1. Which SmartConsole application is used to manage the VPN-1 license?
2. Which command will Eric use to fetch a policy from the SmartCenter server when he is unable to access it?
3. Which command in Cluster is used to see the Active Member?
4. What sequence is followed in the Rule Base Enforcement in VPN-1? 1. Security policy BEFORE-LAST rule 2. Administrator-defined rule base 3. IP Spoofing/IP options 4. Cleanup rule 5. Security Policy FIRST rule 6. NAT
5. Where will you place the Cleanup Rule in the Rule Base?
6. Which application will Jenny use when she wants to apply security policies on the remote users while they connect their systems from home?
7. Which command is used to show the Multicast Routing table?
8. The HTTP access is opened to one new system in the network. When will a rule become effective in such a situation?
9. Which tool can be used for vulnerabilitie?
10. What rule will Mary create in the rule base to implement the authentication when she wants to implement client authentication for an Internet_User Group for HTTP service?
11. Which is Security servers?
12. Which command is used to check the VPN-1 version on Gateway?
13. Different modes in High-Availability (HA)?
14. Which is used to edit the Log file size switch settings?
15. Which SmartView application will Eric use when he wants to see the number of Remote user tunnels?
16. Which command is used to configure the SPLAT operating system?
17. How many log files can be opened at a time in the Smartview Tracker?
18. After how much time does the Firewall Module send the logs to the Log Server?
19. Which authenticated services can work with User-authentication?
20. What is the significance of SIC?
21. Which SmartView application will you use when you want to see the concurrent number of connections?
22. Eric wants that a VPN rule should only be activated for a particular time. How can that be done?
23. How many NAT entries are created for automatic host/network object NAT?
24. What is VTI?
25. Which SmartView application will you use when you want to view the OS details and the Installed Package details?
26. In which mode are the rules created automatically while configuring the VPN?
27. How will you create a RADIUS server for authentication in VPN-1?
28. Which port on Firewall should be opened for IPSec IKE?
29. At which port can you access the WUI of SPLAT?
30. Which OPSEC server will allow you to export the log files to the third party?
31. Which of the following OS is not supported by VPN-1 SecuRemote?
32. Which port CVP security server is used for communication?
33. Which port on Firewall should be opened for IPSec NAT-Traversal?
34. How can you create a new Database Revision Control version?
35. Which command is used to troubleshoot the VPN?
36. What happens when you check the option 'Use Aggressive Mode'?
37. Which command is used to check the routing information in SPLAT?
38. You want to see the logs for rule number 10. What could be the reason for not being able to see any logs in the SmartView Tracker?
39. Which Checkpoint components require/s license?
40.
Which SmartView application will you use when your manager asks you to generate a report containing the number of bytes transferred per IP address in your network during the last month?
41. Which command is used to inspect the translation tables?
42. How many administrators can be defined while installing the VPN-1 NGX?
43. What is the function of DShield Storm Center in Checkpoint Security?
44. Which Checkpoint applications are supported by SPLAT?
45. How many keys are there in PKI (Public Key Infrastructure)?
46. When you are generating Express reports in Eventia Reporter, where will you make queries for the data?
47. What is the extension of the audit log files?
48. Which VPN should be used when you want to allow only specific services to a SecuRemote user?
49. In which type of 'attack' does 'packet' have the same sources, IP and port as destination?
50. Which SmartConsole application will be used when you want to know how many packets are dropped per gateway?
51. Which layer does the IPSec work on?
52. Which is the default Smartdirectory (LDAP) profile for Microsoft AD?
53. Which network will Lea add in the VPN domain of ABC Gateway, when she has created a site-to-site VPN tunnel between ABC(172.16.0.0/24)and XYZ(10.1.0.0/24)?
54. Which type of NAT should Adrian use to publish the server when he wants to publish a Web Server so that the external clients may be able to access the application?
55. The Quick mode is completed __________.
56. Which SmartView application will you use when you want to see the number of connections per application?
57. Which protocols can be scanned by the Anti-Virus engine of VPN-1?
58. Which command is used to determine the route taken by a packet?
59. Which SmartConsole application will Adrian use when he wants to see the CPU utilization and the memory of different gateways being managed from a single SmartCenter server?
60. Which SmartConsole application will be used when you want to see which rule is dropping the traffic?
61. Which Checkpoint package is installed on the Nokia box?
62. Which command in SPALT is used to schedule the backup?
63. At which port will you telnet the gateway to use manual client authentication?
64. Which command is used to know the active policy on the enforcement module?
65. Which command is used to restore the VPN-1 configuration?
66. The Main mode is completed ___________.
67. Which command is used to add GUI clients?
68. Which tool can be used to monitor the Packets?
69.
Jeremy has to create 3 site-to-site VPNs. NJ is the central site and the remote sites are Bangalore and Dubai. Bangalore and Dubai can communicate with each other.
Which VPN topologies should he use to achieve it?
70. Which feature will you use to manage the different security policies for different gateways when you are managing more than one Enforcement modules from the SmartCenter?
71. Where will you place the Stealth rule in the Rule Base?
72. Which SmartConsole application will you use when you want to implement a new security policy for your network?
73. How many TCP flags are there in the Checkpoint Security?
74.
75. What happens during the Tunnel Mode?
76. Which is included while taking the backup of the VPN-1 configuration? (Select all suitable options)
77. __________ TCP flag can launch a DoS attack.
78. Which factor should be kept in mind to improve the performance of the Enforcement module? (Select all suitable options)
79. Which type of NAT will be used by Adrian during the creation of a VPN between two sites, 10.1.1.0/24 and 192.168.1.0/16?
80. Which sign on methods are possible in the Client Authentication in VPN-1?