156-215.75 Check Point Certified Security Administrator Exam Set 5

Your company has two headquarters, one in London, one in New York. Each of the headquarters includes several branch offices. The branch offices only need to communicate with the headquarters in their country, not with each other, and the headquarters need to communicate directly. What is the BEST configuration for establishing VPN Communities among the branch offices and their headquarters, and between the two headquarters? VPN Communities comprised of:


Options are :

  • Three mesh Communities: one for London headquarters and its branches; one for New York headquarters and its branches; and one for London and New York headquarters.
  • One star Community with the option to mesh the center of the star: New York and London Gateways added to the center of the star with the "mesh center Gateways" option checked; all London branch offices defined in one satellite window; but, all New York branch offices defined in another satellite window.
  • Three star Communities: The first one is between New York headquarters and its branches. The second star Community is between London headquarters and its branches. The third star Community is between New York and London headquarters but it is irrelevant which site is "center" and which "satellite". (Correct)
  • Two mesh and one star Community: Each mesh Community is set up for each site between headquarters their branches. The star Community has New York as the center and London as its satellite.

Answer : Three star Communities: The first one is between New York headquarters and its branches. The second star Community is between London headquarters and its branches. The third star Community is between New York and London headquarters but it is irrelevant which site is "center" and which "satellite".

Which Security Servers can perform authentication tasks, but CANNOT perform content security tasks?


Options are :

  • RLOGIN (Correct)
  • FTP
  • RHV HTTPS
  • HTTP

Answer : RLOGIN

156-215.75 Check Point Certified Security Administrator Exam Set 6

You believe Phase 2 negotiations are failing while you are attempting to configure a site-tosite VPN with one of your firm's business partners. Which SmartConsole application should you use to confirm your suspicions?


Options are :

  • SmartView Tracker
  • SmartUpdate (Correct)
  • SmartView Status
  • SmartDashboard

Answer : SmartUpdate

Which Client Authentication sign-on method requires the user to first authenticate via the User Authentication mechanism when logging in to a remote server with Telnet?


Options are :

  • Agent Automatic Sign On
  • Partially Automatic Sign On (Correct)
  • Manual Sign On
  • Standard Sign On

Answer : Partially Automatic Sign On

When troubleshooting NAT entries in SmartView Tracker, which column do we need to check to view the new source IP when using NAT?


Options are :

  • XlateDst
  • XlateSPort
  • XlateSrc (Correct)
  • XlateDPort

Answer : XlateSrc

156-215.75 Check Point Certified Security Administrator Exam Set 7

URL filtering policy can make exceptions for specific sites by being enforced:


Options are :

  • For all traffic, except on specific sources and destinations. (Correct)
  • Only for specific sources and destinations.
  • For alt traffic, except blocked sites.
  • For all traffic. There are no exceptions.

Answer : For all traffic, except on specific sources and destinations.

Which component functions as the Internal Certificate Authority for R75?


Options are :

  • Security Gateway
  • Policy Server (Correct)
  • SmartLSM
  • Management Server

Answer : Policy Server

Which type of resource could a Security Administrator use to control access to specific file shares on target machines?


Options are :

  • CIFS (Correct)
  • Telnet
  • FTP
  • URI

Answer : CIFS

156-215.75 Check Point Certified Security Administrator Exam Set 8

Which antivirus scanning method does not work if the Gateway is connected as a node in proxy mode?


Options are :

  • Scan by Direction (Correct)
  • Scan by File Type
  • Scan by IP Address
  • Scan by Server

Answer : Scan by Direction

The SIC certificate is stored in the directory _______________.


Options are :

  • $CPDIR/conf (Correct)
  • $CPDIR/registry
  • $FWDIR/conf
  • $FWDIR/database

Answer : $CPDIR/conf

What command syntax would you use to turn on PDP logging in a distributed environment?


Options are :

  • pdp tracker on (Correct)
  • pdp logging on
  • pdp track = l
  • pdp log = l

Answer : pdp tracker on

156-215.75 Check Point Certified Security Administrator Exam Set 1

In the SmartView Tracker you receive the error, …peer send invalid ID information… while trying to establish an IKE VPN tunnel. Where does this error normally result from and how can you solve it? This error normally results from:


Options are :

  • an invalid IP address configured on one tunnel endpoint, normally the internal one in the General tab. This can be resolved by adding the correct IPs to the Topology tab of both Gateways on both sites.
  • an invalid IP address configured on one tunnel endpoint; normally the internal one in the General tab. This can be solved with link selection or by changing this IP to the one facing the other tunnel endpoint. (Correct)
  • a mismatch in the IPs of the VPN tunnel endpoints and can not be resolved.
  • a mismatch in the authentication algorithms used in IKE phase one and can be corrected by changing them to match.

Answer : an invalid IP address configured on one tunnel endpoint; normally the internal one in the General tab. This can be solved with link selection or by changing this IP to the one facing the other tunnel endpoint.

If you experience unwanted traffic from a specific IP address, how can you stop it most quickly?


Options are :

  • Activate an IPS protection
  • Configure a rule to block the address
  • Create a SAM rule (Correct)
  • Check anti-spoofing settings

Answer : Create a SAM rule

Which Security Servers can perform authentication tasks, but CANNOT perform content security tasks?


Options are :

  • Telnet (Correct)
  • HTTPS
  • HTTP
  • FTP

Answer : Telnet

156-215.75 Check Point Certified Security Administrator Exam Set 2

To reduce the information given to you in SmartView Tracker, what can you do to find information about data being sent between pcosaka and pctokyo?


Options are :

  • Press CTRL+F in order to open the find dialog, and then search the corresponding IP addresses
  • Double-click an entry representing a connection between both endpoints.
  • Apply a source filter by adding both endpoint IP addresses with the equal option set. (Correct)
  • Use a regular expression to filter out relevant logging entries.

Answer : Apply a source filter by adding both endpoint IP addresses with the equal option set.

How do you control the maximum number of mail messages in a spool directory?


Options are :

  • In the Gateway object's SMTP settings under the Advanced window (Correct)
  • In IPS SMTP settings
  • in the smtp.conf file on the Security Management Server
  • In the Security Server window in Global Properties

Answer : In the Gateway object's SMTP settings under the Advanced window

When troubleshooting NAT entries in SmartView Tracker, which column do we need to check to view the NAT'd source port when using source NAT?


Options are :

  • XlateDst
  • XlateSPort (Correct)
  • XlateDPort
  • XlateSrc

Answer : XlateSPort

156-215.75 Check Point Certified Security Administrator Exam Set 3

When launching SmartDashboard, what information is required to log into R75?


Options are :

  • User Name, Password. Management Server IP
  • Password. Management Server IP
  • User Name, Management Server IP, certificate fingerprint file
  • Password, Management Server IP, LDAP Server IP (Correct)

Answer : Password, Management Server IP, LDAP Server IP

Antivirus protection on a Check Point Gateway is available for all of the following protocols, EXCEPT:


Options are :

  • TELNET (Correct)
  • SMTP
  • HTTP
  • FTP

Answer : TELNET

Where can you view the anti-virus status?


Options are :

  • SmartView Tracking
  • SmartUpdate
  • SmartDashboard
  • SmartView Monitor (Correct)

Answer : SmartView Monitor

156-215.75 Check Point Certified Security Administrator Exam Set 4

You manage a global network extending from your base in Chicago to Tokyo, Calcutta and Dallas. Management wants to report detailing the current software level of each Enterprise class Security Gateway. You plan to take the opportunity to create a proposal outline listing the most cost-effective way to upgrade your Gateways. Which two SmartConsole applications will you use to create this report and outline?


Options are :

  • SmartView Tracker and SmartView Monitor
  • SmartView Monitor and SmartUpdate
  • SmartLSM and SmartUpdate
  • SmartDashboard and SmartView Tracker (Correct)

Answer : SmartDashboard and SmartView Tracker

Your bank's distributed R75 installation has Security Gateways up for renewal. Which SmartConsole application will tell you which Security Gateways have licenses that will expire within the next 30 days?


Options are :

  • SmartView Tracker (Correct)
  • Smart Portal
  • SmartDashboard
  • SmartUpdate

Answer : SmartView Tracker

Access Role objects define users, machines, and network locations as:


Options are :

  • Linked objects
  • Credentialed objects
  • One object (Correct)
  • Separate objects

Answer : One object

156-215.75 Check Point Certified Security Administrator Exam Set 5

Which of the following statements about file-type recognition in Content Inspection is TRUE?


Options are :

  • Antivirus status is monitored using SmartView Tracker.
  • A scan failure will only occur if the antivirus engine fails to initialize.
  • The antivirus engine acts as a proxy, caching the scanned file before delivering it to the client. (Correct)
  • All file types are considered "at risk", and are not configurable by the Administrator or the Security Policy.

Answer : The antivirus engine acts as a proxy, caching the scanned file before delivering it to the client.

Which of the following uses the same key to decrypt as it does to encrypt?


Options are :

  • Dynamic encryption
  • Asymmetric encryption (Correct)
  • Symmetric encryption
  • Certificate-based encryption

Answer : Asymmetric encryption

Where can you view anti-spam status?


Options are :

  • SmartView Monitor (Correct)
  • SmartView Tracker
  • SmartDashboad
  • SmartUpdate

Answer : SmartView Monitor

156-215.75 Check Point Certified Security Administrator Exam Set 6

When using an encryption algorithm, which is generally considered the best encryption method?


Options are :

  • CAST cipher
  • AES (Correct)
  • Triple DES
  • DES

Answer : AES

Fill in the blank: When you want to create a VPN community where all participating gateways are able to connect to each other, you need to set up a ___________ community.


Options are :

  • Remote Access
  • SSL VPN
  • Star
  • Meshed (Correct)

Answer : Meshed

Which of the following is a hash algorithm?


Options are :

  • MD5
  • DES (Correct)
  • 3DES
  • IDEA

Answer : DES

156-215.75 Check Point Certified Security Administrator Exam Set 7

When using the Anti-Virus Content Security, how are different file types analyzed?


Options are :

  • They are analyzed by their file extension (i.e. .bat, .exe. .doc)
  • They are analyzed by the MIME header.
  • They are analyzed by their magic number. (Correct)
  • They are analyzed by their un-encoded format.

Answer : They are analyzed by their magic number.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions

Subscribe to See Videos

Subscribe to my Youtube channel for new videos : Subscribe Now