1. Which sign on methods are possible in the Client Authentication in VPN-1?
2. Which type of NAT will be used by Adrian during the creation of a VPN between two sites, 10.1.1.0/24 and 192.168.1.0/16?
3. Which factor should be kept in mind to improve the performance of the Enforcement module? (Select all suitable options)
4. __________ TCP flag can launch a DoS attack.
5. Which is included while taking the backup of the VPN-1 configuration? (Select all suitable options)
6. What happens during the Tunnel Mode?
7.
8. How many TCP flags are there in the Checkpoint Security?
9. Which SmartConsole application will you use when you want to implement a new security policy for your network?
10. Where will you place the Stealth rule in the Rule Base?
11. Which feature will you use to manage the different security policies for different gateways when you are managing more than one Enforcement modules from the SmartCenter?
12.
Jeremy has to create 3 site-to-site VPNs. NJ is the central site and the remote sites are Bangalore and Dubai. Bangalore and Dubai can communicate with each other.
Which VPN topologies should he use to achieve it?
13. Which tool can be used to monitor the Packets?
14. Which command is used to add GUI clients?
15. The Main mode is completed ___________.
16. Which command is used to restore the VPN-1 configuration?
17. Which command is used to know the active policy on the enforcement module?
18. At which port will you telnet the gateway to use manual client authentication?
19. Which command in SPALT is used to schedule the backup?
20. Which Checkpoint package is installed on the Nokia box?
21. Which SmartConsole application will be used when you want to see which rule is dropping the traffic?
22. Which SmartConsole application will Adrian use when he wants to see the CPU utilization and the memory of different gateways being managed from a single SmartCenter server?
23. Which command is used to determine the route taken by a packet?
24. Which protocols can be scanned by the Anti-Virus engine of VPN-1?
25. Which SmartView application will you use when you want to see the number of connections per application?
26. The Quick mode is completed __________.
27. Which type of NAT should Adrian use to publish the server when he wants to publish a Web Server so that the external clients may be able to access the application?
28. Which network will Lea add in the VPN domain of ABC Gateway, when she has created a site-to-site VPN tunnel between ABC(172.16.0.0/24)and XYZ(10.1.0.0/24)?
29. Which is the default Smartdirectory (LDAP) profile for Microsoft AD?
30. Which layer does the IPSec work on?
31. Which SmartConsole application will be used when you want to know how many packets are dropped per gateway?
32. In which type of 'attack' does 'packet' have the same sources, IP and port as destination?
33. Which VPN should be used when you want to allow only specific services to a SecuRemote user?
34. What is the extension of the audit log files?
35. When you are generating Express reports in Eventia Reporter, where will you make queries for the data?
36. How many keys are there in PKI (Public Key Infrastructure)?
37. Which Checkpoint applications are supported by SPLAT?
38. What is the function of DShield Storm Center in Checkpoint Security?
39. How many administrators can be defined while installing the VPN-1 NGX?
40. Which command is used to inspect the translation tables?
41.
Which SmartView application will you use when your manager asks you to generate a report containing the number of bytes transferred per IP address in your network during the last month?
42. Which Checkpoint components require/s license?
43. You want to see the logs for rule number 10. What could be the reason for not being able to see any logs in the SmartView Tracker?
44. Which command is used to check the routing information in SPLAT?
45. What happens when you check the option 'Use Aggressive Mode'?
46. Which command is used to troubleshoot the VPN?
47. How can you create a new Database Revision Control version?
48. Which port on Firewall should be opened for IPSec NAT-Traversal?
49. Which port CVP security server is used for communication?
50. Which of the following OS is not supported by VPN-1 SecuRemote?
51. Which OPSEC server will allow you to export the log files to the third party?
52. At which port can you access the WUI of SPLAT?
53. Which port on Firewall should be opened for IPSec IKE?
54. How will you create a RADIUS server for authentication in VPN-1?
55. In which mode are the rules created automatically while configuring the VPN?
56. Which SmartView application will you use when you want to view the OS details and the Installed Package details?
57. What is VTI?
58. How many NAT entries are created for automatic host/network object NAT?
59. Eric wants that a VPN rule should only be activated for a particular time. How can that be done?
60. Which SmartView application will you use when you want to see the concurrent number of connections?
61. What is the significance of SIC?
62. Which authenticated services can work with User-authentication?
63. After how much time does the Firewall Module send the logs to the Log Server?
64. How many log files can be opened at a time in the Smartview Tracker?
65. Which command is used to configure the SPLAT operating system?
66. Which SmartView application will Eric use when he wants to see the number of Remote user tunnels?
67. Which is used to edit the Log file size switch settings?
68. Different modes in High-Availability (HA)?
69. Which command is used to check the VPN-1 version on Gateway?
70. Which is Security servers?
71. What rule will Mary create in the rule base to implement the authentication when she wants to implement client authentication for an Internet_User Group for HTTP service?
72. Which tool can be used for vulnerabilitie?
73. The HTTP access is opened to one new system in the network. When will a rule become effective in such a situation?
74. Which command is used to show the Multicast Routing table?
75. Which application will Jenny use when she wants to apply security policies on the remote users while they connect their systems from home?
76. Where will you place the Cleanup Rule in the Rule Base?
77. What sequence is followed in the Rule Base Enforcement in VPN-1? 1. Security policy BEFORE-LAST rule 2. Administrator-defined rule base 3. IP Spoofing/IP options 4. Cleanup rule 5. Security Policy FIRST rule 6. NAT
78. Which command in Cluster is used to see the Active Member?
79. Which command will Eric use to fetch a policy from the SmartCenter server when he is unable to access it?
80. Which SmartConsole application is used to manage the VPN-1 license?
Kernel Programming - Solaris
Mobile Web Authoring
Game Development
Unity3D
Meteor - JavaScript web framework
AppSheet
Related MCQ's