CheckPoint Check Point Certified Security Administrator R71 Sample Questions:
1. You are MegaCorp's Security Administrator. There are various network objects which must be NATed. Some of them use the Automatic Hide NAT method, while others use the Automatic Static NAT method. What is the order of the rules if both methods are used together? Give the best answer.
A) The Hide NAT rules have priority over the Static NAT rules and the NAT on a node has priority over the NAT on a network or an address range
B) The Administrator decides on the order of the rules by shifting the corresponding rules up and down.
C) The position of the rules depends on the time of their creation. The rules created first are placed at the top; rules created later are placed successively below the others.
D) The Static NAT rules have priority over the Hide NAT rules and the NAT on a node has priority over the NAT on a network or an address range
2. You need to completely reboot the Operating System after making which of the following changes on the Security Gateway? i.e. the command cprestart is not sufficient.
A) 3 only
B) 1, 2, 3, 4, and 5
C) 2, 3 only
D) 3, 4, and 5 only
3. Because of a pre-existing design constraints, you set up manual NAT rules for your HTTP server. However, your FTP server and SMTP server are both using automatic NAT rules. All traffic from your FTP and SMTP servers are passing through the Security Gateway without a problem, but traffic from the Web server is dropped on rule 0 because of anti-spoofing settings. What is causing this?
A) Allow bi-directional NAT is not checked in Global Properties.
B) Routing is not configured correctly.
C) Translate destination on client side is not checked in Global Properties under manual NAT rules.
D) Manual NAT rules are not configured correctly.
4. While in Smart View Tracker, Brady has noticed some very odd network traffic that he thinks could be an intrusion. He decides to block the traffic for 60 but cannot remember all the steps. What is the correct order of steps needed to perform this?
1) Select the Active Mode tab In Smart view Tracker
2) Select Tools > Block Intruder
3) Select the Log Viewing tab in SmartView Tracker
4) Set the Blocking Time out value to 60 minutes
5) Highlight the connection he wishes to block
A) 3, 2, 5, 4
B) 1, 2, 5, 4
C) 1, 5, 2, 4
D) 3, 5, 2, 4
5. Which feature in R71 permits blocking specific IP addresses for a specified time period?
A) HTTP Methods
B) Local Interface Spoofing
C) Block Port Overflow
D) Suspicious Activity Monitoring
Solutions:
Question # 1 Answer: D | Question # 2 Answer: C | Question # 3 Answer: C | Question # 4 Answer: C | Question # 5 Answer: D |