Check Point Certified Security Administrator R80 試験
Question No : 1
Fill in the blank: Licenses can be added to the License and Contract repository ________ .
Question No : 2
Joey is using the computer with IP address 192.168.20.13. He wants to access web page “www.Check Point.com”, which is hosted on Web server with IP address 203.0.113.111.
How many rules on Check Point Firewall are required for this connection?
Question No : 3
Which command is used to obtain the configuration lock in Gaia?
Obtaining a Configuration Lock
lock database override unlock database
Question No : 4
Which of the following is NOT a set of Regulatory Requirements related to Information Security?
ISO 37001 - Anti-bribery management systems
Question No : 5
Which of the following is TRUE about the Check Point Host object?
A Check Point host is a host with only one interface, on which Check Point software has been installed, and which is managed by the Security Management server. It is not a routing mechanism and is not capable of IP forwarding.
Question No : 6
AdminA and AdminB are both logged in on SmartConsole.
What does it mean if AdminB sees a locked icon on a rule? Choose the BEST answer.
Question No : 7
Fill in the blanks: A High Availability deployment is referred to as a ______ cluster and a Load Sharing deployment is referred to as a ________ cluster.
In a High Availability cluster, only one member is active (Active/Standby operation).
ClusterXL Load Sharing distributes traffic within a cluster so that the total throughput of multiple members is increased. In Load Sharing configurations, all functioning members in the cluster are active, and handle network traffic (Active/Active operation).
Question No : 8
Which of the following is NOT an alert option?
In Action, select:
none - No alert. log - Sends a log entry to the database. alert - Opens a pop-up window to your desktop. mail - Sends a mail alert to your Inbox. snmptrap - Sends an SNMP alert. useralert - Runs a script. Make sure a user-defined action is available. Go to SmartDashboard > Global Properties > Log and Alert > Alert Commands .
Question No : 9
You want to define a selected administrator's permission to edit a layer.
However, when you click the + sign in the “Select additional profile that will be able edit this layer” you do not see anything.
What is the most likely cause of this problem? Select the BEST answer.
Question No : 10
Fill in the blank: The ________ feature allows administrators to share a policy with other policy packages.
Question No : 11
Fill in the blank: A _______ is used by a VPN gateway to send traffic as if it were a physical interface.
Route Based VPN
VPN traffic is routed according to the routing settings (static or dynamic) of the Security Gateway operating system. The Security Gateway uses a VTI (VPN Tunnel Interface) to send the VPN traffic as if it were a physical interface. The VTIs of Security Gateways in a VPN community connect and can support dynamic routing protocols.
Question No : 12
Provide very wide coverage for all products and protocols, with noticeable performance impact.
How could you tune the profile in order to lower the CPU load still maintaining security at good level? Select the BEST answer.
Question No : 13
The IT Management team is interested in the new features of the Check Point R80 Management and wants to upgrade but they are concerned that the existing R77.30 Gaia Gateways cannot be managed by R80 because it is so different. As the administrator responsible for the Firewalls, how can you answer or confirm these concerns?
Question No : 14
You are going to upgrade from R77 to R80. Before the upgrade, you want to back up the system so that, if there are any problems, you can easily restore to the old version with all configuration and management files intact.
What is the BEST backup method in this scenario?
Question No : 15
Choose what BEST describes users on Gaia Platform.
These users are created by default and cannot be deleted:
admin ― Has full read/write capabilities for all Gaia features, from the WebUI and the CLI. This user has a User ID of 0, and therefore has all of the privileges of a root user. monitor ― Has read-only capabilities for all features in the WebUI and the CLI, and can change its own password. You must give a password for this user before the account can be used.