Which of the following is NOT a method used by Identity Awareness for acquiring identity?
Answer : A
Identity Awareness uses various methods to acquire identity information. These methods include:
Active Directory Query: Identity Awareness queries Active Directory servers to retrieve user and group information.
Cloud IdP (Identity Provider): Identity Awareness integrates with cloud identity providers such as Microsoft Azure AD, Okta, and Google Workspace.
RADIUS: Identity Awareness can use RADIUS servers to authenticate users.
However,Remote Accessis not a method used by Identity Awareness for acquiring identity. Remote Access typically refers to VPN connections, and while Identity Awareness can be used in conjunction with VPNs, it does not directly acquire identity information from remote access connections.
Check Point Troubleshooting Expert - R81 (CCTE) Reference Materials guides and documents.
Check Point Certified Troubleshooting Expert R81.20 - CCTE
Check Point CCTE Certification Sample Questions and Practice Exam
Which of the following is NOT a method used by identity Awareness for acquiring identity?
Answer : C
After upgrading the primary security management server from R80.40 to R81.10 Bob wants to use the central deployment in SmartConsole R81.10 for the first time. How many installations (e.g. Jumbo Hotfix, Hotfixes or Upgrade Packages) can run of such at the same time:
Answer : C
According to the Check Point R81.20 documentation, the central deployment feature allows you to install up to 10 packages simultaneously on multiple gateways1.
Reference
1:Check Point R81.20 Administration Guide, page 35.
What ports are used for SmartConsole to connect to the Security Management Server?
Answer : C
The correct answer is C) CPM (19009), CPMI (18190) https (443).
CPM (19009): This port is used for the communication between the SmartConsole client and the Check Point Management (CPM) process on the Security Management Server. The CPM process handles the database operations and the policy installation.
CPMI (18190): This port is used for the communication between the SmartConsole client and the Check Point Management Interface (CPMI) process on the Security Management Server. The CPMI process handles the authentication and encryption of the SmartConsole sessions.
https (443): This port is used for the communication between the SmartConsole client and the web server on the Security Management Server. The web server provides the SmartConsole GUI and the SmartConsole extensions.
The other options are incorrect because they either include ports that are not used by SmartConsole or omit ports that are used by SmartConsole.
Which of the following cannot be configured in an Access Role Object?
Answer : D
The verified answer is D) Time.
Networks: IP addresses or network objects that define the source or destination of the traffic.
Machines: Specific hosts or machine groups that are identified by their MAC addresses or certificates.
Users: Specific users or user groups that are authenticated by one or more identity sources, such as Active Directory, LDAP, or Identity Awareness.
LDAP group vs Access role objects - Check Point CheckMates3
In R81.20 a new feature dynamic log distribution was added. What is this for?
By default, how often does Threat Emulation update the engine on the Security Gateway?