- (Exam Topic 2)
Which of the following is NOT a set of Regulatory Requirements related to Information Security?
Correct Answer:
A
ISO 37001 - Anti-bribery management systems
- (Exam Topic 2)
Which of the following is NOT a back up method?
Correct Answer:
A
The built-in Gaia backup procedures:
Snapshot Management
System Backup (and System Restore)
Save/Show Configuration (and Load Configuration)
Check Point provides three different procedures for backing up (and restoring) the operating system and networking parameters on your appliances.
Snapshot (Revert)
Backup (Restore)
upgrade_export (Migrate) References:
- (Exam Topic 2)
Which command is used to obtain the configuration lock in Gaia?
Correct Answer:
A
Obtaining a Configuration Lock
lock database override
unlock database
- (Exam Topic 4)
What does it mean if Deyra sees the gateway status
Choose the BEST answer.
Correct Answer:
A
- (Exam Topic 1)
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ____ .
Correct Answer:
B
To enable Identity Awareness:
Log in to SmartDashboard.
From the Network Objects tree, expand the Check Point branch.
Double-click the Security Gateway on which to enable Identity Awareness.
In the Software Blades section, select Identity Awareness on the Network Security tab.
The Identity Awareness
Configuration wizard opens.
Select one or more options. These options set the methods for acquiring identities of managed and unmanaged assets.
AD Query - Lets the Security Gateway seamlessly identify Active Directory users and computers
Browser-Based Authentication - Sends users to a Web page to acquire identities from unidentified users. If Transparent Kerberos Authentication is configured, AD users may be identified transparently.