CCSE Flashcards
(344 cards)
In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?
Install policy
Name the file that is an electronically signed file used by Check Point to translate the features in the license into a code?
cp.macro
Which two Identity Awareness daemons are used to support identity sharing?
Policy Decision Point (PDP) and Policy Enforcement Point (PEP)
In which scenario will an administrator need to manually define Proxy ARP?
A. When they configure an “Automatic Static NAT” which translates to an IP address that does not belong to one of the firewall’s interfaces.
B. When they configure an “Automatic Hide NAT” which translates to an IP address that does not belong to one of the firewall’s interfaces.
C. When they configure a “Manual Static NAT” which translates to an IP address that does not belong to one of the firewall’s interfaces.
D. When they configure a “Manual Hide NAT” which translates to an IP address that belongs to one of the firewall’s interfaces.
C. When they configure a “Manual Static NAT” which translates to an IP address that does not belong to one of the firewall’s interfaces.
Rugged appliances are small appliances with ruggedized hardware and like Quantum Spark appliance they use which operating system?
A. Centos Linux
B. Gaia embedded.
C. Gaia
D. Red Hat Enterprise Linux version 5
B. Gaia embedded.
For Automatic Hide NAT rules created by the administrator what is a TRUE statement?
A. Source Port Address Translation (PAT) is enabled by default.
B. Automatic NAT rules are supported for Network objects only.
C. Automatic NAT rules are supported for Host objects only.
D. Source Port Address Translation (PAT) is disabled by default.
A. Source Port Address Translation (PAT) is enabled by default.
What technologies are used to deny or permit network traffic?
A. Stateful Inspection, Firewall Blade, and URL/Application Blade
B. Packet Filtering, Stateful Inspection, and Application Layer Firewall
C. Firewall Blade, URL/Application Blade, and IPS
D. Stateful Inspection, URL/Application Blade, and Threat Prevention
B. Packet Filtering, Stateful Inspection, and Application Layer Firewall
Identity Awareness allows easy configuration for network access and auditing based on what three items?
A. Client machine IP address.
B. Network location, the identity of a user and the identity of a machine.
C. Log server IP address.
D. Gateway proxy IP address.
B. Network location, the identity of a user and the identity of a machine.
Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?
A. Windows Management Instrumentation (WMI)
B. Hypertext Transfer Protocol Secure (HTTPS)
C. Lightweight Directory Access Protocol (LDAP)
D. Remote Desktop Protocol (RDP)
Windows Management Instrumentation (WMI)
What are the types of Software Containers?
A. Smart Console, Security Management, and Security Gateway
B. Security Management, Security Gateway, and Endpoint Security
C. Security Management, Log & Monitoring, and Security Policy
D. Security Management, Standalone, and Security Gateway
B. Security Management, Security Gateway, and Endpoint Security
What are the Threat Prevention software components available on the Check Point Security Gateway?
A. IPS, Threat Emulation and Threat Extraction
B. IPS, Anti-Bot, Anti-Virus, SandBlast and Macro Extraction
C. IPS, Anti-Bot, Anti-Virus, Threat Emulation and Threat Extraction
D. IDS, Forensics, Anti-Virus, Sandboxing
C. IPS, Anti-Bot, Anti-Virus, Threat Emulation and Threat Extraction
When using Automatic Hide NAT, what is enabled by default?
Source Port Address Translation (PAT)
In which deployment is the security management server and Security Gateway installed on the same appliance?
Standalone
What is the main objective when using Application Control?
A. To filter out specific content.
B. To assist the firewall blade with handling traffic.
C. To see what users are doing.
D. Ensure security and privacy of information.
A. To filter out specific content.
Gaia has two default user accounts that cannot be deleted. What are those user accounts?
Admin and Monitor
When changes are made to a Rule base, It is important to __________ to enforce changes.
Install policy
Why is a Central License the preferred and recommended method of licensing?
A. Central Licensing actually not supported with Gaia.
B. Central Licensing is the only option when deploying Gala.
C. Central Licensing ties to the IP address of a gateway and can be changed to any gateway if needed.
D. Central Licensing ties to the IP address of the management server and is not dependent on the IP of any gateway in the event it changes.
D. Central Licensing ties to the IP address of the management server and is not dependent on the IP of any gateway in the event it changes.
What does the “unknown” SIC status shown on SmartConsole mean?
A. SIC activation key requires a reset
B. Administrator input the wrong SIC key
C. The management can contact the Security Gateway but cannot establish Secure Internal Communication
D. There is no connection between the Security Gateway and Security Management Server
D. There is no connection between the Security Gateway and Security Management Server
What are valid authentication methods for mutual authenticating the VPN gateways?
A. PKI Certificates and Kerberos Tickets
B. PKI Certificates and DynamicID OTP
C. Pre-Shared Secrets and Kerberos Ticket
D. Pre-shared Secret and PKI Certificates
D. Pre-shared Secret and PKI Certificates
What are the correct steps upgrading a HA cluster (M1 is active, M2 is passive) using Multi-Version Cluster(MVC)Upgrade?
A. 1) Enable the MVC mechanism on both cluster members #cphaprob mvc on
2) Upgrade the passive node M2 to R81.10
3) In SmartConsole, change the version of the cluster object
4) Install the Access Control Policy and make sure that the installation will not stop if installation on one cluster member fails
5) After examine the cluster states upgrade node M1 to R81.10
6) On each Cluster Member, disable the MVC mechanism
B. 1) Enable the MVC mechanism on both cluster members #cphaprob mvc on
2) Upgrade the passive node M2 to R81.10
3) In SmartConsole, change the version of the cluster object
4) Install the Access Control Policy
5) After examine the cluster states upgrade node M1 to R81.10
6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy
C. 1) In SmartConsole, change the version of the cluster object
2) Upgrade the passive node M2 to R81.10
3) Enable the MVC mechanism on the upgraded R81.10 Cluster Member M2 #cphaconf mvc on
4) Install the Access Control Policy and make sure that the installation will not stop if installation on one cluster member fails
5) After examine the cluster states upgrade node M1 to R81.10
6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy SmartConsole, change the version of the cluster object
D. 1) Upgrade the passive node M2 to R81.10
2) Enable the MVC mechanism on the upgraded R81.10 Cluster Member M2 #cphaconf mvc on
3) In SmartConsole, change the version of the cluster object
4) Install the Access Control Policy
5) After examine the cluster states upgrade node M1 to R81.10
6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy upgrade the passive node M2 to R81.10
C. 1) In SmartConsole, change the version of the cluster object
2) Upgrade the passive node M2 to R81.10
3) Enable the MVC mechanism on the upgraded R81.10 Cluster Member M2 #cphaconf mvc on
4) Install the Access Control Policy and make sure that the installation will not stop if installation on one cluster member fails
5) After examine the cluster states upgrade node M1 to R81.10
6) On each Cluster Member, disable the MVC mechanism and Install the Access Control Policy SmartConsole, change the version of the cluster object
Which Operating Systems are supported for the Endpoint Security VPN?
A. Windows and x86 Solaris
B. Windows and macOS computers
C. Windows and SPARC Solaris
D. Windows and Red Hat Linux
B. Windows and macOS computers
What are the three SecureXL Templates available in R81.10?
A. PEP Templates, QoS Templates, VPN Templates
B. Accept Templates, Drop Templates, NAT Templates
C. Accept Templates, Drop Templates, Reject Templates
D. Accept Templates, PDP Templates, PEP Templates
B. Accept Templates, Drop Templates, NAT Templates
Which Queue in the Priority Queue has the maximum priority?
A. High Priority
B. Control
C. Routing
D. Heavy Data Queue
C. Routing
Which upgrade method you should use upgrading from R80.40 to R81.10 to avoid any downtime?
A. Zero Downtime Upgrade (ZDU)
B. Connectivity Upgrade (CU)
C. Minimal Effort Upgrade (ME)
D. Multi-Version Cluster Upgrade (MVC)
Multi-Version Cluster Upgrade (MVC)