Check Point R77 Quiz

Check Point R77 Quiz

 



Check Point R77 Quiz contain set of 10 MCQ questions for Check Point R77 MCQ which will help you to clear beginner level quiz.



Q1) You want to configure a mail alert for every time the policy is installed to a specific Checkpoint R77 Gateway . Where would you configure this alert?
A. In SmartView Monitor, select Gateway > Configure Thresholds and in SmartDashboard select Global Properties > Log and Alerts > Alert Commands.
B. In SmartDashboard, select Global Properties > Log and Alerts > Alert Commands.
C. You cannot create a mail alert for Policy installation.
D. In SmartView Monitor, select Gateway > Configure Thresholds.
 
Q2) What statement is true regarding Visitor Mode in Checkpoint R77?
A. VPN authentication and encrypted traffic are tunneled through port TCP 443.
B. Only ESP traffic is tunneled through port TCP 443.
C. Only Main mode and Quick mode traffic are tunneled on TCP port 443.
D. All VPN traffic is tunneled through UDP port 4500.
 
Q3) What port is used for communication to the User Center with SmartUpdate in Checkpoint R77?
A. CPMI 200
B. TCP 8080
C. HTTP 80
D. HTTPS 443
 
Q4) One of your remote Security Gateways suddenly stops sending logs, and you cannot install the Security Policy on the Gateway. All other remote Security Gateways are logging normally to the Security Management Server, and Policy installation is not affected. When you click the Test SIC status button in the problematic Gateway object, you receive an error message. What is the problem?
A. The remote Gateway’s IP address has changed, which invalidates the SIC Certificate.
B. The time on the Security Management Server’s clock has changed, which invalidates the remote Gateway’s Certificate.
C. The Internal Certificate Authority for the Security Management Server object has been removed from objects_5_0.c.
D. There is no connection between the Security Management Server and the remote Gateway. Rules or routing may block the connection.
 
Q5) ______________ is an R77 component that displays the number of packets accepted, rejected, and dropped on a specific Security Gateway, in real time.
A. SmartEvent
B. SmartView Status
C. SmartUpdate
D. SmartView Monitor
 
Q6) What is a Consolidation Policy in Checkpoint R77?
A. The collective name of the Security Policy, Address Translation, and IPS Policies.
B. The specific Policy written in SmartDashboard to configure which log data is stored in the SmartReporter database.
C. The collective name of the logs generated by SmartReporter.
D. A global Policy used to share a common enforcement policy for multiple Security Gateways.
 
Q7) Which port must be allowed to pass through enforcement points in order to allow packet logging to operate correctly?
A. 514
B. 257
C. 256
D. 258
 
Q8) How do you use SmartView Monitor to compile traffic statistics for your company’s Internet Web activity during production hours?
A. Select Tunnels view, and generate a report on the statistics.
B. Configure a Suspicious Activity Rule which triggers an alert when HTTP traffic passes through the Gateway.
C. Use Traffic settings and SmartView Monitor to generate a graph showing the total HTTP traffic for the day.
D. View total packets passed through the Security Gateway.
 
Q9) Which command allows you to view the contents of an R77 table?
A. fw tab -a <tablename>
B. fw tab -t <tablename>
C. fw tab -s <tablename>
D. fw tab -x <tablename>
 
Q10) Checkpoints Central license management allows a Security Administrator to perform which of the following functions?
1. Check for expired licenses.
2. Sort licenses and view license properties.
3. Attach both R77 Central and Local licesnes to a remote module.
4. Delete both R77 Local Licenses and Central licenses from a remote module.
5. Add or remove a license to or from the license repository.
6. Attach and/or delete only R77 Central licenses to a remote module (not Local licenses).
 
A. 1, 2, 5, & 6
B. 2, 3, 4, & 5
C. 2, 5, & 6
D. 1, 2, 3, 4, & 5
 
Q11) Which of the following statements is TRUE about management plug-ins?
A. A management plug-in interacts with a Security Management Server to provide new features and support for new products.
B. Installing a management plug-in is just like an upgrade process.
C. Using a plug-in offers full central management only if special licensing is applied to specific features of the plug-in.
D. The plug-in is a package installed on the Security Gateway.