156-315.80 Check Point Certified Security Expert - R80 Exam
Get link
Facebook
X
Pinterest
Email
Other Apps
Certified Professionals Only Training and Certification Check Point training and certification gives you the critical skills and
knowledge you need to successfully implement and manage Check Point solutions
and earn Check Point’s globally recognized certifications.
Already CCSE Certified in any prior version?
If you have any prior CCSE certification, you are eligible for the CCSE Update
exam (156-915).
Courses and exams are now available, so register for training and certifications
from your local Check Point Authorized Training Centers (ATC) today. Learn more
using the links below or contact your local Authorized Training Center for
availability.
Locate an ATC
Looking to Stand Out from the Crowd? The Check Point Certified Professional has already proven his or her
commitment to providing industry leading Threat Prevention and Data Protection
to their customers. The Professional can further demonstrate that commitment by
choosing to upgrade to the Enterprise-level Check Point Certified Managed
Security Expert Certification (156-820 exam) or demonstrate a deeper knowledge
of security systems with the capstone level Check Point Security Master
certification (156-115 exam).
Recognition Every Check Point certification carries a unique logo that professionals can
leverage as an added bonus to their credentials. This link provides the logos as
well as logo usage rights.
*Course length and price may vary by ATC. Please contact your local ATC for
detailed information.
Preface The Check Point Certified Security Engineering Exam
The Check Point Security Engineering course provides an understanding of
upgrading and advanced configuration of Check Point software blades, installing
and managing VPNs (on both internal and
external networks), gaining the maximum security from Security Gateways, and
resolving Gateway performance issues.
The Check Point Security Engineering Study Guide supplements knowledge you have
gained from the Security Engineering course, and is not a sole means of study.
The Check Point Certified Security Engineering #156-315.13 exam covers the
following topics:
The process for backup of a Security Gateway and Management Server using your
understanding of the differences between backups, snapshots, and
upgrade-exports.
The process for upgrade of Management Server using a database migration.
How to perform debugs on firewall processes.
Building, testing and troubleshooting a ClusterXL Load Sharing deployment on
an enterprise network.
Building, testing and troubleshooting a ClusterXL High Availability deployment
on an enterprise network.
Building, testing and troubleshooting a management HA deployment on an
enterprise network.
Configuring, maintaining and troubleshooting SecureXL and CoreXL acceleration
solutions on the corporate network traffic to ensure noted performance
enhancement on the firewall.
Building, testing and troubleshooting a VRRP deployment on an enterprise
network.
Using an external user database such as LDAP, to configure User Directory to
incorporate user information for authentication services on the network.
Managing internal and external user access to resources for Remote Access or
across a VPN.
Troubleshooting a site-to-site or certificate-based VPN on a corporate gateway
using
IKEView, VPN log files and command-line debug tools.
Optimizing VPN performance and availability using Link Selection and Multiple
Entry Point solutions.
Managing and testing corporate VPN tunnels to allow for greater monitoring and
scalability with multiple tunnels defined in a community including other VPN
providers.
Creating Events and using existing event definitions to generate reports on
specific network traffic using SmartReporter and SmartEvent in order to provide
industry compliance information to management.
Troubleshoot report generation given command-line tools and debug-file
information.
Chapter 1: Upgrading 1 Upgrades are used to save Check Point product configurations, Security
Policies, and objects, so that Security
Administrators do not need to re-create Gateway and Security Management Server
configurations.
Objectives:
• Perform a backup of a Security Gateway and Management Server using your
• Understanding of the differences between backups, snapshots, and
upgrade-exports.
• Upgrade and troubleshoot a Management Server using a database migration.
• Upgrade and troubleshoot a clustered Security Gateway deployment.
Topics
The following table outlines the topics covered in the “Upgrading” chapter of
the Check Point Security
Engineering Course. This table is intended as a supplement to knowledge you have
gained from the
Security Engineering Courseware handbook, and is not meant to be a sole means of
study.
Topics Key Elements
Backup and Restore Security Gateways and
Management Servers
Snapshot management
Upgrade Tools
Backup Schedule Recommendations
Upgrade Tools
Performing Upgrades
Support Contract
Upgrading Standalone Full High
Availability
Lab 1: Upgrading to Check Point R77 Install Security Management Server
Migrating Management server Data
Importing the Check Point Database
Launch SmartDashboard
Upgrading the Security Gateway
Table 1-1: Upgrade Topics
Sample CCSE Exam Question
During an upgrade to the management server, the contract file is transferred to
a gateway when the gateway is upgraded. Where is the contract file retrieved
from:
1) ISO
2) Technical Support
3) Management.
4) User Center.
Answer
During an upgrade to the management server, the contract file is transferred to
a gateway when the gateway is upgraded. Where is the contract file retrieved
from:
1) ISO
2) Technical Support
3) Management.
4) User Center.
Chapter 2: Advanced Firewall 2 The Check Point Firewall Software Blade builds on the award-winning
technology, first offered in
Check Point’s firewall solution, to provide the industry’s best gateway security
with identity
awareness. Check Point’s firewalls are trusted by 100% of Fortune 100 companies
and deployed by
over 170,000 customers. Check Point products have demonstrated industry
leadership and continued innovation since the introduction of FireWall-1 in
1994.
Objectives:
• Using knowledge of Security Gateway infrastructure, including chain modules,
packet flow
and kernel tables to describe how to perform debugs on firewall processes.
Topics
The following table outlines the topics covered in the “Advanced Firewall”
chapter of the Check Point
Security Engineering Course. This table is intended as a supplement to knowledge
you have gained from
the Security Engineering Courseware handbook, and is not meant to be a sole
means of study.
Topic Key Element
Check Point Firewall Infrastructure GUI Clients
Management
Security Gateway User and Kernel Mode Processes
CPC Core Process
FWM
FWD
CPWD
Inbound and Outbound Packet Flow
Inbound FW CTL Chain Modules
Outbound Chain Modules
Columns in a Chain
Stateful Inspection
Kernel Tables Connections Table
Connections Table Format
Check Point Firewall Key Features Packet Inspection Flow
Policy Installation Flow
Policy Installation Process
Policy Installation Process Flow
Network Address Translation How NAT Works
Hide NAT Process
Security Servers
How a Security Server Works
Basic Firewall Administration
Common Commands
FW Monitor What is FW Monitor
C2S Connections and S2C Packets
fw monitor
Lab 2: Core CLI Elements of Firewall
Administration
Policy Management and Status
Verification from the CLI
Using cpinfo
Run cpinfo on the Security Management Server
Analyzing cpinfo in InfoView
Using fw ctl pstat
Using tcpdump
Table 2-1: Advanced Firewall Topics
Sample CCSE Exam Question
Choose the BEST sequence for configuring user managemetn in SmartDashboard,
using an LDAP server.
1. Configure a workstation object for the LDAP server, configure a server object
for the LDAP
Account Unit, and enable LDAP in Global Properties.
2. Configure a server object for the LDAP Account Unit, and create an LDAP
resource object
Chapter 5: Advanced IPsec VPN and Remote Access
Check Point's VPN Software Blade is an integrated software solution that
provides secure
connectivity to corporate networks, remote and mobile users, branch offices and
business partners.
The blade integrates access control, authentication and encryption to guarantee
the security of
network connections over the public Internet.
Objectives:
• Using your knowledge of fundamental VPN tunnel concepts, troubleshoot a
site-to-site or certificate-based VPN on a corporate gateway using IKEView, VPN
log files and commandline debug tools.
• Optimize VPN performance and availability by using Link Selection and Multiple
Entry Point solutions.
• Manage and test corporate VPN tunnels to allow for greater monitoring and
scalability with multiple tunnels defined in a community including other VPN
providers.
Topics:
The following table outlines the topics covered in the “Advanced IPsec VPN and
Remote Access”
chapter of the Check Point Security Engineering Course. This table is intended
as a supplement to
knowledge you have gained from the Security Engineering Courseware handbook, and
is not meant to
be a sole means of study.
Topic Key Element
Advanced VPN Concepts and Practices IPsec
Internet Key Exchange (IKE)
IKE Key Exchange Process – Phase 1/ Phase 2 Stages
Remote Access VPNs Connection Initiation
Link Selection
Multiple Entry Point VPNs How Does MEP Work
Explicit MEP
Implicit MEP
Tunnel Management Permanent Tunnels
Tunnel Testing
VPN Tunnel Sharing
Tunnel-Management Configuration
Permanent-Tunnel Configuration
Tracking Options
Advanced Permanent-Tunnel configuration
VPN Tunnel Sharing Configuration
Troubleshooting VPN Encryption Issues
VPN Debug vpn debug Command
vpn debug on | off
vpn debug ikeon |ikeoff
vpn Log Files
vpn debug trunc
VPN Environment Variables
vpn Command
vpn tu
Comparing SAs
Lab 5: Configure Site-to-Site VPNs with
Third Party Certificates
Configuring Access to the Active Directory Server
Creating the Certificate
Importing the Certificate Chain and Generating Encryption Keys
Installing the Certificate
Chapter 6: Auditing and Reporting 6
The SmartEvent Software Blade turns security information into action with
realtime security event
correlation and management for Check Point security gateways and third-party
devices.
SmartEvent’s unified event analysis identifies critical security events from the
clutter, while
correlating events across all security systems. Its automated aggregation and
correlation of data not
only minimizes the time spent analyzing log data, but also isolates and
prioritizes the real security
threats. The SmartReporter Software Blade centralizes reporting on network,
security, and user
activity and consolidates the data into concise predefined and custom-built
reports. Easy report
generation and automatic distribution save time and money.
Objectives:
• Create Events or use existing event definitions to generate reports on
specific network traffic using SmartReporter and SmartEvent in order to provide
industry compliance information to management.
• Using your knowledge of SmartEvent architecture and module communication,
troubleshoot report generation given command-line tools and debug-file
information.
Topics
The following table outlines the topics covered in the “Auditing and Reporting”
chapter of the Check
Point Security Engineering Course. This table is intended as a supplement to
knowledge you have gained
from the Security Engineering Courseware handbook, and is not meant to be a sole
means of study.
Topic Key Element
Auditing and Reporting Process Auditing and Reporting Standards
SmartEvent SmartEvent Intro
SmartEvent Architecture Component Communication Process
Event Policy User Interface
SmartReporter Report Types
Lab 7: SmartEvent and SmartReporter Configure the Network Object in
SmartDashboard
Configuring Security Gateways to work with SmartEvent
Monitoring Events with SmartEvent
Generate Reports Based on Activities
Table 6-6: Using SmartUpdate Topics
Sample CCSE Exam Question
How many Events can be shown at one time in the Event preview pane?
1. 5,000
2. 30,000
3. 15,000
4. 1,000
Answer
How many Events can be shown at one time in the Event preview pane?
1. 5,000
2. 30,000
3. 15,000
4. 1,000
QUESTION 1
Identify the API that is not supported by Check Point currently.
A. R80 Management API
B.Identity Awareness Web Services API
C. Open REST API
D. OPSEC SDK
Correct Answer: C
QUESTION 2 SandBlast Mobile identifies threats in mobile devices by using on-device,
network, and cloud-based algorithms
and has four dedicated components that constantly work together to protect
mobile devices and their data.
Which component is NOT part of the SandBlast Mobile solution?
A. Management Dashboard
B. Gateway
C. Personal User Storage
D. Behavior Risk Engine
Correct Answer: C
QUESTION 3 What are the different command sources that allow you to communicate with
the API server?
A. SmartView Monitor, API_cli Tool, Gaia CLI, Web Services
B. SmartConsole GUI Console, mgmt_cli Tool, Gaia CLI, Web Services
C. SmartConsole GUI Console, API_cli Tool, Gaia CLI, Web Services
D. API_cli Tool, Gaia CLI, Web Services
Correct Answer: B
QUESTION 4 What makes Anti-Bot unique compared to other Threat Prevention mechanisms,
such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?
A. Anti-Bot is the only countermeasure against unknown malware
B. Anti-Bot is the only protection mechanism which starts a counter-attack
against known Command & Control Centers
C. Anti-Bot is the only signature-based method of malware protection.
D. Anti-Bot is a post-infection malware protection to prevent a host from
establishing a connection to a Command & Control Center.
Correct Answer: D
QUESTION 5 Which TCP-port does CPM process listen to?
Languages: English Audiences: IT professionals Technology: Microsoft 365 Skills measured This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams. Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program. If you have concerns about specific questions on this exam, please submit an exam challenge. If you have other questions or feedb...
Citrix 1Y0-341 (CCP-N) Certification Exam Syllabus 1Y0-341 Dumps Questions, 1Y0-341 PDF, CCP-N Exam Questions PDF, Citrix 1Y0-341 Dumps Free, CCP-N Official Cert Guide PDFThe Citrix 1Y0-341 exam preparation guide is designed to provide candidates with necessary information about the CCP-N exam. It includes exam summary, sample questions, practice test, objectives and ways to interpret the exam objectives to enable candidates to assess the types of questions-answers that may be asked during the Citrix Certified Professional - Networking (CCP-N) exam. It is recommended for all the candidates to refer the 1Y0-341 objectives and sample questions provided in this preparation guide. The Citrix CCP-N certification is mainly targeted to the candidates who want to build their career in Networking domain and demonstrate their expertise. We suggest you to use practice exam listed in this cert guide to get used to with exam environment and identify the knowledge areas where you...
Overview This exam is a qualifying exam for the Expert - SC Series track. This exam focuses on the knowledge and activities involved in installing, initializing, configuring, testing, updating, upgrading and troubleshoot the hardware and software of the Dell EMC SC Series Storage products. Dell EMC provides free practice tests to assess your knowledge in preparation for the exam. Practice tests allow you to become familiar with the topics and question types you will find on the proctored exam. Your results on a practice test offer one indication of how prepared you are for the proctored exam and can highlight topics on which you need to study and train further. A passing score on the practice test does not guarantee a passing score on the certification exam. Products Products likely to be referred to on this exam include but are not limited to: SC Series Storage DSM 2015, SCOS 6.X, the SC4020 and the SC8000 Exam Topics Topics likely to be covered on this exam inclu...
Comments
Post a Comment