
CHKP1 - 1 to 50
Authored by Joder Lapolla
Other
1st Grade
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?
Publish changes
Save changes
Install policy
Install database
2.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
Name the file that is an electronically signed file used by Check Point to translate the features in the license into a code?
Both License (.lic) and Contract (.xml) files
cp.macro
Contract file (.xml)
license File (.lic)
3.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
Which two Identity Awareness daemons are used to support identity sharing?
Policy Activation Point (PAP) and Policy Decision Point (PDP)
Policy Manipulation Point (PMP) and Policy Activation Point (PAP)
Policy Enforcement Point (PEP) and Policy Manipulation Point (PMP)
Policy Decision Point (PDP) and Policy Enforcement Point (PEP)
4.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
In which scenario will an administrator need to manually define Proxy ARP?
When they configure an "Automatic Static NAT" which translates to an IP address that does not belong to one of the firewall's interfaces.
When they configure an "Automatic Hide NAT" which translates to an IP address that does not belong to one of the firewall's interfaces.
When they configure a "Manual Static NAT" which translates to an IP address that does not belong to one of the firewall's interfaces.
When they configure a "Manual Hide NAT" which translates to an IP address that belongs to one of the firewall's interfaces.
5.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
Rugged appliances are small appliances with ruggedized hardware and like Quantum Spark appliance they use which operating system?
Centos Linux
Gaia embedded.
Gaia
Red Hat Enterprise Linux version
6.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
For Automatic Hide NAT rules created by the administrator what is a TRUE statement?
Source Port Address Translation (PAT) is enabled by default.
Automatic NAT rules are supported for Network objects only.
Automatic NAT rules are supported for Host objects only.
Source Port Address Translation (PAT) is disabled by default.
7.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
What technologies are used to deny or permit network traffic?
Stateful Inspection, Firewall Blade, and URL/Application Blade
Packet Filtering, Stateful Inspection, and Application Layer Firewall
Firewall Blade, URL/Application Blade, and IPS
Stateful Inspection, URL/Application Blade, and Threat Prevention
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?