The order of NAT priorities is Static NAT, IP pool NAT, and hide NAT. Static NAT has the highest priority because it is a one-to-one mapping of a private IP address to a public IP address. IP pool NAT has the second highest priority because it is a one-to-many mapping of a private IP address to a pool of public IP addresses. Hide NAT has the lowest priority because it is a many-to-one mapping of multiple private IP addresses to a single public IP address1.
The three types of UserCheck messages are inform, ask, and block. Inform messages notify users about security events and do not require any user action. Ask messages prompt users to choose whether to allow or block an action. Block messages prevent users from performing an action and display a reason1. References: Check Point R81 Logging and Monitoring Administration Guide
Question # 46
Can you use the same layer in multiple policies or rulebases?
Options:
A.
Yes - a layer can be shared with multiple policies and rules.
B.
No - each layer must be unique.
C.
No - layers cannot be shared or reused, but an identical one can be created.
D.
Yes - but it must be copied and pasted with a different name.
You can use the same layer in multiple policies or rulebases. A layer is a set of rules that can be shared, reused, or inherited by different policies. This allows you to create modular and flexible security policies that can be applied to different scenarios.References: [Layers], [Policy Layers and Sub-Policies]
Question # 47
Which option in tracking allows you to see the amount of data passed in the connection?
Accounting is the option in tracking that allows you to see the amount of data passed in the connection. Accounting tracks the number of bytes and packets for each connection and generates reports based on the collected data. References: Certified Security Administrator (CCSA) R81.20 Course Overview, page 14.
The command that shows the installed licenses is cplic print. This command displays the license information on a Check Point server or Security Gateway. It shows the license type, expiration date, attached blades, etc. The other options are incorrect. print cplic is not a valid command. fwlic print is not a valid command. show licenses is not a valid command. References: [How to check license status on SecurePlatform / Gaia from CLI]
Question # 49
: 370
What technologies are used to deny or permit network traffic?
Options:
A.
Stateful Inspection. Firewall Blade, and URL'Application Blade
B.
Packet Filtenng. Stateful Inspection, and Application Layer Firewall
C.
Firewall Blade. URL/Application Blade and IPS
D.
Stateful Inspection. URL/Application Blade, and Threat Prevention
The technologies that are used to deny or permit network traffic are Stateful Inspection, Firewall Blade, and URL/Application Blade. Stateful Inspection is a technology that inspects network traffic at the packet level and maintains the state and context of each connection. Firewall Blade is a software blade that enforces security policy and prevents unauthorized access to protected resources. URL/Application Blade is a software blade that enables administrators to control access to millions of websites and applications based on users, groups, and machines.
The pen-symbol in the left column means that the rules have been edited by the logged in administrator, but the policy has not been published yet. It indicates that the changes are not yet effective and can be discarded.References: Policy Editor, Publishing Changes
Question # 51
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
Options:
A.
Detects and blocks malware by correlating multiple detection engines before users are affected.
B.
Configure rules to limit the available network bandwidth for specified users or groups.
C.
Use UserCheck to help users understand that certain websites are against the company’s security policy.
D.
Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.
The correct answer is A because detecting and blocking malware by correlating multiple detection engines before users are affected is not a feature of the Check Point URL Filtering and Application Control Blade3. This feature is part of the Check Point Anti-Virus and Anti-Bot Blades3. The other options are features of the Check Point URL Filtering and Application Control Blade3. References: Check Point R81 URL Filtering and Application Control Administration Guide
Correlation Unit is the SmartEvent component that creates events. It analyzes logs received from Security Gateways and Servers, and generates security events according to the definitions in the Consolidation Policy. References: [SmartEvent R80.40 Administration Guide], [Correlation Unit]
Question # 53
Which statement is TRUE of anti-spoofing?
Options:
A.
Anti-spoofing is not needed when IPS software blade is enabled
B.
It is more secure to create anti-spoofing groups manually
C.
It is BEST Practice to have anti-spoofing groups in sync with the routing table
D.
With dynamic routing enabled, anti-spoofing groups are updated automatically whenever there is a routing change
The statement that is TRUE of anti-spoofing is that it is BEST Practice to have anti-spoofing groups in sync with the routing table. Anti-spoofing prevents attackers from sending packets with a false source IP address. Anti-spoofing groups define which IP addresses are expected on each interface of the Security Gateway. If the routing table changes, the anti-spoofing groups should be updated accordingly34. References: Check Point R81 ClusterXL Administration Guide, Network Defined by Routes: Anti-Spoofing