Check Point Certified Security Expert R81 v1.0

Page:    1 / 23   
Exam contains 349 questions

What is the purpose of the command "ps aux | grep fwd"?

  • A. You can check the Process ID and the processing time of the fwd process.
  • B. You can convert the log file into Post Script format.
  • C. You can list all Process IDs for all running services.
  • D. You can check whether the IPS default setting is set to Detect or Prevent mode.


Answer : A

What is the command switch to specify the Gaia API context?

  • A. You have to specify it in the YAML file api.yml which is located underneath the /etc directory of the security management server
  • B. You have to change to the zsh-Shell which defaults to the Gaia API context.
  • C. No need to specify a context, since it defaults to the Gaia API context.
  • D. mgmt_cli --context gaia_api <Command>


Answer : D

What are the two types of tests when using the Compliance blade?

  • A. Policy-based tests and Global properties
  • B. Global tests and Object-based tests
  • C. Access Control policy analysis and Threat Prevention policy analysis
  • D. Tests conducted based on the IoC XML file and analysis of SOLR documents


Answer : B

Besides fw monitor, what is another command that can be used to capture packets?

  • A. arp
  • B. traceroute
  • C. tcpdump
  • D. ping


Answer : С

When performing a minimal effort upgrade, what will happen to the network traffic?

  • A. All connections that were initiated before the upgrade will be dropped, causing network downtime.
  • B. All connections that were initiated before the upgrade will be handled by the active gateway
  • C. All connections that were initiated before the upgrade will be handled normally
  • D. All connections that were initiated before the upgrade will be handled by the standby gateway


Answer : A

Using fw monitor you see the following inspection point notion E and i what does that mean?

  • A. E shows the packet before the VPN encryption, i after the inbound firewall VM
  • B. E shows the packet reaching the external interface, i leaving the internal interface
  • C. E shows the packet after the VPN encryption, i before the inbound firewall VM
  • D. E shows the packet leaving the external interface, i reaching the internal interface


Answer : C

You have used the SmartEvent GUI to create a custom Event policy. What is the best way to display the correlated Events generated by SmartEvent Policies?

  • A. Open SmartView Monitor and select the SmartEvent Window from the main menu.
  • B. In the SmartConsole / Logs & Monitor --> open the Logs View and use type:Correlated as query filter.
  • C. In the SmartConsole / Logs & Monitor -> open a new Tab and select External Apps / SmartEvent.
  • D. Select the Events tab in the SmartEvent GUI or use the Events tab in the SmartView web interface.


Answer : C

What is the biggest benefit of policy layers?

  • A. To break one policy into several virtual policies
  • B. Policy Layers and Sub-Policies enable flexible control over the security policy
  • C. They improve the performance on OS kernel version 3.0
  • D. To include Threat Prevention as a sub policy for the firewall policy


Answer : B

Which packet info is masked with Session Rate Acceleration?

  • A. same info from Packet Acceleration is used
  • B. source port ranges
  • C. source port
  • D. source ip


Answer : C

What does Backward Compatibility mean upgrading the Management Server and how can you check it?

  • A. The Management Server is able to manage older Gateways. The lowest supported version is documented in the Installation and Upgrade Guide
  • B. The Management Server is able to manage older Gateways. The lowest supported version is documented in the Release Notes
  • C. You will be able to connect to older Management Server with the SmartConsole. The lowest supported version is documented in the Installation and Upgrade Guide
  • D. You will be able to connect to older Management Server with the SmartConsole. The lowest supported version is documented in the Release Notes


Answer : B

Bob is going to prepare the import of the exported R81.10 management database. Now he wants to verify that the installed tools on the new target security management machine are able to handle the R81.10 release. Which of the following Check Point command is true?

  • A. $FWDIR/scripts/migrate_server print_installed_tools -v R77.30
  • B. $CPDIR/scripts/migrate_server print_installed_tools -v R81.10
  • C. $FWDIR/scripts/migrate_server print_installed_tools -v R81.10
  • D. $FWDIR/scripts/migrate_server print_uninstalled_tools -v R81.10


Answer : C

What a valid SecureXL paths in R81.10?

  • A. F2F (Slow path), Templated Path, PQX and F2V
  • B. F2F (Slow path), PXL, QXL and F2V
  • C. F2F (Slow path), Accelerated Path, PQX and F2V
  • D. F2F (Slow path), Accelerated Path, Medium Path and F2V


Answer : D

Alice was asked by Bob to implement the Check Point Mobile Access VPN blade – therefore are some basic configuration steps required – which statement about the configuration steps is true?

  • A. 1. Enable Mobile Access blade on the Security Gateway object and complete the wizard
    2. Configure Mobile Access parameters in Security Gateway object
    3. Add a rule in the Access Control Policy and install policy
    4. Connect to the Mobile Access Portal
  • B. 1. Configure Mobile Access parameters in Security Gateway object
    2. Enable Mobile Access blade on the Security Gateway object and complete the wizard
    3. Add a rule in the Access Control Policy and install policy
    4. Connect to the Mobile Access Portal
  • C. 1. Connect to the Mobile Access Portal
    2. Enable Mobile Access blade on the Security Gateway object and complete the wizard
    3. Configure Mobile Access parameters in Security Gateway object
    4. Add a rule in the Access Control Policy and install policy
  • D. 1. Add a rule in the Access Control Policy and install policy
    2. Configure Mobile Access parameters in Security Gateway object
    3. Enable Mobile Access blade on the Security Gateway object and complete the wizard
    4. Connect to the Mobile Access Portal


Answer : A

What are not possible commands to acquire the lock in order to make changes in Clish or Web GUI?

  • A. set config-lock on override
  • B. Click the Lock icon in the WebUI
  • C. "set rbac rw = 1"
  • D. lock database override


Answer : C

The customer has about 150 remote access user with a Windows laptop. Not more than 50 Clients will be connected at the same time. The customer wants to use multiple VPN Gateways as entry point and a personal firewall. What will be the best license for him?

  • A. He will need Capsule Connect using MEP (multiple entry points).
  • B. Because the customer uses only Windows clients SecuRemote will be sufficient and no additional license is needed.
  • C. He will need Harmony Endpoint because of the personal firewall.
  • D. Mobile Access license because he needs only a 50 user license, license count is per concurrent user.


Answer : D

Page:    1 / 23   
Exam contains 349 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy