• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/28

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

28 Cards in this Set

  • Front
  • Back

Administrators defined in Check Point Configuration Tool authenticate themselves with a Username and Passwording using

asymmetric SIC

Administrators defined in SmartDashboard can authenticate with what?

Username and Password or with a Certificate (symmetric SIC)

If this is the first time this SmartConsole is used to connect to the Security Management server, the administrator must manually authenticate the Security Management server using what?

It's Fingerprint

What is your primary tool for managing network and security resources?

SMARTDASHBOARD

What are the Object Trees?

Network Objects (Gateways, Networks)


Services (TCP, Citrix)


Resources (URI, FTP)


Servers and OPSEC Applications (Trusted CAs)


Usernad Admins (access roles, user groups)


VPN Communities (site to site, remote access)

What is the Rule Base?

the policy definitions of what is allowed and what is blocked by the firewall

Rules use Objects

From what sources does Identity Awareness get its identities?

AD query
Browser-Based Auth


Identity Agent


Terminal Servers Identity Agent


Remote Access

These security measures make sure of the safety of SIC:

Certificates for authentication
Standards-based SSL for the creation of the secure channel
3DES for encryption

ICA is created when?

During the MGMT server installation process

When is the Internal Certificate Authority Created?

When the Management Server is installed

If there is a discrepancy between the CRL of two communicating components, which CRL is used?

Always the newest

After you install the certificate on a Security Gateway, if the Mobile Access Software Blade is enabled, what must you do/

You must install policy on the gateways again

The users defined in SmartDashboard (and their authentication schemes and encryption keys) are saved where?

To the proprietary Check Point Internal Users Database on the MGMT server

How can you manually instsall the Users Database?

Policy -> Install Database

Changes to external groups take effect only after what?

Security Policy is installed or after the Users Database is downloaded.

What alllows you to easily group different type of policies?

Policy Packages

What allows you to associate each Policy Package with the appriopriate set of gates?

Predefined Installation Targets

ICA is located Where?

MGMT server

ICA issues certificates for what?

SIC


VPN certificates gateways


Users

SIC certificates are automatically renewed after what amount of time?

75% of the validity time of the certificate ahs password

SIC certifiticate Attributes:

5 eyars


1024 bits, can be set to 2048 or 4096


KeyUsage: 5

By default, the CRL is valid for how long/

one week

Fresh CRLs are issued

when approximately 60% of the CRL validity period has passed
immediately following the revocation of a certificate

How to get to management Portal

https://ipMGMTserver:4433

cpwmd

Web daemon


cpwmd.elg

cphttd.elg

web server error log file

What file stores the objects database on the MGMT server?

$FWDIR/conf/objects_5_0.c

When the MGMT server computes what file for the gateway during policy install?

objects.c