Exam A QUESTION 1
Which of the following statements about Bridge mode is TRUE?
A. When managing a Security Gateway in Bridge mode, it is possible to use a bridge interface for Network Address Translation.
B. Assuming a new installation, bridge mode requires changing the existing IP routing of the network.
C. All ClusterXL modes are supported.
D. A bridge must be configured with a pair of interfaces.
Correct Answer: D QUESTION 2
Which SmartConsole component can Administrators use to track remote administrative activities?
A. WebUI
B. Eventia Reporter
C. SmartView Monitor
D. SmartView Tracker
Correct Answer: D QUESTION 3
UDP packets are delivered if they are _________.
A. A legal response to an allowed request on the inverse UDP ports and IP
B. A Stateful ACK to a valid SYN-SYN-/ACK on the inverse UDP ports and IP
C. Reference in the SAM related Dynamic tables
D. Bypassing the Kernel by the “forwarding layer” of clusterXL
Correct Answer: A QUESTION 4
The Check Point Security Gateway’s virtual machine (kernel) exists between which two layers of the OSI model?
A. Session and Network layers
B. Application and Presentation layers
C. Physical and Datalink layers
D. Network and Datalink layers
Correct Answer: D QUESTION 5
The customer has a small Check Point installation which includes one Windows 2003 server as the SmartConsole and a second server running SecurePlatform as both Security Management Server and the Security Gateway. This is an example of a(n):
A. Unsupported configuration.
B. Hybrid Installation.
C. Distributed Installation.
D. Stand-Alone Installation.
Correct Answer: D QUESTION 6
The customer has a small Check Point installation which includes one Windows XP workstation as the SmartConsole, one Solaris server working as Security Management Server, and a third server running SecurePlatform as Security Gateway. This is an example of a(n):
A. Stand-Alone Installation.
B. Unsupported configuration
C. Distributed Installation.
D. Hybrid Installation.
Correct Answer: C QUESTION 7
You are a security architect and need to design a secure firewall, VPN and IPS solution. Where would be the best place to install IPS in the topology if the internal network is already protected?
A. On the firewall itself to protect all connected networks centrally.
B. On each network segment separately.
C. On the LAN is enough, the DMZ does not need to be protected.
D. In front of the firewall is enough.
Correct Answer: A QUESTION 8
You are installing a Security Management Server. Your security plan calls for three administrators for this particular server. How many can you create during installation?
A. Depends on the license installed on the Security Management Server
B. Only one with full access and one with read-only access
C. One
D. As many as you want
Correct Answer: C QUESTION 9
During which step in the installation process is it necessary to note the fingerprint for first-time verification?
A. When establishing SIC between the Security Management Server and the Gateway
B. When configuring the Security Management Server using cpconfig
C. When configuring the Security Gateway object in SmartDashboard
D. When configuring the Gateway in the WebUl
Correct Answer: B QUESTION 10
How can you recreate the account of the Security Administrator, which was created during initial installation of the Management Server on SecurePlatform?
A. Launch cpconfig and delete the Administrator’s account. Recreate the account with the same name.
B. Export the user database into an ASCII file with fwm dbexport. Open this file with an editor, and delete the Administrator Account portion of the file. You will be prompted to create a new account.
C. Type cpm -a, and provide the existing Administrator’s account name. Reset the Security Administrator’s password.
D. Launch SmartDashboard in the User Management screen, and delete the cpconfig administrator.
Correct Answer: A