- (Exam Topic 1)
Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?
Correct Answer:B
AD Query extracts user and computer identity information from the Active Directory Security Event Logs. The system generates a Security Event log entry when a user or computer accesses a network resource. For example, this occurs when a user logs in, unlocks a screen, or accesses a network drive.
Reference : https://sc1.checkpoint.com/documents/R76/CP_R76_IdentityAwareness_AdminGuide/62402.htm
- (Exam Topic 3)
Vanessa is expecting a very important Security Report. The Document should be sent as an attachment via
e-m ail. An e-mail with Security_report.pdf file was delivered to her e-mail inbox. When she opened the PDF file, she noticed that the file is basically empty and only few lines of text are in it. The report is missing some graphs, tables and links. Which component of SandBlast protection is her company using on a Gateway?
Correct Answer:D
- (Exam Topic 4)
You want to store the GAiA configuration in a file for later reference. What command should you use?
Correct Answer:D
- (Exam Topic 4)
Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?
Correct Answer:D
- (Exam Topic 2)
You installed Security Management Server on a computer using GAiA in the MegaCorp home office. You use IP address 10.1.1.1. You also installed the Security Gateway on a second GAiA computer, which you plan to ship to another Administrator at a MegaCorp hub office. What is the correct order for pushing SIC certificates to the Gateway before shipping it?
1. Run cpconfig on the Gateway, select Secure Internal Communication, enter the activation key, and reconfirm.
2. Initialize Internal Certificate Authority (ICA) on the Security Management Server.
3. Configure the Gateway object with the host name and IP addresses for the remote site.
4. Click the Communication button in the Gateway object's General screen, enter the activation key, and click Initialize and OK.
5. Install the Security Policy.
Correct Answer:B
- (Exam Topic 3)
In SmartEvent, what are the different types of automatic reactions that the administrator can configure?
Correct Answer:A