Check Point Certified Security Expert 試験
Question No : 1
Which of the following methods will provide the most complete backup of an R77 configuration?
Question No : 2
You need to back up the routing, interface, and DNS configuration information from your R77 GAiA Security Gateway. Which backup-and-restore solution do you use?
Question No : 3
Your primary Security Management Server runs on GAiA. What is the fastest way to back up your Security Gateway R77 configuration, including routing and network configuration files?
A. Copying the directories $FWDIR/conf and $FWDIR/lib to another location.
B. Use the command snapshot.
C. Using the command upgrade_export.
D. Using the native GAiA back up utility from command line or in the Web-based user interface.
Question No : 4
Your R7x-series Enterprise Security Management Server is running abnormally on Windows Server 2008 R2. You decide to try reinstalling the Security Management Server, but you want to try keeping the critical Security Management Server configuration settings intact (i.e., all Security Policies, databases, SIC, licensing etc.) What is the BEST method to reinstall the Server and keep its critical configuration?
Question No : 5
What is the primary benefit of using upgrade_export over either backup or snapshot?
Question No : 6
A snapshot delivers a complete backup of GAiA. How do you restore a local snapshot named MySnapshot.tgz?
A. Reboot the system and call the start menu. Select option Snapshot Management, provide the Expert password and select [L] for a restore from a local file. Then, provide the correct file name.
B. As Expert user, type command snapshot - R to restore from a local file. Then, provide the correct file name.
C. As Expert user, type command revert --file MySnapshot.tgz.
D. As Expert user, type command snapshot -r MySnapshot.tgz.
Question No : 7
What step should you take before running migrate_export?
Question No : 8
Which of the following statements accurately describes the migrate command?
Question No : 9
Jon is explaining how the inspection module works to a colleague. If a new connection passes through the inspection module and the packet matches the rule, what is the next step in the process?
Question No : 10
User definitions are stored in ________________ .
Question No : 11
Security server configuration settings are stored in _______________ .
Question No : 12
Anytime a client initiates a connection to a server, the firewall kernel signals the FWD process using a trap. FWD spawns the ________ child service, which runs the security server.
Question No : 13
_________ is the called process that starts when opening SmartView Tracker application.
Question No : 14
The process ________ is responsible for Management High Availability synchronization.
Question No : 15
The process ________ is responsible for Policy compilation.