Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

Note! Checkpoint has retired the 156-315.77 Exam Contact us through Live Chat or email us for more information.

156-315.77 Check Point Certified Security Expert Questions and Answers

Questions 4

Fill in the blank.

To enter the router shell, use command _____.

Options:

Buy Now
Questions 5

Fill in the blank.

In Load Sharing Unicast mode, the internal cluster IP address is 10.4.8.3. The internal interfaces on two members are 10.4.8.1 and 10.4.8.2. Internal host 10.4.8.108 Pings 10.4.8.3, and receives replies. The following is the ARP table from the internal Windows host 10.4.8.108.

Review the exhibit and type the IP address of the member serving as the pivot machine in the space below.

Options:

Buy Now
Questions 6

Which CLI tool helps on verifying proper ClusterXL sync?

Options:

A.

fw stat

B.

fw ctl sync

C.

fw ctl pstat

D.

cphaprob stat

Buy Now
Questions 7

What GUI client would you use to view an IPS packet capture?

Options:

A.

SmartView Monitor.

B.

SmartView Tracker.

C.

Smart Update.

D.

Smart Reporter.

Questions 8

Which of the following log files contains verbose information regarding the negotiation process and other encryption failures?

Options:

A.

ike.elg

B.

vpn.elg

C.

iked.elg

D.

vpnd.elg

Buy Now
Questions 9

You have three Gateways in a mesh community. Each gateway’s VPN Domain is their internal network as defined on the Topology tab setting All IP Addresses behind Gateway based on Topology information.

You want to test the route-based VPN, so you created VTIs among the Gateways and created static route entries for the VTIs. However, when you test the VPN, you find out the VPN still go through the regular domain IPsec tunnels instead of the routed VTI tunnels.

What is the problem and how do you make the VPN use the VTI tunnels?

Options:

A.

Domain VPN takes precedence over the route-based VTI. To make the VPN go through VTI, remove the Gateways out of the mesh community and replace with a star community

B.

Domain VPN takes precedence over the route-based VTI. To make the VPN go through VTI, use an empty group object as each Gateway’s VPN Domain

C.

Route-based VTI takes precedence over the Domain VPN. To make the VPN go through VTI, use dynamic-routing protocol like OSPF or BGP to route the VTI address to the peer instead of static routes

D.

Route-based VTI takes precedence over the Domain VPN. Troubleshoot the static route entries to insure that they are correctly pointing to the VTI gateway IP.

Buy Now
Questions 10

Which statement is TRUE for route-based VPN’s?

Options:

A.

IP Pool NAT must be configured on each Gateway.

B.

Dynamic-routing protocols are not required.

C.

Route-based VPN’s are a form of partial overlap VPN Domain.

D.

Route-based VPN’s replace domain-based VPN’s.

Buy Now
Questions 11

Which of the following is TRUE concerning numbered VPN Tunnel Interfaces (VTIs)?

Options:

A.

VTIs are assigned only local addresses, not remote addresses

B.

VTIs cannot share IP addresses

C.

VTIs are only supported on IPSO

D.

VTIs cannot use an already existing physical-interface IP address

Buy Now
Questions 12

When using Captive Portal to send unidentified users to a Web portal for authentication, which of the following is NOT a recommended use for this method?

Options:

A.

For deployment of Identity Agents

B.

Identity-based enforcement for non-AD users (non-Windows and guest users)

C.

Leveraging identity in Internet application control

D.

Basic identity enforcement in the internal network

Buy Now
Questions 13

Which is NOT a method through which Identity Awareness receives its identities?

Options:

A.

AD Query

B.

Group Policy

C.

Identity Agent

D.

Captive Portal

Buy Now
Questions 14

In a Management High Availability (HA) configuration, you can configure synchronization to occur automatically, when:

1. The Security Policy is installed.

2. The Security Policy is saved.

3. The Security Administrator logs in to the secondary SmartCenter Server, and changes its status to active.

4. A scheduled event occurs.

5. The user database is installed.

Select the BEST response for the synchronization sequence. Choose one.

Options:

A.

1, 2, 3

B.

1, 2, 3, 4

C.

1, 3, 4

D.

1, 2, 5

E.

1, 2, 4

Buy Now
Questions 15

When you check Web Server in a host-node object, what happens to the host?

Options:

A.

The Web server daemon is enabled on the host.

B.

More granular controls are added to the host, in addition to Web Intelligence tab settings.

C.

You can specify allowed ports in the Web server's node-object properties. You then do not need to list all allowed ports in the Rule Base.

D.

IPS Web Intelligence is enabled to check on the host.

Buy Now
Questions 16

Which of the following describes the default behavior of an R77 Security Gateway?

Options:

A.

Traffic is filtered using controlled port scanning.

B.

IP protocol types listed as secure are allowed by default, i.e. ICMP, TCP, UDP sessions are inspected.

C.

All traffic is expressly permitted via explicit rules.

D.

Traffic not explicitly permitted is dropped.

Buy Now
Questions 17

Which of the following is NOT an internal/native Check Point command?

Options:

A.

fwaccel on

B.

fw ctl debug

C.

tcpdump

D.

cphaprob

Buy Now
Questions 18

Which graded parameters help determine the protections to activate for security and which can be safely deactivated? Select the most correct answer.

Options:

A.

Type, Severity, Confidence level, Performance impact, Geo information.

B.

Severity, Confidence level, Performance impact, Protection type.

C.

Type, Severity, Confidence level, Performance impact.

D.

Type, Severity, Confidence level, Performance impact, Protection type.

Questions 19

Frank is concerned with performance and wants to configure the affinities settings. His gateway does not have the Performance pack running. What would Frank need to perform in order configure those settings?

Options:

A.

Edit affinity.conf and change the settings

B.

Run fw affinity and change the settings

C.

Edit $FWDIR/conf/fwaffinity.conf and change the settings

D.

Run sim affinity and change the settings

Buy Now
Questions 20

CPD is a core Check Point process that does all of the following EXCEPT:

Options:

A.

AMON status pull from the Gateway

B.

Management High Availability (HA) sync

C.

SIC (Secure Internal Communication) functions

D.

Policy installation

Buy Now
Questions 21

Katie has enabled User Directory and applied the license to Security Management Server, Green. Her supervisor has asked her to configure the Password Strength options of the least one digit, one symbol, 8 characters long and include an uppercase character. How should she accomplish this?

Options:

A.

Open the SmartDashboard, Select Global properties, select Identity Awareness; check the boxes for Password must include an upper character, Password must include a digit, Password must include a symbol and change the password length to 8 characters.

B.

Open the SmartDashboard, Select Global properties, select User Authority; check the boxes for Password must include an upper character, Password must include a digit and Password must include a symbol.

C.

Open the SmartDashboard, Select Global Properties, select User Directory, check the boxes for Password must include an uppercase character, Password must include a digit, and Password must include a symbol.

D.

Open the SmartDashboard, Select Global Properties, select User Directory, check the boxes for Password must include an uppercase character, Password must include a digit, Password must include a symbol and change the password length to 8 characters.

Buy Now
Questions 22

You have pushed a policy to your firewall and you are not able to access the firewall. What command will allow you to remove the current policy from the machine?

Options:

A.

fw purge active

B.

fw purge policy

C.

fw fetch policy

D.

fw unloadlocal

Buy Now
Questions 23

Lilly has generated an IKE debug on her Security Gateway. She has asked Jack to transfer the file to Support. Where is the file located?

Options:

A.

$FWDIR/log/ike.elg

B.

$FWDIR/opt/vpnd.elg

C.

$FWDIR/opt/ike.elg

D.

$FWDIR/log/vpnd.elg

Buy Now
Questions 24

In GAiA, if one is unsure about a possible command, what command lists all possible commands.

Options:

A.

show all |grep commands

B.

show configuration

C.

show commands

D.

get all commands

Buy Now
Questions 25

MicroCorp experienced a security appliance failure. (LEDs of all NICs are off.) The age of the unit required that the RMA-unit be a different model. Will a revert to an existing snapshot bring the new unit up and running?

Options:

A.

There is no dynamic update at reboot.

B.

No. The revert will most probably not match to hard disk.

C.

Yes. Everything is dynamically updated at reboot.

D.

No. At installation the necessary hardware support is selected. The snapshot saves this state.

Buy Now
Questions 26

How do you verify the Check Point kernel running on a firewall?

Options:

A.

fw ver -k

B.

fw ctl pstat

C.

fw ctl get kernel

D.

fw kernel

Buy Now
Questions 27

You are the MegaCorp Security Administrator. This company uses a firewall cluster, consisting of two cluster members. The cluster generally works well but one day you find that the cluster is behaving strangely. You assume that there is a connectivity problem with the cluster synchronization link (cross-over cable). Which of the following commands is the BEST for testing the connectivity of the crossover cable?

Options:

A.

ifconfig -a

B.

arping

C.

telnet

D.

ping

Buy Now
Questions 28

What is the proper CLISH syntax to configure a default route via 192.168.255.1 in GAiA?

Options:

A.

set static-route default nexthop gateway address 192.168.255.1 priority 1 on

B.

set static-route 192.168.255.0/24 nexthop gateway logical ethl on

C.

set static-route 192.168.255.0/24 nexthop gateway address 192.168.255.1 priority 1 on

D.

set static-route nexthop default gateway logical 192.168.255.1 priority 1 on

Buy Now
Questions 29

Where do you define NAT properties so that NAT is performed either client side or server side? In SmartDashboard under:

Options:

A.

Gateway Setting

B.

NAT Rules

C.

Global Properties > NAT definition

D.

Implied Rules

Buy Now
Questions 30

What firewall kernel table stores information about port allocations for Hide NAT connections?

Options:

A.

NAT_dst_any_list

B.

NAT_alloc

C.

NAT_src_any_list

D.

fwx_alloc

Buy Now
Questions 31

The “MAC Magic” value must be modified under the following condition:

Options:

A.

There is more than one cluster connected to the same VLAN

B.

A firewall cluster is configured to use Multicast for CCP traffic

C.

There are more than two members in a firewall cluster

D.

A firewall cluster is configured to use Broadcast for CCP traffic

Questions 32

Fill in the blank.

To bind a NIC to a single processor when using CoreXL on GAiA, you would use the command

Options:

Buy Now
Questions 33

Fill in the blank with a numeric value. The default port number for Secure Sockets Layer (SSL) connections with the LDAP Server is

Options:

Buy Now
Questions 34

Which three of the following are ClusterXL member requirements?

1) same operating systems

2) same Check Point version

3) same appliance model

4) same policy

Options:

A.

1, 3, and 4

B.

1, 2, and 4

C.

2, 3, and 4

D.

1, 2, and 3

Buy Now
Questions 35

MegaCorp plans to upgrade all of its firewalls. Currently the corporation is a mixture of SecurePlatform and IPSO machines running R71, to the latest code level of GAiA. Many of the firewalls are using VTIs to allow advanced routing configuration to propagate through all the networks. What will the Acme company need to do to make sure VTIs will work once moved to GAiA?

Options:

A.

Move to Domain based routing as GAiA does not support VTIs.

B.

Convert all the Secure Platform replacements to unnumbered VTIs.

C.

Nothing specific as GAiA supports both numbered and unnumbered VTIs.

D.

Convert all of the IPSO replacements to numbered VTIs.

Questions 36

Which is NOT a valid option when upgrading Cluster Deployments?

Options:

A.

Fast path Upgrade

B.

Minimal Effort Upgrade

C.

Full Connectivity Upgrade

D.

Zero Downtime

Buy Now
Questions 37

MegaCorp is running Smartcenter R70, some Gateways at R65 and some other Gateways with R60. Management wants to upgrade to the most comprehensive IPv6 support. What should the administrator do first?

Options:

A.

Upgrade Smartcenter to R77 first.

B.

Upgrade R60-Gateways to R65.

C.

Upgrade every unit directly to R77.

D.

Check the ReleaseNotes to verify that every step is supported.

Buy Now
Questions 38

Paul has just joined the MegaCorp security administration team. Natalie, the administrator, creates a new administrator account for Paul in SmartDashboard and installs the policy. When Paul tries to login it fails. How can Natalie verify whether Paul’s IP address is predefined on the security management server?

Options:

A.

Login to Smart Dashboard, access Properties of the SMS, and verify whether Paul’s IP address is listed.

B.

Type cpconfig on the Management Server and select the option “GUI client List” to see if Paul’s IP address is listed.

C.

Login in to Smart Dashboard, access Global Properties, and select Security Management, to verify whether Paul’s IP address is listed.

D.

Access the WEBUI on the Security Gateway, and verify whether Paul’s IP address is listed as a GUI client.

Buy Now
Questions 39

MultiCorp is running Smartcenter R71 on an IPSO platform and wants to upgrade to a new Appliance with R77. Which migration tool is recommended?

Options:

A.

Download Migration Tool R77 for IPSO and Splat/Linux from Check Point website.

B.

Use already installed Migration Tool.

C.

Use Migration Tool from CD/ISO

D.

Fetch Migration Tool R71 for IPSO and Migration Tool R77 for Splat/Linux from CheckPoint website

Buy Now
Questions 40

Which of the following CLISH commands would you use to set the admin user's shell to bash?

Options:

A.

set user admin shell bash

B.

set user admin shell /bin/bash

C.

set user admin shell = /bin/bash

D.

set user admin /bin/bash

Buy Now
Questions 41

User definitions are stored in _____.

Options:

A.

$FWDIR/conf/users.NDB

B.

$FWDIR/conf/fwmuser.conf

C.

$FWDIR/conf/fwusers.conf

D.

$FWDIR/conf/fwauth.NDB

Buy Now
Questions 42

How could you compare the Fingerprint shown to the Fingerprint on the server? Run cpconfig and select:

Exhibit:

Options:

A.

the Certificate Authority option and view the fingerprint.

B.

the GUI Clients option and view the fingerprint.

C.

the Certificate's Fingerprint option and view the fingerprint.

D.

the Server Fingerprint option and view the fingerprint.

Buy Now
Questions 43

Control connections between the Security Management Server and the Gateway are not encrypted by the VPN Community. How are these connections secured?

Options:

A.

They are not secured.

B.

They are not encrypted, but are authenticated by the Gateway

C.

They are encrypted and authenticated using SIC.

D.

They are secured by PPTP

Buy Now
Questions 44

Which process should you debug if SmartDashboard login fails?

Options:

A.

sdm

B.

cpd

C.

fwd

D.

fwm

Buy Now
Questions 45

What is the proper command for importing users into the R77 User Database?

Options:

A.

fwm importusrs

B.

fwm dbimport

C.

fwm import

D.

fwm importdb

Buy Now
Questions 46

Which of the following is a valid Active Directory designation for user John Doe in the Sales department of AcmeCorp.com?

Options:

A.

Cn=john_doe,ca=Sales,ou=acmecorp,dc=com

B.

Cn=john_doe,ou=Sales,ou=acmecorp,dc=com

C.

Cn=john_doe,ou=Sales,dc=acmecorp,dc=com

D.

Cn=john_doe,ca=Sales,dc=acmecorp,dc=com

Buy Now
Questions 47

Included in the customer’s network are some firewall systems with the Performance Pack in use. The customer wishes to use these firewall systems in a cluster (Load Sharing mode). He is not sure if he can use the Sticky Decision Function in this cluster. Explain the situation to him.

Options:

A.

The customer can use the firewalls with Performance Pack inside the cluster, which should support the Sticky Decision Function. It is just necessary to configure it with the clusterXL_SDF_enable command.

B.

ClusterXL always supports the Sticky Decision Function in the Load Sharing mode.

C.

The customer can use the firewalls with Performance Pack inside the cluster, which should support the Sticky Decision Function. It is just necessary to enable the Sticky Decision Function in the SmartDashboard cluster object in the ClusterXL page, Advanced Load Sharing Configuration window.

D.

Sticky Decision Function is not supported when employing either Performance Pack or a hardware-based accelerator card. Enabling the Sticky Decision Function disables these acceleration products.

Buy Now
Questions 48

Where multiple SmartDirectory servers exist in an organization, a query from one of the clients for user information is made to the servers based on a priority. By what category can this priority be defined?

Options:

A.

Location or Account Unit

B.

Gateway or Domain

C.

Gateway or Account Unit

D.

Location or Domain

Buy Now
Questions 49

When migrating the SmartEvent data base from one server to another, the last step is to save the files on the new server. Which of the following commands should you run to save the SmartEvent data base files on the new server?

Options:

A.

cp

B.

restore

C.

migrate import

D.

eva_db_restore

Buy Now
Questions 50

What is the supported ClusterXL configuration when configuring a cluster synchronization network on a VLAN interface?

Options:

A.

It is supported on the lowest VLAN tag of the VLAN interface.

B.

It is not supported on a VLAN tag.

C.

It is supported on VLAN tag 4095.

D.

It is supported on VLAN tag 4096.

Buy Now
Questions 51

To clean the system of all SmartEvent events, you should delete the files in which folder(s)?

Options:

A.

$RTDIR/events_db

B.

$FWDIR/distrib_db and $FWDIR/events

C.

$RTDIR/distrib and $RTDIR/events_db

D.

$FWDIR/distrib

Buy Now
Questions 52

Where is it necessary to configure historical records in SmartView Monitor to generate Express reports in SmartReporter?

Options:

A.

In SmartDashboard, the SmartView Monitor page in the R77 Security Gateway object

B.

In SmartReporter, under Express > Network Activity

C.

In SmartReporter, under Standard > Custom

D.

In SmartView Monitor, under Global Properties > Log and Masters

Buy Now
Questions 53

Which method of load balancing describes “Round Robin”?

Options:

A.

Assigns service requests to servers at random.

B.

Ensures that incoming requests are handled by the server with the fastest response time.

C.

Measures the load on each server to determine which server has the most available resources.

D.

Assigns service requests to the next server in a series.

Buy Now
Questions 54

The SmartEvent Server:

Options:

A.

assigns a severity level to an event.

B.

forwards what is known as an event to the SmartEvent Server.

C.

analyzes each IPS log entry as it enters the Log server.

D.

displays the received events.

Buy Now
Questions 55

In which ClusterXL Load Sharing mode, does the pivot machine get chosen automatically by ClusterXL?

Options:

A.

Hot Standby Load Sharing

B.

Multicast Load Sharing

C.

Unicast Load Sharing

D.

CCP Load Sharing

Buy Now
Questions 56

What is the offline CPSIZEME upload procedure?

Options:

A.

Find the cpsizeme_of_.pdf, attach it to an e-mail and send it to cpsizeme_upload@checkpoint.com

B.

Use the webbrowser version of cpsizeme and fax it to Check Point.

C.

Find the cpsizeme_of_.xml, attach it to an e-mail and send it to cpsizeme_upload@checkpoint.com

D.

There is no offline upload method.

Buy Now
Questions 57

Identity Agent is a lightweight endpoint agent that authenticates securely with Single Sign-On (SSO). Which of the following is NOT a recommended use for this method?

Options:

A.

Leveraging machine name or identity

B.

When accuracy in detecting identity is crucial

C.

Identity based enforcement for non-AD users (non-Windows and guest users)

D.

Protecting highly sensitive servers

Buy Now
Questions 58

Which two processes are responsible on handling Identity Awareness?

Options:

A.

pdp and lad

B.

pdp and pdp-11

C.

pep and lad

D.

pdp and pep

Buy Now
Questions 59

MultiCorp has bought company OmniCorp and now has two active AD domains. How would you deploy Identity Awareness in this environment?

Options:

A.

You must run an ADquery for every domain.

B.

Identity Awareness can only manage one AD domain.

C.

Only one ADquery is necessary to ask for all domains.

D.

Only Captive Portal can be used.

Buy Now
Questions 60

In the following cluster configuration; if you reboot sglondon_1 which device will be active when sglondon_1 is back up and running? Why?

Options:

A.

sglondon_1 because it the first configured object with the lowest IP.

B.

sglondon_2 because sglondon_1 has highest IP.

C.

sglondon_1, because it is up again, sglondon_2 took over during reboot.

D.

sglondon_2 because it has highest priority.

Buy Now
Questions 61

Which of the following access options would you NOT use when configuring Captive Portal?

Options:

A.

From the Internet

B.

Through all interfaces

C.

Through internal interfaces

D.

Through the Firewall policy

Buy Now
Questions 62

If using AD Query for seamless identity data reception from Microsoft Active Directory (AD), which of the following methods is NOT Check Point recommended?

Options:

A.

Identity-based enforcement for non-AD users (non-Windows and guest users)

B.

Basic identity enforcement in the internal network

C.

Leveraging identity in Internet application control

D.

Identity-based auditing and logging

Buy Now
Questions 63

Jerry is concerned that a denial-of-service (DoS) attack may affect his VPN Communities. He decides to implement IKE DoS protection. Jerry needs to minimize the performance impact of implementing this new protection.

Which of the following configurations is MOST appropriate for Jerry?

Options:

A.

Set Support IKE DoS protection from identified source to "Puzzles", and Support IKE DoS protection from unidentified source to "Stateless".

B.

Set Support IKE Dos Protection from identified source, and Support IKE DoS protection from unidentified source to "Puzzles".

C.

Set Support IKE DoS protection from identified source to "Stateless," and Support IKE DoS protection from unidentified source to "Puzzles".

D.

Set "Support IKE DoS protection" from identified source, and "Support IKE DoS protection" from unidentified source to "Stateless".

E.

Set Support IKE DoS protection from identified source to "Stateless", and Support IKE DoS protection from unidentified source to "None".

Buy Now
Questions 64

How can you prevent delay-sensitive applications, such as video and voice traffic, from being dropped due to long queue using Check Point QoS solution?

Options:

A.

Weighted Fair queuing

B.

guaranteed per connection

C.

Low latency class

D.

guaranteed per VoIP rule

Buy Now
Questions 65

If Victor wanted to edit new Signature Protections, what tab would he need to access in SmartDashboard?

Options:

A.

QoS Tab

B.

SmartDefense Tab

C.

IPSec VPN Tab

D.

IPS Tab

Buy Now
Questions 66

A Fast Path Upgrade of a cluster:

Options:

A.

Upgrades all cluster members except one at the same time.

B.

Treats each individual cluster member as an individual gateway.

C.

Is not a valid upgrade method in R76.

D.

Is only supported in major releases (R70 to R71, R75 to R76).

Buy Now
Questions 67

You plan to migrate a VPN-1 NG with Application Intelligence (Al) R55 SmartCenter Server to VPN-1 NGX. You also plan to upgrade four VPN-1 Pro Gateways at remote offices, and one local VPN-1 Pro Gateway at your company's headquarters. The SmartCenter Server configuration must be migrated. What is the correct procedure to migrate the configuration?

Options:

A.

Upgrade the SmartCenter Server and the five remote Gateways via Smart Update, at the same time.

B.

1. Copy the $FWDIR\conf directory from the SmartCenter Server.2. Save directory contents to another directory.3. Uninstall the SmartCenter Server, and install a new SmartCenter Server.4. Move directory contents to $FWDIR\conf.5. Reinstall all gateways using NGX and install a policy.

C.

1. From the VPN-1 NGX CD in the SmartCenter Server, select "advance upgrade".2. After importing the SmartCenter configuration into the new NGX SmartCenter, reboot.3. Upgrade all licenses and software on all five remote Gateways via SmartUpdate.

D.

1. Upgrade the five remote Gateways via SmartUpdate.2. Upgrade the SmartCenter Server, using the VPN-1 NGX CD.

E.

1. Upgrade the SmartCenter Server, using the VPN-1 NGX CD.2. Reinstall and update the licenses of the five remote Gateways.

Buy Now
Questions 68

Which task will ThreatSpect Engine NOT do?

Options:

A.

Look for suspicious activity by monitoring outgoing mail traffic

B.

Review the IPS signatures

C.

Review the networks signatures for Bot families

D.

Perform a reputation check

Buy Now
Questions 69

You have installed a R77 Security Gateway on GAiA. To manage the Gateway from the enterprise Security Management Server, you create a new Gateway object and Security Policy.

When you install the new Policy from the Policy menu, the Gateway object does not appear in the Install Policy window as a target. What is the problem?

Options:

A.

The new Gateway's temporary license has expired.

B.

The object was created with Node > Gateway.

C.

The Gateway object is not specified in the first policy rule column Install On.

D.

No Masters file is created for the new Gateway.

Buy Now
Questions 70

Using the output below, what does the red flag indicate for the MS08-067 Protection?

Options:

A.

It indicates this is for follow up

B.

It indicates this protection is for a new 0-day vulnerability

C.

It indicates this protection's severity level was modified from the default setting by the administrator

D.

It indicates this protection is a critical

Buy Now
Questions 71

You need to completely reboot the Operating System after making which of the following changes on the Security Gateway? (i.e. the command cprestart is not sufficient.)

1. Adding a hot-swappable NIC to the Operating System for the first time.

2. Uninstalling the R75 Power/UTM package.

3. Installing the R75 Power/UTM package.

4. Re-establishing SIC to the Security Management Server.

5. Doubling the maximum number of connections accepted by the Security Gateway.

Options:

A.

2, 3 only

B.

3 only

C.

3, 4, and 5 only

D.

1, 2, 3, 4, and 5

Buy Now
Questions 72

What is the most typical type of configuration for VPNs with several externally managed Gateways?

Options:

A.

star community

B.

mesh community

C.

domain community

D.

Hybrid community

E.

SAT community

Buy Now
Questions 73

When selecting a backup target using SmartProvisioning, which target is NOT available?

Options:

A.

Locally on device

B.

FTP

C.

SCP

D.

TFTP

Buy Now
Questions 74

You are a Security Administrator preparing to deploy a new HFA (Hot fix Accumulator) to ten Security Gateways at five geographically separated locations.

What is the BEST method to implement this HFA?

Options:

A.

Send a Certified Security Engineer to each site to perform the update

B.

Use SmartUpdate to install the packages to each of the Security Gateways remotely

C.

Use a SSH connection to SCP the HFA to each Security Gateway.Once copied locally, initiate a remote installation command and monitor the installation progress with SmartView Monitor.

D.

Send a CDROM with the HFA to each location and have local personnel install it

Buy Now
Questions 75

For an initial installation of Connecter, which of the following statements is TRUE?

Options:

A.

You must configure the Connecter username and password before running the First Time Wizard.

B.

It is possible to run the First Time Wizard from Expert Mode on the Connecter server.

C.

It is not possible to use the sysconfig and cpconfig utilities, until the First Time Wizard in the Administration Web GUI is successfully completed.

D.

It is not necessary to set up the Rule Base before completing Connector's installation.

Buy Now
Questions 76

Which command can be used to verify SecureXL statistics?

Options:

A.

fwaccel top

B.

fwaccel stats

C.

fw ctl pstat

D.

cphaprob stat

Buy Now
Questions 77

What happens in relation to the CRL cache after a cpstop;spstart has been initiated?

Options:

A.

The gateway continues to use the old CRL even if it is not valid, until a new CRL is cached

B.

The gateway continues to use the old CRL, as long as it is valid.

C.

The gateway issues a crl_zap on startup, which empties the cache and forces Certificate retrieval.

D.

The gateway retrieves a new CRL on startup, then discards the old CRL as invalid.

Buy Now
Questions 78

You want to upgrade an NG with Application Intelligence R55 Security Gateway running on SecurePlatform to VPN-1 NGX R65 via SmartUpdate.

Which package(s) is(are) needed in the Repository prior to upgrade?

Options:

A.

SecurePlatform NGX R65 package

B.

VPN-1 Power/UTM NGX R65 package

C.

SecurePlatform and VPN-1 Power/UTM NGX R65 packages

D.

SVN Foundation and VPN-1 Power/UTM packages

Buy Now
Questions 79

Cody is notified by blacklist.org that his site has been reported as a spam relay, due to his SMTP Server being unprotected. Cody decides to implement an SMTP Security Server, to prevent the server from being a spam relay.

Which of the following is the most efficient configuration method?

Options:

A.

Configure the SMTP Security Server to perform MX resolving.

B.

Configure the SMTP Security Server to perform filtering, based on IP address and SMTP protocols.

C.

Configure the SMTP Security Server to work with an OPSEC based product, for content checking.

D.

Configure the SMTP Security Server to apply a generic "from" address to all outgoing mail.

E.

Configure the SMTP Security Server to allow only mail to or from names, within Cody's corporate domain.

Buy Now
Questions 80

SmartProvisioning uses different types of profiles to manage and provision the gateways.

These types are:

Options:

A.

SmartLSM Security Profiles and Provisioning Profiles

B.

Provisioning Profiles and Gateways Profiles

C.

SmartLSM Security Profiles and SmartDashboard Profiles

D.

SmartConsole Profiles and SmartFilter Profiles

Buy Now
Questions 81

Which protocol is not supported for DLP?

Options:

A.

ftp

B.

https

C.

http

D.

smtp

Buy Now
Questions 82

Which statement defines Public Key Infrastructure? Security is provided:

Options:

A.

by authentication.

B.

via both private and public keys, without the use of digital Certificates.

C.

by Certificate Authorities, digital certificates, and public key encryption.

D.

by Certificate Authorities, digital certificates, and two-way symmetric-key encryption.

Buy Now
Questions 83

Which of the following statements is TRUE concerning MEP VPN’s?

Options:

A.

The VPN Client selects which Security Gateway takes over, should the first connection fail.

B.

MEP VPN’s are restricted to the location of the gateways.

C.

State synchronization between Security Gateways is required.

D.

MEP Security Gateways cannot be managed by separate Management Servers.

Buy Now
Questions 84

You want VPN traffic to match packets from internal interfaces. You also want the traffic to exit the Security Gateway bound for all site-to-site VPN Communities, including Remote Access Communities. How should you configure the VPN match rule?

Options:

A.

internal_clear > All_communities

B.

Internal_clear > External_Clear

C.

Communities > Communities

D.

internal_clear > All_GwToGw

Buy Now
Questions 85

Your organization maintains several IKE VPN’s. Executives in your organization want to know which mechanism Security Gateway R77 uses to guarantee the authenticity and integrity of messages. Which technology should you explain to the executives?

Options:

A.

Certificate Revocation Lists

B.

Application Intelligence

C.

Key-exchange protocols

D.

Digital signatures

Buy Now
Questions 86

You are trying to configure Directional VPN Rule Match in the Rule Base. But the Match column does not have the option to see the Directional Match. You see the following window. What must you enable to see the Directional Match?

Exhibit:

Options:

A.

directional_match (true) in the objects_5_0.C file on Security Management Server

B.

VPN Directional Match on the Gateway object’s VPN tab

C.

VPN Directional Match on the VPN advanced window, in Global Properties

D.

Advanced Routing on each Security Gateway

Buy Now
Questions 87

Remote clients are using IPSec VPN to authenticate via LDAP server to connect to the organization. Which gateway process is responsible for the authentication?

Options:

A.

fwm

B.

fwd

C.

vpnd

D.

cvpnd

Buy Now
Questions 88

The connection to the ClusterXL member ‘A’ breaks. The ClusterXL member ‘A’ status is now ‘down’. Afterwards the switch admin set a port to ClusterXL member ‘B’ to ‘down’. What will happen?

Options:

A.

ClusterXL member ‘B’ also left the cluster.

B.

ClusterXL member ‘B’ stays active as last member.

C.

Both ClusterXL members share load equally.

D.

ClusterXL member ‘A’ is asked to come back to cluster.

Buy Now
Questions 89

Fill in the blank.

Type the command and syntax that you would use to view the virtual cluster interfaces of a ClusterXL environment.

Options:

Buy Now
Questions 90

_____ is the called process that starts when opening SmartView Tracker application.

Options:

A.

FWM

B.

CPLMD

C.

logtrackerd

D.

fwlogd

Buy Now
Exam Code: 156-315.77
Exam Name: Check Point Certified Security Expert
Last Update: Apr 14, 2023
Questions: 754