Exam 3: Check Point Certified Security Expert - R80

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

If an administrator wants to add manual NAT for addresses now owned by the Check Point firewall, what else is necessary to be completed for it to function properly?

(Multiple Choice)
5.0/5
(37)

Which command shows the current connections distributed by CoreXL FW instances?

(Multiple Choice)
4.7/5
(46)

Which one of the following is true about Capsule Connect?

(Multiple Choice)
4.7/5
(35)

The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?

(Multiple Choice)
4.8/5
(30)

After verifying that API Server is not running, how can you start the API Server?

(Multiple Choice)
4.9/5
(40)

Pamela is Cyber Security Engineer working for Global Instance Firm with large scale deployment of Check Point Enterprise Appliances using GAiA/R80.10. Company's Developer Team is having random access issue to newly deployed Application Server in DMZ's Application Server Farm Tier and blames DMZ Security Gateway as root cause. The ticket has been created and issue is at Pamela's desk for an investigation. Pamela decides to use Check Point's Packet Analyzer Tool-fw monitor to iron out the issue during approved Maintenance window. What do you recommend as the best suggestion for Pamela to make sure she successfully captures entire traffic in context of Firewall and problematic traffic?

(Multiple Choice)
4.8/5
(47)

When simulating a problem on ClusterXL cluster with cphaprob -d STOP -s problem -t 0 register, to initiate a failover on an active cluster member, what command allows you remove the problematic state?

(Multiple Choice)
4.8/5
(31)

What traffic does the Anti-bot feature block?

(Multiple Choice)
4.7/5
(35)

What CLI command compiles and installs a Security Policy on the target's Security Gateways?

(Multiple Choice)
4.7/5
(36)

What are the attributes that SecureXL will check after the connection is allowed by Security Policy?

(Multiple Choice)
4.9/5
(35)

SmartEvent uses it's event policy to identity events. How can this be customized?

(Multiple Choice)
4.9/5
(40)

Which of these is an implicit MEP option?

(Multiple Choice)
4.8/5
(40)

You notice that your firewall is under a DDoS attack and would like to enable the Penalty Box feature, which command you use?

(Multiple Choice)
4.8/5
(34)

You need to change the MAC-address on eth2 interface of the gateway. What is the correct way to change MAC-address in Check Point Gaia?

(Multiple Choice)
4.7/5
(49)

NAT rules are prioritized in which order? 1. Automatic Static NAT 2. Automatic Hide NAT 3. Manual/Pre-Automatic NAT 4. Post-Automatic/Manual NAT rules

(Multiple Choice)
4.7/5
(37)

What is the correct command to observe the Sync traffic in a VRRP environment?

(Multiple Choice)
4.9/5
(36)

Which member of a high-availability cluster should be upgraded first in a Zero downtime upgrade?

(Multiple Choice)
4.8/5
(36)

Which statement is most correct regarding about "CoreXL Dynamic Dispatcher"?

(Multiple Choice)
4.9/5
(38)

Capsule Connect and Capsule Workspace both offer secured connection for remote users who are using their mobile devices. However, there are differences between the two. Which of the following statements correctly identify each product's capabilities?

(Multiple Choice)
4.8/5
(40)

You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don't have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?

(Multiple Choice)
4.8/5
(40)
Showing 321 - 340 of 340
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)