Question 1
Question
QUESTION 1
You manage a global network extending from your base in Chicago to Tokyo, Calcutta and Dallas.
Management wants a report detailing the current software level of each Enterprise class Security Gateway.
You plan to take the opportunity to create a proposal outline, listing the most cost- effective way to upgrade
your Gateways. Which two SmartConsole applications will you use to create this report and outline?
Answer
-
A. SmartView Tracker and SmartView Monitor
-
B. SmartLSM and SmartUpdate
-
C. SmartDashboard and SmartView Tracker
-
D. SmartView Monitor and SmartUpdate
Question 2
Question
QUESTION 2
Your bank's distributed R77 installation has Security Gateways up for renewal. Which SmartConsole
application will tell you which Security Gateways have licenses that will expire within the next 30 days?
Answer
-
A. SmartView Tracker
-
B. SmartPortal
-
C. SmartUpdate
-
D. SmartDashboard
Question 3
Question
QUESTION 3
When launching SmartDashboard, what information is required to log into R77?
Answer
-
A. User Name, Management Server IP, certificate fingerprint file
-
B. User Name, Password, Management Server IP
-
C. Password, Management Server IP
-
D. Password, Management Server IP, LDAP Server IP
Question 4
Question
QUESTION 4
Message digests use which of the following?
Answer
-
A. DES and RC4
-
B. IDEA and RC4
-
C. SSL and MD4
-
D. SHA-1 and MD5
Question 5
Question
QUESTION 5
Which of the following is a hash algorithm?
Answer
-
A. 3DES
-
B. IDEA
-
C. DES
-
D. MD5
Question 6
Question
QUESTION 6
Which of the following uses the same key to decrypt as it does to encrypt?
Question 7
Question
QUESTION 7
You believe Phase 2 negotiations are failing while you are attempting to configure a site-to-site VPN with
one of your firm's business partners. Which SmartConsole application should you use to confirm your
suspicions?
Answer
-
A. SmartDashboard
-
B. SmartUpdate
-
C. SmartView Status
-
D. SmartView Tracker
Question 8
Question
QUESTION 8
A digital signature:
Answer
-
A. Guarantees the authenticity and integrity of a message.
-
B. Automatically exchanges shared keys.
-
C. Decrypts data to its original form.
-
D. Provides a secure key exchange mechanism over the Internet.
Question 9
Question
QUESTION 9
Which component functions as the Internal Certificate Authority for R77?
Answer
-
A. Security Gateway
-
B. Management Server
-
C. Policy Server
-
D. SmartLSM
Question 10
Question
QUESTION 10
The customer has a small Check Point installation, which includes one GAiA server working as the
SmartConsole, and a second server running Windows 2008 as both Security Management Server and
Security Gateway. This is an example of a(n):
Answer
-
A. Distributed Installation
-
B. Hybrid Installation
-
C. Unsupported configuration
-
D. Stand-Alone Installation
Question 11
Question
QUESTION 11
The customer has a small Check Point installation which includes one Windows 2008 server as the
SmartConsole and a second server running GAiA as both Security Management Server and the Security
Gateway. This is an example of a(n):
Answer
-
A. Distributed Installation
-
B. Unsupported configuration
-
C. Hybrid Installation
-
D. Stand-Alone Installation
Question 12
Question
QUESTION 12
The customer has a small Check Point installation which includes one Windows 7 workstation as the
SmartConsole, one GAiA device working as Security Management Server, and a third server running
SecurePlatform as Security Gateway. This is an example of a(n):
Answer
-
A. Hybrid Installation
-
B. Unsupported configuration
-
C. Stand-Alone Installation
-
D. Distributed Installation
Question 13
Question
QUESTION 13
The customer has a small Check Point installation which includes one Windows 2008 server as
SmartConsole and Security Management Server with a second server running GAiA as Security Gateway.
This is an example of a(n):
Answer
-
A. Stand-Alone Installation.
-
B. Distributed Installation.
-
C. Unsupported configuration
-
D. Hybrid Installation
Question 14
Question
QUESTION 14
When doing a Stand-Alone Installation, you would install the Security Management Server with which other
Check Point architecture component?
Question 15
Question
QUESTION 15
Tom has been tasked to install Check Point R77 in a distributed deployment. Before Tom installs the
systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his
calculations?
Question 16
Question
QUESTION 16
Which command allows Security Policy name and install date verification on a Security Gateway?
Answer
-
A. fw show policy
-
B. fw stat -l
-
C. fw ctl pstat -policy
-
D. fw ver -p
Question 17
Question
QUESTION 17
You have two rules, ten users, and two user groups in a Security Policy. You create database version 1 for
this configuration. You then delete two existing users and add a new user group. You modify one rule and
add two new rules to the Rule Base. You save the Security Policy and create database version 2. After
awhile, you decide to roll back to version 1 to use the Rule Base, but you want to keep your user database.
How can you do this?
Answer
-
A. Run fwm dbexport -l filename. Restore the database. Then, run fwm dbimport -l filename to import the
users.
-
B. Run fwm_dbexport to export the user database. Select restore the entire database in the Database
Revision screen. Then, run fwm_dbimport.
-
C. Restore the entire database, except the user database, and then create the new user and user group.
-
D. Restore the entire database, except the user database.
Question 18
Question
QUESTION 18
Which feature or command provides the easiest path for Security Administrators to revert to earlier versions
of the same Security Policy and objects configuration?
Answer
-
A. Database Revision Control
-
B. Policy Package management
-
C. dbexport/dbimport
-
D. upgrade_export/upgrade_import
Question 19
Question
QUESTION 19
Your Security Management Server fails and does not reboot. One of your remote Security Gateways
managed by the Security Management Server reboots. What occurs with the remote Gateway after reboot?
Answer
-
A. Since the Security Management Server is not available, the remote Gateway cannot fetch the Security
Policy. Therefore, all traffic is allowed through the Gateway.
-
B. Since the Security Management Server is not available, the remote Gateway cannot fetch the Security
Policy. Therefore, no traffic is allowed through the Gateway.
-
C. The remote Gateway fetches the last installed Security Policy locally and passes traffic normally. The
Gateway will log locally, since the Security Management Server is not available.
-
D. Since the Security Management Server is not available, the remote Gateway uses the local Security
Policy, but does not log traffic.
Question 20
Question
QUESTION 20
How can you configure an application to automatically launch on the Security Management Server when
traffic is dropped or accepted by a rule in the Security Policy?
Answer
-
A. SNMP trap alert script
-
B. Custom scripts cannot be executed through alert scripts.
-
C. User-defined alert script
-
D. Pop-up alert script
Question 21
Question
QUESTION 21
Which of the following is NOT useful to verify whether or not a Security Policy is active on a Gateway?
Question 22
Question
QUESTION 22
Exhibit:
Of the following, what parameters will not be preserved when using Database Revision Control?
Answer
-
A. 2, 4, 7, 10, 11
-
B. 3, 4, 5, 6, 9, 12, 13
-
C. 5, 6, 9, 12, 13
-
D. 1, 2, 8, 10, 11
Question 23
Question
QUESTION 23
You are about to test some rule and object changes suggested in an R77 news group. Which backup
solution should you use to ensure the easiest restoration of your Security Policy to its previous configuration
after testing the changes?
Answer
-
A. Manual copies of the directory $FWDIR/conf
-
B. upgrade_export command
-
C. Database Revision Control
-
D. GAiA backup utilities
Question 24
Question
QUESTION 24
Exhibit:
You plan to create a backup of the rules, objects, policies, and global properties from an R77 Security
Management Server. Which of the following backup and restore solutions can you use?
Answer
-
A. 2, 4, and 5
-
B. 1, 2, 3, 4, and 5
-
C. 1, 2, and 3
-
D. 1, 3, and 4
Question 25
Question
QUESTION 25
Which R77 feature or command allows Security Administrators to revert to earlier Security Policy versions
without changing object configurations?
Answer
-
A. upgrade_export/upgrade_import
-
B. fwm dbexport/fwm dbimport
-
C. Database Revision Control
-
D. Policy Package management
Question 26
Question
QUESTION 26
What must a Security Administrator do to comply with a management requirement to log all traffic accepted
through the perimeter Security Gateway?
Answer
-
A. In Global Properties > Reporting Tools check the box Enable tracking all rules (including rules marked
as None in the Track column). Send these logs to a secondary log server for a complete logging history.
Use your normal log server for standard logging for troubleshooting.
-
B. Install the View Implicit Rules package using SmartUpdate.
-
C. Define two log servers on the R77 Gateway object. Enable Log Implied Rules on the first log server.
Enable Log Rule Base on the second log server. Use SmartReporter to merge the two log server
records into the same database for HIPPA log audits.
-
D. Check the Log Implied Rules Globally box on the R77 Gateway object.
Question 27
Question
QUESTION 27
Which utility allows you to configure the DHCP service on GAiA from the command line?
Answer
-
A. ifconfig
-
B. sysconfig
-
C. cpconfig
-
D. dhcp_cfg
Question 28
Question
QUESTION 28
The third-shift Administrator was updating Security Management Server access settings in Global
Properties and testing. He managed to lock himself out of his account. How can you unlock this account?
Answer
-
A. Type fwm unlock_admin from the Security Management Server command line.
-
B. Type fwm unlock_admin -u from the Security Gateway command line.
-
C. Type fwm lock_admin -u <account name> from the Security Management Server command line.
-
D. Delete the file admin.lock in the Security Management Server directory $FWDIR/tmp/.
Question 29
Question
QUESTION 29
The third-shift Administrator was updating Security Management Server access settings in Global
Properties. He managed to lock all administrators out of their accounts. How should you unlock these
accounts?
Answer
-
A. Delete the file admin.lock in the Security Management Server directory $FWDIR/tmp/.
-
B. Reinstall the Security Management Server and restore using upgrade_import.
-
C. Type fwm lock_admin -ua from the Security Management Server command line.
-
D. Login to SmartDashboard as the special cpconfig_admin user account; right-click on each administrator
object and select unlock.
Question 30
Question
QUESTION 30
You are the Security Administrator for ABC-Corp. A Check Point Firewall is installed and in use on GAiA.
You are concerned that the system might not be retaining your entries for the interfaces and routing
configuration. You would like to verify your entries in the corresponding file(s) on GAiA.
Where can you view them? Give the BEST answer.
Answer
-
A. /etc/sysconfig/netconf.C
-
B. /etc/conf/route.C
-
C. /etc/sysconfig/network-scripts/ifcfg-ethx
-
D. /etc/sysconfig/network
Question 31
Question
QUESTION 31
When using GAiA, it might be necessary to temporarily change the MAC address of the interface eth 0 to
00:0C:29:12:34:56. After restarting the network the old MAC address should be active.
How do you configure this change?
Answer
-
A. Edit the file /etc/sysconfig/netconf.C and put the new MAC address in the field
-
B. As expert user, issue these commands:
# IP link set eth0 down
# IP link set eth0 addr 00:0C:29:12:34:56
# IP link set eth0 up
-
C. As expert user, issue the command:
# IP link set eth0 addr 00:0C:29:12:34:56
-
D. Open the WebUI, select Network > Connections > eth0. Place the new MAC address in the field
Physical Address, and press Apply to save the settings.
Question 32
Question
QUESTION 32
Several Security Policies can be used for different installation targets. The Firewall protecting Human
Resources' servers should have its own Policy Package. These rules must be installed on this machine and
not on the Internet Firewall. How can this be accomplished?
Answer
-
A. A Rule Base is always installed on all possible targets. The rules to be installed on a Firewall are
defined by the selection in the Rule Base row Install On.
-
B. When selecting the correct Firewall in each line of the Rule Base row Install On, only this Firewall is
shown in the list of possible installation targets after selecting Policy > Install on Target.
-
C. In the menu of SmartDashboard, go to Policy > Policy Installation Targets and select the correct firewall
via Specific Targets.
-
D. A Rule Base can always be installed on any Check Point Firewall object. It is necessary to select the
appropriate target directly after selecting Policy > Install on Target.
Question 33
Question
QUESTION 33
You have a diskless appliance platform. How do you keep swap file wear to a minimum?
Answer
-
A. Issue FW-1 bases its package structure on the Security Management Server, dynamically loading when
the firewall is booted.
-
B. The external PCMCIA-based flash extension has the swap file mapped to it, allowing easy replacement.
-
C. Use PRAM flash devices, eliminating the longevity.
-
D. A RAM drive reduces the swap file thrashing which causes fast wear on the device.
Question 34
Question
QUESTION 34
Your R77 primary Security Management Server is installed on GAiA. You plan to schedule the Security
Management Server to run fw logswitch automatically every 48 hours. How do you create this schedule?
Answer
-
A. On a GAiA Security Management Server, this can only be accomplished by configuring the command fw
logswitch via the cron utility.
-
B. Create a time object, and add 48 hours as the interval. Open the primary Security Management Server
object's Logs and Masters window, enable Schedule log switch, and select the Time object.
-
C. Create a time object, and add 48 hours as the interval. Open the Security Gateway object's Logs and
Masters window, enable Schedule log switch, and select the Time object.
-
D. Create a time object, and add 48 hours as the interval. Select that time object's Global Properties >
Logs and Masters window, to schedule a logswitch.
Question 35
Question
QUESTION 35
Which of the following methods will provide the most complete backup of an R77 configuration?
Answer
-
A. Policy Package Management
-
B. Copying the directories $FWDIR\conf and $CPDIR\conf to another server
-
C. Execute command upgrade_export
-
D. Database Revision Control
Question 36
Question
QUESTION 36
Which of the following commands can provide the most complete restoration of a R77 configuration?
Question 37
Question
QUESTION 37
When restoring R77 using the command upgrade_import, which of the following items are NOT restored?
Answer
-
A. SIC Certificates
-
B. Licenses
-
C. Route tables
-
D. Global properties
Question 38
Question
QUESTION 38
Your organization's disaster recovery plan needs an update to the backup and restore section to reap the
new distributed R77 installation benefits. Your plan must meet the following required and desired
objectives:
Required ObjectivE.
The Security Policy repository must be backed up no less frequently than every 24 hours.
Desired ObjectivE.
The R77 components that enforce the Security Policies should be backed up at least once a week.
Desired ObjectivE.
Back up R77 logs at least once a week.
Your disaster recovery plan is as follows:
- Use the cron utility to run the command upgrade_export each night on the Security Management Servers.
- Configure the organization's routine back up software to back up the files created by the command
upgrade_export.
- Configure the GAiA back up utility to back up the Security Gateways every Saturday night.
- Use the cron utility to run the command upgrade_export each Saturday night on the log servers.
- Configure an automatic, nightly logswitch.
- Configure the organization's routine back up software to back up the switched logs every night.
Upon evaluation, your plan:
Answer
-
A. Meets the required objective and only one desired objective.
-
B. Meets the required objective but does not meet either desired objective.
-
C. Does not meet the required objective.
-
D. Meets the required objective and both desired objectives.
Question 39
Question
QUESTION 39
Your company is running Security Management Server R77 on GAiA, which has been migrated through
each version starting from Check Point 4.1. How do you add a new administrator account?
Answer
-
A. Using SmartDashboard, under Users, select Add New Administrator
-
B. Using SmartDashboard or cpconfig
-
C. Using the Web console on GAiA under Product configuration, select Administrators
-
D. Using cpconfig on the Security Management Server, choose Administrators
Question 40
Question
QUESTION 40
Peter is your new Security Administrator. On his first working day, he is very nervous and enters the wrong
password three times. His account is locked. What can be done to unlock Peter's account? Give the BEST
answer.
Answer
-
A. You can unlock Peter's account by using the command fwm lock_admin -u Peter on the Security
Management Server.
-
B. You can unlock Peter's account by using the command fwm unlock_admin -u Peter on the Security
Management Server
-
C. It is not possible to unlock Peter's account. You have to install the firewall once again or abstain from
Peter's help.
-
D. You can unlock Peter's account by using the command fwm unlock_admin -u Peter on the Security
Gateway.
Question 41
Question
QUESTION 41
Where can you find the Check Point's SNMP MIB file?
Answer
-
A. $CPDIR/lib/snmp/chkpt.mib
-
B. $FWDIR/conf/snmp.mib
-
C. It is obtained only by request from the TAC.
-
D. There is no specific MIB file for Check Point products.
Question 42
Question
QUESTION 42
You want to generate a cpinfo file via CLI on a system running GAiA. This will take about 40 minutes since
the log files are also needed. What action do you need to take regarding timeout?
Answer
-
A. No action is needed because cpshell has a timeout of one hour by default.
-
B. Log in as the default user expert and start cpinfo.
-
C. Log in as admin, switch to expert mode, set the timeout to one hour with the command, idle 60, then
start cpinfo.
-
D. Log in as Administrator, set the timeout to one hour with the command idle 60 and start cpinfo.
Question 43
Question
QUESTION 43
Many companies have defined more than one administrator. To increase security, only one administrator
should be able to install a Rule Base on a specific Firewall. How do you configure this?
Answer
-
A. Define a permission profile in SmartDashboard with read/write privileges, but restrict it to all other
firewalls by placing them in the Policy Targets field. Then, an administrator with this permission profile
cannot install a policy on any Firewall not listed here.
-
B. Put the one administrator in an Administrator group and configure this group in the specific Firewall
object in Advanced > Permission to Install.
-
C. In the object General Properties representing the specific Firewall, go to the Software Blades product list
and select Firewall. Right-click in the menu, select Administrator to Install to define only this
administrator.
-
D. Right-click on the object representing the specific administrator, and select that Firewall in Policy
Targets.
Question 44
Question
QUESTION 44
What is the officially accepted diagnostic tool for IP Appliance Support?
Answer
-
A. ipsoinfo
-
B. CST
-
C. uag-diag
-
D. cpinfo
Question 45
Question
QUESTION 45
Which of these Security Policy changes optimize Security Gateway performance?
Answer
-
A. Using groups within groups in the manual NAT Rule Base.
-
B. Use Automatic NAT rules instead of Manual NAT rules whenever possible.
-
C. Using domain objects in rules when possible.
-
D. Putting the least-used rule at the top of the Rule Base.
Question 46
Question
QUESTION 46
Your perimeter Security Gateway's external IP is 200.200.200.3. Your network diagram shows:
Required:
Allow only network 192.168.10.0 and 192.168.20.0 to go out to Internet, using 200.200.200.5.
The local network 192.168.1.0/24 needs to use 200.200.200.3 to go out to the Internet.
Assume you enable all the settings in the NAT page of Global Properties.
How do you achieve this requirement?
Answer
-
A. Create a network object 192.168.0.0/16. Enable Hide NAT on the NAT page. Enter 200.200.200.5 as
the hiding IP address. Add an ARP entry for 200.200.200.5 for the MAC address of 200.200.200.3.
-
B. Create network objects for 192.168.10.0/24 and 192.168.20.0/24. Enable Hide NAT on both network
objects, using 200.200.200.5 as hiding IP address. Add an ARP entry for 200.200.200.3 for the MAC
address of 200.200.200.5
-
C. Create an Address Range object, starting from 192.168.10.1 to 192.168.20.254. Enable Hide NAT on
the NAT page of the address range object. Enter Hiding IP address 200.200.200.5. Add an ARP entry
for 200.200.200.5 for the MAC address of 200.200.200.3
-
D. Create two network objects: 192.168.10.0/24 and 192.168.20.0/24. Add the two network objects to a
group object. Create a manual NAT rule like the following: Original source -groupobject; Destination -
any; Service - any; Translated source - 200.200.200.5; Destination -original; Service - original
Question 47
Question
QUESTION 47
Because of pre-existing design constraints, you set up manual NAT rules for your HTTP server. However,
your FTP server and SMTP server are both using automatic NAT rules. All traffic from your FTP and SMTP
servers are passing through the Security Gateway without a problem, but traffic from the Web server is
dropped on rule 0 because of anti-spoofing settings. What is causing this?
Answer
-
A. Manual NAT rules are not configured correctly.
-
B. Allow bi-directional NAT is not checked in Global Properties.
-
C. Routing is not configured correctly
-
D. Translate destination on client side is not checked in Global Properties under Manual NAT Rules.
Question 48
Question
QUESTION 48
You enable Hide NAT on the network object, 10.1.1.0 behind the Security Gateway's external interface. You
browse to the Google Website from host, 10.1.1.10 successfully. You enable a log on the rule that allows
10.1.1.0 to exit the network. How many log entries do you see for that connection in SmartView Tracker?
Answer
-
A. Two, one for outbound, one for inbound
-
B. Only one, outbound
-
C. Two, both outbound, one for the real IP connection and one for the NAT IP connection
-
D. Only one, inbound
Question 49
Question
QUESTION 49
Which of the following statements BEST describes Check Point's Hide Network Address Translation
method?
Answer
-
A. Translates many destination IP addresses into one destination IP address
-
B. One-to-one NAT which implements PAT (Port Address Translation) for accomplishing both Source and
Destination IP address translation
-
C. Translates many source IP addresses into one source IP address
-
D. Many-to-one NAT which implements PAT (Port Address Translation) for accomplishing both Source and
Destination IP address translation
Question 50
Question
QUESTION 50
Which Check Point address translation method allows an administrator to use fewer ISP-assigned IP
addresses than the number of internal hosts requiring Internet connectivity?
Answer
-
A. Hide
-
B. Static Destination
-
C. Static Source
-
D. Dynamic Destination
Question 51
Question
QUESTION 51
NAT can NOT be configured on which of the following objects?
Answer
-
A. HTTP Logical Server
-
B. Gateway
-
C. Address Range
-
D. Host
Question 52
Question
QUESTION 52
Which Check Point address translation method is necessary if you want to connect from a host on the
Internet via HTTP to a server with a reserved (RFC 1918) IP address on your DMZ?
Answer
-
A. Dynamic Source Address Translation
-
B. Hide Address Translation
-
C. Port Address Translation
-
D. Static Destination Address Translation
Question 53
Question
QUESTION 53
You want to implement Static Destination NAT in order to provide external, Internet users access to an
internal Web Server that has a reserved (RFC 1918) IP address. You have an unused valid IP address on
the network between your Security Gateway and ISP router. You control the router that sits between the
firewall external interface and the Internet.
What is an alternative configuration if proxy ARP cannot be used on your Security Gateway?
Answer
-
A. Publish a proxy ARP entry on the ISP router instead of the firewall for the valid IP address.
-
B. Place a static ARP entry on the ISP router for the valid IP address to the firewall's external address.
-
C. Publish a proxy ARP entry on the internal Web server instead of the firewall for the valid IP address.
-
D. Place a static host route on the firewall for the valid IP address to the internal Web server.
Question 54
Question
QUESTION 54
After implementing Static Address Translation to allow Internet traffic to an internal Web Server on your
DMZ, you notice that any NATed connections to that machine are being dropped by anti- spoofing
protections. Which of the following is the MOST LIKELY cause?
Answer
-
A. The Global Properties setting Translate destination on client side is unchecked. But the topology on the
DMZ interface is set to Internal - Network defined by IP and Mask. Check the Global Properties setting
Translate destination on client side.
-
B. The Global Properties setting Translate destination on client side is unchecked. But the topology on the
external interface is set to Others +. Change topology to External.
-
C. The Global Properties setting Translate destination on client side is checked. But the topology on the
external interface is set to External. Change topology to Others +.
-
D. The Global Properties setting Translate destination on client side is checked. But the topology on the
DMZ interface is set to Internal - Network defined by IP and Mask. Uncheck the Global Properties
setting Translate destination on client side.
Question 55
Question
QUESTION 55
Which NAT option applicable for Automatic NAT applies to Manual NAT as well?
Answer
-
A. Allow bi-directional NAT
-
B. Automatic ARP configuration
-
C. Translate destination on client-side
-
D. Enable IP Pool NAT
Question 56
Question
QUESTION 56
Your main internal network 10.10.10.0/24 allows all traffic to the Internet using Hide NAT. You also have a
small network 10.10.20.0/24 behind the internal router. You want to configure the kernel to translate the
source address only when network 10.10.20.0 tries to access the Internet for HTTP, SMTP, and FTP
services. Which of the following configurations will allow this network to access the Internet?
Answer
-
A. Configure three Manual Static NAT rules for network 10.10.20.0/24, one for each service.
-
B. Configure Automatic Static NAT on network 10.10.20.0/24.
-
C. Configure one Manual Hide NAT rule for HTTP, FTP, and SMTP services for network 10.10.20.0/24.
-
D. Configure Automatic Hide NAT on network 10.10.20.0/24 and then edit the Service column in the NAT
Rule Base on the automatic rule.
Question 57
Question
QUESTION 57
You have three servers located in a DMZ, using private IP addresses. You want internal users from
10.10.10.x to access the DMZ servers by public IP addresses. Internal_net 10.10.10.x is configured for
Hide NAT behind the Security Gateway's external interface.
What is the best configuration for 10.10.10.x users to access the DMZ servers, using the DMZ servers'
public IP addresses?
Answer
-
A. When connecting to internal network 10.10.10.x, configure Hide NAT for the DMZ network behind the
Security Gateway DMZ interface.
-
B. When the source is the internal network 10.10.10.x, configure manual static NAT rules to translate the
DMZ servers.
-
C. When connecting to the Internet, configure manual Static NAT rules to translate the DMZ servers.
-
D. When trying to access DMZ servers, configure Hide NAT for 10.10.10.x behind the DMZ's interface.
Question 58
Question
QUESTION 58
An internal host initiates a session to the Google.com website and is set for Hide NAT behind the Security
Gateway. The initiating traffic is an example of __________.
Answer
-
A. client side NAT
-
B. source NAT
-
C. destination NAT
-
D. None of these
Question 59
Question
QUESTION 59
A host on the Internet initiates traffic to the Static NAT IP of your Web server behind the Security Gateway.
With the default settings in place for NAT, the initiating packet will translate the _________.
Question 60
Question
QUESTION 60
A Web server behind the Security Gateway is set to Automatic Static NAT. Client side NAT is not checked
in the Global Properties. A client on the Internet initiates a session to the Web Server. Assuming there is a
rule allowing this traffic, what other configuration must be done to allow the traffic to reach the Web server?
Answer
-
A. Automatic ARP must be unchecked in the Global Properties.
-
B. Nothing else must be configured
-
C. A static route must be added on the Security Gateway to the internal host.
-
D. A static route for the NAT IP must be added to the Gateway's upstream router.
Correct Answer:
Question 61
Question
QUESTION 61
With deployment of SecureClient, you have defined in the policy that you allow traffic only to an encrypted
domain. But when your mobile users move outside of your company, they often cannot use SecureClient
because they have to register first (i.e. in Hotel or Conference rooms). How do you solve this problem?
Answer
-
A. Allow for unencrypted traffic
-
B. Allow traffic outside the encrypted domain
-
C. Enable Hot Spot/Hotel Registration
-
D. Allow your users to turn off SecureClient
Question 62
Question
QUESTION 62
What statement is true regarding Visitor Mode?
Answer
-
A. VPN authentication and encrypted traffic are tunneled through port TCP 443.
-
B. Only ESP traffic is tunneled through port TCP 443.
-
C. Only Main mode and Quick mode traffic are tunneled on TCP port 443.
-
D. All VPN traffic is tunneled through UDP port 4500.
Question 63
Question
QUESTION 63
When attempting to connect with SecureClient Mobile you get the following error message:
The certificate provided is invalid. Please provide the username and password.
What is the probable cause of the error?
Answer
-
A. Your user configuration does not have an office mode IP address so the connection failed.
-
B. Your certificate is invalid.
-
C. There is no connection to the server, and the client disconnected.
-
D. Your user credentials are invalid.
Question 64
Question
QUESTION 64
What port is used for communication to the User Center with SmartUpdate?
Answer
-
A. CPMI 200
-
B. TCP 8080
-
C. HTTP 80
-
D. HTTPS 443
Question 65
Question
QUESTION 65
You are a Security Administrator preparing to deploy a new HFA (Hotfix Accumulator) to ten Security
Gateways at five geographically separate locations. What is the BEST method to implement this HFA?
Answer
-
A. Use a SSH connection to SCP the HFA to each Security Gateway. Once copied locally, initiate a remote installation command and monitor the installation progress with SmartView Monitor.
-
B. Send a CD-ROM with the HFA to each location and have local personnel install it.
-
C. Send a Certified Security Engineer to each site to perform the update.
-
D. Use SmartUpdate to install the packages to each of the Security Gateways remotely.
Question 66
Question
QUESTION 66
What action can be performed from SmartUpdate R77?
Question 67
Question
QUESTION 67
Which tool CANNOT be launched from SmartUpdate R77?
Answer
-
A. IP Appliance Voyager
-
B. snapshot
-
C. GAiA WebUI
-
D. cpinfo
Question 68
Question
QUESTION 68
Sally has a Hot Fix Accumulator (HFA) she wants to install on her Security Gateway which operates with
GAiA, but she cannot SCP the HFA to the system. She can SSH into the Security Gateway, but she has
never been able to SCP files to it. What would be the most likely reason she cannot do so?
Answer
-
A. She needs to edit /etc/SSHd/SSHd_config and add the Standard Mode account.
-
B. She needs to run sysconfig and restart the SSH process.
-
C. She needs to edit /etc/scpusers and add the Standard Mode account.
-
D. She needs to run cpconfig to enable the ability to SCP files.
Question 69
Question
QUESTION 69
Which of the following are available SmartConsole clients which can be installed from the R77 Windows
CD? Read all answers and select the most complete and valid list.
Answer
-
A. SmartView Tracker, SmartDashboard, CPINFO, SmartUpdate, SmartView Status
-
B. SmartView Tracker, SmartDashboard, SmartLSM, SmartView Monitor
-
C. SmartView Tracker, CPINFO, SmartUpdate
-
D. Security Policy Editor, Log Viewer, Real Time Monitor GUI
Question 70
Question
QUESTION 70
What is a possible reason for the IKE failure shown in this screenshot?
Answer
-
A. Mismatch in VPN Domains.
-
B. Mismatch in preshared secrets.
-
C. Mismatch in Diffie-Hellman group.
-
D. Mismatch in encryption schemes.
Question 71
Question
QUESTION 71
When using an encryption algorithm, which is generally considered the best encryption method?
Answer
-
A. Triple DES
-
B. AES-256
-
C. CAST cipher
-
D. DES
Question 72
Question
QUESTION 72
Which do you configure to give remote access VPN users a local IP address?
Question 73
Question
QUESTION 73
You have a mesh VPN Community configured to create a site-to-site VPN. Given the displayed VPN
properties, what can you conclude about this community?
Exhibit:
Answer
-
A. The VPN Community will perform IKE Phase 1 key-exchange encryption using the longest key Security
Gateway R77 supports.
-
B. Changing the setting Perform key exchange encryption with from AES-256 to 3DES will enhance the
VPN Community's security , and reduce encryption overhead.
-
C. Change the data-integrity setting for this VPN Community because MD5 is incompatible with AES.
-
D. Changing the setting Perform IPsec data encryption with from AES-128 to 3Des will increase the
encryption overhead.
Question 74
Question
QUESTION 74
Certificates for Security Gateways are created during a simple initialization from _____________.
Question 75
Question
QUESTION 75
Which of the below is the MOST correct process to reset SIC from SmartDashboard?
Answer
-
A. Run cpconfig, and click Reset.
-
B. Click the Communication button for the firewall object, then click Reset. Run cpconfig and type a new
activation key.
-
C. Run cpconfig, and select Secure Internal Communication > Change One Time Password.
-
D. Click Communication > Reset on the Gateway object, and type a new activation key.
Question 76
Question
QUESTION 76
Exhibit:
You installed Security Management Server on a computer using GAiA in the MegaCorp home office. You
use IP address 10.1.1.1. You also installed the Security Gateway on a second GAiA computer, which you
plan to ship to another Administrator at a MegaCorp hub office. What is the correct order for pushing SIC
certificates to the Gateway before shipping it?
Answer
-
A. 2, 3, 4, 1, 5
-
B. 2, 1, 3, 4, 5
-
C. 1, 3, 2, 4, 5
-
D. 2, 3, 4, 5, 1
Question 77
Question
QUESTION 77
Although SIC was already established and running, Joe reset SIC between the Security Management
Server and a remote Gateway. He set a new activation key on the Gateway's side with the command
cpconfig and put in the same activation key in the Gateway's object on the Security Management Server.
Unfortunately, SIC can not be established. What is a possible reason for the problem?
Answer
-
A. The installed policy blocks the communication.
-
B. The old Gateway object should have been deleted and recreated.
-
C. Joe forgot to exit from cpconfig.
-
D. Joe forgot to reboot the Gateway.
Question 78
Question
QUESTION 78
You want to reset SIC between smberlin and sgosaka.
In SmartDashboard, you choose sgosaka, Communication, Reset. On sgosaka, you start cpconfig, choose
Secure Internal Communication and enter the new SIC Activation Key. The screen reads The SIC was
successfully initialized and jumps back to the cpconfig menu. When trying to establish a connection, instead
of a working connection, you receive this error message:
"Failed to connect to the module"
What is the reason for this behavior?
Answer
-
A. The Gateway was not rebooted, which is necessary to change the SIC key.
-
B. You must first initialize the Gateway object in SmartDashboard (i.e., right-click on the object, choose
Basic Setup > Initialize).
-
C. The Check Point services on the Gateway were not restarted because you are still in the cpconfig utility.
-
D. The activation key contains letters that are on different keys on localized keyboards. Therefore, the
activation can not be typed in a matching fashion.
Question 79
Question
QUESTION 79
John is the Security Administrator in his company. He installs a new R77 Security Management Server and
a new R77 Gateway. He now wants to establish SIC between them. After entering the activation key, he
gets the following message in SmartDashboard -
"Trust established"
SIC still does not seem to work because the policy won't install and interface fetching does not work. What
might be a reason for this?
Answer
-
A. SIC does not function over the network.
-
B. It always works when the trust is established
-
C. The Gateway's time is several days or weeks in the future and the SIC certificate is not yet valid.
-
D. This must be a human error.
Question 80
Question
QUESTION 80
The SIC certificate is stored in the directory _______________.
Answer
-
A. $CPDIR/registry
-
B. $CPDIR/conf
-
C. $FWDIR/database
-
D. $FWDIR/conf
Question 81
Question
QUESTION 81
You run cpconfig to reset SIC on the Security Gateway. After the SIC reset operation is complete, the policy
that will be installed is the:
Question 82
Question
QUESTION 82
Exhibit:
Chris has lost SIC communication with his Security Gateway and he needs to re-establish SIC. What would
be the correct order of steps needed to perform this task?
Answer
-
A. 5, 1, 2, 4
-
B. 5, 1, 4, 2
-
C. 3, 1, 4, 2
-
D. 2, 3, 1, 4
Question 83
Question
QUESTION 83
What happens when you open the Gateway object window Trusted Communication and press and confirm
Reset?
Answer
-
A. Sic will be reset on the Gateway only.
-
B. The Gateway certificate will be revoked on the Gateway only.
-
C. The Gateway certificate will be revoked on the Security Managment Server only.
-
D. The Gateway certificate will be revoked on the Security Management Server and SIC will be reset on
the Gateway.
Question 84
Question
QUESTION 84
Identity Awareness is implemented to manage access to protected resources based on a user's
_____________.
Question 85
Question
QUESTION 85
Which of the following allows administrators to allow or deny traffic to or from a specific network based on
the user's credentials?
Answer
-
A. Access Policy
-
B. Access Role
-
C. Access Rule
-
D. Access Certificate
Question 86
Question
QUESTION 86
John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to a
set of designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the
gateway policy permits access only from John's desktop which is assigned a static IP address 10.0.0.19.
He has received a new laptop and wants to access the HR Web Server from anywhere in the organization.
The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk.
The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop
with a static IP (10.0.0.19).
He wants to move around the organization and continue to have access to the HR Web Server. To make
this scenario work, the IT administrator:
1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources, and installs
the policy.
2) Adds an access role object to the Firewall Rule Base that lets John Adams access the HR Web Server
from any machine and from any location and installs policy.
John plugged in his laptop to the network on a different network segment and was not able to connect to
the HR Web server. What is the next BEST troubleshooting step?
Answer
-
A. Investigate this as a network connectivity issue
-
B. Install the Identity Awareness Agent
-
C. Set static IP to DHCP
-
D. After enabling Identity Awareness, reboot the gateway
Question 87
Question
QUESTION 87
John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to
designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway
policy permits access only from John's desktop which is assigned an IP address 10.0.0.19 via DHCP.
John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT
department gave the laptop a static IP address, but that limits him to operating it only from his desk. The
current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop. He
wants to move around the organization and continue to have access to the HR Web Server.
To make this scenario work, the IT administrator:
1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the
policy.
2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web
Server from any machine and from any location.
John plugged in his laptop to the network on a different network segment and he is not able to connect.
How does he solve this problem?
Answer
-
A. John should install the Identity Awareness Agent
-
B. The firewall admin should install the Security Policy
-
C. John should lock and unlock the computer
-
D. Investigate this as a network connectivity issue
Question 88
Question
QUESTION 88
John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to
designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway
policy permits access only from John's desktop which is assigned a static IP address 10.0.0.19.
John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT
department gave the laptop a static IP address, but that limits him to operating it only from his desk. The
current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop with a
static IP (10.0.0.19). He wants to move around the organization and continue to have access to the HR
Web Server.
To make this scenario work, the IT administrator:
1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the
policy.
2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web
Server from any machine and from any location.
What should John do when he cannot access the web server from a different personal computer?
Answer
-
A. John should lock and unlock his computer
-
B. Investigate this as a network connectivity issue
-
C. The access should be changed to authenticate the user instead of the PC
-
D. John should install the Identity Awareness Agent
Question 89
Question
QUESTION 89
Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use her iPad to
access the internal Finance Web server. Because the iPad is not a member of the
Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter her AD
credentials in the Captive Portal and then get the same access as on her office computer. Her access to
resources is based on rules in the R77 Firewall Rule Base.
To make this scenario work, the IT administrator must:
1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity Sources.
2) In the Portal Settings window in the User Access section, make sure that Name and password login is
selected.
3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network destinations. Select accept as the Action.
Ms. McHanry tries to access the resource but is unable. What should she do?
Answer
-
A. Have the security administrator select the Action field of the Firewall Rule "Redirect HTTP connections
to an authentication (captive) portal"
-
B. Have the security administrator reboot the firewall
-
C. Have the security administrator select Any for the Machines tab in the appropriate Access Role
-
D. Install the Identity Awareness agent on her iPad
Question 90
Question
QUESTION 90
When using LDAP as an authentication method for Identity Awareness, the query:
Answer
-
A. Requires client and server side software.
-
B. Prompts the user to enter credentials
-
C. Requires administrators to specifically allow LDAP traffic to and from the LDAP Server and the Security
Gateway.
-
D. Is transparent, requiring no client or server side software, or client intervention.
Question 91
Question
QUESTION 91
Which of the following firewall modes DOES NOT allow for Identity Awareness to be deployed?
Answer
-
A. Bridge
-
B. Load Sharing
-
C. High Availability
-
D. Fail Open
Question 92
Question
QUESTION 92
What happens if the identity of a user is known?
Answer
-
A. If the user credentials do not match an Access Role, the traffic is automatically dropped.
-
B. If the user credentials do not match an Access Role, the system displays a sandbox.
-
C. If the user credentials do not match an Access Role, the gateway moves onto the next rule.
-
D. If the user credentials do not match an Access Role, the system displays the Captive Portal.
Question 93
Question
QUESTION 93
What happens if the identity of a user is known?
Answer
-
A. If the user credentials do not match an Access Role, the system displays the Captive Portal.
-
B. If the user credentials do not match an Access Role, the system displays a sandbox.
-
C. If the user credentials do not match an Access Role, the traffic is automatically dropped.
-
D. If the user credentials match an Access Role, the rule is applied and traffic is accepted or dropped
based on the defined action.
Question 94
Question
QUESTION 94
Which rule position in the Rule Base should hold the Cleanup Rule? Why?
Answer
-
A. First. It explicitly accepts otherwise dropped traffic.
-
B. Last. It explicitly drops otherwise accepted traffic.
-
C. Last. It serves a logging function before the implicit drop.
-
D. Before last followed by the Stealth Rule.
Question 95
Question
QUESTION 95
Which item below in a Security Policy would be enforced first?
Answer
-
A. IP spoofing/IP options
-
B. Security Policy First rule
-
C. Administrator-defined Rule Base
-
D. Network Address Translation
Question 96
Question
QUESTION 96
When you hide a rule in a Rule Base, how can you then disable the rule?
Answer
-
A. Hidden rules are already effectively disabled from Security Gateway enforcement.
-
B. Right-click on the hidden rule place-holder bar and select Disable Rule(s).
-
C. Right-click on the hidden rule place-holder bar and uncheck Hide, then right-click and select Disable
Rule(s); re-hide the rule.
-
D. Use the search utility in SmartDashboard to view all hidden rules. Select the relevant rule and click
Disable Rule(s).
Question 97
Question
QUESTION 97
A Cleanup rule:
Answer
-
A. logs connections that would otherwise be dropped without logging by default.
-
B. drops packets without logging connections that would otherwise be dropped and logged by default.
-
C. logs connections that would otherwise be accepted without logging by default.
-
D. drops packets without logging connections that would otherwise be accepted and logged by default.
Question 98
Question
QUESTION 98
Which statement is TRUE about implicit rules?
Answer
-
A. You create them in SmartDashboard.
-
B. The Gateway enforces implicit rules that enable outgoing packets only.
-
C. Changes to the Security Gateway's default settings do not affect implicit rules.
-
D. They are derived from Global Properties and explicit object properties.
Question 99
Question
QUESTION 99
You have included the Cleanup Rule in your Rule Base. Where in the Rule Base should the Accept ICMP
Requests implied rule have no effect?
Answer
-
A. Last
-
B. After Stealth Rule
-
C. First
-
D. Before Last
Question 100
Question
QUESTION 100
All of the following are Security Gateway control connections defined by default implied rules, EXCEPT:
Answer
-
A. Exclusion of specific services for reporting purposes.
-
B. Acceptance of IKE and RDP traffic for communication and encryption purposes.
-
C. Communication with server types, such as RADIUS, CVP, UFP, TACACS, and LDAP
-
D. Specific traffic that facilitates functionality, such as logging, management, and key exchange.