Check Point Certified Security Administrator Part 3
This flashcard set focuses on Check Point security management concepts, including deployment options, permission profiles, software blades, license types, and threat prevention features. It helps reinforce understanding of administrative access control, policy layers, and monitoring tools within the Check Point architecture.
Which policy type is used to enforce bandwidth and traffic control rules?
A. Threat Prevention
B. QoS
C. Threat Emulation
D. Access Control
B. QoS
Key Terms
Which policy type is used to enforce bandwidth and traffic control rules?
A. Threat Prevention
B. QoS
C. Threat Emulation
D. Access Control
B. QoS
Which Check Point Application Control feature enables application scanning and detection?
A. Application Dictionary
B. Application Library
C. CPApp
D. AppWiki
D. AppWiki
What type of NAT is a one-to-one relationship where each host is translated to a unique address?
A. Source
B. Destination
C. Hide
D. Static
D. Static
For Automatic Hide NAT rules created by the administrator what is a TRUE statement?
A. Source Port Address Translation (PAT) is enabled by default.
B. Source Port Address Translation (PAT) is disabled by default.
C. Automatic NAT rules are supported for Network objects only.
D. Automatic NAT rules are supported for Host objects only.
A. Source Port Address Translation (PAT) is enabled by default.
In which scenario will an administrator need to manually define Proxy ARP?
A. When they configure an "Automatic Static NAT" which translates to an IP address that does not belong to one of the firewall's interfaces.
B. When they configure an "Automatic Hide NAT" which translates to an IP address that does not belong to one of the firewall's interfaces.
C. When they configure a "Manual Static NAT" which translates to an IP address that does not belong to one of the firewall's interfaces.
D. When they configure a "Manual Hide NAT" which translates to an IP address that belongs to one of the firewall's interfaces.
C. When they configure a "Manual Static NAT" which translates to an IP address that does not belong to one of the firewall's interfaces.
What is UserCheck?
A. Messaging tool used to verify a user’s credentials.
B. Communication tool used to inform a user about a website or application they are trying to access.
C. Communication tool used to notify an administrator when a new user is created.
D. Administrator tool used to monitor users on their network.
B. Communication tool used to inform a user about a website or application they are trying to access.
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
Which policy type is used to enforce bandwidth and traffic control rules? A. Threat Prevention | B. QoS |
Which Check Point Application Control feature enables application scanning and detection? A. Application Dictionary | D. AppWiki |
What type of NAT is a one-to-one relationship where each host is translated to a unique address? A. Source | D. Static |
For Automatic Hide NAT rules created by the administrator what is a TRUE statement? A. Source Port Address Translation (PAT) is enabled by default. | A. Source Port Address Translation (PAT) is enabled by default. |
In which scenario will an administrator need to manually define Proxy ARP? A. When they configure an "Automatic Static NAT" which translates to an IP address that does not belong to one of the firewall's interfaces. | C. When they configure a "Manual Static NAT" which translates to an IP address that does not belong to one of the firewall's interfaces. |
What is UserCheck? A. Messaging tool used to verify a user’s credentials. | B. Communication tool used to inform a user about a website or application they are trying to access. |
Which Autonomous Threat Prevention profile uses sanitization technology? A. Cloud/data Center | D. Perimeter |
URL Filtering employs a technology, which educates users on web usage policy in real time. What is the name of that technology? A. WebCheck | C. UserCheck |
You want to set up a VPN tunnel to an external gateway. You had to make sure that the IKE P2 SA will only be established between two subnets and not all subnets defined in the default VPN domain of your gateway. A. In the SmartConsole create a dedicated VPN Community for both Gateways. On the Management add the following line to the $FWDIR/conf/user.def.FW1 file -> subnetforrangeandpeer = { }; | B. In the SmartConsole create a dedicated VPN Community for both Gateways. Selecting the local gateway in the Community you can set the VPN Domain to ‘User defined’ and put in the local network. |
Can Check Point and Third-party Gateways establish a certificate-based Site-to-Site VPN tunnel? A. No, Certificate based VPNs are only possible between Check Point devices | D. Yes, but they need to have a mutually trusted certificate authority |
Which tool allows you to monitor the top bandwidth on smart console? A. Smart Event | C. SmartView Monitor |
Where can alerts be viewed? A. Alerts can be seen in SmartView Monitor. | A. Alerts can be seen in SmartView Monitor. |
Which product correlates logs and detects security threats, providing a centralized display of potential attack patterns from all network devices? A. SmartView Monitor | B. SmartEvent |
In the Check Point Security Management Architecture, which component(s) can store logs? A. Security Management Server and Security Gateway | A. Security Management Server and Security Gateway |
Which of the following is NOT a tracking log option in R81.x? A. Full Log | A. Full Log |
What makes log queries faster? A. Size of physical memory on the log server. | C. Indexing Engine indexes logs for faster search results. |
Which information is included in the "Extended Log" tracking option, but is not included in the "Log" tracking option? A. data type information | C. file attributes |
How many layers make up the TCP/IP model? A. 6 | B. 4 |
What is the user ID of a user that have all the privileges of a root user? A. User ID 99 | D. User ID 0 |
In SmartEvent, a correlation unit (CU) is used to do what? A. Receive firewall and other software blade logs in a region and forward them to the primary log server. | D. Analyze log entries and identify events. |
Choose what BEST describes users on Gaia Platform. A. There is one default user that can be deleted. | B. There are two default users and neither can be deleted. |
What is the purpose of a Stealth Rule? A. A rule that allows administrators to access SmartConsole from any device. | B. To drop any traffic destined for the firewall that is not otherwise explicitly allowed. |
Gaia has two default user accounts that cannot be deleted. What are those user accounts? A. Expert and Clish | C. Admin and Monitor |
Which Threat Prevention Software Blade provides comprehensive protection against malicious and unwanted network traffic, focusing on application and server vulnerabilities? A. IPS | A. IPS |
You had setup the VPN Community ‘VPN-Stores' with 3 gateways. There are some issues with one remote gateway(1.1.1.1) and an your local gateway. What will be the best log filter to see only the IKE Phase 2 agreed networks for both gateways. A. action:"Key Install" AND 1.1.1.1 AND Quick Mode | D. Blade:"VPN" AND VPN-Stores AND Quick Mode |
Which Security Blade needs to be enabled in order to sanitize and remove potentially malicious content from files, before those files enter the network? A. Anti-Virus | C. Threat Extraction |
John is the administrator of a Security Management server managing a Check Point Security Gateway. John is currently updating the network objects and amending the rules using SmartConsole. To make John’s changes available to other administrators before installing a policy, what should John do? A. File > Save | B. Publish the session. |
To provide updated malicious data signatures to all Threat Prevention blades, the Threat Prevention gateway does what with the data? A. Share the data to the ThreatCloud for use by other Threat Prevention blades. | A. Share the data to the ThreatCloud for use by other Threat Prevention blades. |
Which of the following is TRUE regarding Gaia command line? A. Configuration changes should be done in mgmtcli and use clish for monitoring. Expert mode is used only for OS level tasks. B. Configuration changes should be done in mgmtcli and use expert mode for OS-level tasks. | B. Configuration changes should be done in mgmt_cli and use expert mode for OS-level tasks. |
When connected to the Check Point Management Server using the SmartConsole, the first administrator to connect has a lock on: A. only the objects being modified in the Management Database and other administrators can connect to make changes using a special session as long as they all connect from the same LAN network. | C. the entire Management Database and all sessions and other administrators can connect only as Read-only. |
When you upload a package or license to the appropriate repository in SmartUpdate, where is the package or license stored? A. Check Point user center | B. Security Management Server |
Security Gateway software blades must be attached to what? A. Security Gateway | A. Security Gateway |
Which of the following is NOT supported by Bridge Mode on the Check Point Security Gateway? A. Antivirus | D. NAT |
Secure Internal Communication (SIC) is handled by what process? A. HTTPS | A. HTTPS |
Which of the following licenses are considered temporary? A. Plug-and-play (Trial) and Evaluation | A. Plug-and-play (Trial) and Evaluation |
What technologies are used to deny or permit network traffic? A. Stateful Inspection, URL/Application Blade, and Threat Prevention | B. Stateful Inspection, Firewall Blade, and URL/Application Blade |
When using Automatic Hide NAT, what is enabled by default? A. Source Port Address Translation (PAT) | A. Source Port Address Translation (PAT) |
Fill in the blank: The _ feature allows administrators to share a policy with other policy packages. A. Concurrent policy packages | B. Shared policies |
Name the utility that is used to block activities that appear to be suspicious? A. Suspicious Activity Monitoring (SAM) | C. Drop Rule in the rulebase |
What is a role of Publishing? A. The Publish operation sends the modifications made via SmartConsole in the private session and makes them public. | A. The Publish operation sends the modifications made via SmartConsole in the private session and makes them public. |
A network administrator has informed you that they have identified a malicious host on the network, and instructed you to block it. Corporate policy dictates that firewall policy changes cannot be made at this time. What tool can you use to block this traffic? A. Anti-Bot protection | B. Suspicious Activity Monitoring (SAM) rules |
What is NOT an advantage of Stateful Inspection? A. High Performance | B. No Screening above Network Layer |
From the GAiA Portal, which of the following operations CANNOT be performed on a Security Management Server? A. Add a static route | C. Verify a Security Policy |
AdminA and AdminB are both logged into SmartConsole. What does it mean if AdminB sees a lock icon on a rule? (Choose the best answer.) A. Rule is locked by AdminA and will be made available if the session is published. | A. Rule is locked by AdminA and will be made available if the session is published. |
Which of the following is true about Stateful Inspection? A. Stateful Inspection looks at both the headers of packets, as well as examining their content. | C. Stateful Inspection requires that a server reply to a request, in order to track a connection’s state. |
Aggressive Mode in iKEv1 uses how many packages for negotiation? A. 3 | A. 3 |
Bob and Joe both have Administrator Roles on their Gaia Platform. Bob logs in on the WebUI and then Joe logs in through CLI. Choose what BEST describes the following scenario, where Bob and Joe are both logged in: A. Since they both are logged in on different interfaces, they will both be able to make changes. | B. The database will be locked by Bob and Joe will not be able to make any changes. |
What does the 'unknown' SIC status shown on SmartConsole mean? A. The management can contact the Security Gateway but cannot establish Secure Internal Communication | A. The management can contact the Security Gateway but cannot establish Secure Internal Communication |
When comparing Stateful Inspection and Packet Filtering, what is a benefit that Stateful Inspection offers over Packer Filtering? A. Stateful Inspection offers unlimited connections because of virtual memory usage | C. Only one rule is required for each connection. |
A stateful inspection firewall works by registering connection data and compares traffic to this information. Where is the information stored? A. It is stored in the OS sessions table. | B. It is stored using state tables. |
You have discovered suspicious activity in your network. What is the BEST immediate action to take? A. Wait until traffic has been identified before making any changes. | C. Create a Suspicious Activity Monitoring (SAM) rule to block that traffic. |
Where can the administrator edit a list of trusted SmartConsole clients? A. Using cpconfig on any Gateway or Server, in the GAiA Portal logged into a Security Management Server. | D. Using cpconfig on a Security Management Server, in the GAiA Portal logged into a Security Management Server, in SmartConsole: Manage and Settings > Permissions and Administrators >Trusted Clients. |