Correct Answer: Partial AutomaticFully AutomaticSingle Sign on
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer: None
Correct Answer: Remove the unused rulesKeep the mostly used rules at the topCollate the rules
Correct Answer: SYN
Correct Answer: Global propertiesObjectsRule baseLicense
Correct Answer: It encrypts the entire packet
Which network will you add in the antispoofing settings when there are two networks(192.168.0.0/24,172.16.0.0/24) behind the VPN-1 gateway?
172.16.0.0/24 192.168.0.0/24 & 172.16.0.0/24 192.168.0.0/16 & 172.16.0.0/16 Answer Correct Answer: 192.168.0.0/16 & 172.16.0.0/16 Note: This Question is unanswered, help us to find answer for this one Check Answer
Correct Answer: 192.168.0.0/16 & 172.16.0.0/16
Correct Answer: 6
Correct Answer: SmartDashboard
Correct Answer: At the top
Which feature will you use to manage the different security policies for different gateways when you are managing more than one Enforcement modules from the SmartCenter?
Correct Answer: Policy Package Management
Jeremy has to create 3 site-to-site VPNs. NJ is the central site and the remote sites are Bangalore and Dubai. Bangalore and Dubai can communicate with each other.
Which VPN topologies should he use to achieve it?
Star topology for Banglore and Dubai VPN and Mesh for NJ VPN
Mesh topology for Banglore and Dubai VPN and Star for NJ VPN
Mesh topology for Banglore and Dubai VPN and Mesh for NJ VPN
Star topology for Banglore and Dubai VPN and Star for NJ VPN
Correct Answer: Mesh topology for Banglore and Dubai VPN and Star for NJ VPN
Correct Answer: EtherealTCPDUMP
Correct Answer: cpconfig
Correct Answer: after Phase 1
Correct Answer: upgrade_import
Correct Answer: fw stat
Correct Answer: 259
Correct Answer: backup --sched
Correct Answer: IPSO
Correct Answer: SmartView Tracker
Correct Answer: SmartView Monitor
Correct Answer: traceroute
Correct Answer: HTTPSFTP
Correct Answer: after Phase 2
Correct Answer: Static NAT
Correct Answer: 172.16.0.0/24
Correct Answer: Microsoft_AD
Correct Answer: Network Layer
Correct Answer: LAND
Correct Answer: Traditional mode
Correct Answer: alog
Correct Answer: 2
Correct Answer: VPN-ProSmartCenterEventia Reporter
Correct Answer: It correlates world wide traffic profiles to detect attacks
Correct Answer: 1
Correct Answer: fw monitor
Which SmartView application will you use when your manager asks you to generate a report containing the number of bytes transferred per IP address in your network during the last month?
SmartView Status
SmartView Tracker
SmartUpdate
SmartView Monitor
Eventia Reporter
Correct Answer: Eventia Reporter
Correct Answer: VPN-1SmartDefenceLDAPSmartView Monitor
Correct Answer: Logging is not enabled in rule number 10
Correct Answer: netstat -nr
Correct Answer: The 6-packet IKE Phase 1 is replaced by the 3-packet exchange
Correct Answer: vpn tu
Correct Answer: By selecting the option before pushing the policy
Correct Answer: UDP 4500
Correct Answer: 18181
Correct Answer: IPSO 4.0
Correct Answer: LEA
Correct Answer: 80
Correct Answer: UDP 500
Correct Answer: Manage->Servers and OPSEC applications->New->RADIUS
Correct Answer: Simplified Mode
Correct Answer: SmartUpdate
Correct Answer: VPN Tunnel Interface
Eric wants that a VPN rule should only be activated for a particular time.
How can that be done?
By specifying the time VPN object settings
By specifying the time in global settings
By specifying the time in VPN rule
Correct Answer: By specifying the time in VPN rule
Correct Answer: It is used for secure communication between a gateway and SmartCenter server
Correct Answer: rloginhttp
Correct Answer: Instantly
Correct Answer: Sysconfig
Correct Answer: Checkpoint Gateway-->Logs and Masters
Correct Answer: Active-ActiveActive-Passive
Correct Answer: fw ver
Correct Answer: FTPTCPCIFS
What rule will Mary create in the rule base to implement the authentication when she wants to implement client authentication for an Internet_User Group for HTTP service?
Source:Internet_Users@Any; Dest:Any ; Service:HTTP ; Action:Client Authentication
Source:Internet_Users@Any; Dest:Any ; Service:Telnet; Action:Client Authentication
Source:Internet_Users@Any; Dest:Any ; Service:HTTP ; Action:Session Authentication.
Source:Internet_Users@Any; Dest:Any ; Service:HTTP ; Action:User Authentication
Correct Answer: Source:Internet_Users@Any; Dest:Any ; Service:HTTP ; Action:Client Authentication
Correct Answer: Nessus
The HTTP access is opened to one new system in the network.
When will a rule become effective in such a situation?
While installing the policy
During cpstop
During cpstart
During cprestart
By saving the policy on SmartCenter server
Correct Answer: While installing the policy
Correct Answer: show ip mroute
Correct Answer: SecureClient
Correct Answer: In the middle
What sequence is followed in the Rule Base Enforcement in VPN-1?
1. Security policy BEFORE-LAST rule
2. Administrator-defined rule base
3. IP Spoofing/IP options
4. Cleanup rule
5. Security Policy FIRST rule
6. NAT
156324
632541
125463
125346
365214
Correct Answer: 365214
Correct Answer: cphaprob stat
Correct Answer: fw fetch
Correct Answer: Smart Update
Checkpoint Security MCQs | Topic-wise