Check Point Firewall Quiz

Check Point Firewall Quiz

 



Check Point Firewall Quiz contain set of 10 MCQ questions for Check Point Firewall MCQ which will help you to clear beginner level quiz.



1. SIC still does not seem to work because the policy won’t install and interface fetching does not work. What might be a reason for this?
A. It always works when the trust is established
B. This must be a human error.
C. SIC does not function over the network.
D. The Gateway’s time is several days or weeks in the future and the SIC certificate is not yet valid.
Answer: D
 
2. Spoofing is a method of:
A. Disguising an illegal IP address behind an authorized IP address through Port Address Translation.
B. Making packets appear as if they come from an authorized IP address.
C. Detecting people using false or wrong authentication logins.
D. Hiding your firewall from unauthorized users.
Answer: B
 
3. You are working with three other Security Administrators. Which SmartConsole component can be used to monitor changes to rules or object properties made by the other administrators?
A. Eventia Tracker

B
. SmartView Monitor
C. Eventia Monitor
D. SmartView Tracker
Answer: D
 
4. Which of the following tools is used to generate a Security Gateway R77 configuration report?
A. infoCP
B. cpinfo
C. infoview
D. fw cpinfo
Answer: B
 
5. Which of the following commands can provide the most complete restoration of a R77 configuration?
A. cpinfo -recover
B. fwm dbimport -p <export file>
C. upgrade_import
D. cpconfig
Answer: C
 
6. Anti-Spoofing is typically set up on which object type?
A. Network
B. Security Management object
C. Host
D. Security Gateway
Answer: D
 
7.  Which of the following uses the same key to decrypt as it does to encrypt?
A. Asymmetric encryption
B. Symmetric encryption
C. Certificate-based encryption
D. Dynamic encryption
Answer: B
 
8. The ____________ and ____________ rules are the two basic rules which should be used by all Security Administrators.
A. Cleanup; Stealth
B. Administrator Access; Stealth
C. Cleanup; Administrator Access
D. Network Traffic; Stealth
Answer: A
 
9.  During which step in the installation process is it necessary to note the fingerprint for firsttime verification?
A. When configuring the Security Gateway object in SmartDashboard
B. When configuring the Security Management Server using cpconfig
C. When establishing SIC between the Security Management Server and the Gateway
D. When configuring the Gateway in the WebUI
Answer: B
 
10. Which of the following options is available with the SecurePlatform cpconfig utility?
A. Time & Date
B. GUI Clients
C. DHCP Server configuration
D. Export setup
Answer: B
 
11. Which of the following describes the default behavior of an R77 Security Gateway?
A. Traffic is filtered using controlled port scanning.
B. IP protocol types listed as secure are allowed by default, i.e. ICMP, TCP, UDP sessions are inspected.
C. All traffic is expressly permitted via explicit rules.
D. Traffic not explicitly permitted is dropped.
Answer: D