100%(1)1 out of 1 people found this document helpful
This preview shows page 24 - 28 out of 29 pages.
52.Fill in the blank: The tool _______ generates a R80 Security Gatewayconfiguration report.A. infoCPB. infoviewC. cpinfoD. fw cpinfoAnswer: CExplanation:CPInfo is an auto-updatable utility that collects diagnostics data on a customer'smachine at the time of execution and uploads it to Check Point servers (it replacesthe standalone cp_uploader utility for uploading files to Check Point servers). TheCPinfo output file allows analyzing customer setups from a remote location. CheckPoint support engineers can open the CPinfo file in a demo mode, while viewingactual customer Security Policies and Objects. This allows the in-depth analysis ofcustomer's configuration and environment settings. When contacting Check PointSupport, collect the cpinfo files from the Security Management server and SecurityGateways involved in your case.24 / 30
53.Which of the following commands can be used to remove site-to-site IPSECSecurity Associations (SA)?54.Which of the following is NOT an authentication scheme used for accounts createdthrough SmartConsole?25 / 30
DumpsBaseExplanation:Authentication Schemes:- Check Point Password- Operating System Password- RADIUS- SecurID- TACAS- UndefinedIf a user with an undefined authentication scheme is matched to a Security Rule withsome form of authentication, access is always denied.55.Which pre-defined Permission Profile should be assigned to an administrator thatrequires full access to audit all configurations without modifying them?56.Packages and licenses are loaded from all of these sources EXCEPTA. Download Center Web siteB. UserUpdateC. User CenterD. Check Point DVDAnswer: BExplanation:Packages and licenses are loaded into these repositories from several sources:57.Which of the following technologies extracts detailed information from packets andstores that information in state tables?26 / 30