Summer Sale - Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 5763r953

Welcome To DumpsPedia

156-215.77 Sample Questions Answers

Questions 4

What action CANNOT be run from SmartUpdate R77?

Options:

A.

Fetch sync status

B.

Reboot Gateway

C.

Preinstall verifier

D.

Get all Gateway Data

Buy Now
Questions 5

ALL of the following options are provided by the GAiA sysconfig utility, EXCEPT:

Options:

A.

Export setup

B.

DHCP Server configuration

C.

Time & Date

D.

GUI Clients

Buy Now
Questions 6

When using AD Query to authenticate users for Identity Awareness, identity data is received seamlessly from the Microsoft Active Directory (AD). What is NOT a recommended usage of this method?

Options:

A.

Leveraging identity in the application control blade

B.

Basic identity enforcement in the internal network

C.

Identity-based auditing and logging

D.

Identity-based enforcement for non-AD users (non-Windows and guest users)

Buy Now
Questions 7

Which of the following methods is NOT used by Identity Awareness to catalog identities?

Options:

A.

AD Query

B.

Captive Portal

C.

Identity Agent

D.

GPO

Buy Now
Questions 8

What action can be performed from SmartUpdate R77?

Options:

A.

upgrade_export

B.

fw stat -l

C.

cpinfo

D.

remote_uninstall_verifier

Buy Now
Questions 9

Where are custom queries stored in R77 SmartView Tracker?

Options:

A.

On the SmartView Tracker PC local file system under the user's profile.

B.

On the Security Management Server tied to the GUI client IP.

C.

On the Security Management Server tied to the Administrator User Database login name.

D.

On the SmartView Tracker PC local file system shared by all users of that local PC.

Buy Now
Questions 10

Which set of objects have an Authentication tab?

Options:

A.

Templates, Users

B.

Users, Networks

C.

Users, User Groups

D.

Networks, Hosts

Buy Now
Questions 11

How are locally cached usernames and passwords cleared from the memory of a R77 Security Gateway?

Options:

A.

By using the Clear User Cache button in SmartDashboard.

B.

Usernames and passwords only clear from memory after they time out.

C.

By retrieving LDAP user information using the command fw fetchldap.

D.

By installing a Security Policy.

Buy Now
Questions 12

During which step in the installation process is it necessary to note the fingerprint for first-time verification?

Options:

A.

When configuring the Gateway in the WebUI

B.

When configuring the Security Management Server using cpconfig

C.

When establishing SIC between the Security Management Server and the Gateway

D.

When configuring the Security Gateway object in SmartDashboard

Buy Now
Questions 13

The customer has a small Check Point installation which includes one Windows 2008 server as SmartConsole and Security Management Server with a second server running GAiA as Security Gateway. This is an example of a(n):

Options:

A.

Stand-Alone Installation.

B.

Distributed Installation.

C.

Unsupported configuration.

D.

Hybrid Installation.

Buy Now
Questions 14

Which R77 SmartConsole tool would you use to verify the installed Security Policy name on a Security Gateway?

Options:

A.

SmartView Monitor

B.

SmartUpdate

C.

SmartView Status

D.

None, SmartConsole applications only communicate with the Security Management Server.

Buy Now
Questions 15

Where can you find the Check Point’s SNMP MIB file?

Options:

A.

$CPDIR/lib/snmp/chkpt.mib

B.

$FWDIR/conf/snmp.mib

C.

It is obtained only by request from the TAC.

D.

There is no specific MIB file for Check Point products.

Buy Now
Questions 16

Which of the following items should be configured for the Security Management Server to authenticate via LDAP?

Options:

A.

Check Point Password

B.

Active Directory Server object

C.

Windows logon password

D.

WMI object

Buy Now
Questions 17

An Administrator without access to SmartDashboard installed a new IPSO-based R77 Security Gateway over the weekend. He e-mailed you the SIC activation key and the IP address of the Security Gateway. You want to confirm communication between the Security Gateway and the Management Server by installing the Policy. What might prevent you from installing the Policy?

Options:

A.

An intermediate local Security Gateway does not allow a policy install through it to the remote new Security Gateway appliance. Resolve by running the command fw unloadlocal on the local Security Gateway.

B.

You first need to run the command fw unloadlocal on the R77 Security Gateway appliance in order to remove the restrictive default policy.

C.

You first need to create a new Gateway object in SmartDashboard, establish SIC via the Communication button, and define the Gateway’s topology.

D.

You have not established Secure Internal Communications (SIC) between the Security Gateway and Management Server. You must initialize SIC on the Security Management Server.

Buy Now
Questions 18

Which of the following statements is TRUE about management plug-ins?

Options:

A.

A management plug-in interacts with a Security Management Server to provide new features and support for new products.

B.

Installing a management plug-in is just like an upgrade process.

C.

Using a plug-in offers full central management only if special licensing is applied to specific features of the plug-in.

D.

The plug-in is a package installed on the Security Gateway.

Buy Now
Questions 19

How granular may an administrator filter an Access Role with identity awareness? Per:

Options:

A.

Specific ICA Certificate

B.

AD User

C.

Radius Group

D.

Windows Domain

Buy Now
Questions 20

MegaCorp’s security infrastructure separates Security Gateways geographically. You must request a central license for one remote Security Gateway.

How do you apply the license?

Options:

A.

Using the remote Gateway’s IP address, and attaching the license to the remote Gateway via SmartUpdate.

B.

Using your Security Management Server's IP address, and attaching the license to the remote Gateway via SmartUpdate.

C.

Using the remote Gateway's IP address, and applying the license locally with the command cplic put.

D.

Using each of the Gateways’ IP addresses, and applying the licenses on the Security Management Server with the command.

Buy Now
Questions 21

Which command displays the installed Security Gateway version?

Options:

A.

fw ver

B.

fw stat

C.

fw printver

D.

cpstat –gw

Buy Now
Questions 22

Suppose the Security Gateway hard drive fails and you are forced to rebuild it. You have a snapshot file stored to a TFTP server and backups of your Security Management Server.

What is the correct procedure for rebuilding the Gateway quickly?

Options:

A.

Reinstall the base operating system (i.e., GAiA). Configure the Gateway interface so that the Gateway can communicate with the TFTP server. Revert to the stored snapshot image, and install the Security Policy.

B.

Run the command revert to restore the snapshot, establish SIC, and install the Policy.

C.

Run the command revert to restore the snapshot. Reinstall any necessary Check Point products. Establish SIC and install the Policy.

D.

Reinstall the base operating system (i.e., GAia). Configure the Gateway interface so that the Gateway can communicate with the TFTP server. Reinstall any necessary Check Point products and previously applied hotfixes. Revert to the stored snapshot image, and install the Policy.

Buy Now
Questions 23

You have just installed your Gateway and want to analyze the packet size distribution of your traffic with SmartView Monitor.

Unfortunately, you get the message.

"There are no machines that contain Firewall Blade and SmartView Monitor."

What should you do to analyze the packet size distribution of your traffic? Give the BEST answer.

Options:

A.

Purchase the SmartView Monitor license for your Security Management Server.

B.

Enable Monitoring on your Security Management Server.

C.

Purchase the SmartView Monitor license for your Security Gateway.

D.

Enable Monitoring on your Security Gateway.

Buy Now
Questions 24

You have detected a possible intruder listed in SmartView Tracker’s active pane. What is the fastest method to block this intruder from accessing your network indefinitely?

Options:

A.

Modify the Rule Base to drop these connections from the network.

B.

In SmartView Tracker, select Tools > Block Intruder.

C.

In SmartView Monitor, select Tools > Suspicious Activity Rules.

D.

In SmartDashboard, select IPS > Network Security > Denial of Service.

Buy Now
Questions 25

You manage a global network extending from your base in Chicago to Tokyo, Calcutta and Dallas. Management wants a report detailing the current software level of each Enterprise class Security Gateway. You plan to take the opportunity to create a proposal outline, listing the most cost-effective way to upgrade your Gateways.

Which two SmartConsole applications will you use to create this report and outline?

Options:

A.

SmartView Tracker and SmartView Monitor

B.

SmartLSM and SmartUpdate

C.

SmartDashboard and SmartView Tracker

D.

SmartView Monitor and SmartUpdate

Buy Now
Questions 26

NAT can NOT be configured on which of the following objects?

Options:

A.

HTTP Logical Server

B.

Gateway

C.

Address Range

D.

Host

Buy Now
Questions 27

When launching SmartDashboard, what information is required to log into R77?

Options:

A.

User Name, Management Server IP, certificate fingerprint file

B.

User Name, Password, Management Server IP

C.

Password, Management Server IP

D.

Password, Management Server IP, LDAP Server IP

Buy Now
Questions 28

Identify the correct step performed by SmartUpdate to upgrade a remote Security Gateway. After selecting Packages > Distribute and Install Selected Package and choosing the target Gateway, the:

Options:

A.

selected package is copied from the Package Repository on the Security Management Server to the Security Gateway and the installation IS performed.

B.

SmartUpdate wizard walks the Administrator through a distributed installation.

C.

selected package is copied from the Package Repository on the Security Management Server to the Security Gateway but the installation IS NOT performed.

D.

selected package is copied from the SmartUpdate PC CD-ROM directly to the Security Gateway and the installation IS performed.

Buy Now
Questions 29

Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use her iPad to access the internal Finance Web server. Because the iPad is not a member of the Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter her AD credentials in the Captive Portal and then get the same access as on her office computer. Her access to resources is based on rules in the R77 Firewall Rule Base.

To make this scenario work, the IT administrator must:

1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity Sources.

2) In the Portal Settings window in the User Access section, make sure that Name and password login is selected.

3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network destinations. Select accept as the Action.

Ms. McHanry tries to access the resource but is unable. What should she do?

Options:

A.

Have the security administrator select the Action field of the Firewall Rule “Redirect HTTP connections to an authentication (captive) portal?

B.

Have the security administrator reboot the firewall

C.

Have the security administrator select Any for the Machines tab in the appropriate Access Role

D.

Install the Identity Awareness agent on her iPad

Buy Now
Questions 30

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned a static IP address 10.0.0.19.

John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop with a static IP (10.0.0.19). He wants to move around the organization and continue to have access to the HR Web Server.

To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the policy.

2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.

3) Changes from static IP address to DHCP for the client PC.

What should John do when he cannot access the web server from a different personal computer?

Options:

A.

John should lock and unlock his computer

B.

Investigate this as a network connectivity issue

C.

The access should be changed to authenticate the user instead of the PC

D.

John should install the Identity Awareness Agent

Buy Now
Questions 31

You want to generate a cpinfo file via CLI on a system running GAiA. This will take about 40 minutes since the log files are also needed.

What action do you need to take regarding timeout?

Options:

A.

No action is needed because cpshell has a timeout of one hour by default.

B.

Log in as the default user expert and start cpinfo.

C.

Log in as admin, switch to expert mode, set the timeout to one hour with the command, idle 60, then start cpinfo.

D.

Log in as Administrator, set the timeout to one hour with the command idle 60 and start cpinfo.

Buy Now
Questions 32

What is also referred to as Dynamic NAT?

Options:

A.

Automatic NAT

B.

Static NAT

C.

Manual NAT

D.

Hide NAT

Buy Now
Questions 33

Your users are defined in a Windows 2008 R2 Active Directory server. You must add LDAP users to a Client Authentication rule. Which kind of user group do you need in the Client Authentication rule in R77?

Options:

A.

External-user group

B.

LDAP group

C.

A group with a generic user

D.

All Users

Buy Now
Questions 34

What information is found in the SmartView Tracker Management log?

Options:

A.

SIC revoke certificate event

B.

Destination IP address

C.

Most accessed Rule Base rule

D.

Number of concurrent IKE negotiations

Buy Now
Questions 35

Where is the easiest and BEST place to find information about connections between two machines?

Options:

A.

All options are valid.

B.

On a Security Gateway using the command fw log.

C.

On a Security Management Server, using SmartView Tracker.

D.

On a Security Gateway Console interface; it gives you detailed access to log files and state table information.

Buy Now
Questions 36

Which of the following items should be configured for the Security Management Server to authenticate using LDAP?

Options:

A.

Login Distinguished Name and password

B.

Windows logon password

C.

Check Point Password

D.

WMI object

Buy Now
Questions 37

Access Role objects define users, machines, and network locations as:

Options:

A.

Credentialed objects

B.

Linked objects

C.

One object

D.

Separate objects

Buy Now
Questions 38

What type of traffic can be re-directed to the Captive Portal?

Options:

A.

SMTP

B.

HTTP

C.

All of the above

D.

FTP

Buy Now
Questions 39

Complete this statement from the options provided. Using Captive Portal, unidentified users may be either; blocked, allowed to enter required credentials, or required to download the _____________.

Options:

A.

Identity Awareness Agent

B.

Full Endpoint Client

C.

ICA Certificate

D.

SecureClient

Buy Now
Questions 40

You are conducting a security audit. While reviewing configuration files and logs, you notice logs accepting POP3 traffic, but you do not see a rule allowing POP3 traffic in the Rule Base. Which of the following is the most likely cause?

Options:

A.

The POP3 rule is disabled.

B.

POP3 is accepted in Global Properties.

C.

The POP3 rule is hidden.

D.

POP3 is one of 3 services (POP3, IMAP, and SMTP) accepted by the default mail object in R77.

Buy Now
Questions 41

When you change an implicit rule’s order from Last to First in Global Properties, how do you make the change take effect?

Options:

A.

Run fw fetch from the Security Gateway.

B.

Select Install Database from the Policy menu.

C.

Select Save from the File menu.

D.

Reinstall the Security Policy.

Buy Now
Questions 42

How many packets does the IKE exchange use for Phase 1 Aggressive Mode?

Options:

A.

12

B.

6

C.

3

D.

1

Buy Now
Questions 43

In SmartView Tracker, which rule shows when a packet is dropped due to anti-spoofing?

Options:

A.

Rule 0

B.

Blank field under Rule Number

C.

Rule 1

D.

Cleanup Rule

Buy Now
Questions 44

SmartView Monitor is mainly for which kind of work –

1. Monitoring Performance and traffic

2. Provision Package

3. Managing licenses

4. Managing VPN Tunnels

Options:

A.

2, 3

B.

2, 4

C.

1, 4

D.

1, 3

Buy Now
Questions 45

A host on the Internet initiates traffic to the Static NAT IP of your Web server behind the Security Gateway. With the default settings in place for NAT, the initiating packet will translate the _________.

Options:

A.

destination on server side

B.

source on server side

C.

source on client side

D.

destination on client side

Buy Now
Questions 46

The fw monitor utility is used to troubleshoot which of the following problems?

Options:

A.

Phase two key negotiation

B.

Address translation

C.

Log Consolidation Engine

D.

User data base corruption

Buy Now
Questions 47

Lilly needs to review VPN History counters for the last week.

Where would she do this?

Options:

A.

SmartView Monitor > Tunnels > VPN History

B.

SmartView Monitor > System Counters > VPN History

C.

SmartView Monitor > System Counters > Firewall Security History

D.

SmartView Monitor > System Counters > VPN

Buy Now
Questions 48

What is the only SmartConsole you can open without a license?

Options:

A.

SmartDashboard

B.

SmartEvent

C.

SmartUpdate

D.

SmartView Monitor

Buy Now
Questions 49

Peter is your new Security Administrator. On his first working day, he is very nervous and enters the wrong password three times. His account is locked.

What can be done to unlock Peter’s account? Give the BEST answer.

Options:

A.

You can unlock Peter’s account by using the command fwm lock_admin -u Peter on the Security Management Server.

B.

You can unlock Peter’s account by using the command fwm unlock_admin -u Peter on the Security Management Server

C.

It is not possible to unlock Peter’s account. You have to install the firewall once again or abstain from Peter’s help.

D.

You can unlock Peter’s account by using the command fwm unlock_admin -u Peter on the Security Gateway.

Buy Now
Questions 50

Which feature or command provides the easiest path for Security Administrators to revert to earlier versions of the same Security Policy and objects configuration?

Options:

A.

Database Revision Control

B.

Policy Package management

C.

dbexport/dbimport

D.

upgrade_export/upgrade_import

Buy Now
Questions 51

The customer has a small Check Point installation which includes one Windows 7 workstation as the SmartConsole, one GAiA device working as Security Management Server, and a third server running SecurePlatform as Security Gateway. This is an example of a(n):

Options:

A.

Hybrid Installation

B.

Unsupported configuration

C.

Stand-Alone Installation

D.

Distributed Installation

Buy Now
Questions 52

SmartView Tracker R77 consists of three different modes. They are:

Options:

A.

Log, Active, and Audit

B.

Log, Active, and Management

C.

Network and Endpoint, Active, and Management

D.

Log, Track, and Management

Buy Now
Questions 53

How many packets does the IKE exchange use for Phase 1 Main Mode?

Options:

A.

12

B.

1

C.

3

D.

6

Buy Now
Questions 54

With the User Directory Software Blade, you can create R77 user definitions on a(n) _________ Server.

Options:

A.

LDAP

B.

Radius

C.

SecureID

D.

NT Domain

Buy Now
Questions 55

When configuring anti-spoofing on the Security Gateway object interfaces, which of the following is NOT a valid R77 topology configuration?

Options:

A.

External

B.

Any

C.

Specific

D.

Not Defined

Buy Now
Questions 56

Your shipping company uses a custom application to update the shipping distribution database. The custom application includes a service used only to notify remote sites that the distribution database is malfunctioning. The perimeter Security Gateway’s Rule Base includes a rule to accept this traffic. Since you are responsible for multiple sites, you want notification by a text message to your cellular phone, whenever traffic is accepted on this rule. Which of the following would work BEST for your purpose?

Options:

A.

Logging implied rules

B.

User-defined alert script

C.

SNMP trap

D.

SmartView Monitor Threshold

Buy Now
Questions 57

Which SmartConsole component can Administrators use to track changes to the Rule Base?

Options:

A.

WebUI

B.

SmartView Tracker

C.

SmartView Monitor

D.

SmartReporter

Buy Now
Questions 58

If you were NOT using IKE aggressive mode for your IPsec tunnel, how many packets would you see for normal Phase 1 exchange?

Options:

A.

9

B.

2

C.

3

D.

6

Buy Now
Status:
Expired
Exam Code: 156-215.77
Exam Name: Check Point Certified Security Administrator
Last Update: Apr 14, 2023
Questions: 388
$72  $159.99
$54  $119.99
$45  $99.99
buy now 156-215.77