Hello friends in this post we are going to discuss about Check Point MCQs | Check Point Multiple choice questions | Check Point Objective type questions | Check Point Wipro TrendNXT Myskillz
If you are looking for more Dumps for MYSKILLZ Visit Here
- Before Security Gateways can exchange encryption keys and build VPN tunnels, they first need
to authenticate to each other. What are the types of
Ans. Certificates - Which command line interface utility allows the administrator to verify the name and
timestamp of the Security Policy currently instructed.
Ans. Fw stat - Which tool is used to control VPN tunnels?
Ans. vpn tu - How to check the mds server (provider -1) service status
Ans. Mdsstat - Secure communication from CMAs to the Security Gateways user which type of encryption?
Ans. 128-bit SSL encryption - What are the security measures are taken to ensure the safety of SIC?
Ans. 3DES for encryption - What are the components are available in the security rule.
- Source IP
- You run cpconfig to reset SIC on the Security Gateway. After the SIC reset operation is complete,
the policy that will be installed is the
Ans. Initial policy - Your company’s Security Policy forces users to authenticate to the Gateway explicitly, before
they can use any services. The Gateway does not allow Telnet service to itself from any location.
How would you set up the authentication method With.
Ans. Client Authentication rule using the manual sign-on method, using HTTP on port 900 - Which of the applications in check point technology can be used to configure security objects?
- Smart Dashboard 2. Smartview Monitor 3. Smartview Tracker 4. Smart Event Manager
- Commands to configure the address resolution protocol (ARP).
- Which of the following can be found in cpinfo from an enforcement point?
Ans. The complete file objects_5_0. C - Where are automatic NAT rules added to the Rule Base?
Ans. Last - All Check point products come with a 15-day trial-period license. How many CMAs can be
managed by an MDS Manager running with only.
Ans. 500 - During which step in the installation process is it necessary to note the fingerprint for first-time
verification?
Ans. When configuring the Security Management Server using cpconfig - The revert operation allows you to revert to a previously saved version. Once you initiate the
revert operation, the selected version overwrites the current policy. The one type of information
that is not overwritten, is
Ans. Certificate Authority (CA) data - Which R77 SmartConsole tool would you use to verify the installed Security Policy name on a
Security Gateway?Ans. SmartView Tracker - which nat method allows you to external traffic to access internal resources.
Ans. Static - Which column in the Rule Base is used to define authentication parameters?
Ans. Action - The most recommended and manageable method for authentication among gateways and
remote clients is:
Ans. Digital certificates
Check Point Set-2 - Which services are supported by VPN-1/Firewall-1 User Authentication?
Ans. Telnet, FTP, RLOGIN, HTTP, HTTPS - If you are experiencing LDAP issues, which of the following should you check?
Ans. Connectivity between the R75 Gateway and LDAP server - Which of the below is the MOST correct process to reset SIC from SmartDashboard?
Ans. Click the Communication button for the firewall object, then click Reset. Run
cpconfig and type a new activation key. - what method used to ensures that policy package is not mistakenly installed on any appropriate
target
Ans. Installation target - David wants to manage hundreds of gateways using a central management tool. What tool
would David use to accomplish his goal?
Ans. SmartBlade - how to fix the issue for firewall fwx_cache error
Ans. add the table size - The most recommended and manageable method for authentication among gateways and
remote clients is:
Ans. Digital certificates - SmartView Tracker logs the following Security Administrator activities, EXCEPT
Ans. Tracking SLA compliance. - How do you define a service object for a TCP port range?
Ans. Manage Services, New TCP, Provide name and define Port: x-y - what is the advantages of client authentication
Ans. Unlimited number of connections - how do you check the cluster status on the checkpoint firewall
Ans. Cphaprob stat - If a Security Gateway enforces three protections, LDAP Injection, Malicious Code Protector, and
Header Rejection, which Check Point license is required in SmartUpdate?
Ans. IPS - Which of the following is TRUE concerning unnumbered VPN Tunnel Interfaces (VTIs)?
Ans. Local IP addresses are not configured, remote IP addresses are configured - When you use the Global Properties’ default settings on R76, which type of traffic will be
dropped
if NO explicit rule allows the traffic?
Ans. RIP traffic35. R75 kernel resides directly below which layer of the OSI model? Note:
Application is the top and Physical is the bottom of the IP stack.
Ans. Network - What physical machine must have access to the User Center public IP address when checking for
new packages with SmartUpdate?
Ans. SmartUpdate GUI PC - you can change the system to 32-bit or 64-bit using the command
Ans. Set edition - the internal certificate authority (ica) cannot be used for
Ans. NAT rules - what are the dynamic routing protocol checkpoint r77 gaia os supports
Ans. OSPF - The SIC certificate is stored in the directory
Ans. $CPDIR/conf
Extra.. - which command should run to check the status of corexl on your security gateway
Ans. fw6 ctl multik stat. - the certificate authority manager process and this process does not run on a multiple domain
log server or multiple domain server
Ans. Fwm_mds - Which specific R70 GUI would you use to view the length of time a TCP connection was open?
Ans. SmartView Monitor - Which of these attributes would be critical for a site-to-site VPN?
Ans. Strong data encryption - The script for the automatic start of Multi-Domain Server processes upon boot can be found in
Ans. /etc/init.d. The name of the file is firewall1. A link to this file appears
in /etc/rc3.d directory under the name S95firewall1. - How is CheckPoint stateful-inspection firewalls provide a security measure against port
scanning?
Ans. By closing all ports until the specific port is requested
Part 3 - If you are experiencing LDAP issues , which of the following should you check
Ans. Connectivity between the NGX Gateway and LDAP server - Which of the following does the security Gateway R70 use of guaranteeing the integrity and
authenticity of message
Ans. Digital signatures - The SIC certificate is stored in the directory
Ans. $CPDIR/conf - The most recommended and manageable method for authentication among Gateways and
Remote clients is
Ans. Digital certificates - Web server child deamonAns. Httpd2
- Which command displays the installed Security Gateway Version?
Ans. fw ver - What are the components are available in the security rule
Ans. Source IP - Which of the following is TRUE concerning unnumbered VPN Tunnel Interfaces(VTIs)?
Ans. VITS are only supported on Secured Platform. - Which of these attributes would be critical for a site –to-site VPN?
Ans. Strong data encryption - When Checkpoint product is used to create and save changes to a Log consolidation policy?
Ans. SmartDashboard Log Consolidator - Logging information on the Anti-Virus scan is sent to the Security management server and can
be viewed using which of the following GUI?
SmartView Tracker
Ans. - Before Security Gateways can exchange encryption keys and build VPN tunnels , they first need
to authenticate to each other. What are the types of credentials?
Ans. Certificates - What is the purpose of stealth rule in the Rule base of VPN/Firewall?
Ans.It is the first rule in the Rule Base that prevents traffic from directly
accessing the firewall itself. - The customer has a small Check Point installation which includes one Windows XP workstation
as a smartConnector Server,and the third server running SecurePlatform as Security
Gateway.This is an example of a(n):
Ans. - SmartView Tracker logs the following Security Administrator activities , EXCEPT:
Ans. Tracking SLA compliance. - Wait mode is a Client Authentication feature for Manual Sign On. What port number the user
initiates a client authenticated.
Ans. 259 - How do you enforces a strict change control policy . Which of the following would be MOST
effective for quickly dropping
Block Intruder feature of SmartView Tracker
Ans. - Multi Domain Server Installation creates subdirectories under
Ans. var/opt - When translation occurs using automatic Hide NAT. What also happens?
Ans.The source port is modified. - Where can an administrator configure the notification action in the event of a policy install time
change?
Ans. Smartview monitor: Global Thresholds - What are the server platforms checkpoint multi domain server support
Ans. Checkpoint secure platform - How many timesis the firewall kernel invoked for a packet to be passed through a VPN
connection?
Ans. One time69. What … is used to backs up binaries and data from your multi domain server to the working
directory
Ans. Mds_backup - What are the software version supported for the checkpoint 2200 appliance
Ans. R77 - What is the command to check the number of connection passing throw the firewall
Ans. FW connection