156-315.13 Check Point Security Expert R76(GAiA) Exam Set 4

Which of the following methods will provide the most complete backup of an R76 configuration?


Options are :

  • Database Revision Control
  • upgrade_export command (Correct)
  • Copying the directories $FWDIR\conf and $CPDIR\conf to another server
  • Policy Package Management

Answer : upgrade_export command

156-215.77 Check Point Certified Security Administrator Exam Set 1

Check Point recommends that you back up systems running Check Point products. Run your back ups during maintenance windows to limit disruptions to services, improve CPU usage, and simplify time allotment. Which back up method does Check Point recommend every couple of months, depending on how frequently you make changes to the network or policy?


Options are :

  • snapshot
  • backup (Correct)
  • upgrade_export
  • migrate export

Answer : backup

Before upgrading SecurePlatform, you should create a backup. To save time, many administrators use the command backup. This creates a backup of the Check Point configuration as well as the system configuration.An administrator has installed the latest HFA on the system for fixing traffic problems after creating a backup file. There is a mistake in the very complex static routing configuration. The Check Point configuration has not been changed. Can the administrator use a restore to fix the errors in static routing?


Options are :

  • A back up cannot be restored, because the binary files are missing.
  • The restore can be done easily by the command restore and selecting the appropriate backup file. (Correct)
  • The restore is done by selecting Snapshot Management from the SecurePlatform boot menu.
  • The restore is not possible because the backup file does not have the same build number (version).

Answer : The restore can be done easily by the command restore and selecting the appropriate backup file.

Which command would you use to save the routing information before upgrading a Windows Gateway?


Options are :

  • ipconfig –a > [filename].txt
  • ifconfig > [filename].txt
  • netstat –rn > [filename].txt (Correct)
  • cp /etc/sysconfig/network.C [location]

Answer : netstat –rn > [filename].txt

156-315.13 Check Point Security Expert R76(GAiA) Exam Set 6

In a zero downtime firewall cluster environment what command do you run to avoid switching problems around the cluster.


Options are :

  • cphaconf set_ccp multicast
  • cphaconf set clear_subs
  • cphaconf set_ccp broadcast (Correct)
  • cphaconf set mc_relod

Answer : cphaconf set_ccp broadcast

Your R76 enterprise Security Management Server is running abnormally on Windows 2008 Server. You decide to try reinstalling the Security Management Server, but you want to try keeping the critical Security Management Server configuration settings intact (i.e., all Security Policies, databases, SIC, licensing etc.) What is the BEST method to reinstall the Server and keep its critical configuration?


Options are :

  • 1. Download the latest upgrade_export utility and run it from a c; \temp directory to export the configuration into a . tgz file 2. Skip any upgarde__verification warnings since you are not upgrading 3. Transfer the . tgz file to another networked machine 4. Download and run the cpclean utility and reboot 5. Use the R70 CD-ROM to select the uuarade import ootion to import the confiauration
  • 1. Create a database revision control backup using the SmartDashboard 2. Create a compressed archive of the *FWDlR*\ conf and »FWDiR8\lib directories and copy them to another networked machine. 3. Uninstall all R70 packages via Add/Remove Programs and reboot. 4. Install again as a primary Security Management Server using the R70 CD. 5. Reboot and restore the two archived directories over the top of the new installation, choosing to overwrite existing files.
  • 1. Download the latest upqrade_expoct utility and run it from a \temp directory to export the configuration into a . tgz file 2. Perform any requested upgcade_veri£ic«tion suggested steps 3. Uninstall all R70 packages via Add/Remove Programs and reboot 4. Use SmartUpdate to reinstall the Security Management Server and reboot 5. Transfer the tgz file back to the local \temp 6. Run upgrade__import to import the configuration (Correct)
  • 1. Insert the F70 CD-ROM, and select the option to export the configuration using the latest upgrade utilities 2. Perform any requested upgrade_verification suggested steps and re-export the configuration if needed 3. Save the export " tgz file to a local c: \temp directory 4. Uninstall all R70 packages via Add/Remove Programs and reboot 5. Install again using the R70 CD-ROM as a primary Security Management Server and reboot 6. Run upgrade_import to import the configuration

Answer : 1. Download the latest upqrade_expoct utility and run it from a \temp directory to export the configuration into a . tgz file 2. Perform any requested upgcade_veri£ic«tion suggested steps 3. Uninstall all R70 packages via Add/Remove Programs and reboot 4. Use SmartUpdate to reinstall the Security Management Server and reboot 5. Transfer the tgz file back to the local \temp 6. Run upgrade__import to import the configuration

Snapshot is available on which Security Management Server and Security Gateway platforms?


Options are :

  • Solaris
  • Windows XP Server
  • Windows 2003 Server
  • SecurePlatform (Correct)

Answer : SecurePlatform

156-315.77 Check Point Certified Security Expert Exam Set 18

Typically, when you upgrade the Security Management Server, you install and configure a fresh R76 installation on a new computer and then migrate the database from the original machine. Which of the following statements are TRUE?


Options are :

  • The Security Management Server on the new machine must be the same or greater than the version on the original machine. (Correct)
  • The new machine may not have more Check Point products installed than the original Security Management Server.
  • All product databases are included in the migration.
  • Both machines must have the same number of interfaces installed and configured before migration can be attempted.

Answer : The Security Management Server on the new machine must be the same or greater than the version on the original machine.

Control connections between the Security Management Server and the Gateway are not encrypted by the VPN Community. How are these connections secured?


Options are :

  • They are not secured (Correct)
  • They are secured by PPTP
  • They are encrypted and authenticated using SIC
  • They are not encrypted, but are authenticated by the Gateway

Answer : They are not secured

The file snapshot generates is very large, and can only be restored to:


Options are :

  • Individual members of a cluster configuration
  • A device having exactly the same Operating System as the device that created the file (Correct)
  • The device that created it, after it has been upgraded
  • Windows Server class systems

Answer : A device having exactly the same Operating System as the device that created the file

156-315.77 Check Point Certified Security Expert Exam Set 19

You need to back up the routing, interface, and DNS configuration information from your R76 SecurePlatform Security Gateway. Which backup-and-restore solution do you use?


Options are :

  • SecurePlatform back up utilities (Correct)
  • Manual copies of the directory $FWDIR/conf
  • Commands upgrade_export and upgrade_import
  • Database Revision Control

Answer : SecurePlatform back up utilities

Which of the following statements accurately describes the upgrade_export command?


Options are :

  • upgrade_export stores network-configuration data, objects, global properties, and the database revisions prior to upgrading the Security Management Server.
  • upgrade_export is used when upgrading the Security Gateway, and allows certain files to be included or excluded before exporting.
  • Used primarily when upgrading the Security Management Server, upgrade_export stores all object databases and the conf directories for importing to a newer version of the Security Gateway. (Correct)
  • Used when upgrading the Security Gateway, upgrade_export includes modified files, such as in the directories /lib and /conf.

Answer : Used primarily when upgrading the Security Management Server, upgrade_export stores all object databases and the conf directories for importing to a newer version of the Security Gateway.

In which case is a Sticky Decision Function relevant?


Options are :

  • Load Sharing - Multicast
  • Load Sharing - Unicast
  • Load Balancing - Forward
  • High Availability (Correct)

Answer : High Availability

156-315.77 Check Point Certified Security Expert Exam Set 5

Which is NOT a valid option when upgrading Cluster Deployments?


Options are :

  • Zero Downtime
  • Full Connectivity Upgrade
  • Minimal Effort Upgrade
  • Fast path Upgrade (Correct)

Answer : Fast path Upgrade

Where do you define NAT properties so that NAT is performed either client side or server side?


Options are :

  • In SmartDashboard under Global Properties > NAT definition (Correct)
  • In SmartDashboard in the NAT Rules
  • In file $DFWDIR/lib/table.def
  • In SmartDashboard under Gateway setting

Answer : In SmartDashboard under Global Properties > NAT definition

The process ________ is responsible for Management High Availability synchronization.


Options are :

  • FWM (Correct)
  • Fwsync
  • CPD
  • CPLMD

Answer : FWM

156-315.77 Check Point Certified Security Expert Exam Set 8

David wants to manage hundreds of gateways using a central management tool. What tool would David use to accomplish his goal?


Options are :

  • None
  • SmartBlade (Correct)
  • SmartProvisioning
  • SmartDashboard
  • SmartLSM

Answer : SmartBlade

A snapshot delivers a complete backup of SecurePlatform. The resulting file can be stored on servers or as a local file in /var/CPsnapshot/snapshots. How do you restore a local snapshot named MySnapshot.tgz?


Options are :

  • As Expert user, type command revert --file MySnapshot.tgz. (Correct)
  • As Expert user, type command snapshot - R to restore from a local file. Then, provide the correct file name.
  • As Expert user, type command snapshot -r MySnapshot.tgz.
  • Reboot the system and call the start menu. Select option Snapshot Management, provide the Expert password and select [L] for a restore from a local file. Then, provide the correct file name.

Answer : As Expert user, type command revert --file MySnapshot.tgz.

Which of the following commands can provide the most complete restore of an R76 configuration?


Options are :

  • cpconfig
  • upgrade_import (Correct)
  • cpinfo -recover
  • fwm dbimport -p

Answer : upgrade_import

156-315.77 Check Point Certified Security Expert Exam Set 6

Jon is explaining how the inspection module works to a colleague. If a new connection passes through the inspection module and the packet matches the rule, what is the next step in the process?


Options are :

  • Verify if the packet should be rejected.
  • Verify if any logging or alerts are defined. (Correct)
  • Verify if another rule exists.
  • Verify if the packet should be moved through the TCP/IP stack.

Answer : Verify if any logging or alerts are defined.

When, during policy installation, does the atomic load task run?


Options are :

  • Before CPD runs on the Gateway.
  • It is the first task during policy installation.
  • It is the last task during policy installation. (Correct)
  • Immediately after fwm load runs on the SmartCenter.

Answer : It is the last task during policy installation.

The process ________ is responsible for GUIClient communication with the SmartCenter.


Options are :

  • CPLMD
  • CPD
  • FWM (Correct)
  • FWD

Answer : FWM

156-315.71 Check Point Security Expert R71 Practical Exam Set 1

When restoring a Security Management Server from a backup file, the restore package can be retrieved from which source?


Options are :

  • HTTP server, FTP server, or TFTP server
  • Local folder, TFTP server, or Disk (Correct)
  • Local folder, TFTP server, or FTP server
  • Disk, SCP server, or TFTP server

Answer : Local folder, TFTP server, or Disk

When using migrate to upgrade a Secure Management Server, which of the following is included in the migration?


Options are :

  • SmartEvent database
  • SmartReporter database
  • System interface configuration
  • classes.C file (Correct)

Answer : classes.C file

During a Security Management Server migrate export, the system:


Options are :

  • Saves all system settings and Check Point product configuration settings to a file.
  • Creates a backup file that includes the SmartReporter database.
  • Creates a backup file that includes the SmartEvent database.
  • Creates a backup archive for all the Check Point configuration settings. (Correct)

Answer : Creates a backup archive for all the Check Point configuration settings.

Check Point Certified Security Expert Exam Set 5

What is the primary benefit of using upgrade_export over either backup or snapshot?


Options are :

  • The commands backup and snapshot can take a long time to run whereas upgrade_export will take a much shorter amount of time.
  • upgrade_export has an option to backup the system and SmartView Tracker logs while backup and snapshot will not.
  • upgrade_export will back up routing tables, hosts files, and manual ARP configurations, where backup and snapshot will not.
  • upgrade_export is operating system independent and can be used when backup or snapshot is not available. (Correct)

Answer : upgrade_export is operating system independent and can be used when backup or snapshot is not available.

Your organization's disaster recovery plan needs an update to the backup and restore section to reap the benefits of the new distributed R76 installation. Your plan must meet the following required and desired objectives: Upon evaluation, your plan:


Options are :

  • Meets the required objective and only one desired objective
  • Does not meet the required objective
  • Meets the required objective but does not meet either desired objective
  • Meets the required objective and both desired objectives (Correct)

Answer : Meets the required objective and both desired objectives

What firewall kernel table stores information about port allocations for Hide NAT connections?


Options are :

  • fwx_alloc (Correct)
  • NAT_dst_any_list
  • host_ip_addrs
  • NAT_src_any_list

Answer : fwx_alloc

156-315.77 Check Point Certified Security Expert Exam Set 3

The process ________________ compiles $FWDIR/conf/*.W files into machine language.


Options are :

  • cpd
  • fw gen (Correct)
  • fwm
  • fwd

Answer : fw gen

Check Point recommends that you back up systems running Check Point products. Run your back ups during maintenance windows to limit disruptions to services, improve CPU usage, and simplify time allotment. Which back up method does Check Point recommend before major changes, such as upgrades?


Options are :

  • upgrade_export
  • snapshot (Correct)
  • migrate export
  • backup

Answer : snapshot

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions