Exam Name: Check Point Certified Security Expert Plus



Similar documents
Check Point Security Administrator R70

Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel

Get Success in Passing Your Certification Exam at first attempt!

Firewall Troubleshooting

Ford ANX Troubleshooting Procedure for use by Trading Partners

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

10 Configuring Packet Filtering and Routing Rules

VPN-1 VE Evaluation Guide

8. Firewall Design & Implementation

Using IPsec VPN to provide communication between offices

Securing Networks with PIX and ASA

INTRODUCTION TO FIREWALL SECURITY

Creating a VPN with overlapping subnets

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Check Point NGX VoIP Hotfix-1 Release Notes June 2006

Table of Contents. Introduction

Chapter 7. Firewalls

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Release Notes. Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 2 Known Issues... 3 Resolved Issues...

Cornerstones of Security

SIP Trunking Configuration with

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Polycom. RealPresence Ready Firewall Traversal Tips

How to Open HTTP or HTTPS traffic to a webserver behind the NetVanta 2000 Series unit (Enhanced OS)

This article describes a detailed configuration example that demonstrates how to configure Cyberoam to provide the access of internal resources.

Cisco PIX vs. Checkpoint Firewall

Chapter 4 Customizing Your Network Settings

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others

Check Point FireWall-1 HTTP Security Server performance tuning

Network Agent Quick Start

DMZ Network Visibility with Wireshark June 15, 2010

Firewall and Router Policy

CS Computer and Network Security: Firewalls

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure

Scenario: Remote-Access VPN Configuration

Checkpoint Check Point Provider-1 NGX (v4) Practice Test. Version 2.1

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

Configuring PA Firewalls for a Layer 3 Deployment

Lab Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance

Release Notes. Pre-Installation Recommendations... 1 Platform Compatibility... 1 Known Issues... 2 Resolved Issues... 2 Troubleshooting...

Electronic Service Agent TM. Network and Transmission Security And Information Privacy

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

Focus on Security. Keeping the bad guys out

Cisco Secure PIX Firewall with Two Routers Configuration Example

CS Computer and Network Security: Firewalls

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Advanced VPN Concepts and Tunnel Monitoring

Configuring Static and Dynamic NAT Simultaneously

Scenario: IPsec Remote-Access VPN Configuration

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

About Firewall Protection

Implementing Network Address Translation and Port Redirection in epipe

Troubleshooting the Firewall Services Module

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Load Balance Router R258V

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network

Websense Web Security Gateway: What to do when a Web site does not load as expected

SonicWALL PCI 1.1 Implementation Guide

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

CSC574 - Computer and Network Security Module: Firewalls

Firewall Environments. Name

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

A Model Design of Network Security for Private and Public Data Transmission

Windows Server Firewall Configuration

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Virtual Fragmentation Reassembly

H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5)

SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks

Journaling Guide for Archive for Exchange 2007

Lab Diagramming Intranet Traffic Flows

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Release Notes. Contents. Release Purpose. Pre-Installation Recommendations. Platform Compatibility. Dell SonicWALL Global VPN Client 4.

Security Technology: Firewalls and VPNs

Firewall Defaults and Some Basic Rules

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Fortinet Network Security NSE4 test questions and answers:

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services (5 days)

Contents. Pre-Installation Recommendations. Platform Compatibility. G lobal VPN Client SonicWALL Global VPN Client for 64-Bit Clients

How to Logon with Domain Credentials to a Server in a Workgroup

McAfee Firewall Enterprise 8.2.1

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

McAfee Next Generation Firewall (NGFW) Administration Course

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

74% 96 Action Items. Compliance

How To Configure Syslog over VPN

Network Connect Performance Logs on MAC OS

Troubleshooting the Firewall Services Module

LifeSize Transit Deployment Guide June 2011

M2M Series Routers. Port Forwarding / DMZ Setup

Sample Configuration Using the ip nat outside source static

This section provides a summary of using network location profiles to identify network connection types. Details include:

F-SECURE MESSAGING SECURITY GATEWAY

Transcription:

Exam Code: 156-515 Exam Name: Check Point Certified Security Expert Plus NGX Vendor: Check Point Version: DEMO

Part: A 1: Which files should be acquired from a Windows 2003 Server system crash with a Dr. Watson error? A.drwtsn32.log B.vmcore.log C.core.log D.memory.log E.info.log Correct Answers: A 2: VPN debugging information is written to which of the following files? A.FWDIR/log/ahttpd.elg B.FWDIR/log/fw.elg C.$FWDIR/log/ike.elg D.FWDIR/log/authd.elg E.FWDIR/log/vpn.elg 3: fw monitor packets are collected from the kernel in a buffer. What happens if the buffer becomes full? A.The information in the buffer is saved and packet capture continues, with new data stored in the buffer. B.Older packet information is dropped as new packet information is added. C.Packet capture stops. D.All packets in it are deleted, and the buffer begins filling from the beginning. 4: Which file provides the data for the host_table output, and is responsible for keeping a record of all internal IPs passing through the internal interfaces of a restricted hosts licensed Security Gateway? A.hosts.h B.external.if C.hosts D.fwd.h E.fwconn.h 5: You modified the *def file on your Security Gateway, but the changes were not applied. Why? A.There is more than one *.def file on the Gateway. B.You did not have the proper authority. C.*.def files must be modified on the SmartCenter Server. D.The *.def file on the Gateway is read-only.

6: Assume you have a rule allowing HTTP traffic, on port 80, to a specific Web server in a Demilitarized Zone (DMZ). If an external host port scans the Web server's IP address, what information will be revealed? A.Nothing; the NGX Security Server automatically block all port scans. B.All ports are open on the Security Server. C.All ports are open on the Web server. D.The Web server's file structure is revealed. E.Port 80 is open on the Web server. 7: Which of the following types of information should an Administrator use tcpdump to view? A.DECnet traffic analysis B.VLAN trunking analysis C.NAT traffic analysis D.Packet-header analysis E.AppleTalk traffic analysis 8: Which statement is true for route based VPNs? A.IP Pool NAT must be configured on each gateway B.Route-based VPNs replace domain-based VPNs C.Route-based VPNs are a form of partial overlap VPN Domain D.Packets are encrypted or decrypted automatically E.Dynamic-routing protocols are not required 9: The list below provides all the actions Check Point recommends to troubleshoot a problem with an NGX product. A.List Possible Causes B.Identify the Problem C.Collect Related Information D.Consult Various Reference Sources E.Test Causes Individually and Logically Select the answer that shows the order of the recommended actions that make up Check Point's troubleshooting guidelines? A.B, C, A, E, D B.A, E, B, D, C C.A, B, C, D, E D.B, A, D, E, C E.D, B, A, C, E Correct Answers: A 10: NGX Wire Mode allows:

A.Peer gateways to establish a VPN connection automatically from predefined preshared secrets. B.Administrators to verify that each VPN-1 SecureClient is properly configured, before allowing it access to the protected domain. C.Peer gateways to fail over existing VPN traffic, by avoiding Stateful Inspection. D.Administrators to monitor VPN traffic for troubleshooting purposes. E.Administrators to limit the number of simultaneous VPN connections, to reduce the traffic load passing through a Security Gateway. 11: Which of the following commands identifies whether or not a Security Policy is installed or the Security Gateway is operating with the Initial Policy? A.fw monitor B.cp policy C.cp stat D.fw policy E.fw stat 12: A SecuRemote/SecureClient tunnel test uses which port? A.UDP 18233 B.UDP 2746 C.UDP 18234 D.TCP 18231 E.UDP 18321 13: Which of the following vpn debug options purges ike.elg and vpnd.elg, and creates a time stamp before starting ike debug and vpn debug at the same time? A.ike on B.timeon C.trunc D.ikefail E.mon 14: Gus is troubleshooting a problem with SMTP. He has enabled debugging on his Security Gateway and needs to copy the *.elg files into an archive to send to Check Point Support. Which of the following files does Gus NOT need to send? A.fwd.elg B.mdq.elg C.diffserv.elg D.asmtpd.elg

15: How can you view cpinfo on a SecurePlatform Pro machine? A.snoop -i B.infotab C.tcpdump D.Text editor, such as vi E.infoview 16: When VPN-1 NGX starts after reboot, with no installed Security Policy, which of these occurs? A.All traffic except HTTP connections is blocked. B.All traffic except SmartDefense Console connections is blocked. C.All traffic is blocked. D.All traffic except SmartConsole/SmartCenter Server connections is blocked. E.All traffic is allowed. 17: Which of the following commands would you run to debug a VPN connection? A.debug vpn ike B.debug vpn ikeon C.vpn debug ike D.debug vpn ike on E.vpn debug ikeon 18: Which one of these is a temporary pointer log file? A.$FWDIR/log/xx.logptr B.$FWDIR/log/xx.log C.$FWDIR/log/xx.logaccount_ptr D.$FWDIR/log/xx.logLuuidDB 19: When collecting information relating to the perceived problem, what is the most important question to ask? A.Is this problem repeatable? B.Is this problem software or hardware related? C.Under what circumstances does this problem occur? D.What action or state am I trying to achieve? E.Does the problem appear random or can you establish a pattern? 20: The virtual machine inspects each packet at the following points: -Before the virtual machine, in the inbound direction (i or PREIN) -After the virtual machine, in the inbound direction (I or POSTIN)

-Before the virtual machine, in the outbound direction (o or PREOUT) -After the virtual machine, in the outbound direction (O or POSTOUT) If Ethereal displays a packet with i, I, o, and O entries, what does that likely indicate? A.The packet was rejected by the Rule Base. B.The packet was destined for the Gateway. C.Nothing unusual; the o and O entries only appear if there is a kernel-level error. D.The packet was rerouted by the Gateway's OS. E.The packet arrived at the kernel and left the Security Gateway successfully.