These Checkpoint Security multiple-choice questions and their answers will help you strengthen your grip on the subject of Checkpoint Security. You can prepare for an upcoming exam or job interview with these 80 Checkpoint Security MCQs.
So scroll down and start answering.
A. Smart Update
B. Smart View Tracker
C. Smart View Status
D. Smart View Monitor
E. Smart LSM
A. fw install policy
B. fw fetchpolicy
C. fwm fetch
D. fw fetch
A. cphaprob stat
B. cphaprob list
C. cpha prob stat
D. cpha prob list
What sequence is followed in the Rule Base Enforcement in VPN-1?
1. Security policy BEFORE-LAST rule
2. Administrator-defined rule base
3. IP Spoofing/IP options
4. Cleanup rule
5. Security Policy FIRST rule
6. NAT
A.
156324Â
B.
632541Â
C.
125463Â
D.
125346Â
E.
365214Â
A. At the top
B. Anywhere
C. At the bottom
D. In the middle
A. SecuRemote
B. SecureClient
C. SmartLSM
D. Enforcement Module
A. show ip route
B. show multicast table
C. show ip mroute
D. show ipm route
The HTTP access is opened to one new system in the network.
When will a rule become effective in such a situation?
A.
While installing the policyÂ
B.
During cpstop
C.
During cpstart
D.
During cprestart
E.
By saving the policy on SmartCenter server
A. Ethereal
B. Nessus
C. TCPDUMP
D. Snort
What rule will Mary create in the rule base to implement the authentication when she wants to implement client authentication for an Internet_User Group for HTTP service?
A.
Source:Internet_Users@Any; Dest:Any ; Service:HTTP ; Action:Client Authentication
B.
Source:Internet_Users@Any; Dest:Any ; Service:Telnet; Action:Client Authentication
C.
Source:Internet_Users@Any; Dest:Any ; Service:HTTP ; Action:Session Authentication.
D.
Source:Internet_Users@Any; Dest:Any ; Service:HTTP ; Action:User Authentication
A. URI
B. SMTP
C. FTP
D. TCP
E. CIFS
A. fw ver
B. fwmver
C. fwm version
D. fwm ver
A. Active-Active
B. Active-Deactive
C. Active-Passive
D. Passive-Passive
E. Deactive-Passive
A. SmartView Status
B. SmartView Tracker
C. Checkpoint Gateway-->Logs and Masters
D. Global policies-->Logs and Masters
E. SmartLSM
A. SmartView Status
B. SmartView Tracker
C. SmartUpdate
D. SmartView Monitor
E. SmartLSM
A. ConUtilities
B. CPutil
C. CPconfig
D. Sysconfig
A. 1
B. 2
C. 3
D. 4
E. 5
A. Instantly
B. After 1 second
C. After 0.5 second
D. After 2 seconds
E. After 3 seconds
A. telnet
B. https
C. rlogin
D. http
E. ftp
A. It is used for secure communication between two gateways
B. It is used for secure communication between a gateway and SmartCenter server
C. It is used for authentication
D. It is used for encryption in the VPN tunnels
A. SmartView Status
B. SmartView Tracker
C. SmartUpdate
D. SmartView Monitor
E. SmartLSM
Eric wants that a VPN rule should only be activated for a particular time.
How can that be done?
A.
By specifying the time VPN object settings
B.
By specifying the time in global settings Â
C.
By specifying the time in VPN ruleÂ
A. 1
B. 2
C. 3
D. None
A. VPN Tunnel Interface
B. Virtual Tunnel Interface
C. VPN Terminating Interface
D. Virtual Terminating Interface
A. SmartView Status
B. SmartView Tracker
C. SmartUpdate
D. SmartView Monitor
E. SmartLSM
A. Hybrid Mode
B. None
C. Traditional Mode
D. Simplified Mode
A. File->New->RADIUS server
B. Manage->Servers and OPSEC applications->New->RADIUS
C. New->RADIUS Server
D. Right click server->New RADIUS server
E. Object->RADIUS server
A. UDP 4500
B. TCP 4500
C. UDP 500
D. TCP 500
E. UDP 1818
A. 80
B. 443
C. 18181
D. 18110
E. 8080
A. CVP
B. UFP
C. ELA
D. LEA
A. Windows XP
B. RedHat Linux 9
C. MacOS X
D. IPSO 4.0
A. 18181
B. 18182
C. 18921
D. 18891
E. 18291
A. UDP 4500
B. TCP 4500
C. UDP 500
D. TCP 500
E. UDP 1818
A. By selecting the option in Policy Package Management
B. By selecting the option in Global properties
C. By selecting the option after pushing the policy
D. By selecting the option before pushing the policy
A. vpn ike
B. vpn tu
C. vpn
D. vpn securemote
A. The 6-packet IKE Phase 2 is replaced by the 3-packet exchange
B. Nothing happens
C. The 3-packet IKE Phase 1 is replaced by the 1-packet exchange
D. The 6-packet IKE Phase 1 is replaced by the 3-packet exchange
A. Show IP route
B. Show routing table
C. netstat -nr
D. cpstat
A. Logging is not enabled in Global Properties
B. Logging is not enabled in Checkpoint Object
C. Checking the logs in SmartView Monitor
D. Logging is not enabled in rule number 10
A. VPN-1
B. SmartDefence
C. LDAP
D. SmartView Monitor
 Which SmartView application will you use when your manager asks you to generate a report containing the number of bytes transferred per IP address in your network during the last month?
A.
SmartView Status
B.
SmartView Tracker
C.
SmartUpdate
D.
SmartView Monitor
E.
Eventia ReporterÂ
A. fw monitor
B. fwm monitor
C. fw mon
D. fwm mon
A. 1
B. 2
C. 3
D. 4
E. None
A. It is a Hacking center
B. It correlates world wide traffic profiles to detect attacks
C. It is a DoS attack center
A. VPN-Pro
B. SmartCenter
C. Smart Clients
D. Eventia Reporter
A. 1
B. 2
C. 3
D. 4
A. Eventia Database
B. SmartView Tracker
C. SmartView Monitor
D. Local Database
A. log
B. auditlog
C. alog
D. adlog
A. Traditional mode
B. Simplified mode
C. Hybrid mode
D. Encryption mode
A. SmallPMTU
B. Teardrop
C. LAND
D. Smurfattack
E. Botnets
A. SmartView Status
B. SmartView Tracker
C. SmartUpdate
D. SmartView Monitor
E. SmartLSM
A. Session Layer
B. Data Link Layer
C. Network Layer
D. Application Layer
A. AD.Microsoft
B. AD_Microsoft
C. Microsoft_AD
D. Microsoft.AD
A. 172.16.1.0/24
B. 10.1.0.1/24
C. 172.16.0.0/24
D. 172.16.0.0/16
E. 10.1.1.0/16
A. Static NAT
B. Dynamic NAT
C. Hide NAT
D. NAT is not required
A. before Phase 1
B. after Phase 1
C. before Phase 2
D. after Phase 2
A. SmartView Status
B. SmartView Tracker
C. SmartUpdate
D. SmartView Monitor
E. SmartLSM
A. POP3
B. HTTP
C. SMTP
D. IMAP
E. HTTPS
F. FTP
A. netstat
B. ipconfig
C. ifconfig
D. traceroute
A. SmartView Status
B. SmartView Tracker
C. SmartUpdate
D. SmartView Monitor
E. SmartLSM
A. SmartView Status
B. SmartView Tracker
C. SmartUpdate
D. SmartView Monitor
E. SmartLSM
A. Checkpoint NGX wrapper
B. VPN-1 wrapper
C. IPSO
D. SecurePlatform
A. backup schedule
B. backup --sched
C. backup --schedule
D. backup --shd
A. 258
B. 259
C. 260
D. 18181
A. fw stat
B. fwm stat
C. fw statistics
D. fwm statistics
E. fw policy name
A. upgrade_restore
B. upgrade_import
C. upgrade_export
D. upgrade_import_restore
A. before Phase 1
B. after Phase 1
C. before Phase 2
D. after Phase 2
A. cpconfiguration
B. cpconfig
C. cputil
D. add guiclients
A. Ethereal
B. Nessus
C. TCPDUMP
D. Snort
Jeremy has to create 3 site-to-site VPNs. NJ is the central site and the remote sites are Bangalore and Dubai. Bangalore and Dubai can communicate with each other.
Which VPN topologies should he use to achieve it?
A.
Star topology for Banglore and Dubai VPN and Mesh for NJ VPNÂ Â
B.
Mesh topology for Banglore and Dubai VPN and Star for NJ VPNÂ
C.
Mesh topology for Banglore and Dubai VPN and Mesh for NJ VPN
D.
Star topology for Banglore and Dubai VPN and Star for NJ VPN
Which feature will you use to manage the different security policies for different gateways when you are managing more than one Enforcement modules from the SmartCenter?
A. Policy Package Management
B. Policy Management
C. Database revision control
D. Backup tools
A. At the top
B. Anywhere
C. At the bottom
D. In the middle
A. SmartView Status
B. SmartView Tracker
C. SmartDashboard
D. SmartView Monitor
E. SmartLSM
A. 3
B. 2
C. 5
D. 8
E. 6
Which network will you add in the antispoofing settings when there are two networks(192.168.0.0/24,172.16.0.0/24) behind the VPN-1 gateway?
A.
B. 172.16.0.0/24
C. 192.168.0.0/24 & 172.16.0.0/24
D. 192.168.0.0/16 & 172.16.0.0/16
A. It encrypts the entire packet
B. It encrypts the data portion
C. It encrypts the header portion
D. No encryption occurs
A. Global properties
B. Objects
C. Rule base
D. License
A. ACK
B. FIN
C. SYN
D. SYN/ACK
E. URG
A. Remove the unused rules
B. Enable log for all the rules
C. Keep the mostly used rules at the top
D. Collate the rules
A. Static NAT
B. Dynamic NAT
C. Hide NAT
D. None
A. Partial Automatic
B. Fully Automatic
C. Hybrid Login
D. Encrypted Sign on
E. Single Sign on