View the rule below. What does the pen-symbol in the left column mean?
B
What object type would you use to grant network access to an LDAP user group?
B
Which of the following technologies extracts detailed information from packets and stores
that information in state tables?
B
An administrator is creating an IPsec site-to-site VPN between his corporate office and
branch office. Both offices are protected by Check Point Security Gateway managed by the
same Security Management Server (SMS). While configuring the VPN community to specify
the pre-shared secret, the administrator did not find a box to input the pre-shared secret. Why
does it not allow him to specify the pre-shared secret?
C
Which of the following is NOT a policy type available for each policy package?
A
Which SmartConsole tab is used to monitor network and security performance?
D
Which option in a firewall rule would only match and allow traffic to VPN gateways for one
Community in common?
C
____________ is the Gaia command that turns the server off.
C
Which software blade enables Access Control policies to accept, drop, or limit web site
access based on user, group, and/or machine?
A
What is a role of Publishing?
A
You are the Check Point administrator for Alpha Corp. You received a call that one of the
users is unable to browse the Internet on their new tablet which is connected to the company
wireless, which goes through a Check Point Gateway. How would you review the logs to see
what is blocking this traffic?
D
Examine the sample Rule Base.
What will be the result of a verification of the policy from SmartConsole?
C
Each cluster, at a minimum, should have at least ___________ interfaces.
C
Which key is created during Phase 2 of a site-to-site VPN?
C
Which tool is used to enable cluster membership on a Gateway?
B