<< Prev Question Next Question >>

Question 114/184

In SmartConsole, objects are used to represent physical and virtual network components and also some logical components. These objects are divided into several categories. Which of the following is NOT an objects category?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (184q)
Question 1: How many users can have read/write access in Gaia Operating ...
Question 2: Which option, when applied to a rule, allows traffic to VPN ...
Question 3: What is NOT an advantage of Stateful Inspection?...
Question 4: An administrator is creating an IPsec site-to-site VPN betwe...
Question 5: Which default Gaia user has full read/write access?...
Question 6: Examine the sample Rule Base. (Exhibit) What will be the res...
Question 7: What are two basic rules Check Point recommending for buildi...
Question 8: Fill in the blank: In Security Gateways R75 and above, SIC u...
Question 9: What is the default shell for the command line interface?...
Question 10: Which SmartConsole application shows correlated logs and agg...
Question 11: Which back up method uses the command line to create an imag...
Question 12: You have created a rule at the top of your Rule Base to perm...
Question 13: Fill in the blank: Browser-based Authentication sends users ...
Question 14: Application Control/URL filtering database library is known ...
Question 15: When should you generate new licenses?...
Question 16: What is the most complete definition of the difference betwe...
Question 17: Which two of these Check Point Protocols are used by ?...
Question 18: What is the difference between SSL VPN and IPSec VPN?...
Question 19: Due to high CPU workload on the Security Gateway, the securi...
Question 20: A SAM rule Is implemented to provide what function or benefi...
Question 21: What are the steps to configure the HTTPS Inspection Policy?...
Question 22: In the Check Point Security Management Architecture, which c...
Question 23: What are the software components used by Autonomous Threat P...
Question 24: Fill in the blank: With the User Directory Software Blade, y...
Question 25: What is the purpose of the Stealth Rule?...
Question 26: Which deployment adds a Security Gateway to an existing envi...
Question 27: Of all the Check Point components in your network, which one...
Question 28: The Online Activation method is available for Check Point ma...
Question 29: You had setup the VPN Community NPN-Stores' with 3 gateways....
Question 30: Choose what BEST describes a Session...
Question 31: Which SmartConsole tab shows logs and detects security threa...
Question 32: At what point is the Internal Certificate Authority (ICA) cr...
Question 33: Fill in the blank: SmartConsole, SmartEvent GUI client, and ...
Question 34: Secure Internal Communication (SIC) is handled by what proce...
Question 35: Which of the following is NOT a method used by Identity Awar...
Question 36: True or False: More than one administrator can log into the ...
Question 37: Which statement describes what Identity Sharing is in Identi...
Question 38: Which of the following is NOT an authentication scheme used ...
Question 39: Which one of the following is a way that the objects can be ...
Question 40: Which option will match a connection regardless of its assoc...
Question 41: Fill in the blank Once a license is activated, a___________s...
Question 42: If the Active Security Management Server fails or if it beco...
Question 43: When should you generate new licenses?...
Question 44: What is the main difference between Static NAT and Hide NAT?...
Question 45: Identify the ports to which the Client Authentication daemon...
Question 46: What is the user ID of a user that have all the privileges o...
Question 47: Where can alerts be viewed?
Question 48: Which of the following is used to initially create trust bet...
Question 49: You have successfully backed up your Check Point configurati...
Question 50: Security Zones do no work with what type of defined rule?...
Question 51: Which one of these features is NOT associated with the Check...
Question 52: The purpose of the Communication Initialization process is t...
Question 53: Fill in the blank: An Endpoint identity agent uses a _______...
Question 54: Which Threat Prevention Software Blade provides comprehensiv...
Question 55: Security Gateway software blades must be attached to what?...
Question 56: Which of the following is NOT a component of Check Point Cap...
Question 57: Which type of Check Point license ties the package license t...
Question 58: What command from the CLI would be used to view current lice...
Question 59: If there is an Accept Implied Policy set to "First", what is...
Question 60: Fill in the blank: Once a certificate is revoked from the Se...
Question 61: What protocol is specifically used for clustered environment...
Question 62: Which one of the following is TRUE?...
Question 63: After trust has been established between the Check Point com...
Question 64: Identity Awareness allows the Security Administrator to conf...
Question 65: Which of the following is a new R80.10 Gateway feature that ...
Question 66: When configuring LDAP User Directory integration, Changes ap...
Question 67: Which of the following is NOT a valid configuration screen o...
Question 68: An administrator wishes to use Application objects in a rule...
Question 69: Which type of attack can a firewall NOT prevent?...
Question 70: Which information is included in the "Extended Log" tracking...
Question 71: Which of the following commands is used to monitor cluster m...
Question 72: Gaia has two default user accounts that cannot be deleted. W...
Question 73: Which of the completed statements is NOT true? The WebUI can...
Question 74: Which of the following methods can be used to update the tru...
Question 75: In which scenario is it a valid option to transfer a license...
Question 76: What two ordered layers make up the Access Control Policy La...
Question 77: Session unique identifiers are passed to the web api using w...
Question 78: The competition between stateful inspection and proxies was ...
Question 79: What key is used to save the current CPView page in a filena...
Question 80: What does it mean if Deyra sees the gateway status: (Exhibit...
Question 81: The default shell of the Gaia CLI is cli.sh. How do you chan...
Question 82: What is the default shell of Gaia CLI?...
Question 83: Fill in the blanks: A Check Point software license consists ...
Question 84: When a gateway requires user information for authentication,...
Question 85: What needs to be configured if the NAT property 'Translate d...
Question 86: Which single Security Blade can be turned on to block both m...
Question 87: In what way is Secure Network Distributor (SND) a relevant f...
Question 88: Which of the following is an identity acquisition method tha...
Question 89: With URL Filtering, what portion of the traffic is sent to t...
Question 90: Fill in the blank: ____________ is the Gaia command that tur...
Question 91: Name the authentication method that requires token authentic...
Question 92: What are the Threat Prevention software components available...
Question 93: To provide updated malicious data signatures to all Threat P...
Question 94: Fill in the blanks: There are ________ types of software con...
Question 95: Fill in the blanks: In _____ NAT, Only the ________ is trans...
Question 96: Name the utility that is used to block activities that appea...
Question 97: Which Check Point software blade provides Application Securi...
Question 98: Which statement is TRUE of anti-spoofing?...
Question 99: Which is a main component of the Check Point security manage...
Question 100: In a Distributed deployment, the Security Gateway and the Se...
Question 101: Which of the following Windows Security Events will NOT map ...
Question 102: Which application is used for the central management and dep...
Question 103: Which of the following is NOT a tracking log option in R80.x...
Question 104: A network administrator has informed you that they have iden...
Question 105: SmartEvent does NOT use which of the following procedures to...
Question 106: How many layers make up the TCP/IP model?...
Question 107: Which of the following is used to extract state related info...
Question 108: Check Point licenses come in two forms. What are those forms...
Question 109: Which key is created during Phase 2 of a site-to-site VPN?...
Question 110: What is the purpose of a Clean-up Rule?...
Question 111: Which of the following licenses are considered temporary?...
Question 112: CPU-level of your Security gateway is peaking to 100% causin...
Question 113: Which one of the following is the preferred licensing model?...
Question 114: In SmartConsole, objects are used to represent physical and ...
Question 115: Which Threat Prevention Profile is not included by default i...
Question 116: Which Identity Source(s) should be selected in Identity Awar...
Question 117: Which of the following commands is used to monitor cluster m...
Question 118: The CDT utility supports which of the following?...
Question 119: When you upload a package or license to the appropriate repo...
Question 120: The Network Operations Center administrator needs access to ...
Question 121: What is a reason for manual creation of a NAT rule?...
Question 122: Which of these is NOT a feature or benefit of Application Co...
Question 123: If there are two administrators logged in at the same time t...
Question 124: The SIC Status "Unknown" means
Question 125: What is the most recommended installation method for Check P...
Question 126: When using Automatic Hide NAT, what is enabled by default?...
Question 127: Which of the following is NOT supported by Bridge Mode on th...
Question 128: John is using Management HA. Which Smartcenter should be con...
Question 129: Name the pre-defined Roles included in Gaia OS....
Question 130: Which two Identity Awareness daemons are used to support ide...
Question 131: What kind of NAT enables Source Port Address Translation by ...
Question 132: What is the purpose of a Stealth Rule?...
Question 133: Fill in the blank When LDAP is integrated with Check Point S...
Question 134: To enforce the Security Policy correctly, a Security Gateway...
Question 135: What are the three deployment considerations for a secure ne...
Question 136: Fill in the blank: By default, the SIC certificates issued b...
Question 137: Choose what BEST describes the reason why querying logs now ...
Question 138: Customer's R80 management server needs to be upgraded to R80...
Question 139: URL Filtering cannot be used to:...
Question 140: Tom has connected to the Management Server remotely using Sm...
Question 141: Which Check Point software blade prevents malicious files fr...
Question 142: What are the three types of UserCheck messages?...
Question 143: What are the advantages of a "shared policy" in R80?...
Question 144: What command would show the API server status?...
Question 145: Which SmartConsole tab is used to monitor network and securi...
Question 146: URL Filtering employs a technology, which educates users on ...
Question 147: Using R80 Smart Console, what does a "pencil icon" in a rule...
Question 148: What is the purpose of Captive Portal?...
Question 149: Which backup utility captures the most information and tends...
Question 150: Which encryption algorithm is the least secured?...
Question 151: What technologies are used to deny or permit network traffic...
Question 152: What are the three main components of Check Point security m...
Question 153: When comparing Stateful Inspection and Packet Filtering, wha...
Question 154: Which type of Check Point license is tied to the IP address ...
Question 155: What are valid authentication methods for mutual authenticat...
Question 156: Fill in the blanks: Default port numbers for an LDAP server ...
Question 157: What is the RFC number that act as a best practice guide for...
Question 158: In SmartEvent, a correlation unit (CU) is used to do what?...
Question 159: Fill in the blank: To create policy for traffic to or from a...
Question 160: Please choose correct command syntax to add an "emailserver1...
Question 161: Which of the following is a valid deployment option?...
Question 162: What is UserCheck?
Question 163: Which command shows the installed licenses?...
Question 164: When configuring LDAP with User Directory integration, chang...
Question 165: A layer can support different combinations of blades What ar...
Question 166: Fill in the blank: Authentication rules are defined for ____...
Question 167: Fill in the blank: The _____ feature allows administrators t...
Question 168: Is it possible to have more than one administrator connected...
Question 169: Which of the following is NOT an identity source used for Id...
Question 170: A stateful inspection firewall works by registering connecti...
Question 171: Where is the "Hit Count" feature enabled or disabled in Smar...
Question 172: Both major kinds of NAT support Hide and Static NAT. However...
Question 173: Which of the following are types of VPN communities?...
Question 174: Access roles allow the firewall administrator to configure n...
Question 175: Fill in the blank: When a policy package is installed, _____...
Question 176: Fill in the blank RADIUS Accounting gets_____data from reque...
Question 177: Which of the following is the most secure means of authentic...
Question 178: In order to modify Security Policies, the administrator can ...
Question 179: Which Check Point Software Wade provides visibility of users...
Question 180: Choose what BEST describes the reason why querying logs now ...
Question 181: What is the order of NAT priorities?...
Question 182: When an encrypted packet is decrypted, where does this happe...
Question 183: Fill in the blank: When LDAP is integrated with Check Point ...
Question 184: When a SAM rule is required on Security Gateway to quickly b...