156-215.70 Check Point Certified Security Administrator Exam Set 9

What is the Security Administrator do to comply with the requirement to recognize all the management traffic is accepted through the perimeter security gateway?


Options are :

  • Global Properties> Reporting Tools box Enable monitoring of all rules (including rules on any column labeled Track). To send these logs to the secondary server log for a complete history of logging. Use a standard Syslog server logging standard troubleshooting. (Correct)
  • Check the Log implicit rules worldwide box R70 Gateway object.
  • To specify two log servers Gateway R70 object. Please Log implicit rules in the first log server. Please Log rule base in the second syslog server. Use the Smart Reporter combine these two log server records in the same database HIPPA log checks.
  • Install View implicit rules package Smart Update.
  • None

Answer : Global Properties> Reporting Tools box Enable monitoring of all rules (including rules on any column labeled Track). To send these logs to the secondary server log for a complete history of logging. Use a standard Syslog server logging standard troubleshooting.

The customer has created a new Gateway object that is managed from a remote location. When you attempt to install a new Gateway Security, the goal is not visible install the box. What should you look for?


Options are :

  • Ports object is created by using the Check Point> Security Gateway option for network objects, a dialog box, but still determines the object interfaces for the security gateway.
  • Ports object is created by using the Check Point> Outsourced VPN gateway option from the Network Objects dialog box. (Correct)
  • Secure Internal Communications (SIC) not specified object.
  • None
  • Anti-spoofing been configured interfaces Gateway object.

Answer : Ports object is created by using the Check Point> Outsourced VPN gateway option from the Network Objects dialog box.

Every SmartView Tracker choice would be most effectively show who installed the security policy to block all traffic to the corporate network?


Options are :

  • Network and Endpoint tab
  • Custom filter
  • None
  • active tab
  • management tab (Correct)

Answer : management tab

Every SmartView Tracker to read your SMTP email body is sent to Chief Executive Officer (CEO) of the company?


Options are :

  • Screen Capture Action
  • Display Load View
  • None
  • Network and Endpoint Tab
  • This is not the SmartView Tracker feature (Correct)

Answer : This is not the SmartView Tracker feature

Check Point Certified Security Expert Exam Set 11

What are the specific R70 GUI you use to add an address translation rule?


Options are :

  • None
  • SmartDashboard (Correct)
  • Smart Console
  • SmartView Monitor
  • SmartNet

Answer : SmartDashboard

You are one of the Security Administrator Security Management Server manages three different firewalls. One of the firewalls does not appear in the dialog box when you try to install security policy. Which of the following is a possible cause?


Options are :

  • The firewall does not synchronize your Security Management Server for 60 minutes
  • The license for this particular firewall is obsolete.
  • None
  • Firewall object is created, but the SIC has not yet been confirmed.
  • A firewall is not listed in the Policy Installation screen targets of this policy package (Correct)

Answer : A firewall is not listed in the Policy Installation screen targets of this policy package

How to view the operation of the Smart Security Administrator Console?


Options are :

  • SmartView Activity Monitor using a filter Administrator
  • None
  • Eventia Suite
  • SmartView Tracker Management tab, (Correct)
  • SmartView Tracker Network and endpoint tabs

Answer : SmartView Tracker Management tab,

You are about to test some of the proposed rule and object change when using R70 newsgroup. Every backup solution should be used to ensure the easiest to restore your security policy to its previous configuration after testing the changes?


Options are :

  • None
  • Manual copies FWDIR $ / conf
  • Secure Platform Backup Tools
  • Database version control system (Correct)
  • upgrade_export command

Answer : Database version control system

You have three servers located in the DMZ using private IP addresses. You want internal users to use 10.10.10.x DMZ servers public IP addresses. Internal_net 10.10.10.x is set to hide behind your gateway NAT Security s external interface. What is the best configuration 10.10.10.x users can use the DMZ servers that use the DMZ Servers public IP addresses?


Options are :

  • None
  • When the source is an internal network 10.10.10.x, set the manual static NAT rules translate the DMZ servers. (Correct)
  • When trying to access the DMZ servers, set the Hide NAT 10.10.10.x behind the DMZ interface
  • When connecting to the internal network 10.10.10.x, set the Hide NAT DMZ network behind the DMZ interface of the security gateway.
  • When you connect to the Internet, specify the manual Static NAT rules translate the DMZ servers.

Answer : When the source is an internal network 10.10.10.x, set the manual static NAT rules translate the DMZ servers.

The transport uses its own application to update the distribution of maritime database. The custom application includes a service used only to notify the remote sites, the distribution database is malfunctioning. Perimeter Security, your gateway s rule base includes a rule to accept this traffic. Since you are responsible for a number of sites to be notified by a text message to mobile phone when traffic is approved to this rule. Which of the following would work best for your purpose?


Options are :

  • None
  • SNMP
  • SmartView Monitor Threshold
  • By signing an implied rules
  • User-defined alert condition script (Correct)

Answer : User-defined alert condition script

156-315.77 Check Point Certified Security Expert Exam Set 2

Secure Internal Communications (SIC) is fully NAT-tolerant, because it is based on:


Options are :

  • None
  • SIC is not NAT-tolerant
  • IP addresses.
  • SIC names. (Correct)
  • MAC addresses

Answer : SIC names.

In a NAT hide the outgoing connection, which is part of the package is changed?


Options are :

  • Destination IP address and destination port
  • Destination IP address and destination port
  • Source IP address and source port (Correct)
  • Source IP address and destination port
  • None

Answer : Source IP address and source port

SmartView Tracker records the next Security Administrator pl:


Options are :

  • None
  • Object creation, deletion, and editing
  • rule Base changes
  • SLA Compliance Monitoring (Correct)
  • Administrator check-in and check-out

Answer : SLA Compliance Monitoring

Security Check Unit has stated that unpatched Web application server have access to the SQL server. Do you believe that you have the correct IPS by setting but would like to check this using SmartView Tracker. Which of the following words confirm that this information is blocked attacks?


Options are :

  • None
  • "Fingerprint Scrambling: Changed [SQL], and [Perl]"
  • "Concealed HTTP response [SQL Server]. (Error code WSE0160003)" (Correct)
  • "HTTP response-scam: remove the signature [SQL Server]"
  • "ASCII only answer Title observed: SQL"

Answer : "Concealed HTTP response [SQL Server]. (Error code WSE0160003)"

Which of the following is NOT a valid choice for monitoring and control of packets R70?


Options are :

  • Session Auth
  • None
  • Reject
  • Accept
  • keep (Correct)

Answer : keep

Where the system administrator defines the notification for further measures by a firewall in the case of free disk space falls below 15%?


Options are :

  • SmartView Tracker> Audit tab> Gateway Counters
  • SmartView Monitor> Gateway Status> threshold settings (Correct)
  • None
  • This can be monitored by a user-defined script.
  • Real-time> Gateway Settings> Status Monitor

Answer : SmartView Monitor> Gateway Status> threshold settings

156-315.77 Check Point Certified Security Expert Exam Set 7

Where are the custom queries saved R70 SmartView Tracker?


Options are :

  • From the Security Management Server GUI tied to the client's IP.
  • From the Security Management Server tied to the root of the database login name (Correct)
  • None
  • It's SmartView Tracker PC over the local file system user data.
  • It's SmartView Tracker PC local file system shared by all users of that local PC.

Answer : From the Security Management Server tied to the root of the database login name

Security Administrator reviewing activities of the bank and comparing it to the change log. What do you think about Security Administrator action?


Options are :

  • SmartView Tracker Network and endpoint status
  • None
  • SmartView Tracker Management mode (Correct)
  • SmartView Tracker in active mode
  • SmartView Tracker can show Security Administrator activities; but look at the system logs Security Management Server operating system.

Answer : SmartView Tracker Management mode

Hide the NAT rule is created that includes a source address of a group of ten (10) nets, and three (3) a second group of objects (containing 4, 5, and 6, the host objects, respectively). Assuming that all addresses non-repetitive, how many effective rules you have created?


Options are :

  • 13
  • 2
  • None
  • 1
  • 25 (Correct)

Answer : 25

You have created a firewall rule base, websydney. Now you are going to create a new policy package safety and address translation rules of the second Gateway. What is true of the new package s NAT rules?


Options are :

  • Rules 1 and 5 will be displayed in a new package.
  • NAT rules are empty in a new package.
  • None
  • Rules 2, 3 and 4, the new package will appear. (Correct)
  • Rules 1, 3, 4 and 5 will appear in a new package.

Answer : Rules 2, 3 and 4, the new package will appear.

You can export SmartMap the type of file (s)?


Options are :

  • SmartMap can not be exported R60 through R70
  • Microsoft Visio, and GIF
  • Microsoft Visio, bitmap or JPEG (Correct)
  • None
  • Adobe Photoshop, and JPEG

Answer : Microsoft Visio, bitmap or JPEG

Static NAT connections by default, which translates checkpoint firewall kernel?


Options are :

  • Post-abroad
  • Eitherbound
  • Outgoing
  • None
  • Incoming (Correct)

Answer : Incoming

Check Point Certified Security Expert Exam Set 3

When you add a rule the resource object, which takes place the following?


Options are :

  • For users who try to connect to the destination of the rule is needed to authenticate.
  • None
  • All packages corresponding to this rule are either hidden or unloaded from the specified resource.
  • All packets correspond to a resource service is analyzed through the application layer proxy (Correct)
  • All packets that match dropped into a resource

Answer : All packets correspond to a resource service is analyzed through the application layer proxy

What Smart Console tool would you use to see the last policy pushed the audit log?


Options are :

  • Nothing, Smart Console applications just to communicate Security Management Server.
  • SmartView Server
  • SmartView Tracker (Correct)
  • SmartView status
  • None

Answer : SmartView Tracker

You MegaCorp Security Administrator. There are a variety of network objects that has been eliminated is. Some of them use the Automatic Hide NAT method, while others use an automatic static NAT method. What is the order of the rules, if both methods are used together? Give the best answer.


Options are :

  • The system administrator decides order of the rules by moving the corresponding rules up and down
  • None
  • of the Statute depends on when they were created. The rules made is first placed to the top; types of rules subsequently placed in a row under others.
  • Hide NAT rules take precedence Static NAT rules and NAT node is a priority NAT or network addresses.
  • Static NAT rules are rules and Hide NAT NAT node is a priority NAT or network addresses priority. (Correct)

Answer : Static NAT rules are rules and Hide NAT NAT node is a priority NAT or network addresses priority.

Which of the following R70 SmartView Tracker views show a popup warning the performance impact of security gateway?


Options are :

  • account of the survey
  • None
  • Active Tab (Correct)
  • All Records Query
  • Audit Tab

Answer : Active Tab

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions