1.
An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office. Both offices are protected by Check Point Security Gateway managed by the same Security Management Server. While configuring the VPN community to specify the pre-shared secret the administrator found that the check box to enable pre-shared secret is shared and cannot be enabled. Why does it not allow him to specify the pre-shared secret?
2.
ABC Corp., and have recently returned from a training course on Check Points new advanced R80 management platform. You are presenting an in-house R80 Management to the other administrators in ABC Corp. How will you describe the new "Publish" button in R80 Management Console?
3.
Which of the following ClusterXL modes uses a non-unicast MAC address for the cluster IP address.
4.
Fill in the blank: With the User Directory Software Blade, you can create R80 user definitions on a(an) ___________ Server.
5.
Which of the following is NOT a component of a Distinguished Name?
6.
What are the three authentication methods for SIC?
7.
You have enabled Full Log as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?
8.
What is the order of NAT priorities?
9.
Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?
10.
Ken wants to obtain a configuration lock from other administrator on R80 Security Management Server. He can do this via WebUI or a via CLI. Which command should be use in CLI? Choose the correct answer.