QUESTION 52 Fill in the blank: The tool generates a R80 Security Gateway configuration report.
A. infoCP
B. infoview
C. cpinfo
D. fw cpinfo
Answer: C
QUESTION 53 Which of the following commands can be used to remove site-to-site IPSEC Security
Associations (SA)?
A. vpn tu
B. vpn ipsec remove -l
C. vpn debug ipsec
D. fw ipsec tu
Answer: A
QUESTION 54 Which of the following is NOT an authentication scheme used for accounts created through
SmartConsole?
A. Security questions
B. Check Point password
C. SecurID
D. RADIUS
Answer: A
QUESTION 55 Which pre-defined Permission Profile should be assigned to an administrator that requires full
access to audit all configurations without modifying them?
A. Auditor
B. Read Only All
C. Super User
D. Full Access
Answer: B
QUESTION 56 Packages and licenses are loaded from all of theses sources EXCEPT
A. Download Center Web site
B. UserUpdate
C. User Center
D. Check Point DVD
Answer: B
QUESTION 57 Which of the following technologies extracts detailed information from packets and stores that
information in state tables?
A. INSPECT Engine
B. Stateful Inspection
C. Packet Filtering
D. Application Layer Firewall
Answer: B
QUESTION 58 On the following graphic, you will find layers of policies.
What is a precedence of traffic inspection for the defined polices?
A. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and
then if implicit Drop Rule drops the packet, it comes next to IPS layer and then after accepting the
packet it passes to Threat Prevention layer.
B. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and
then if there is any rule which accepts the packet, it comes next to IPS layer and then after
accepting the packet it passes to Threat Prevention layer
C. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and
then if there is any rule which accepts the packet, it comes next to Threat Prevention layer and
then after accepting the packet it passes to IPS layer.
D. A packet arrives at the gateway, it is checked against the rules in IPS policy layer and then it
comes next to the Network policy layer and then after accepting the packet it passes to Threat
Prevention layer.