Exam 3: Check Point Certified Security Expert - R80
Exam 1: Check Point Certified Security Principles Associate (CCSPA)60 Questions
Exam 2: Check Point Certified Security Administrator (CCSA R80)676 Questions
Exam 3: Check Point Certified Security Expert - R80340 Questions
Select questions type
You have existing dbedit scripts from R77. Can you use them with R80.10?
(Multiple Choice)
4.9/5
(37)
You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?
(Multiple Choice)
4.8/5
(31)
What happen when IPS profile is set in Detect Only Mode for troubleshooting?
(Multiple Choice)
4.9/5
(32)
How often does Threat Emulation download packages by default?
(Multiple Choice)
4.8/5
(38)
The Compliance Blade allows you to search for text strings in many windows and panes, to search for a value in a field, what would your syntax be?
(Multiple Choice)
4.9/5
(41)
In terms of Order Rule Enforcement, when a packet arrives at the gateway, the gateway checks it against the rules in the top Policy Layer, sequentially from top to bottom. Which of the following statements is correct?
(Multiple Choice)
4.8/5
(35)
What level of CPU load on a Secure Network Distributor would indicate that another may be necessary?
(Multiple Choice)
4.9/5
(36)
What are the methods of SandBlast Threat Emulation deployment?
(Multiple Choice)
4.8/5
(39)
Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.
(Multiple Choice)
4.7/5
(30)
SmartEvent provides a convenient way to run common command line executables that can assist in investigating events. Right-clicking the IP address, source or destination, in an event provides a list of default and customized commands. They appear only on cells that refer to IP addresses because the IP address of the active cell is used as the destination of the command when run. The default commands are:
(Multiple Choice)
4.9/5
(33)
Which command can you use to verify the number of active concurrent connections?
(Multiple Choice)
4.8/5
(37)
Where do you create and modify the Mobile Access policy in R80?
(Multiple Choice)
4.8/5
(32)
Automatic affinity means that if SecureXL is running, the affinity for each interface is automatically reset every
(Multiple Choice)
4.8/5
(41)
You have a Geo-Protection policy blocking Australia and a number of other countries. Your network now requires a Check Point Firewall to be installed in Sydney, Australia. What must you do to get SIC to work?
(Multiple Choice)
4.8/5
(33)
When Configuring Endpoint Compliance Settings for Applications and Gateways within Mobile Access, which of the three approaches will allow you to configure individual policies for each application?
(Multiple Choice)
4.9/5
(32)
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?
(Multiple Choice)
4.8/5
(33)
Showing 61 - 80 of 340
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)