CCSE Flashcards
What is the port used for SmartConsole to connect to the Security Management Server:
CPMI port 18191/TCP
Which is the correct order of a log flow processed by SmartEvents components
Firewall > Log Server > Correlation Unit > SmartEvent Server Database > SmartEvent Client
In SmartEvent, what are the different types of automatic reactions that the administrator can configure?
Mail, Block Source, Block Event Activity, External Script, SNMP Trap
Which components allow you to reset a VPN tunnel?
SmartView monitor only
When synchronizing clusters, which of the following statements is FALSE?
A. The state of connections using resources is maintained in a Security Server, so their connections cannot be synchronized.
B. Only cluster members running on the same OS platform can be synchronized.
C. In the case of a failover, accounting information on the failed member may be lost despite a properly working synchronization.
D. Client Authentication or Session Authentication connections through a cluster member will be lost if the cluster member fails.
Client Authentication or Session Authentication connections through a cluster member will be lost if the cluster member fails.
Which of the following is a new R80.10 Gateway feature that had not been available in R77.X and older?
The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control
over the rule base flow and which security functionalities take precedence.
In R80.10, how do you manage your Mobile Access Policy?
From SmartDashboard
You find one of your cluster gateways showing “Down” when you run the “cphaprob stat” command. You then run the “clusterXL_admin up” on the down member
but unfortunately the member continues to show down. What command do you run to determine the case?
cphaprob -a list
SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day
Protection?
Threat Agent Solution
Which of the following is NOT a valid way to view interface’s IP address settings in Gaia?
Using the command sthtool in Expert Mode
Check Point recommends configuring Disk Space Management parameters to delete old log entities when available disk space is less than or equal to?
15%
What API command below creates a new host with the name “New Host” and IP address of “192.168.0.10”?
add host name “New Host” ip-address “192.168.0.10”
What are types of Check Point APIs available currently as part of R80.10 code?
Management API, Threat Prevention API, Identity Awareness Web Services API and OPSEC SDK API
Which of the following is NOT an internal/native Check Point command?
A. fwaccel on
B. fw ct1 debug
C. tcpdump
D. cphaprob
tcpdump
What is the SandBlast Agent designed to do?
If malware enters an end user’s system, the SandBlast Agent prevents the malware form spreading with the network
The SmartEvent R80 Web application for real-time event monitoring is called:
SmartView Monitor
What Shell is required in Gaia to use WinSCP?
Bash
Which one of the following is true about Threat Emulation?
Takes minutes to complete (less than 3 minutes)
What are the minimum open server hardware requirements for a Security Management Server/Standalone in R80.10?
4 CPU cores, 8GB of RAM and 500GB of disk space
The “MAC magic” value must be modified under the following condition:
A firewall cluster is configured to use Broadcast for CCP traffic
The Correlation Unit performs all but which of the following actions:
Assigns a severity level to the event
The following command is used to verify the CPUSE version:
HostName:0>show installer status build
Which statement is true regarding redundancy?
Both Cluster XL and VRRP are fully supported by Gaia and available to all Check Point appliances, open servers, and virtualized environments.
Vanessa is expecting a very important Security Report. The Document should be sent as an attachment via e-mail. An e-mail with Security_ report.pdf file was
delivered to her e-mail inbox. When she opened the PDF file, she noticed that the file is basically empty and only few lines of text are in it. The report is missing
some graphs, tables and links. Which component of SandBlast protection is her company using on a Gateway?
SandBlast Threat Extraction