• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back
What technologies does Check Point use to grant or deny traffic.
Packet Filtering
Application Intelligence
Stateful Inspection
What layers of the OSI do Packet Filtering work at?
3 (network) and 4 (transport)
What elements will a typical rule include?
Source address
Destination address
Source port
Destination port
Protocol
What is the least secure type of firewall?
Packet-filter firewall
Stateful inspection includes layer ____ awareness into the standard packet-filter firewall architecture?
Layer 4
Stateful inspection not only inspects the it's header but also?
The content of the packet through layer 7
The state of a connection is monitored and put into the?
State Table
How does Stateful Inspection prevent port scanning.
It keeps all ports closed on a host until a allowed port is requested
What is used to extract state related information out of the state table from all application layers?
INSPECT Engine.
What enforces security policies on the gateways?
INSPECT Engine.
What is integrated into the firewall and IPS to prevent application layer attacks?
Application Intelligence.
Where in the is the OS kernel placed?
Between the NIC and TCP/IP Stack
Why is the OS Kernel placed between the NIC and the TCP/IP stack?
To protect the TCP/IP stack.
After packets pass the NIC where are they sent?
To the inspection module.
After packets pass the Inspection module where are they passed to?
TCP/IP stack
Bridging creates a layer ____ relation ship between 2 or more interfaces.
2
A gateway in bridge mode is invisible to all layer _____ traffic
3
What are the 4 critical layers of network security Check Point provides protections for?
Network perimeter
Network Core
the Web
the end points
What application is used to manage all aspects of the gateway and the management station?
Smart Console
Name the smart console components
SmartDashboard
SmartEvent
SmartProvisioning
SmartReporter
SmartUpdate
SmartView Monitor
SmartView Tracker
What a component is used to control policy?
SmartDashboard
What tabs are available to control/manage network policies?
Firewall
NAT
IPS
Anti Spam and Mail
Anti Virus and URL Filtering
SSL VPN
IPSEC VPN
QoS
DLP
Desktop
What is the DLP tab for?
Data Loss Prevention tab used to see the status of machines and incidents.
What is the Desktop tab for?
Used to control access to desktop, both in the local network and also connecting remotely.