Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
28 Cards in this Set
- Front
- Back
Administrators defined in Check Point Configuration Tool authenticate themselves with a Username and Passwording using |
asymmetric SIC |
|
Administrators defined in SmartDashboard can authenticate with what? |
Username and Password or with a Certificate (symmetric SIC) |
|
If this is the first time this SmartConsole is used to connect to the Security Management server, the administrator must manually authenticate the Security Management server using what? |
It's Fingerprint |
|
What is your primary tool for managing network and security resources? |
SMARTDASHBOARD |
|
What are the Object Trees? |
Network Objects (Gateways, Networks) Services (TCP, Citrix) Resources (URI, FTP) Servers and OPSEC Applications (Trusted CAs) Usernad Admins (access roles, user groups) VPN Communities (site to site, remote access) |
|
What is the Rule Base? |
the policy definitions of what is allowed and what is blocked by the firewall |
|
From what sources does Identity Awareness get its identities? |
AD query Identity Agent Terminal Servers Identity Agent Remote Access |
|
These security measures make sure of the safety of SIC: |
Certificates for authentication |
|
ICA is created when? |
During the MGMT server installation process |
|
When is the Internal Certificate Authority Created? |
When the Management Server is installed |
|
If there is a discrepancy between the CRL of two communicating components, which CRL is used? |
Always the newest |
|
After you install the certificate on a Security Gateway, if the Mobile Access Software Blade is enabled, what must you do/ |
You must install policy on the gateways again |
|
The users defined in SmartDashboard (and their authentication schemes and encryption keys) are saved where? |
To the proprietary Check Point Internal Users Database on the MGMT server |
|
How can you manually instsall the Users Database? |
Policy -> Install Database |
|
Changes to external groups take effect only after what? |
Security Policy is installed or after the Users Database is downloaded. |
|
What alllows you to easily group different type of policies? |
Policy Packages |
|
What allows you to associate each Policy Package with the appriopriate set of gates? |
Predefined Installation Targets |
|
ICA is located Where? |
MGMT server |
|
ICA issues certificates for what? |
SIC VPN certificates gateways Users |
|
SIC certificates are automatically renewed after what amount of time? |
75% of the validity time of the certificate ahs password |
|
SIC certifiticate Attributes: |
5 eyars 1024 bits, can be set to 2048 or 4096 KeyUsage: 5 |
|
By default, the CRL is valid for how long/ |
one week |
|
Fresh CRLs are issued |
when approximately 60% of the CRL validity period has passed |
|
How to get to management Portal |
https://ipMGMTserver:4433 |
|
cpwmd |
Web daemon cpwmd.elg |
|
cphttd.elg |
web server error log file |
|
What file stores the objects database on the MGMT server? |
$FWDIR/conf/objects_5_0.c |
|
When the MGMT server computes what file for the gateway during policy install? |
objects.c |