Q1. - (Topic 2) While in SmartView Tracker, Brady has noticed some very odd network traffic that he thinks could be an intrusion. He decides to block the traffic for 60 minutes, but cannot remember all the steps. What is the correct order of steps needed to set up the block? 1) Select Active Mode tab in SmartView Tracker. 2) Select Tools >…
Q1. - (Topic 1) You believe Phase 2 negotiations are failing while you are attempting to configure a site-to-site VPN with one of your firm's business partners. Which SmartConsole application should you use to confirm your suspicions? A. SmartDashboard B. SmartView Tracker C. SmartUpdate D. SmartView Status View AnswerAnswer: B Q2. - (Topic 3) Which R77 GUI would you use to see the number of packets accepted since…
Q1. - (Topic 3) Your company has two headquarters, one in London, one in New York. Each of the headquarters includes several branch offices. The branch offices only need to communicate with the headquarters in their country, not with each other, and the headquarters need to communicate directly. What is the BEST configuration for establishing VPN Communities among the branch offices…
Q1. - (Topic 2) Which Check Point address translation method allows an administrator to use fewer ISP-assigned IP addresses than the number of internal hosts requiring Internet connectivity? A. Static Source B. Static Destination C. Dynamic Destination D. Hide View AnswerAnswer: D Q2. - (Topic 3) What is the Manual Client Authentication TELNET port? A. 264 B. 259 C. 900 D. 23 View AnswerAnswer: B Q3. - (Topic 1) The INSPECT engine inserts itself into…
Q1. - (Topic 3) What happens when you run the commanD. fw sam -J src [Source IP Address]? A. Connections to and from the specified target are blocked without the need to change the Security Policy. B. Connections to and from the specified target are blocked with the need to change the Security Policy. C. Connections from the specified source are blocked without the…
Q1. - (Topic 1) Which of the following methods will provide the most complete backup of an R75 configuration? A. Execute command upgrade_export B. Database Revision Control C. Policy Package Management D. Copying the directories $FWDIR\conf and $CPDIR\conf to another server View AnswerAnswer: A Q2. - (Topic 1) The ____________ and ____________ rules are the two basic rules which should be used by all Security Administrators. A. Cleanup; Stealth B.…
Q1. - (Topic 1) When using SecurePlatform, it might be necessary to temporarily change the MAC address of the interface eth 0 to 00:0C:29:12:34:56. After restarting the network the old MAC address should be active. How do you configure this change? A. Edit the file /etc/sysconfig/netconf.c and put the new MAC address in the field B. As expert user, issue these commands: #…
Q1. - (Topic 3) Which rule is responsible for the installation failure? A. Rule 3 B. Rule 4 C. Rule 5 D. Rule 6 View AnswerAnswer: B Q2. - (Topic 2) To check the Rule Base, some rules can be hidden so they do not distract the administrator from the unhidden rules. Assume that only rules accepting HTTP or SSH will be shown. How do you accomplish this? A.…
Q1. - (Topic 2) Which statement below describes the most correct strategy for implementing a Rule Base? A. Place a network-traffic rule above the administrator access rule. B. Limit grouping to rules regarding specific access. C. Place the most frequently used rules at the top of the Policy and the ones that are not frequently used further down. D. Add the Stealth Rule before the…
Q1. - (Topic 3) John is the Security Administrator in his company. He installs a new R77 Security Management Server and a new R77 Gateway. He now wants to establish SIC between them. After entering the activation key, he gets the following message in SmartDashboard -“Trust established? SIC still does not seem to work because the policy won’t install and interface fetching…
Q1. - (Topic 2) To reduce the information given to you in SmartView Tracker, what can you do to find information about data being sent between pcosaka and pctokyo? A. Apply a source filter by adding both endpoint IP addresses with the equal option set. B. Use a regular expression to filter out relevant logging entries. C. Double-click an entry representing a connection between…
Q1. - (Topic 3) Study the Rule base and Client Authentication Action properties screen -After being authenticated by the Security Gateway, when a user starts an HTTP connection to a Web site, the user tries to FTP to another site using the command line. What happens to the user? The: A. FTP connection is dropped by Rule 2. B. user is prompted from…
Q1. - (Topic 1) During which step in the installation process is it necessary to note the fingerprint for first-time verification? A. When configuring the Security Gateway object in SmartDashboard B. When configuring the Security Management Server using cpconfig C. When establishing SIC between the Security Management Server and the Gateway D. When configuring the Gateway in the WebUI View AnswerAnswer: B Q2. - (Topic 1) A snapshot…
Q1. - (Topic 1) Which component functions as the Internal Certificate Authority for R77? A. Security Gateway B. Management Server C. Policy Server D. SmartLSM View AnswerAnswer: B 69. - (Topic 1) Which command allows you to view the contents of an R77 table? A. fw tab -s B. fw tab -t C. fw tab -x D. fw tab -a Q2. - (Topic 1) How do you recover communications between…
Q1. - (Topic 2) Your perimeter Security Gateway's external IP is 200.200.200.3. Your network diagram shows: RequireD. Allow only network 192.168.10.0 and 192.168.20.0 to go out to the Internet, using 200.200.200.5. The local network 192.168.1.0/24 needs to use 200.200.200.3 to go out to the Internet. Assuming you enable all the settings in the NAT page of Global Properties, how could you achieve these requirements? A.…
Q1. - (Topic 1) Which command enables IP forwarding on IPSO? A. echo 1 > /proc/sys/net/ipv4/ip_forward B. ipsofwd on admin C. echo 0 > /proc/sys/net/ipv4/ip_forward D. clish -c set routing active enable View AnswerAnswer: B Q2. - (Topic 1) You want to generate a cpinfo file via CLI on a system running GAiA. This will take about 40 minutes since the log files are also needed. What action…