Check Point Certified Security Administrator Part 1
This flashcard set focuses on Check Point security management concepts, including deployment options, permission profiles, software blades, license types, and threat prevention features. It helps reinforce understanding of administrative access control, policy layers, and monitoring tools within the Check Point architecture.
Which of the following is a valid deployment option?
A. CloudSec deployment
B. Disliked deployment
C. Router only deployment
D. Standalone deployment
D. Standalone deployment
Key Terms
Which of the following is a valid deployment option?
A. CloudSec deployment
B. Disliked deployment
C. Router only deployment
D. Standalone deployment
D. Standalone deployment
Using the SmartConsole, which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?
A. Read Only All
B. Full Access
C. Editor
D. Super User
A. Read Only All
Which Check Point software blade monitors Check Point devices and provides a picture of network and security performance?
A. Logging and Status
B. Monitoring
C. Threat Emulation
D. Application Control
B. Monitoring
Which type of Check Point license ties the package license to the IP address of the Security Management Server?
A. Formal
B. Corporate
C. Central
D. Local
D. Local
Which Threat Prevention Software Blade provides protection from malicious software that can infect your network computers? Choose the BEST answer.
A. Anti-Malware
B. Content Awareness
C. Anti-Virus
D. IPS
C. Anti-Virus
URL Filtering cannot be used to:
A. Control Data Security
B. Decrease legal liability
C. Improve organizational security
D. Control Bandwidth issues
A. Control Data Security
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
Term | Definition |
---|---|
Which of the following is a valid deployment option? A. CloudSec deployment | D. Standalone deployment |
Using the SmartConsole, which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them? A. Read Only All | A. Read Only All |
Which Check Point software blade monitors Check Point devices and provides a picture of network and security performance? A. Logging and Status | B. Monitoring |
Which type of Check Point license ties the package license to the IP address of the Security Management Server? A. Formal | D. Local |
Which Threat Prevention Software Blade provides protection from malicious software that can infect your network computers? Choose the BEST answer. A. Anti-Malware | C. Anti-Virus |
URL Filtering cannot be used to: A. Control Data Security | A. Control Data Security |
Which one of the following is TRUE? A. One policy can be either inline or ordered, but not both. | B. Inline layer can be defined as a rule action. |
Fill in the blanks: A Check Point software license consists of a _____ and _____. A. Software container; software package | A. Software container; software package |
Which of the following is used to initially create trust between a Gateway and Security Management Server? A. One-time Password | A. One-time Password |
What are the two elements of address translation rules? A. Original packet and translated packet | A. Original packet and translated packet |
Which of the following log queries would show only dropped packets with source address of 192.168.1.1 and destination address of 172.26.1.1? A. 192.168.1.1 AND 172.26.1.1 AND drop | B. src:192.168.1.1 AND dst:172.26.1.1 AND action:Drop |
Fill in the blanks: The _____ collects logs and sends them to the _____. A. Log server; Security Gateway | B. Security Gateways; log server |
Which of the following is NOT an authentication scheme used for accounts created through SmartConsole? A. RADIUS | D. Security questions |
Which of the following statements about Site-to-Site VPN Domain-based is NOT true? A. Route-based- The Security Gateways will have a Virtual Tunnel Interface (VTI) for each VPN Tunnel with a peer VPN Gateway. The Routing Table can have routes to forward traffic to these VTIs. Any traffic routed through a VTI is automatically identified as VPN Traffic and is passed through the VPN Tunnel associated with the VTI. | A. Route-based- The Security Gateways will have a Virtual Tunnel Interface (VTI) for each VPN Tunnel with a peer VPN Gateway. The Routing Table can have routes to forward traffic to these VTIs. Any traffic routed through a VTI is automatically identified as VPN Traffic and is passed through the VPN Tunnel associated with the VTI. |
What is the main objective when using Application Control? A. To see what users are doing. | B. Ensure security and privacy of information. |
Which default Gaia user has full read/write access? A. superuser | D. admin |
Which icon in the WebUI indicates that read/write access is enabled? A. Eyeglasses | B. Pencil |
Which SmartConsole tab is used to monitor network and security performance? A. Logs Monitor | A. Logs Monitor |
Check Point Update Service Engine (CPUSE), also known as Deployment Agent [DA], is an advanced and intuitive mechanism for software deployment on Gaia OS. What software packages are supported for deployment? A. It supports deployments of single HotFixes (HF), and of Major Versions. Blink Packages and HotFix Accumulators (Jumbo) are not supported. | B. It supports deployments of single HotFixes (HF), of HotFix Accumulators (Jumbo), and of Major Versions |
In SmartConsole, on which tab are Permissions and Administrators defined? A. MANAGE & SETTINGS | A. MANAGE & SETTINGS |
Which tool allows automatic update of Gaia OS and Check Point products installed on Gaia OS? A. CPDAS - Check Point Deployment Agent Service | B. CPUSE - Check Point Upgrade Service Engine |
In the Check Point three-tiered architecture, which of the following is NOT a function of the Security Management Server? A. Verify and compile Security Policies. | B. Display policies and logs on the administrator’s workstation. |
True or False: More than one administrator can log into the Security Management Server with SmartConsole with write permission at the same time. A. True, every administrator works on a different database that is independent of the other administrators | C. True, every administrator works in a session that is independent of the other administrators |
What Check Point tool is used to automatically update Check Point products for the Gaia OS? A. Check Point Update Engine | C. Check Point Upgrade Service Engine (CPUSE) |
If there are two administrators logged in at the same time to the SmartConsole, and there are objects locked for editing, what must be done to make them available to other administrators? Choose the BEST answer. A. Delete older versions of database. | B. Publish or discard the session. |
What are the two deployment options available for a security gateway? A. Bridge and Switch | D. Standalone and Distributed |
One of major features in SmartConsole is concurrent administration. Which of the following is NOT possible considering that AdminA, AdminB and AdminC are editing the same Security Policy? A. AdminB sees a pencil icon next the rule that AdminB is currently editing. | C. AdminA and AdminB are editing the same rule at the same time. |
Which one of the following is the preferred licensing model? Select the BEST answer. A. Local licensing because it ties the package license to the IP-address of the gateway and has no dependency of the Security Management Server. | C. Central licensing because it ties the package license to the IP-address of the Security Management Server and has no dependency on the gateway. |
A Check Point Software license consists of two components, the Software Blade and the Software Container. There are types of Software Containers: . A. Two; Security Management and Endpoint Security | B. Three; Security Management, Security Gateway, and Endpoint Security |
Which type of Check Point license is tied to the IP address of a specific Security Gateway and cannot be transferred to a gateway that has a different IP address? A. Formal | C. Local |
Tom has connected to the Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored shortly afterward. What will happen to the changes already made? A. Tom will have to reboot his SmartConsole computer, and access the Management cache store on that computer, which is only accessible after a reboot. | C. Tom's changes will have been stored on the Management when he reconnects and he will not lose any of his work. |
In which deployment is the security management server and Security Gateway installed on the same appliance? A. Switch | B. Standalone |
Which software blade enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine? A. Data Awareness | D. Identity Awareness |
DLP and Mobile Access Policy are examples of what type of Policy? A. Shared Policies | A. Shared Policies |
What is the default shell of Gaia CLI? A. Read-only | C. Clish |
Which of the following is NOT a valid application navigation tab in SmartConsole? A. WEBUI & COMMAND LINE | A. WEBUI & COMMAND LINE |
What are two basic rules Check Point recommends for building an effective security policy? A. Accept Rule and Drop Rule | C. Cleanup Rule and Stealth Rule |
When dealing with policy layers, what two layer types can be utilized? A. Inbound Layers and Outbound Layers | B. Ordered Layers and Inline Layers |
What are the three main components of Check Point security management architecture? A. Smart Console, Standalone, Security Management Server | D. SmartConsole, Security Management Server, Security Gateway |
Which Check Point software blade provides protection from zero-day and undiscovered threats? A. Threat Extraction | B. Threat Emulation |
What are the three types of UserCheck messages? A. ask, block, and notify | A. ask, block, and notify |
By default, which port is used to connect to the GAiA Portal? A. 4434 | D. 443 |
Choose what BEST describes a Session. A. Sessions ends when policy is pushed to the Security Gateway. | C. Starts when an Administrator logs in through SmartConsole and ends when the Administrator logs out. |
Which command shows detailed information about VPN tunnels? A. cat $FWDIR/conf/vpn.conf | C. vpn tu |
After a new Log Server is added to the environment and the SIC trust has been established with the SMS what will the gateways do? A. Gateways will send new firewall logs to the new Log Server as soon as the SIC trust is set up between the SMS and the new Log Server. | B. Logs are not automatically forwarded to a new Log Server. SmartConsole must be used to manually configure each gateway to send its logs to the server. |
Fill in the blank: Backup and restores can be accomplished through _. A. CLI, SmartUpdate, or SmartBackup | C. SmartConsole, WebUI, or CLI |
What kind of NAT enables Source Port Address Translation by default? A. Automatic Hide NAT | A. Automatic Hide NAT |
Fill in the blanks: In NAT, Only the is translated. A. Hide; source | A. Hide; source |
Application Control/URL filtering database library is known as: A. AppWiki | A. AppWiki |
Of all the Check Point components in your network, which one changes most often and should be backed up most frequently? A. Security Management Server | A. Security Management Server |
Which of the following technologies extracts detailed information from packets and stores that information in different tables? A. Application Layer Firewall | D. Stateful Inspection |
You are the Check Point administrator for Alpha Corp. You received a call that one of the users is unable to browse the Internet on their new tablet which is connected to the company wireless, which goes through a Check Point Gateway. How would you review the logs to see what is blocking this traffic? A. Open SmartEvent to see why they are being blocked. | B. From SmartConsole, go to the Log & Monitor tab and filter for the IP address of the tablet. |
Rugged appliances are small appliances with ruggedized hardware and like Quantum Spark appliance they use which operating system? A. Gaia iOS | A. Gaia iOS |
What command from the CLI would be used to view current licensing? A. cplic print | A. cplic print |
A security zone is a group of one or more network interfaces from different centrally managed gateways. What is considered part of the zone? A. Security Zones are not supported by Check Point firewalls. | D. The local directly connected subnet defined by the subnet IP and subnet mask. |
Which of the completed statements is NOT true? The GAiA Portal (WebUI) can be used to manage Operating System user accounts and: A. assign privileges to users. | B. assign user rights to the directory structure on the Security Management Server. |
Which encryption algorithm is the least secured? A. 3DES | C. DES |
Fill in the blank: SmartConsole, SmartEvent GUI client, and _ allow viewing of billions of consolidated logs and shows them as prioritized security events. A. SmartMonitor | D. SmartView Web Application |
What is the default tracking option of a rule? A. None | C. Log |
Fill in the blank: Once a license is activated, a _ should be installed. A. License Management file | D. Service Contract file |