<< Prev Question Next Question >>

Question 36/365

Your company has two headquarters, one in London, one in New York. Each of the headquarters includes several branch offices. The branch offices only need to communicate with the headquarters in their country, not with each other, and the headquarters need to communicate directly. What is the BEST configuration for establishing VPN Communities among the branch offices and their headquarters, and between the two headquarters? VPN Communities comprised of:

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (365q)
Question 1: Where can you find the Check Point's SNMP MIB file?...
Question 2: What CLI utility allows an administrator to capture traffic ...
Question 3: An advantage of using central instead of local licensing is:...
Question 4: Which of the following actions take place in IKE Phase 2 wit...
Question 5: You manage a global network extending from your base in Chic...
Question 6: In SmartView Tracker, which rule shows when a packet is drop...
Question 7: When doing a Stand-Alone Installation, you would install the...
Question 8: Installing a policy usually has no impact on currently exist...
Question 9: Your organization's disaster recovery plan needs an update t...
Question 10: What happens when you select File &gt; Export from the Smart...
Question 11: Which of the following statements is TRUE about management p...
Question 12: You receive a notification that long-lasting Telnet connecti...
Question 13: An internal host initiates a session to the Google.com websi...
Question 14: Exhibit: (Exhibit) You installed Security Management Server ...
Question 15: Which of the following is a hash algorithm?...
Question 16: Choose the correct statement regarding Stealth Rules:...
Question 17: SmartView Tracker logs the following Security Administrator ...
Question 18: John Adams is an HR partner in the ACME organization. ACME I...
Question 19: Your company is still using traditional mode VPN configurati...
Question 20: Match the following commands to their correct function. Each...
Question 21: Your users are defined in a Windows 2008 R2 Active Directory...
Question 22: Which of the following is true of a Stealth Rule?...
Question 23: With deployment of SecureClient, you have defined in the pol...
Question 24: What are you required to do before running the command upgra...
Question 25: Your Security Management Server fails and does not reboot. O...
Question 26: A host on the Internet initiates traffic to the Static NAT I...
Question 27: Complete this statement from the options provided. Using Cap...
Question 28: The Captive Portal tool:
Question 29: Which of these attributes would be critical for a site-to-si...
Question 30: What information is found in the SmartView Tracker Managemen...
Question 31: You have configured Automatic Static NAT on an internal host...
Question 32: Your main internal network 10.10.10.0/24 allows all traffic ...
Question 33: What is the syntax for uninstalling a package using newpkg?...
Question 34: Your primary Security Gateway runs on GAiA. What is the easi...
Question 35: SmartView Monitor is mainly for which kind of work - 1. Moni...
Question 36: Your company has two headquarters, one in London, one in New...
Question 37: The third-shift Administrator was updating Security Manageme...
Question 38: The Security Gateway is installed on GAiA R77 The default po...
Question 39: A _______ rule is used to prevent all traffic going to the R...
Question 40: Which SmartConsole tool would you use to see the last policy...
Question 41: In a distributed management environment, the administrator h...
Question 42: Sally has a Hot Fix Accumulator (HFA) she wants to install o...
Question 43: Which command enables IP forwarding on IPSO?...
Question 44: Which of the following is an authentication method used by I...
Question 45: Which of these components does NOT require a Security Gatewa...
Question 46: Which of the following statements BEST describes Check Point...
Question 47: Choose the BEST sequence for configuring user management in ...
Question 48: Why should the upgrade_export configuration file (.tgz) be d...
Question 49: Identity Awareness is implemented to manage access to protec...
Question 50: Which of the following items should be configured for the Se...
Question 51: After implementing Static Address Translation to allow Inter...
Question 52: How can you activate the SNMP daemon on a Check Point Securi...
Question 53: What is the primary benefit of using the command upgrade_exp...
Question 54: When using LDAP as an authentication method for Identity Awa...
Question 55: Certificates for Security Gateways are created during a simp...
Question 56: SmartUpdate is mainly for which kind of work - 1. Monitoring...
Question 57: Which R77 SmartConsole tool would you use to verify the inst...
Question 58: SmartView Tracker R77 consists of three different modes. The...
Question 59: You are about to integrate RSA SecurID users into the Check ...
Question 60: Which feature in R77 permits blocking specific IP addresses ...
Question 61: Where can an administrator configure the notification action...
Question 62: The INSPECT engine inserts itself into the kernel between wh...
Question 63: Looking at the SYN packets in the Wireshark output, select t...
Question 64: Which of the following is NOT a valid option when configurin...
Question 65: How does the button Get Address, found on the Host Node Obje...
Question 66: As you review this Security Policy, what changes could you m...
Question 67: Which of the following allows administrators to allow or den...
Question 68: If a SmartUpdate upgrade or distribution operation fails on ...
Question 69: Which of the following describes the default behavior of an ...
Question 70: When using vpn tu, which option must you choose if you want ...
Question 71: During which step in the installation process is it necessar...
Question 72: How do you recover communications between your Security Mana...
Question 73: When translation occurs using automatic Hide NAT, what also ...
Question 74: How granular may an administrator filter an Access Role with...
Question 75: What is the Manual Client Authentication TELNET port?...
Question 76: Which of the following items should be configured for the Se...
Question 77: Which of the following statements accurately describes the c...
Question 78: A marketing firm's networking team is trying to troubleshoot...
Question 79: What is the difference between Standard and Specific Sign On...
Question 80: To qualify as an Identity Awareness enabled rule, which colu...
Question 81: You are using SmartView Tracker to troubleshoot NAT entries....
Question 82: John Adams is an HR partner in the ACME organization. ACME I...
Question 83: Which rule is responsible for the installation failure? Exhi...
Question 84: Which SmartView Tracker mode allows you to read the SMTP e-m...
Question 85: When using an encryption algorithm, which is generally consi...
Question 86: You want to configure a mail alert for every time the policy...
Question 87: Where is the easiest and BEST place to find information abou...
Question 88: What is the officially accepted diagnostic tool for IP Appli...
Question 89: When you change an implicit rule's order from Last to First ...
Question 90: VPN gateways must authenticate to each other prior to exchan...
Question 91: What CANNOT be configured for existing connections during a ...
1 commentQuestion 92: You want to generate a cpinfo file via CLI on a system runni...
Question 93: Can you use Captive Portal with HTTPS?...
Question 94: Which port must be allowed to pass through enforcement point...
Question 95: Which type of R77 Security Server does not provide User Auth...
Question 96: Which R77 GUI would you use to see the number of packets acc...
Question 97: You have installed a R77 Security Gateway on GAiA. To manage...
Question 98: Which of these Security Policy changes optimize Security Gat...
Question 99: How can you configure an application to automatically launch...
Question 100: An Administrator without access to SmartDashboard installed ...
Question 101: Because of pre-existing design constraints, you set up manua...
Question 102: Identify the correct step performed by SmartUpdate to upgrad...
Question 103: Your R77 primary Security Management Server is installed on ...
Question 104: You find a suspicious FTP site trying to connect to one of y...
Question 105: Choose the SmartLog property that is TRUE....
Question 106: Anti-Spoofing is typically set up on which object type?...
Question 107: You intend to upgrade a Check Point Gateway from R71 to R77....
Question 108: How do you configure an alert in SmartView Monitor?...
Question 109: What command syntax would you use to see accounts the gatewa...
Question 110: You need to back up the routing, interface, and DNS configur...
Question 111: Which of the following R77 SmartView Tracker views will disp...
Question 112: When configuring LDAP authentication, which of the following...
Question 113: You have a diskless appliance platform. How do you keep swap...
Question 114: Your shipping company uses a custom application to update th...
Question 115: Central license management allows a Security Administrator t...
Question 116: Which of the following are authentication methods that Secur...
Question 117: Which of the following actions do NOT take place in IKE Phas...
Question 118: Although SIC was already established and running, Joe reset ...
Question 119: Spoofing is a method of:
Question 120: A Cleanup rule:
Question 121: True or FalsE. SmartView Monitor can be used to create alert...
Question 122: Your internal network is configured to be 10.1.1.0/24. This ...
Question 123: Which command allows you to view the contents of an R77 tabl...
Question 124: Where are SmartEvent licenses installed?...
Question 125: Your manager requires you to setup a VPN to a new business p...
Question 126: You have detected a possible intruder listed in SmartView Tr...
Question 127: Where do we need to reset the SIC on a gateway object?...
Question 128: Which of the following commands can provide the most complet...
Question 129: Which component functions as the Internal Certificate Author...
Question 130: You can include External commands in SmartView Tracker by th...
Question 131: What is a Consolidation Policy?...
Question 132: Many companies have defined more than one administrator. To ...
Question 133: How many packets does the IKE exchange use for Phase 1 Aggre...
Question 134: Lily has completed the initial setup of her Management Serve...
Question 135: In the Rule Base displayed for fwsingapore, user authenticat...
Question 136: The technical-support department has a requirement to access...
Question 137: In SmartDashboard, you configure 45 MB as the required free ...
Question 138: A client has created a new Gateway object that will be manag...
Question 139: You enable Hide NAT on the network object, 10.1.1.0 behind t...
Question 140: Which of the below is the MOST correct process to reset SIC ...
Question 141: You are a Security Administrator who has installed Security ...
Question 142: Which of the following is NOT defined by an Access Role obje...
Question 143: All of the following are Security Gateway control connection...
Question 144: Where can an administrator specify the notification action t...
Question 145: Assume you are a Security Administrator for ABCTech. You hav...
Question 146: You find a suspicious connection from a problematic host. Yo...
Question 147: The London Security Gateway Administrator has just installed...
Question 148: When you use the Global Properties' default settings on R77,...
Question 149: Your Security Gateways are running near performance capacity...
Question 150: Which authentication type permits five different sign-on met...
Question 151: Packages and licenses are loaded into the SmartUpdate reposi...
Question 152: Which operating systems are supported by a Check Point Secur...
Question 153: In the Rule Base displayed, user authentication in Rule 4 is...
Question 154: You are conducting a security audit. While reviewing configu...
Question 155: A company has disabled logging for some of the most commonly...
Question 156: What gives administrators more flexibility when configuring ...
Question 157: What port is used for communication to the User Center with ...
Question 158: Which of the following methods will provide the most complet...
Question 159: ______________ is an R77 component that displays the number ...
Question 160: Which rule position in the Rule Base should hold the Cleanup...
Question 161: While in SmartView Tracker, Brady has noticed some very odd ...
Question 162: Katie has been asked to setup a rule to allow the new webser...
Question 163: When you hide a rule in a Rule Base, how can you then disabl...
Question 164: Which command would provide the most comprehensive diagnosti...
Question 165: Jack has locked himself out of the Kirk Security Gateway wit...
Question 166: What information is found in the SmartView Tracker Managemen...
Question 167: How can you recreate the Security Administrator account, whi...
Question 168: Which SmartView Tracker selection would most effectively sho...
Question 169: To check the Rule Base, some rules can be hidden so they do ...
Question 170: A snapshot delivers a complete GAiA backup. The resulting fi...
Question 171: Where would an administrator enable Implied Rules logging?...
Question 172: What is a possible reason for the IKE failure shown in this ...
Question 173: ALL of the following options are provided by the GAiA syscon...
Question 174: The R77 fw monitor utility is used to troubleshoot which of ...
Question 175: A Security Policy installed by another Security Administrato...
Question 176: Which command allows Security Policy name and install date v...
Question 177: You are running the license_upgrade tool on your GAiA Gatewa...
Question 178: You have two rules, ten users, and two user groups in a Secu...
Question 179: Which rules are not applied on a first-match basis?...
Question 180: The third-shift Administrator was updating Security Manageme...
Question 181: Which of the following is NOT useful to verify whether or no...
Question 182: Which command line interface utility allows the administrato...
Question 183: Can a Check Point gateway translate both source IP address a...
Question 184: Which R77 feature or command allows Security Administrators ...
Question 185: Which NAT option applicable for Automatic NAT applies to Man...
Question 186: Where does the security administrator activate Identity Awar...
Question 187: You are the Security Administrator for MegaCorp. A Check Poi...
Question 188: Your company is running Security Management Server R77 on GA...
Question 189: You want to implement Static Destination NAT in order to pro...
Question 190: The customer has a small Check Point installation which incl...
Question 191: In which Rule Base can you implement an Access Role?...
Question 192: An Administrator without access to SmartDashboard installed ...
Question 193: What is the default setting when you use NAT?...
Question 194: If you were NOT using IKE aggressive mode for your IPsec tun...
Question 195: Over the weekend, an Administrator without access to SmartDa...
Question 196: You are MegaCorp's Security Administrator. There are various...
Question 197: Which set of objects have an Authentication tab?...
Question 198: Reviewing the Rule Base, you see that ________ is responsibl...
Question 199: You install and deploy GAiA with default settings. You allow...
Question 200: Which Security Gateway R77 configuration setting forces the ...
Question 201: Your company has two headquarters, one in London, and one in...
Question 202: You are the Security Administrator for ABC-Corp. A Check Poi...
Question 203: Suppose the Security Gateway hard drive fails and you are fo...
Question 204: MegaCorp's security infrastructure separates Security Gatewa...
Question 205: Several Security Policies can be used for different installa...
Question 206: When configuring anti-spoofing on the Security Gateway objec...
Question 207: Study the Rule base and Client Authentication Action propert...
Question 208: Where is the fingerprint generated, based on the output disp...
Question 209: Which of the following authentication methods can be configu...
Question 210: In a distributed management environment, the administrator h...
Question 211: What is also referred to as Dynamic NAT?...
Question 212: Choose the correct statement regarding Implied Rules:...
Question 213: Which of the following is a viable consideration when determ...
Question 214: You have included the Cleanup Rule in your Rule Base. Where ...
Question 215: One of your remote Security Gateways suddenly stops sending ...
Question 216: What happens when you run the command. fw sam -J src [Source...
Question 217: What command syntax would you use to turn on PDP logging in ...
Question 218: Which utility allows you to configure the DHCP service on GA...
Question 219: Which of the following is true of the Cleanup rule?...
Question 220: In SmartDashboard, Translate destination on client side is c...
Question 221: How are cached usernames and passwords cleared from the memo...
Question 222: You are reviewing the Security Administrator activity for a ...
Question 223: Which rule is responsible for the installation failure? Exhi...
Question 224: You would use the Hide Rule feature to:...
Question 225: What happens if you select Web Server in the dialog box? Exh...
Question 226: Which of the following is NOT true for Clientless VPN?...
Question 227: You are trying to save a custom log query in R77 SmartView T...
Question 228: Identify the correct step performed by SmartUpdate to upgrad...
Question 229: You have just installed your Gateway and want to analyze the...
Question 230: The customer has a small Check Point installation which incl...
Question 231: Exhibit: (Exhibit) You plan to create a backup of the rules,...
Question 232: What happens if the identity of a user is known?...
Question 233: When using AD Query to authenticate users for Identity Aware...
Question 234: What statement is true regarding Visitor Mode?...
Question 235: How many packets does the IKE exchange use for Phase 1 Main ...
Question 236: The customer has a small Check Point installation which incl...
Question 237: If a Security Gateway enforces three protections, LDAP Injec...
Question 238: You believe Phase 2 negotiations are failing while you are a...
Question 239: Which command displays the installed Security Gateway versio...
Question 240: Exhibit: (Exhibit) Chris has lost SIC communication with his...
Question 241: What happens when you open the Gateway object window Trusted...
Question 242: An internal router is sending UDP keep-alive packets that ar...
Question 243: What does SmartUpdate allow you to do?...
Question 244: You are the Security Administrator for MegaCorp. In order to...
Question 245: Complete this statement. The block Intruder option in the Ac...
Question 246: When attempting to connect with SecureClient Mobile you get ...
Question 247: By default, when you click File &gt; Switch Active File in S...
Question 248: Your company's Security Policy forces users to authenticate ...
Question 249: One of your remote Security Gateway's suddenly stops sending...
Question 250: You are working with multiple Security Gateways that enforce...
Question 251: Your company enforces a strict change control policy. Which ...
Question 252: Users with Identity Awareness Agent installed on their machi...
Question 253: Which Check Point address translation method allows an admin...
Question 254: Security Gateway R77 supports User Authentication for which ...
Question 255: UDP packets are delivered if they are ___________....
Question 256: Why are certificates preferred over pre-shared keys in an IP...
Question 257: How can you reset the Security Administrator password that w...
Question 258: Which command displays the installed Security Gateway kernel...
Question 259: You need to completely reboot the Operating System after mak...
Question 260: You cannot use SmartDashboard's User Directory features to c...
Question 261: Several Security Policies can be used for different installa...
Question 262: Which of the following uses the same key to decrypt as it do...
Question 263: Is it possible to track the number of connections each rule ...
Question 264: What mechanism does a gateway configured with Identity Aware...
Question 265: Exhibit: (Exhibit) Of the following, what parameters will no...
Question 266: You just installed a new Web server in the DMZ that must be ...
Question 267: You are a Security Administrator preparing to deploy a new H...
Question 268: Identify the ports to which the Client Authentication daemon...
Question 269: When launching SmartDashboard, what information is required ...
Question 270: A digital signature:
Question 271: You have configured SNX on the Security Gateway. The client ...
Question 272: After filtering a fw monitor trace by port and IP, a packet ...
Question 273: How do you use SmartView Monitor to compile traffic statisti...
Question 274: Which of the following objects is a valid source in an authe...
Question 275: Static NAT connections, by default, translate on which firew...
Question 276: Charles requests a Website while using a computer not in the...
Question 277: Lilly needs to review VPN History counters for the last week...
Question 278: Which SmartConsole component can Administrators use to track...
Question 279: You have three servers located in a DMZ, using private IP ad...
Question 280: John is the Security Administrator in his company. He instal...
Question 281: You run cpconfig to reset SIC on the Security Gateway. After...
Question 282: Select the TRUE statements about the Rule Base shown? Exhibi...
Question 283: What command with appropriate switches would you use to test...
Question 284: Which of the following options is available with the GAiA cp...
Question 285: You are working with three other Security Administrators. Wh...
Question 286: Which answers are TRUE? Automatic Static NAT CANNOT be used ...
Question 287: Which command gives an overview of your installed licenses?...
Question 288: A Security Policy has several database versions. What config...
Question 289: The Tokyo Security Management Server Administrator cannot co...
Question 290: Which Client Authentication sign-on method requires the user...
Question 291: Which feature or command provides the easiest path for Secur...
Question 292: When restoring R77 using the command upgrade_import, which o...
Question 293: You find that Users are not prompted for authentication when...
Question 294: The Identity Agent is a lightweight endpoint agent that auth...
Question 295: You want to establish a VPN, using certificates. Your VPN wi...
Question 296: Which item below in a Security Policy would be enforced firs...
Question 297: Which of the following tools is used to generate a Security ...
Question 298: For which service is it NOT possible to configure user authe...
Question 299: Before upgrading SecurePlatform to GAiA, you should create a...
Question 300: How many packets are required for IKE Phase 2?...
Question 301: Which of the following items should be configured for the Se...
Question 302: What action can be performed from SmartUpdate R77?...
Question 303: For remote user authentication, which authentication scheme ...
Question 304: Which statement is TRUE about implicit rules?...
Question 305: As a Security Administrator, you must refresh the Client Aut...
Question 306: When configuring the Check Point Gateway network interfaces,...
Question 307: What action CANNOT be run from SmartUpdate R77?...
Question 308: John Adams is an HR partner in the ACME organization. ACME I...
Question 309: You have created a Rule Base for firewall, websydney. Now yo...
Question 310: Which rule is responsible for the client authentication fail...
Question 311: You enable Automatic Static NAT on an internal host node obj...
Question 312: Review the rules. (Exhibit) Assume domain UDP is enabled in ...
Question 313: Your bank's distributed R77 installation has Security Gatewa...
Question 314: Your boss wants you to closely monitor an employee suspected...
Question 315: If you are experiencing LDAP issues, which of the following ...
Question 316: Your perimeter Security Gateway's external IP is 200.200.200...
Question 317: All R77 Security Servers can perform authentication with the...
Question 318: How can you check whether IP forwarding is enabled on an IP ...
Question 319: How do you configure the Security Policy to provide user acc...
Question 320: Which answer below best describes the Administrator Auditing...
Question 321: Where do you verify that UserDirectory is enabled?...
Question 322: You are the Security Administrator for MegaCorp and would li...
Question 323: Tom has been tasked to install Check Point R77 in a distribu...
Question 324: You want to reset SIC between smberlin and sgosaka. (Exhibit...
Question 325: Which authentication type requires specifying a contact agen...
Question 326: What is the purpose of an Identity Agent?...
Question 327: What happens if the identity of a user is known?...
Question 328: Which of the following methods is NOT used by Identity Aware...
Question 329: What type of traffic can be re-directed to the Captive Porta...
Question 330: What must a Security Administrator do to comply with a manag...
Question 331: NAT can NOT be configured on which of the following objects?...
Question 332: Which of the following is a viable consideration when determ...
Question 333: You have a mesh VPN Community configured to create a site-to...
Question 334: Which of the following is a CLI command for Security Gateway...
Question 335: Which of the following are available SmartConsole clients wh...
Question 336: What physical machine must have access to the User Center pu...
Question 337: Which of the following is a viable consideration when determ...
Question 338: You are responsible for the configuration of MegaCorp's Chec...
Question 339: Which of the following authentication methods can be configu...
Question 340: Jack has been asked do enable Identify Awareness. What are t...
Question 341: Which NAT option is available for Manual NAT as well as Auto...
Question 342: The SIC certificate is stored in the directory _____________...
Question 343: Peter is your new Security Administrator. On his first worki...
Question 344: The fw monitor utility is used to troubleshoot which of the ...
Question 345: Which of the following can be found in cpinfo from an enforc...
Question 346: You are installing a Security Management Server. Your securi...
Question 347: You are running a R77 Security Gateway on GAiA. In case of a...
Question 348: The User Directory Software Blade is used to integrate which...
Question 349: Which Check Point address translation method is necessary if...
Question 350: You are about to test some rule and object changes suggested...
Question 351: Which of the following firewall modes DOES NOT allow for Ide...
Question 352: Match the terms with their definitions: Exhibit: (Exhibit)...
Question 353: Jennifer McHanry is CEO of ACME. She recently bought her own...
Question 354: Which of the following commands can be used to remove site-t...
Question 355: A Web server behind the Security Gateway is set to Automatic...
Question 356: Central license management allows a Security Administrator t...
Question 357: Which tool CANNOT be launched from SmartUpdate R77?...
Question 358: How can you activate the SNMP daemon on a Check Point Securi...
Question 359: Which directory holds the SmartLog index files by default?...
Question 360: Message digests use which of the following?...
Question 361: When using vpn tu, which option must you choose if you only ...
Question 362: When using GAiA, it might be necessary to temporarily change...
Question 363: Secure Internal Communications (SIC) is completely NAT-toler...
Question 364: You review this Security Policy because Rule 4 is inhibited....
Question 365: You are a Security Administrator using one Security Manageme...