Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

156-915.77 Sample Questions Answers

Questions 4

How many pre-defined exclusions are included by default in SmartEvent R77 as part of the product installation?

Options:

A.

5

B.

0

C.

10

D.

3

Buy Now
Questions 5

You have selected the event Port Scan from Internal Network in SmartEvent, to detect an event when 30 port scans have occurred within 60 seconds. You also want to detect two port scans from a host within 10 seconds of each other. How would you accomplish this?

Options:

A.

Define the two port-scan detections as an exception.

B.

You cannot set SmartEvent to detect two port scans from a host within 10 seconds of each other.

C.

Select the two port-scan detections as a sub-event.

D.

Select the two port-scan detections as a new event.

Buy Now
Questions 6

Where do you verify that UserDirectory is enabled?

Options:

A.

Verify that Security Gateway > General Properties > Authentication > Use UserDirectory (LDAP) for Security Gateways is checked

B.

Verify that Global Properties > Authentication > Use UserDirectory (LDAP) for Security Gateways is checked

C.

Verify that Security Gateway > General Properties > UserDirectory (LDAP) > Use UserDirectory (LDAP) for Security Gateways is checked

D.

Verify that Global Properties > UserDirectory (LDAP) > Use UserDirectory (LDAP) for Security Gateways is checked

Buy Now
Questions 7

Review the rules.

Assume domain UDP is enabled in the impled rules.

What happens when a user from the internal network tries to browse to the internet using HTTP? The user:

Options:

A.

can connect to the Internet successfully after being authenticated.

B.

is prompted three times before connecting to the Internet successfully.

C.

can go to the Internet after Telnetting to the client authentication daemon port 259.

D.

can go to the Internet, without being prompted for authentication.

Buy Now
Questions 8

Review the Rule Base displayed.

For which rules will the connection templates be generated in SecureXL?

Options:

A.

Rules 2 and 5

B.

Rules 2 through 5

C.

Rule 2 only

D.

All rules except Rule 3

Buy Now
Questions 9

To run GAiA in 64bit mode, which of the following is true?

1) Run set edition default 64-bit.

2) Install more than 4 GB RAM.

3) Install more than 4 TB of Hard Disk.

Options:

A.

1 and 3

B.

1 and 2

C.

2 and 3

D.

1, 2, and 3

Buy Now
Questions 10

Which of the following CLISH commands would you use to set the admin user's shell to bash?

Options:

A.

set user admin shell bash

B.

set user admin shell /bin/bash

C.

set user admin shell = /bin/bash

D.

set user admin /bin/bash

Buy Now
Questions 11

The connection to the ClusterXL member ‘A’ breaks. The ClusterXL member ‘A’ status is now ‘down’. Afterwards the switch admin set a port to ClusterXL member ‘B’ to ‘down’. What will happen?

Options:

A.

ClusterXL member ‘B’ also left the cluster.

B.

ClusterXL member ‘B’ stays active as last member.

C.

Both ClusterXL members share load equally.

D.

ClusterXL member ‘A’ is asked to come back to cluster.

Buy Now
Questions 12

Which statements about Management HA are correct?

1) Primary SmartCenter describes first installed SmartCenter

2) Active SmartCenter is always used to administrate with SmartConsole

3) Active SmartCenter describes first installed SmartCenter

4) Primary SmartCenter is always used to administrate with SmartConsole

Options:

A.

1 and 4

B.

2 and 3

C.

1 and 2

D.

3 and 4

Buy Now
Questions 13

Fill in the blank. To verify that a VPN Tunnel is properly established, use the command _________

Options:

Buy Now
Questions 14

Many companies have defined more than one administrator. To increase security, only one administrator should be able to install a Rule Base on a specific Firewall. How do you configure this?

Options:

A.

Define a permission profile in SmartDashboard with read/write privileges, but restrict it to all other firewalls by placing them in the Policy Targets field. Then, an administrator with this permission profile cannot install a policy on any Firewall not listed here.

B.

Put the one administrator in an Administrator group and configure this group in the specific Firewall object in Advanced > Permission to Install.

C.

In the object General Properties representing the specific Firewall, go to the Software Blades product list and select Firewall. Right-click in the menu, select Administrator to Install to define only this administrator.

D.

Right-click on the object representing the specific administrator, and select that Firewall in Policy Targets.

Buy Now
Questions 15

A host on the Internet initiates traffic to the Static NAT IP of your Web server behind the Security Gateway. With the default settings in place for NAT, the initiating packet will translate the _________.

Options:

A.

destination on server side

B.

source on server side

C.

source on client side

D.

destination on client side

Buy Now
Questions 16

Suppose the Security Gateway hard drive fails and you are forced to rebuild it. You have a snapshot file stored to a TFTP server and backups of your Security Management Server. What is the correct procedure for rebuilding the Gateway quickly?

Options:

A.

Reinstall the base operating system (i.e., GAiA). Configure the Gateway interface so that the Gateway can communicate with the TFTP server. Revert to the stored snapshot image, and install the Security Policy.

B.

Run the command revert to restore the snapshot, establish SIC, and install the Policy.

C.

Run the command revert to restore the snapshot. Reinstall any necessary Check Point products. Establish SIC and install the Policy.

D.

Reinstall the base operating system (i.e., GAia). Configure the Gateway interface so that the Gateway can communicate with the TFTP server. Reinstall any necessary Check Point products and previously applied hotfixes. Revert to the stored snapshot image, and install the Policy.

Buy Now
Questions 17

You are the Security Administrator for MegaCorp. A Check Point firewall is installed and in use on a platform using GAiA. You have trouble configuring the speed and duplex settings of your Ethernet interfaces. Which of the following commands can be used in CLISH to configure the speed and duplex settings of an Ethernet interface and will survive a reboot? Give the BEST answer.

Options:

A.

ethtool

B.

set interface

C.

mii_tool

D.

ifconfig -a

Buy Now
Questions 18

Assume you are a Security Administrator for ABCTech. You have allowed authenticated access to users from Mkting_net to Finance_net. But in the user’s properties, connections are only permitted within Mkting_net. What is the BEST way to resolve this conflict?

Options:

A.

Select Ignore Database in the Action Properties window.

B.

Permit access to Finance_net.

C.

Select Intersect with user database in the Action Properties window.

D.

Select Intersect with user database or Ignore Database in the Action Properties window.

Buy Now
Questions 19

How can you check whether IP forwarding is enabled on an IP Security Appliance?

Options:

A.

clish -c show routing active enable

B.

cat /proc/sys/net/ipv4/ip_forward

C.

echo 1 > /proc/sys/net/ipv4/ip_forward

D.

ipsofwd list

Buy Now
Questions 20

Which Security Gateway R77 configuration setting forces the Client Authentication authorization time-out to refresh, each time a new user is authenticated? The:

Options:

A.

Time properties, adjusted on the user objects for each user, in the Client Authentication rule Source.

B.

IPS > Application Intelligence > Client Authentication > Refresh User Timeout option enabled.

C.

Refreshable Timeout setting, in Client Authentication Action Properties > Limits.

D.

Global Properties > Authentication parameters, adjusted to allow for Regular Client Refreshment.

Buy Now
Questions 21

Your company’s Security Policy forces users to authenticate to the Gateway explicitly, before they can use any services. The Gateway does not allow the Telnet service to itself from any location. How would you configure authentication on the Gateway? With a:

Options:

A.

Client Authentication rule using the manual sign-on method, using HTTP on port 900

B.

Client Authentication rule, using partially automatic sign on

C.

Client Authentication for fully automatic sign on

D.

Session Authentication rule

Buy Now
Questions 22

What happens if the identity of a user is known?

Options:

A.

If the user credentials do not match an Access Role, the system displays the Captive Portal.

B.

If the user credentials do not match an Access Role, the system displays a sandbox.

C.

If the user credentials do not match an Access Role, the traffic is automatically dropped.

D.

If the user credentials match an Access Role, the rule is applied and traffic is accepted or dropped based on the defined action.

Buy Now
Questions 23

What happens if the identity of a user is known?

Options:

A.

If the user credentials do not match an Access Role, the traffic is automatically dropped.

B.

If the user credentials do not match an Access Role, the system displays a sandbox.

C.

If the user credentials do not match an Access Role, the gateway moves onto the next rule.

D.

If the user credentials do not match an Access Role, the system displays the Captive Portal.

Buy Now
Questions 24

You enable Automatic Static NAT on an internal host node object with a private IP address of 10.10.10.5, which is NATed into 216.216.216.5. (You use the default settings in Global Properties / NAT.)

When you run fw monitor on the R77 Security Gateway and then start a new HTTP connection from host 10.10.10.5 to browse the Internet, at what point in the monitor output will you observe the HTTP SYN-ACK packet translated from 216.216.216.5 back into 10.10.10.5?

Options:

A.

o=outbound kernel, before the virtual machine

B.

I=inbound kernel, after the virtual machine

C.

O=outbound kernel, after the virtual machine

D.

i=inbound kernel, before the virtual machine

Buy Now
Questions 25

Fill in the blanks. To view the number of concurrent connections going through your firewall, you would use the command and syntax __ ___ __ __________ __ .

Options:

Buy Now
Questions 26

What command syntax would you use to see accounts the gateway suspects are service accounts?

Options:

A.

pdp check_log

B.

pdp show service

C.

adlog check_accounts

D.

adlog a service_accounts

Buy Now
Questions 27

Your organization maintains several IKE VPN’s. Executives in your organization want to know which mechanism Security Gateway R77 uses to guarantee the authenticity and integrity of messages. Which technology should you explain to the executives?

Options:

A.

Certificate Revocation Lists

B.

Application Intelligence

C.

Key-exchange protocols

D.

Digital signatures

Buy Now
Questions 28

Access Role objects define users, machines, and network locations as:

Options:

A.

Credentialed objects

B.

Linked objects

C.

One object

D.

Separate objects

Buy Now
Questions 29

Where does the security administrator activate Identity Awareness within SmartDashboard?

Options:

A.

Gateway Object > General Properties

B.

Security Management Server > Identity Awareness

C.

Policy > Global Properties > Identity Awareness

D.

LDAP Server Object > General Properties

Buy Now
Questions 30

Several Security Policies can be used for different installation targets. The Firewall protecting Human Resources’ servers should have its own Policy Package. These rules must be installed on this machine and not on the Internet Firewall. How can this be accomplished?

Options:

A.

A Rule Base is always installed on all possible targets. The rules to be installed on a Firewall are defined by the selection in the Rule Base row Install On.

B.

When selecting the correct Firewall in each line of the Rule Base row Install On, only this Firewall is shown in the list of possible installation targets after selecting Policy > Install on Target.

C.

In the menu of SmartDashboard, go to Policy > Policy Installation Targets and select the correct firewall via Specific Targets.

D.

A Rule Base can always be installed on any Check Point Firewall object. It is necessary to select the appropriate target directly after selecting Policy > Install on Target.

Buy Now
Status:
Expired
Exam Code: 156-915.77
Exam Name: Check Point Certified Security Expert Update
Last Update: Apr 14, 2023
Questions: 203
$64  $159.99
$48  $119.99
$40  $99.99
buy now 156-915.77