|
Hi Freinds, Pls some one upload the dump ! If someone would like to post practicing questions from www.itcertkeys.com. Efforts will be highly appreciated
|
Question 1. You have two Nokia Appliances one IP530 and one IP380. Both Appliances have IPSO 39 and VPN-1 Pro NGX installed in a distributed deployment Can they be members of a gateway cluster? A. No, because the Gateway versions must not be the same on both security gateways B. Yes, as long as they have the same IPSO version and the same VPN-1 Pro version C. No, because members of a security gateway cluster must be installed as stand-alone deployments D. Yes, because both gateways are from Nokia, whether they have the same VPN-1 PRO version or not E. No, because the appliances must be of the same model (Both should be IP530orIP380.) Answer: B Question 2. You want VPN traffic to match packets from internal interfaces. You also want the traffic to exit the Security Gateway, bound for all site-to-site VPN Communities, including Remote Access Communities. How should you configure the VPN match rule? A. Internal_clear>- All_GwToGw B. Communities >- Communities C. Internal_clear>- External_Clear D. Internal_clear>- Communitis E. Internal_clear>-All_communitis Answer: E Question 3. Review the following rules and note the Client Authentication Action properties screen, as shown in the exhibit. After being authenticated by the Security Gateway when a user starts an HTTP connection to a Web site the user tries to FTP to another site using the command line. What happens to the user? The.... A. FTP session is dropped by the implicit Cleanup Rule. B. User is prompted from the FTP site only, and does not need to enter username and password for the Client Authentication. C. FTP connection is dropped by rule 2. D. FTP data connection is dropped, after the user is authenticated successfully. E. User is prompted for authentication by the Security Gateway again. Answer: B Question 4. After being authenticated by the Security Gateway, When a user starts an HTTP connection to a Web site, the user tries to FTP to another site using the command line. What happens to the user? The: A. FTP session is dropped by the implicit Cleanup Rule B. user is prompted from that FTP site on~, and does not need to enter username and password for Client Authentication C. FTP connection is dropped by rule2 D. FTP data connection is dropped, after the user is authenticated successfully E. User is prompted for authentication by the Security Gateway aqain Answer: B Question 5. You want to upgrade a SecurePlatform NG with Application Intelligence (AI) R55 Gateway to SecurePlalform NGX R60 via SmartUpdate. Which package is needed in the repository before upgrading? A. SVN Foundation and VPN-1 Express/Pro B. VPN-1 and FireWall-1 C. SecurePlalform NGX R60 D. SVN Foundation E. VPN-1 ProfExpress NGX R60 Answer: C Explanation: SecurePlatform Upgrade An IBM e305 server is configured as a SecurePlatform firewall with NG-AI HFA- 12. A new VPN-1 Pro/Express Gateway object is created in SmartDashboard. SIC is initialized and NG and NGX licenses are attached to the module.The starting point for the upgrade is illustrated in Figure 13.16. Figure 13.16 The Package Management View SecurePlatform Pre-Upgrade The next step is to add the SecurePlatform NGX to the Package Repository using the Add Package From CD option. Insert NGX CD1 containing the SmartUpdate client and click the Add Package From CD button in the toolbar to open a browse window. Select the appropriate drive and the packages are listed as displayed in Figure 13.17. p480, Configuring Check Point NGX VPN-1/FireWall-1, Syngress, 1597490318 Question 6. What is the command to see the licenses of the Security Gateway ITCertKeys from your SmartCenter Server? A. print ITCertKeys B. fw licprint ITCertKeys C. fw tab -t fwlic ITCertKeys D. cplic print ITCertKeys E. fw lic print ITCertKeys Answer: D Explanation: cplic print - prints details of Check Point licenses on the local machine. On a Module, this command will print all licenses that are installed on the local machine - both Local and Central licenses. P456, . NG COMMAND LINE INTERFACE Advanced Technical Reference Guide - NG FP3 Question 7. You set up a mesh VPN Community, so your internal network can access your partners network, and vice versa . Your Security Policy encrypts only FTP and HTTP traffic through a VPN tunnel. All traffic among your internal and partner networks is sent in clear text. How do you configure VPN Community? A. Disable 'accept all encrypted traffic', and put FTP and http in the Excluded services in the Community object Add a rule in the Security Policy for services FTP and http, with the Community object in the VPN field B. Disable "accept all encrypted traffic" in the Community, and add FTP and http services to the Security Policy, with that Community object in the VPN field C. Enable "accept all encrypted traffic", but put FTP and http in the Excluded services in the Community. Add a rule in the Security Policy with services FTP and http, and the Community object in theVPN field D. Put FTP and http in the Excluded services in the Community object Then add a rule in the Security Policy to allow any as the service, with the Community object in the VPN field Answer: B Question 8. Ophelia is the security Administrator for a shipping company. Her company uses a custom application to update the distribution database. The custom application includes a service used only to notify remote sites that the distribution database is malfunctioning. The perimeter Security Gateways Rule Base includes a rule to accept this traffic. Ophelia needs to be notified, via a text message to her cellular phone, whenever traffic is accepted on this rule. Which of the following options is MOST appropriate for Ophelia's requirement? A. User-defined alert script B. Logging implied rules C. SmartViewMonitor D. Pop-up API E. SNMP trap Answer: A Question 9. You are reviewing SmartView Tracker entries, and see a Connection Rejection on a Check Point QoS rule. What causes the Connection Rejection? A. No QoS rule exists to match the rejected traffic B. The number of guaranteed connections is exceeded. The rule's action properties are not set to accept additional connections C. The Constant Bit Rate for a Low Latency Class has been exceeded by greater than 10%, and the Maximal Delay is set below requirements D. Burst traffic matching the Default Rule is exhausting the Check Point QoS global packet buffers E. The guarantee of one of the rule's sub-rules exceeds the guarantee in the rule itself Answer: B Explanation: QoS rules with the track field set to Log can generate the following types of log events: QoS rejects a connection when the number of guaranteed connections is exceeded, and/or when the rule's action properties are not set to accept additional connections. 359, accel_ccse_ngx Question 10. Choose the BEST sequence for configuring user management on Smart Dash board, for use with an LDAP server A. Enable LDAP in Global Properties, configure a host-node object for the LDAP Server, and configure a server object for the LDAP Account Unit B. Configure a workstation object for the LDAP server, configure a server object for the LDAP Account Unit, and enable LDAP in Global Properties C. Configure a server object for the LDAP Account Unit, enable LDAP in Global Properties, and create an LDAP server using an OPSEC application D. Configure a server object for the LDAP Account Unit, enable LDAP in Global Properties, and create an LDAP resource object E. Configure a server object for the LDAP Account Unit, and create an LDAP resource object Answer: A Explanation: 340, Check Point Security Administration NGX I Student Handbook
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.