<< Prev Question Next Question >>

Question 67/240

You want to define a selected administrator's permission to edit a layer. However, when you click the + sign in the "Select additional profile that will be able edit this layer" you do not see anything. What is the most likely cause of this problem? Select the BEST answer.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (240q)
Question 1: Anti-Spoofing is typically set up on which object type?...
Question 2: Which limitation of CoreXL is overcome by using (mitigated b...
Question 3: Fill in the blank: Licenses can be added to the License and ...
Question 4: The WebUI offers three methods for downloading Hotfixes via ...
Question 5: You are about to test some rule and object changes suggested...
Question 6: Which type of Endpoint Identity Agent includes packet taggin...
Question 7: If there is an Accept Implied Policy set to "First", what is...
Question 8: Which one of the following is true about Threat Extraction?...
Question 9: What protocol is specifically used for clustered environment...
Question 10: What are the three conflict resolution rules in the Threat P...
Question 11: What does the "unknown" SIC status shown on SmartConsole mea...
Question 12: Why would an administrator see the message below? (Exhibit)...
Question 13: Packages and licenses are loaded from all of these sources E...
Question 14: Look at the following screenshot and select the BEST answer....
Question 15: Office mode means that:
Question 16: Which of the following is NOT an advantage to using multiple...
Question 17: Under which file is the proxy arp configuration stored?...
Question 18: You are using SmartView Tracker to troubleshoot NAT entries....
Question 19: Which of the following is NOT an element of VPN Simplified M...
Question 20: What port is used for communication to the User Center with ...
Question 21: With which command can you view the running configuration of...
Question 22: There are two R77.30 Security Gateways in the Firewall Clust...
Question 23: Check Point APIs allow system engineers and developers to ma...
Question 24: What needs to be configured if the NAT property 'Translate d...
Question 25: Your boss wants you to closely monitor an employee suspected...
Question 26: Which of the following statements accurately describes the c...
Question 27: Which of these statements describes the Check Point ThreatCl...
Question 28: John Adams is an HR partner in the ACME organization. ACME I...
Question 29: What is the potential downside or drawback to choosing the S...
Question 30: Fill in the blanks: A High Availability deployment is referr...
Question 31: Which command is used to obtain the configuration lock in Ga...
Question 32: SandBlast has several functional components that work togeth...
Question 33: What are types of Check Point APIs available currently as pa...
Question 34: Packet acceleration (SecureXL) identifies connections by sev...
Question 35: When using GAiA, it might be necessary to temporarily change...
Question 36: Sticky Decision Function (SDF) is required to prevent which ...
Question 37: Which tool CANNOT be launched from SmartUpdate R77?...
Question 38: Choose what BEST describes users on Gaia Platform....
Question 39: If the first packet of an UDP session is rejected by a secur...
Question 40: Which of the following is NOT an authentication scheme used ...
Question 41: Choose what BEST describes a Session....
Question 42: Which two of these Check Point Protocols are used by _____ ?...
Question 43: In SmartEvent, what are the different types of automatic rea...
Question 44: What are the three tabs available in SmartView Tracker?...
Question 45: Which command shows the installed licenses?...
Question 46: You have just installed your Gateway and want to analyze the...
Question 47: Fill in the blank: A _______ is used by a VPN gateway to sen...
Question 48: What action can be performed from SmartUpdate R77?...
Question 49: Which is the correct order of a log flow processed by SmartE...
Question 50: Which policy type is used to enforce bandwidth and traffic c...
Question 51: Fill in the blank: The _________ software blade enables Appl...
Question 52: Sally has a Hot Fix Accumulator (HFA) she wants to install o...
Question 53: Which of these attributes would be critical for a site-to-si...
Question 54: You are the Security Administrator for MegaCorp. In order to...
Question 55: Where can administrator edit a list of trusted SmartConsole ...
Question 56: During the Check Point Stateful Inspection Process, for pack...
Question 57: Provide very wide coverage for all products and protocols, w...
Question 58: What statement is true regarding Visitor Mode?...
Question 59: Fill in the blank: A(n) _____ rule is created by an administ...
Question 60: When doing a Stand-Alone Installation, you would install the...
Question 61: What is the default method for destination NAT?...
Question 62: Review the rules. Assume domain UDP is enabled in the implie...
Question 63: The fw monitorutility is used to troubleshoot which of the f...
Question 64: You installed Security Management Server on a computer using...
Question 65: Fill in the blank: The _________ collects logs and sends the...
Question 66: Fill in the blank: RADIUS protocol uses ______ to communicat...
Question 67: You want to define a selected administrator's permission to ...
Question 68: Which of the following is NOT a tracking option? (Select thr...
Question 69: Which of the following is a hash algorithm?...
Question 70: When logging in for the first time to a Security management ...
Question 71: What Identity Agent allows packet tagging and computer authe...
Question 72: As you review this Security Policy, what changes could you m...
Question 73: Jack works for a managed service provider and he has been ta...
Question 74: Which one of the following is the preferred licensing model?...
Question 75: Fill in the blank: By default, the SIC certificates issued b...
Question 76: Fill in the blank: In Security Gateways R75 and above, SIC u...
Question 77: Harriet wants to protect sensitive information from intentio...
Question 78: What must a Security Administrator do to comply with a manag...
Question 79: Which of the following is NOT a valid option when configurin...
Question 80: Identify the API that is not supported by Check Point curren...
Question 81: Which Check Point software blade provides protection from ze...
Question 82: What is the Transport layer of the TCP/IP model responsible ...
Question 83: Joey is using the computer with IP address 192.168.20.13. He...
Question 84: John Adams is an HR partner in the ACME organization. ACME I...
Question 85: In order to modify Security Policies the administrator can u...
Question 86: When using LDAP as an authentication method for Identity Awa...
Question 87: What does it mean if Bob gets this result on an object searc...
Question 88: Which statement is NOT TRUE about Delta synchronization?...
Question 89: Of all the Check Point components in your network, which one...
Question 90: Tom has been tasked to install Check Point R80 in a distribu...
Question 91: Fill in the blank: The ________ feature allows administrator...
Question 92: Fill in the blank: The R80 SmartConsole, SmartEvent GUI clie...
Question 93: Which Check Point software blade provides visibility of user...
Question 94: AdminA and AdminB are both logged in on SmartConsole. What d...
Question 95: What happens if the identity of a user is known?...
Question 96: SmartEvent does NOT use which of the following procedures to...
Question 97: On the following picture an administrator configures Identit...
Question 98: Your bank's distributed R77 installation has Security Gatewa...
Question 99: Fill in the blanks: A security Policy is created in ________...
Question 100: When you upload a package or license to the appropriate repo...
Question 101: Where do we need to reset the SIC on a gateway object?...
Question 102: There are 4 ways to use the Management API for creating host...
Question 103: Which command can you use to enable or disable multi-queue p...
Question 104: In which VPN community is a satellite VPN gateway not allowe...
Question 105: What happens when you run the command: fw sam -J src [Source...
Question 106: Which NAT rules are prioritized first?...
Question 107: Look at the screenshot below. What CLISH command provides th...
Question 108: Which Check Point software blade prevents malicious files fr...
Question 109: In the R80 SmartConsole, on which tab are Permissions and Ad...
Question 110: Match the following commands to their correct function. Each...
Question 111: Which policy type has its own Exceptions section?...
Question 112: While in SmartView Tracker, Brady has noticed some very odd ...
Question 113: Kofi, the administrator of the ABC Corp network wishes to ch...
Question 114: Which rule is responsible for the user authentication failur...
Question 115: Fill in the blank: The IPS policy for pre-R80 gateways is in...
Question 116: In the Check Point Security Management Architecture, which c...
Question 117: Which message indicates IKE Phase 2 has completed successful...
Question 118: What is the command to see cluster status in cli expert mode...
Question 119: To optimize Rule Base efficiency the most hit rules should b...
Question 120: Which of the following commands is used to monitor cluster m...
Question 121: Tina is a new administrator who is currently reviewing the n...
Question 122: You want to establish a VPN, using certificates. Your VPN wi...
Question 123: Which of the following is TRUE regarding Gaia command line?...
Question 124: What CLI utility allows an administrator to capture traffic ...
Question 125: By default, which port does the WebUI listen on?...
Question 126: Can multiple administrators connect to a Security Management...
Question 127: Which of the following is NOT a back up method?...
Question 128: Can a Check Point gateway translate both source IP address a...
Question 129: Which of the following is NOT a set of Regulatory Requiremen...
Question 130: You are conducting a security audit. While reviewing configu...
Question 131: Fill in the blanks: The Application Layer Firewalls inspect ...
Question 132: Where would an administrator enable Implied Rules logging?...
Question 133: The IT Management team is interested in the new features of ...
Question 134: Which of the following is NOT a license activation method?...
Question 135: How do you configure an alert in SmartView Monitor?...
Question 136: After the initial installation the First Time Configuration ...
Question 137: To install a brand new Check Point Cluster, the MegaCorp IT ...
Question 138: How many users can have read/write access in Gaia at one tim...
Question 139: The Firewall kernel is replicated multiple times, therefore:...
Question 140: John is using Management HA. Which Smartcenter should be con...
Question 141: Which path below is available only when CoreXL is enabled?...
Question 142: Fill in the blank: The tool _______ generates a R80 Security...
Question 143: You are about to integrate RSA SecurID users into the Check ...
Question 144: What is the difference between SSL VPN and IPSec VPN?...
Question 145: How do you configure the Security Policy to provide uses acc...
Question 146: Which of the following is NOT an alert option?...
Question 147: Which authentication scheme requires a user to possess a tok...
Question 148: Which type of Check Point license is tied to the IP address ...
Question 149: Which of these components does NOT require a Security Gatewa...
Question 150: Fill in the blank: When tunnel test packets no longer invoke...
Question 151: On R80.10 when configuring Third-Party devices to read the l...
Question 152: What is the default shell of Gaia CLI?...
Question 153: When a packet arrives at the gateway, the gateway checks it ...
Question 154: The security Gateway is installed on GAiA R80 The default po...
Question 155: Which the following type of authentication on Mobile Access ...
Question 156: If there are two administrators logged in at the same time t...
Question 157: Message digests use which of the following?...
Question 158: Choose what BEST describes the Policy Layer Traffic Inspecti...
Question 159: What is the SOLR database for?
Question 160: R80 Security Management Server can be installed on which of ...
Question 161: Fill in the blank: Browser-based Authentication sends users ...
Question 162: At what point is the Internal Certificate Authority (ICA) cr...
Question 163: Customer's R80 management server needs to be upgraded to R80...
Question 164: When defining QoS global properties, which option below is n...
Question 165: Which of the following is TRUE about the Check Point Host ob...
Question 166: Which of the following uses the same key to decrypt as it do...
Question 167: Which of the following is NOT defined by an Access Role obje...
Question 168: Fill in the blank: To build an effective Security Policy, us...
Question 169: Fill in the blank: Service blades must be attached to a ____...
Question 170: Fill in the blanks: A Check Point software license consists ...
Question 171: Your manager requires you to setup a VPN to a new business p...
Question 172: What is the appropriate default Gaia Portal address?...
Question 173: The system administrator of a company is trying to find out ...
Question 174: Which of the following commands can be used to remove site-t...
Question 175: Which options are given on features, when editing a Role on ...
Question 176: MyCorp has the following NAT rules. You need to disable the ...
Question 177: What are the steps to configure the HTTPS Inspection Policy?...
Question 178: In what way are SSL VPN and IPSec VPN different?...
Question 179: When Identity Awareness is enabled, which identity source(s)...
Question 180: Which SmartConsole component can Administrators use to track...
Question 181: As a Security Administrator, you must refresh the Client Aut...
Question 182: Vanessa is expecting a very important Security Report. The D...
Question 183: Administrator Dave logs into R80 Management Server to review...
Question 184: Which feature in R77 permits blocking specific IP addresses ...
Question 185: Which information is included in the "Full Log" tracking opt...
Question 186: Fill in the blank: RADIUS Accounting gets ______ data from r...
Question 187: To ensure that VMAC mode is enabled, which CLI command you s...
Question 188: To fully enable Dynamic Dispatcher on a Security Gateway:...
Question 189: Bob and Joe both have Administrator Roles on their Gaia Plat...
Question 190: What is the default shell for the command line interface?...
Question 191: Fill in the blank: When LDAP is integrated with Check Point ...
Question 192: What component of R80 Management is used for indexing?...
Question 193: You want to reset SIC between smberlin and sgosaka. (Exhibit...
Question 194: How would you deploy TE250X Check Point appliance just for e...
Question 195: VPN gateways must authenticate to each other prior to exchan...
Question 196: Which set of objects have an Authentication tab?...
Question 197: What is the default time length that Hit Count Data is kept?...
Question 198: Choose the Best place to find a Security Management Server b...
Question 199: Which default user has full read/write access?...
Question 200: What is the best sync method in the ClusterXL deployment?...
Question 201: Fill in the blank: An LDAP server holds one or more ________...
Question 202: Which of the following is NOT a VPN routing option available...
Question 203: What port is used for delivering logs from the gateway to th...
Question 204: Study the Rule base and Client Authentication Action propert...
Question 205: Your company enforces a strict change control policy. Which ...
Question 206: Fill in the blank: In order to install a license, it must fi...
Question 207: Vanessa is a Firewall administrator. She wants to test a bac...
Question 208: Which component functions as the Internal Certificate Author...
Question 209: Choose the SmartLog property that is TRUE....
Question 210: Which directory holds the SmartLog index files by default?...
Question 211: The most important part of a site-to-site VPN deployment is ...
Question 212: What happens if the identity of a user is known?...
Question 213: Where does the security administrator activate Identity Awar...
Question 214: On the following graphic, you will find layers of policies. ...
Question 215: The technical-support department has a requirement to access...
Question 216: Which command can you use to verify the number of active con...
Question 217: In SmartView Tracker, which rule shows when a packet is drop...
Question 218: You are going to upgrade from R77 to R80. Before the upgrade...
Question 219: You believe Phase 2 negotiations are failing while you are a...
Question 220: Administrator wishes to update IPS from SmartConsole by clic...
Question 221: A client has created a new Gateway object that will be manag...
Question 222: Which pre-defined Permission Profile should be assigned to a...
Question 223: NAT can NOT be configured on which of the following objects?...
Question 224: Mesh and Star are two types of VPN topologies. Which stateme...
Question 225: The Captive Portal tool:
Question 226: The organization's security manager wishes to back up just t...
Question 227: What is the difference between an event and a log?...
Question 228: Which of the following technologies extracts detailed inform...
Question 229: What is the purpose of Priority Delta in VRRP?...
Question 230: Which of the following licenses are considered temporary?...
Question 231: Fill in the blank: Once a license is activated, a ________ s...
Question 232: Fill in the blank: A new license should be generated and ins...
Question 233: Fill in the blanks: In the Network policy layer, the default...
Question 234: Which of the completed statements is NOT true? The WebUI can...
Question 235: Katie has been asked to do a backup on the Blue Security Gat...
Question 236: In Logging and Monitoring, the tracking options are Log, Det...
Question 237: Which remote Access Solution is clientless?...
Question 238: Using mgmt_cli, what is the correct syntax to import a host ...
Question 239: According to Check Point Best Practice, when adding a non-ma...
Question 240: Which option would allow you to make a backup copy of the OS...