Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Check Point Security Gateway Configuration, Quizzes of Computer Science

A comprehensive overview of the configuration and management of check point security gateways. It covers a wide range of topics, including authentication methods, vpn tunnels, security policy management, logging and monitoring, and various command-line utilities. Structured in three sets, with each set containing multiple questions and answers related to different aspects of check point security solutions. The information presented in this document can be valuable for security professionals, network administrators, and it personnel responsible for managing and maintaining check point security infrastructure within an organization. Essential concepts, best practices, and troubleshooting techniques, making it a useful resource for both novice and experienced users of check point security products.

Typology: Quizzes

2023/2024

Available from 10/08/2024

b-naveen-kumar
b-naveen-kumar 🇮🇳

8 documents

1 / 5

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Check Point Set-1
1. Before Security Gateways can exchange encryption keys and build VPN tunnels, they first need
to authenticate to each other. What are the types of
Ans. Certificates
2. Which command line interface utility allows the administrator to verify the name and
timestamp of the Security Policy currently instructed.
Ans. Fw stat
3. Which tool is used to control VPN tunnels?
Ans. vpn tu
4. How to check the mds server (provider -1) service status
Ans. Mdsstat
5. Secure communication from CMAs to the Security Gateways user which type of encryption?
Ans. 128-bit SSL encryption
6. What are the security measures are taken to ensure the safety of SIC?
Ans. 3DES for encryption
7. What are the components are available in the security rule.
1. Source IP
8. You run cpconfig to reset SIC on the Security Gateway. After the SIC reset operation is complete,
the policy that will be installed is the
Ans. Initial policy
9. Your company's Security Policy forces users to authenticate to the Gateway explicitly, before
they can use any services. The Gateway does not allow Telnet service to itself from any location.
How would you set up the authentication method With.
Ans. Client Authentication rule using the manual sign-on method, using HTTP on port 900
10. Which of the applications in check point technology can be used to configure security objects?
1. Smart Dashboard 2. Smartview Monitor 3. Smartview Tracker 4. Smart Event Manager
11. Commands to configure the address resolution protocol (ARP).
12. Which of the following can be found in cpinfo from an enforcement point?
Ans. The complete file objects_5_0. C
13. Where are automatic NAT rules added to the Rule Base?
Ans. Last
14. All Check point products come with a 15-day trial-period license. How many CMAs can be
managed by an MDS Manager running with only.
Ans. 500
15. During which step in the installation process is it necessary to note the fingerprint for first-time
verification?
Ans. When configuring the Security Management Server using cpconfig
16. The revert operation allows you to revert to a previously saved version. Once you initiate the
revert operation, the selected version overwrites the current policy. The one type of information
that is not overwritten, is
Ans. Certificate Authority (CA) data
17. Which R77 SmartConsole tool would you use to verify the installed Security Policy name on a
Security Gateway?
pf3
pf4
pf5

Partial preview of the text

Download Check Point Security Gateway Configuration and more Quizzes Computer Science in PDF only on Docsity!

Check Point Set-

  1. Before Security Gateways can exchange encryption keys and build VPN tunnels, they first need to authenticate to each other. What are the types of Ans. Certificates
  2. Which command line interface utility allows the administrator to verify the name and timestamp of the Security Policy currently instructed. Ans. Fw stat
  3. Which tool is used to control VPN tunnels? Ans. vpn tu
  4. How to check the mds server (provider -1) service status Ans. Mdsstat
  5. Secure communication from CMAs to the Security Gateways user which type of encryption? Ans. 128-bit SSL encryption
  6. What are the security measures are taken to ensure the safety of SIC? Ans. 3DES for encryption
  7. What are the components are available in the security rule. 1. Source IP
  8. You run cpconfig to reset SIC on the Security Gateway. After the SIC reset operation is complete, the policy that will be installed is the Ans. Initial policy
  9. Your company's Security Policy forces users to authenticate to the Gateway explicitly, before they can use any services. The Gateway does not allow Telnet service to itself from any location. How would you set up the authentication method With. Ans. Client Authentication rule using the manual sign-on method, using HTTP on port 900
  10. Which of the applications in check point technology can be used to configure security objects?
    1. Smart Dashboard 2. Smartview Monitor 3. Smartview Tracker 4. Smart Event Manager
  11. Commands to configure the address resolution protocol (ARP).
  12. Which of the following can be found in cpinfo from an enforcement point? Ans. The complete file objects_5_0. C
  13. Where are automatic NAT rules added to the Rule Base? Ans. **Last
  14. All Check point products come with a 15-day trial-period license. How many CMAs can be** managed by an MDS Manager running with only. Ans. 500
  15. During which step in the installation process is it necessary to note the fingerprint for first-time verification? Ans. When configuring the Security Management Server using cpconfig
  16. The revert operation allows you to revert to a previously saved version. Once you initiate the revert operation, the selected version overwrites the current policy. The one type of information that is not overwritten, is Ans. Certificate Authority (CA) data
  17. Which R77 SmartConsole tool would you use to verify the installed Security Policy name on a Security Gateway?

Ans. SmartView Tracker

  1. which nat method allows you to external traffic to access internal resources. Ans. Static
  2. Which column in the Rule Base is used to define authentication parameters? Ans. Action
  3. The most recommended and manageable method for authentication among gateways and remote clients is: Ans. Digital certificates

Check Point Set-

  1. Which services are supported by VPN-1/Firewall-1 User Authentication? Ans. Telnet, FTP, RLOGIN, HTTP, HTTPS
  2. If you are experiencing LDAP issues, which of the following should you check? Ans. Connectivity between the R75 Gateway and LDAP server
  3. Which of the below is the MOST correct process to reset SIC from SmartDashboard? Ans. Click the Communication button for the firewall object, then click Reset. Run cpconfig and type a new activation key.
  4. what method used to ensures that policy package is not mistakenly installed on any appropriate target Ans. Installation target
  5. David wants to manage hundreds of gateways using a central management tool. What tool would David use to accomplish his goal? Ans. SmartBlade
  6. how to fix the issue for firewall fwx_cache error Ans. add the table size
  7. The most recommended and manageable method for authentication among gateways and remote clients is: Ans. Digital certificates
  8. SmartView Tracker logs the following Security Administrator activities, EXCEPT Ans. Tracking SLA compliance.
  9. How do you define a service object for a TCP port range? Ans. Manage Services, New TCP, Provide name and define Port: x-y
  10. what is the advantages of client authentication Ans. Unlimited number of connections
  11. how do you check the cluster status on the checkpoint firewall Ans. Cphaprob stat
  12. If a Security Gateway enforces three protections, LDAP Injection, Malicious Code Protector, and Header Rejection, which Check Point license is required in SmartUpdate? Ans. IPS
  13. Which of the following is TRUE concerning unnumbered VPN Tunnel Interfaces (VTIs)? Ans. Local IP addresses are not configured, remote IP addresses are configured
  14. When you use the Global Properties’ default settings on R76, which type of traffic will be dropped if NO explicit rule allows the traffic? Ans. RIP traffic

Ans. Httpd

  1. Which command displays the installed Security Gateway Version? Ans. fw ver
  2. What are the components are available in the security rule Ans. Source IP
  3. Which of the following is TRUE concerning unnumbered VPN Tunnel Interfaces(VTIs)? Ans. VITS are only supported on Secured Platform.
  4. Which of these attributes would be critical for a site – to-site VPN? Ans. Strong data encryption
  5. When Checkpoint product is used to create and save changes to a Log consolidation policy? Ans. SmartDashboard Log Consolidator
  6. Logging information on the Anti-Virus scan is sent to the Security management server and can be viewed using which of the following GUI? Ans. SmartView Tracker
  7. Before Security Gateways can exchange encryption keys and build VPN tunnels , they first need to authenticate to each other. What are the types of credentials? Ans. Certificates
  8. What is the purpose of stealth rule in the Rule base of VPN/Firewall? Ans.It is the first rule in the Rule Base that prevents traffic from directly accessing the firewall itself.
  9. The customer has a small Check Point installation which includes one Windows XP workstation as a smartConnector Server,and the third server running SecurePlatform as Security Gateway.This is an example of a(n): Ans.
  10. SmartView Tracker logs the following Security Administrator activities , EXCEPT: Ans. Tracking SLA compliance.
  11. Wait mode is a Client Authentication feature for Manual Sign On. What port number the user initiates a client authenticated. Ans. 259
  12. How do you enforces a strict change control policy. Which of the following would be MOST effective for quickly dropping Ans. Block Intruder feature of SmartView Tracker
  13. Multi Domain Server Installation creates subdirectories under Ans. var/opt
  14. When translation occurs using automatic Hide NAT. What also happens? Ans.The source port is modified.
  15. Where can an administrator configure the notification action in the event of a policy install time change? Ans. Smartview monitor: Global Thresholds
  16. What are the server platforms checkpoint multi domain server support Ans. Checkpoint secure platform
  17. How many timesis the firewall kernel invoked for a packet to be passed through a VPN connection? Ans. One time
  1. What … is used to backs up binaries and data from your multi domain server to the working directory Ans. Mds_backup
  2. What are the software version supported for the checkpoint 2200 appliance Ans. R
  3. What is the command to check the number of connection passing throw the firewall Ans. FW connection