What kind of users are to be defined via SmartDashboard?
You are about to integrate RSA SecurID users into the Check Point infrastructure. What kind of users are to be
defined via SmartDashboard?
what object SHOULD be added?
According to Check Point Best Practice, when adding a non-managed Check Point Gateway to a Check Point
security solution what object SHOULD be added? A(n):
What are the two types of credentials used for authenti…
VPN gateways must authenticate to each other prior to exchanging information. What are the two types of
credentials used for authentication?
What happens when you run the command: fw sam -J src [S…
What happens when you run the command: fw sam -J src [Source IP Address]?
what changes could you make to accommodate Rule 4?
Which of the following is NOT a valid option when confi…
Which of the following is NOT a valid option when configuring access for Captive Portal?
What should you look for?
A client has created a new Gateway object that will be managed at a remote location. When the client attempts
to install the Security Policy to the new Gateway object, the object does not appear in the Install On check box.
What should you look for?
What is also referred to as Dynamic NAT?
What is also referred to as Dynamic NAT?
How many packets does the IKE exchange use for Phase 1 …
How many packets does the IKE exchange use for Phase 1 Main Mode?
What should she do?
Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use her iPad to
access the internal Finance Web server. Because the iPad is not a member of the Active Directory domain, she
cannot identify seamlessly with AD Query. However, she can enter her AD credentials in the Captive Portal and
then get the same access as on her office computer. Her access to resources is based on rules in the R77
Firewall Rule Base.
To make this scenario work, the IT administrator must:
1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity Sources.
2) In the Portal Settings window in the User Access section, make sure that Name and password login is
selected.
3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network destinations. Select
accept as the Action.
4) Install policy.Ms McHanry tries to access the resource but is unable. What should she do?