Question 6 of 536

Which of the following Automatically Generated Rules NAT rules have the lowest implementation priority?
Answer

Suggested Answer

The suggested answer is B, C.

In SmartDashboard, the automatic NAT rules are organized as follows: first, Static NAT rules for Firewall or node (computer or server) objects have the highest priority, followed by Hide NAT rules for Firewall or node objects. Then come Static NAT rules for network or address range objects. Finally, Hide NAT rules for network or address range objects have the lowest priority. Therefore, both Address Range Hide NAT and Network Hide NAT have the lowest implementation priority.

Community Votes3 votes
CMost voted
100%
Question 7 of 536

VPN gateways authenticate using ___________ and ___________ .
Answer

Suggested Answer

The suggested answer is B.

VPN gateways authenticate using Digital Certificates and Pre-shared secrets.
Reference:
https://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/85469.htm
Question 8 of 536

In R80 spoofing is defined as a method of:
Answer

Suggested Answer

The suggested answer is D.

Spoofing in the context of R80 refers to making packets appear as if they come from an authorized IP address. This method involves attackers using a fake, trusted IP address to hijack connections, send malware, perform DoS attacks, or gain unauthorized access to a network. This is consistent with the definition and purpose of IP spoofing in network security.

Question 9 of 536

The __________ is used to obtain identification and security information about network users.
Answer

Suggested Answer

The suggested answer is A.

Reference:
https://www.checkpoint.com/downloads/product-related/datasheets/DS_UserDirectorySWB.pdf
Question 10 of 536

Which Check Point Application Control feature enables application scanning and detection?
Answer

Suggested Answer

The suggested answer is B.

AppWiki Application Classification Library
AppWiki enables application scanning and detection of more than 5,000 distinct applications and over 300,000 Web 2.0 widgets including instant messaging, social networking, video streaming, VoIP, games and more.
Reference:
https://www.checkpoint.com/products/application-control-software-blade/