to enable the Penalty Box feature,
A. sim erdos –e 1
B. sim erdos – m 1
C. sim erdos –v 1
D. sim erdos –x 1
Answer: A
A. Threat Emulation
97
Certify For Sure with IT Exam Dumps
B. Threat Simulator
C. Threat Extraction
D. Threat Cloud
Answer: B
Answer: D
353. Check Point APIs allow system engineers and developers to make changes to their organization’s
security policy with CLI tools and Web Services for all the following except:
D. Create products that use and enhance the Check Point Solution
Answer: A
Explanation:
Check Point APIs let system administrators and developers make changes to the security policy with CLI
• Create products that use and enhance the Check Point solution References:
354. Traffic from source 192.168.1.1 is going to www.google.com. The Application Control Blade on the
gateway is inspecting the traffic. Assuming acceleration is enabled which path is handling the traffic?
A. Slow Path
B. Medium Path
98
Certify For Sure with IT Exam Dumps
C. Fast Path
D. Accelerated Path
Answer: A
B. VRRP can be used together with ClusterXL, but with degraded performance
Answer: C
356. With MTA (Mail Transfer Agent) enabled the gateways manages SMTP traffic and holds external email
with potentially malicious attachments. What is required in order to enable MTA (Mail Transfer Agent)
D. Traffic on port 25
Answer: B
357. CPM process stores objects, policies, users, administrators, licenses and management data in a
A. MySQL
B. Postgres SQL
C. MarisDB
D. SOLR
Answer: B
358. Which Check Point software blade provides protection from zero-day and undiscovered threats?
A. Firewall
99
Certify For Sure with IT Exam Dumps
B. Threat Emulation
C. Application Control
D. Threat Extraction
Answer: B
B. Manual/Pre-Automatic NAT
Answer: B
A. Security policy
B. Inbound chain
C. Outbound chain
Answer: A
361. What are types of Check Point APIs available currently as part of R80.10 code?
A. Security Gateway API Management API, Threat Prevention API and Identity Awareness Web Services
API
B. Management API, Threat Prevention API, Identity Awareness Web Services API and OPSEC SDK API
C. OSE API, OPSEC SDK API, Threat Extraction API and Policy Editor API
D. CPMI API, Management API, Threat Prevention API and Identity Awareness Web Services API
Answer: B
362. What has to be taken into consideration when configuring Management HA?
A. The Database revisions will not be synchronized between the management servers
100
Certify For Sure with IT Exam Dumps
C. If you wanted to use Full Connectivity Upgrade, you must change the Implied Rules to allow
D. For Management Server synchronization, only External Virtual Switches are supported. So, if you
wanted to employ Virtual Routers instead, you have to reconsider your design.
Answer: A
A. The Firewall kernel only touches the packet if the connection is accelerated
C. The Firewall kernel is replicated only with new connections and deletes itself once the connection times
out
Answer: D
Explanation:
On a Security Gateway with CoreXL enabled, the Firewall kernel is replicated multiple times. Each
replicated copy, or instance, runs on one processing core. These instances handle traffic concurrently, and
each instance is a complete and independent inspection kernel. When CoreXL is enabled, all the kernel
instances in the Security Gateway process traffic through the same interfaces and apply the same security
policy.
Answer: A
Explanation:
365. How many images are included with Check Point TE appliance in Recommended Mode?
101
Certify For Sure with IT Exam Dumps
A. 2(OS) images
Answer: A
366. Fill in the blank: The R80 SmartConsole, SmartEvent GUI client, and _______ consolidate billions of
A. SmartMonitor
C. SmartReporter
D. SmartTracker
Answer: B
Answer: A
368. Customer’s R80 management server needs to be upgraded to R80.10. What is the best upgrade
A. Export R80 configuration, clean install R80.10 and import the configuration
D. SmartUpdate upgrade
Answer: C
369. Your manager asked you to check the status of SecureXL, and its enabled templates and features.
102
Certify For Sure with IT Exam Dumps
What command will you use to provide such information to manager?
A. fw accel stat
B. fwaccel stat
C. fw acces stats
D. fwaccel stats
Answer: B
Answer: A
communication
Answer: B
Answer: D
103
Certify For Sure with IT Exam Dumps
A. Authentication requests
B. CPMI dbsync
C. Logs
D. Event Policy
Answer: D
374. Fill in the blank: The IPS policy for pre-R80 gateways is installed during the _______ .
Answer: C
Explanation:
https://sc1.checkpoint.com/documents/R80/CP_R80BC_ThreatPrevention/html_frameset.htm?topic=docu
ments
A. IDA
B. RAD
C. PDP
D. VPN
Answer: C
376. Check Point Management (cpm) is the main management process in that it provides the architecture
for a consolidates management console. CPM allows the GUI client and management server to
104
Certify For Sure with IT Exam Dumps
Answer: A
377. What is a feature that enables VPN connections to successfully maintain a private and secure VPN
A. Stateful Mode
C. Wire Mode
D. Stateless Mode
Answer: C
Explanation:
Wire Mode is a VPN-1 NGX feature that enables VPN connections to successfully fail over, bypassing
Security Gateway enforcement. This improves performance and reduces downtime. Based on a trusted
source and destination, Wire Mode uses internal interfaces and VPN Communities to maintain a private
and secure VPN session, without employing Stateful Inspection. Since Stateful Inspection no longer takes
place, dynamic-routing protocols that do not survive state verification in non-Wire Mode configurations can
now be deployed. The VPN connection is no different from any other connections along a dedicated wire,
378. Sieve is a Cyber Security Engineer working for Global Bank with a large scale deployment of Check
Point Enterprise Appliances Steve's manager. Diana asks him to provide firewall connection table details
from one of the firewalls for which he is responsible. Which of these commands may impact performance
briefly and should not be used during heavy traffic times of day?
A. fw tab -t connections -s
B. fw tab -t connections
C. fw tab -t connections -c
D. fw tab -t connections -f
Answer: B
A. cat $FWDIR/conf/vpn.conf
105
Certify For Sure with IT Exam Dumps
B. vpn tu tlist
C. vpn tu
D. cpview
Answer: B
380. Which of the following authentication methods ARE NOT used for Mobile Access?
A. RADIUS server
C. SecurID
D. TACACS+
Answer: D
A. /opt/CPSmartlog-R80/log
B. /opt/CPshrd-R80/log
C. /opt/CPsuite-R80/fw1/log
D. /opt/CPsuite-R80/log
Answer: C
Answer: C
A. Capsule Connect provides a Layer3 VPN. Capsule Workspace provides a Desktop with usable
applications.
106
Certify For Sure with IT Exam Dumps
C. Capsule Connect provides Business data isolation.
Answer: A
C. With “fw monitor”, you can see the inspection points, which cannot be seen in “tcpdump”
D. “fw monitor” can be used from the CLI of the Management Server to collect information from multiple
gateways.
Answer: C
385. During the Check Point Stateful Inspection Process, for packets that do not pass Firewall Kernel
Answer: D
386. Kofi, the administrator of the ALPHA Corp network wishes to change the default Gaia WebUI Portal
port number currently set on the default HTTPS port. Which CLISH commands are required to be able to
107
Certify For Sure with IT Exam Dumps
Answer: A
387. In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the
following options can you add to each Log, Detailed Log and Extended Log?
A. Accounting
B. Suppression
C. Accounting/Suppression
D. Accounting/Extended
Answer: C
388. Which SmartConsole tab is used to monitor network and security performance?
A. Manage Setting
B. Security Policies
108
Certify For Sure with IT Exam Dumps
D. Logs and Monitor
Answer: D
389. You have existing dbedit scripts from R77. Can you use them with R80.10?
C. You can use dbedit to modify threat prevention or access policies, but not create or modify layers
Answer: D
109
Certify For Sure with IT Exam Dumps
B. Based on Active Directory integration which allows the Security Gateway to correlate Active Directory
users and machines to IP addresses in a method that is completely transparent to the user.
D. The ports 443 or 80 what will be used by Browser-Based and configured Authentication.
Answer: B
110
Certify For Sure with IT Exam Dumps
391. Which firewall daemon is responsible for the FW CLI commands?
A. fwd
B. fwm
C. cpm
D. cpd
Answer: A
111