• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/73

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

73 Cards in this Set

  • Front
  • Back
What provides visual tracking, monitoring, and accounting information for all connections logged by Check Point components?
SmartView Tracker
What is the API for exporting Security Gateway log data to other applications, such as spreadsheets or databases?
Log Export Application (LEA)
(T/F) Reporting and event-analysis applications are available from multiple OPSEC partners.
True
What types of logs are defined in SmartView Tracker? (2)
Predefined
Custom
What are the 3 SmartView Tracker tabs?
Network & Endpoint
Active
Management
What SmartView Tracker tab displays the default view and shows all security related events?
Network & Endpoint
What SmartView Tracker tab displays currently open connections?
Active
(T/F) Switching to Active mode will not have an effect on system resource utilization.
False.
What SmartView Tracker tab displays changes made to objects in the rule base and tracks general SmartDashboard use?
Management
(T/F) When using 'Save Log File As' only records that match the selection criteria (visible and non-visible) will be saved to the files.
True
In Tracker, when you create a new log file using the current file is _________ and ________________ with a name that includes the ____________ and __________.
Closed
Written to disk
Current time
Current date
How many log files can be open in Tracker at a time?
one
What is the default log file path and name for log mode?
$FWDIR/log/fw.log
What is the default log file path and name for audit mode?
$FWDIR/log/fwadt.log
How do you configure a name other the default name for a log?
Clear the default box and specify a new name.
On the Tracker toolbar, which option will allow you to transfer log files from a remote machine to the current machine?
Remote Files Management
On the Tracker toolbar, which option toggles the display of the Files Fetch Progress Window?
Show or hide Fetch Progress
On the Tracker toolbar, what can you do by selecting Query Options? (4)
Toggle the dispolay of the query tree pane.
Open an existing query
Save a custom query
Save a custom query under a new name
What format are log entries saved as when using the File > Export?
*.txt
In Tracker, how do you delete all entries in the log file regardless of which entries are selected.
File > Purge Active File
What are some of the entries you will find in Administrator Auditing? (6)
Administrator login, administrator logout, Object creation, object deletion, object editing, and changes in the rule base.
(T/F) Using the Management Tab in Tracker, it is not possible see changes made by a specific administrator.
False
(T/F) Using the Management Tab in Tracker, it is possible to see who modified an object and what changes were made.
True
Where can the Global Properties - Log and Alert window be found?
Policy > Global Policies > Log and Alert
allez-vous d'étudier les options à partir de la page 229?
Oui!
What specifies the minimum amount of time between successive logs of similar packets?
Excessive log grace period.
What aspects of "similar" packets are the same? (5)
Source address, source port, destination address, destination port, and protocol.
How do you change the frequency with which the SMS queries Check Point Gateways for status information?
Policy > Global Properties > Log and Alert > Time Settings > Status Fetching Interval
What function in Tracker do you use to terminate an active connection and block further connections from and to specific IP addresses?
Block Intruder
What Tracker mode must you be in to terminate and block active connections?
Active Mode
How do you block an active connection with Block Intruder?
Active Mode > Select Connection > Tools > Block Intruder
What are the 3 options for Blocking Scope in the Block Intruder tool?
Block all connections with the same source, destination, and service.
Block access from this source
Block access to this destination
What are the 2 options for Blocking Timeout in the Block Intruder tool?
Indefinite
For <#> minutes
What are the 2 options for the "Force this blocking" field in the Block Intruder tool?
Only on <gateway>
On any Security Gateway
How do you unblock a connection in Tracker?
Tools > Clear Blocking
What provides a single, central interface for monitoring network activity, and performance of Check Point applications?
SmartView Monitor
(T/F) SmartView Monitor is not capable of custom views.
False
What protocol does the Management Server use to collect information about specific gateways that are installed?
Application Monitoring (AMON)
In the collection of status information for Monitor's Gateway Status View the __________ is the client and the __________ is the server.
Management Server
Gateway
What do System Counters provide in Gateway Status View?
in-depth details on Gateway use and activity.
What can you generate system status information about in Gateway Status View? (3)
Resource user
Gateway performance statistics
Detect & monitor suspicious activity
What are some of the things that can be monitored in Monitor's Tunnels View? (3)
Tunnel Status
VPN Community
Gateways associated with a tunnel
(T/F) Monitor recognizes tunnel malfunctions and connectivity problems by constantly monitoring and analyzing the status of an organization's tunnels.
True
In Monitor's Tunnels View, what are used to generate fully detailed reports that include information about all tunnels that fulfill specific conditions?
Tunnel queries
What Monitor view is uses to keep track of VPN remote users currently logged in?
Remote Users View
Which Monitor view utilizes the Integrity Server compliance capability to verify connections arriving from various hosts across the internal network?
Cooperative Enforcement
(T/F) Cooperative enforcement does not test all hosts initiating a connection for compliance.
False
Where can you view logs related to Cooperative Enforcement that are generated for both authorized or unauthorized hosts?
SmartView Monitor
What are security rules that enable the administrator to instantly block suspicious connections that are not restricted by the currently enforced security policy?
Suspicious Activity Rules
(T/F) Suspicious Activity Rules require a policy push to be enforced.
False
What is the path of a Monitor alert? (3)
Gateway > SMS > SmartView Monitor (SmartConsole)
Under what conditions are alerts sent?
When traffic matches a rule with Alert is set as the Action.
When a system event surpasses a configured threshold.
(T/F) Administrators can define alerts to be sent for different gateways
True
What is the default location for an alert to be sent?
SmartView Monitor on the admin's desktop.
(T/F) It is possible to define alerts for QoS that would not apply to Connectra
True
(T/F) Alerts can be Global or per Gateway.
True
SmartView Monitors gathers status information about Check Point objects and __________.
OPSEC objects
After reviewing the status of certain clients in Monitor you decide to take decisive action for a client or cluster member. What are your choices? (2)
Disconnect client
Start/Stop Cluster Member
How do you start or stop a cluster member in Monitor?
Right click the object and choose stop or start member
Where do you configure alerts in SmartDashboard?
Policy > Global Properties > Log and Alerts > Alert Commands
How do you view active alerts in Monitor?
Tools > Alerts
(T/F) Studying the scenarios on 248 will give you a better perspective.
True
(Tracker/Monitor) What would be used to endure network components are operating properly
Tracker (That's what the book says. I disagree)
(Tracker/Monitor) What would be used to troubleshoot system and security (rules) issues.
Tracker
(Tracker/Monitor) What would be used to gather information for legal or audit purposes.
Tracker
(Tracker/Monitor) What would be used to generate reports to analyze network-traffic patterns.
Tracker
(Tracker/Monitor) What would be used to temporarily or permanently terminate connections form specific IP addresses.
Tracker
(Tracker/Monitor) What would be used to centrally view Check Point and OPSEC devices
Monitor
(Tracker/Monitor) What would be used to present a complete picture of changes to gateways, tunnels, remote users, and security activities.
Monitor
(Tracker/Monitor) What would be used to immediately identify changes in traffic flow patterns that may signify malicious activity.
Monitor
(Tracker/Monitor) What would be used to maintain high network availability?
Monitor
(Tracker/Monitor) What would be used to improve efficiency of bandwidth use.
Monitor
(Tracker/Monitor) What would be used to track SLA compliance
Monitor