Examine the following Rule Base.
Answer : D
Explantation:
On top of the print screen there is a number "8" which consists for the number of changes made and not saved.
Session Management Toolbar (top of SmartConsole)
ALPHA Corp has a new administrator who logs into the Gaia Portal to make some changes. He realizes that even though he has logged in as an administrator, he is unable to make any changes because all configuration options are greyed out as shown in the screenshot image below. What is the likely cause for this?
Answer : B
Explanation:
There is a lock on top left side of the screen. B is the logical answer.
Administrator Kofi has just made some changes on his Management Server and then clicks on the Publish button in SmartConsole but then gets the error message shown in the screenshot below.
Where can the administrator check for more information on these errors?
Answer : B
Explanation:
Validation Errors -
The validations pane in SmartConsole shows configuration error messages. Examples of errors are object names that are not unique, and the use of objects that are not valid in the Rule Base.
To publish, you must fix the errors.
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/CP_R80_SecMGMT/126197
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?
Answer : B
Harriet wants to protect sensitive information from intentional loss when users browse to a specific URL: https://personal.mymail.com, which blade will she enable to achieve her goal?
Answer : A
Explanation:
Check Point revolutionizes DLP by combining technology and processes to move businesses from passive detection to active Data Loss Prevention. Innovative
MultiSpectג„¢ data classification combines user, content and process information to make accurate decisions, while UserCheckג„¢ technology empowers users to remediate incidents in real time. Check Pointג€™s self-educating network-based DLP solution frees IT/security personnel from incident handling and educates users
ג€"
on proper data handling policies
protecting sensitive corporate information from both intentional and unintentional loss.
Reference:
https://www.checkpoint.com/downloads/product-related/datasheets/DLP-software-blade-datasheet.pdf
To optimize Rule Base efficiency the most hit rules should be where?
Answer : C
Explanation:
It is logical that if lesser rules are checked for the matched rule to be found the lesser CPU cycles the device is using. Checkpoint match a session from the first rule on top till the last on the bottom.
Which of the following is NOT a license activation method?
Answer : A
Which policy type has its own Exceptions section?
Answer : A
Explanation:
The Exceptions Groups pane lets you define exception groups. When necessary, you can create exception groups to use in the Rule Base. An exception group contains one or more defined exceptions. This option facilitates ease-of-use so you do not have to manually define exceptions in multiple rules for commonly required exceptions. You can choose to which rules you want to add exception groups. This means they can be added to some rules and not to others, depending on necessity.
Reference:
https://sc1.checkpoint.com/documents/R77/CP_R77_ThreatPrevention_WebAdmin/82209.htm#o97030
By default, which port does the WebUI listen on?
Answer : C
Explanation:
To configure Security Management Server on Gaia:
✑ Open a browser to the WebUI: https://<Gaia management IP address>
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_Gaia_IUG/html_frameset.htm?topic=documents/R80/CP_R80_Gaia_IUG/132120
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
Answer : D
Explanation:
There are different deployment scenarios for Check Point software products.
✑ Standalone Deployment - The Security Management Server and the Security Gateway are installed on the same computer or appliance.
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_Installation_and_Upgrade_Guide-webAdmin/86429.htm
Which options are given on features, when editing a Role on Gaia Platform?
Answer : B
Explanation:
Roles -
Role-based administration (RBA) lets you create administrative roles for users. With RBA, an administrator can allow Gaia users to access specified features by including those features in a role and assigning that role to users. Each role can include a combination of administrative (read/write) access to some features, monitoring (read-only) access to other features, and no access to other features.
You can also specify which access mechanisms (WebUI or the CLI) are available to the user.
What is the default time length that Hit Count Data is kept?
Answer : A
Reference:
https://community.checkpoint.com/t5/General-Topics/What-is-the-default-time-that-HIT-count-data-is-kept-in-R80/td-p/33636
Choose the Best place to find a Security Management Server backup file named backup_fw, on a Check Point Appliance.
Answer : D
Explanation:
Gaia's Backup feature allows backing up the configuration of the Gaia OS and of the Security Management server database, or restoring a previously saved configuration.
The configuration is saved to a .tgz file in the following directory:
With which command can you view the running configuration of Gaia Operating system?
Answer : C
Which of the following is TRUE regarding Gaia command line?
Answer : D
Have any questions or issues ? Please dont hesitate to contact us