Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

156-915.80 Sample Questions Answers

Questions 4

In R80spoofing is defined as a method of:

Options:

A.

Disguising an illegal IP address behind an authorized IP address through Port Address Translation.

B.

Hiding your firewall from unauthorized users.

C.

Detecting people using false or wrong authentication logins

D.

Making packets appear as if they come from an authorized IP address.

Buy Now
Questions 5

Usethe table to match the BEST Management High Availability synchronication-status descriptions for your Security Management Server (SMS).

Exhibit:

Options:

A.

A-5, B-3, C-1, D-2

B.

A-3, B-1, C-4, D-2

C.

A-3, B-5, C-2, D-4

D.

A-3, B-1, C-5, D-4

Buy Now
Questions 6

MegaCorp is using SmartCenter Server with several gateways. Their requirements result in a heavy log load. Would it be feasible to add the SmartEvent Correlation Unit and SmartEvent Server to their SmartCenter Server?

Options:

A.

No. SmartCenter SIC will interfere with the function of SmartEvent.

B.

No. If SmartCenter is already under stress,the use of a separate server for SmartEvent is recommended.

C.

No, SmartEvent and Smartcenter cannot be installed on the same machine at the same time.

D.

Yes. SmartEvent must be installed on your SmartCenter Server.

Buy Now
Questions 7

Complete this statement from the options provided. Using Captive Portal, unidentified users may be either; blocked, allowed to enter required credentials, or required to download the _____________.

Options:

A.

Identity Awareness Agent

B.

Full Endpoint Client

C.

ICA Certificate

D.

SecureClient

Buy Now
Questions 8

Study the Rule base and Client Authentication Action properties screen -

After being authenticated by the Security Gateway, when a user starts an HTTP connection to a Web site, the user tries to FTP to another site using the command line. What happens to the user? The:

Options:

A.

user is prompted for authentication by the Security Gateway again.

B.

FTP data connection is dropped after the user is authenticated successfully.

C.

user is prompted to authenticate from that FTP site only, and does notneed to enter his username and password for Client Authentication.

D.

FTP connection is dropped by Rule 2.

Buy Now
Questions 9

You cannot use SmartDashboard’s User Directory features to connect to the LDAP server. What should you investigate?

1) Verify you have read-only permissions as administrator for the operating system.

2) Verify there are no restrictions blocking SmartDashboard's User Manager from connecting to the LDAP server.

3) Check that the login Distinguished Name configured has root permission (or at least write permission Administrative access) in the LDAP Server's access control configuration.

Options:

A.

1,2, and 3

B.

2 and 3

C.

1 and 2

D.

1 and 3

Buy Now
Questions 10

You intend to upgrade a Check Point Gateway from R71 to R80. Prior to upgrading, you want to back up the Gateway should there be any problems with the upgrade. Which of the following allows for the Gateway configuration to be completely backed up into a manageable size in the least amount of time?

Options:

A.

database revision

B.

snapshot

C.

upgrade_export

D.

backup

Buy Now
Questions 11

Your company has the requirement that SmartEvent reports should show a detailed and accurate view of network activity but also performance should beguaranteed. Which actions should be taken to achieve that?

1) Use same hard drive for database directory, log files, and temporary directory.

2) Use Consolidation Rules.

3) Limit logging to blocked traffic only.

4) Use Multiple Database Tables.

Options:

A.

2, 4

B.

1, 3, 4

C.

1, 2, 4

D.

1, 2

Buy Now
Questions 12

The connection to the ClusterXL member ‘A’ breaks. The ClusterXL member ‘A’ status is now ‘down’. Afterwards the switch admin set a port to ClusterXL member ‘B’ to ‘down’. What will happen?

Options:

A.

ClusterXL member ‘B’ also left the cluster.

B.

ClusterXL member ‘B’ stays active as last member.

C.

Both ClusterXL members share load equally.

D.

ClusterXL member ‘A’ is asked to come back to cluster.

Buy Now
Questions 13

Type the full cphaprob command and syntax that will show full synchronization status.

Options:

Buy Now
Questions 14

Which statements about Management HA are correct?

1) Primary SmartCenter describes first installed SmartCenter

2) Active SmartCenter is always used to administrate with SmartConsole

3) Active SmartCenter describes first installed SmartCenter

4) Primary SmartCenter is always used to administrate with SmartConsole

Options:

A.

1 and 4

B.

2 and 3

C.

1 and 2

D.

3 and 4

Buy Now
Questions 15

Type the full fw command and syntax that allows you to disable only sync on a cluster firewall member.

Options:

Buy Now
Questions 16

Please choose correct command syntax to add an “emailserver1” host with IP address 10.50.23.90 using GAiA management CLI?

Options:

A.

host name myHost12 ip-address10.50.23.90

B.

mgmt. add host name ip-address 10.50.23.90

C.

add host name emailserver1 ip-address 10.50.23.90

D.

mgmt. add host name emailserver1 ip-address 10.50.23.90

Buy Now
Questions 17

Fred is troubleshooting a NAT issue and wants to check to see if the inboundconnection from his internal network is being translated across the interface in the firewall correctly. He decides to use the fw monitor to capture the traffic from the source 192.168.3.5 or the destination of 10.1.1.25 on his Security Gateway, Green thathas an IP of 192.168.4.5. What command captures this traffic in a file that he can download and review with WireShark?

Options:

A.

Expert@Green# fwmonitor –e “accept src=192.168.3.5 and dst=10.1.1.25;” –o monitor.out

B.

Expert@Green# fw monitor –e “accept src=192.168.3.5 or dst=10.1.1.25;” –o monitor.out

C.

Expert@Green# fwmonitor –e “accept src=192.168.3.5 or dst=10.1.1.25;” –o monitor.out

D.

Expert@Green# fw monitor –e “accept src=192.168.4.5 or dst=10.1.1.25;” –o monitor.out

Buy Now
Questions 18

Session unique identifiers are passed to the web api using which http header option?

Options:

A.

X-chkp-sid

B.

Accept-Charset

C.

Proxy-Authorization

D.

Application

Buy Now
Questions 19

Using mgmt_cli, what is the correct syntax to import a host object called Server_1 from the CLI?

Options:

A.

mgmt_cli add-host “Server_1” ip_ address “10.15.123.10” – format txt

B.

mgmt_ cli add host name “Server_ 1” ip-address “10.15.123.10” – format json

C.

mgmt_ cli add object-host “Server_ 1” ip-address “10.15.123.10” – format json

D.

mgmt_cli add object “Server_ 1”ip-address “10.15.123.10” – format json

Buy Now
Questions 20

John is using Management HA. Which Smartcenter should be connected to for marking changes?

Options:

A.

secondary Smartcenter

B.

active SmartConsole

C.

connect virtual IP of Smartcenter HA

D.

Primary Log Server

Buy Now
Questions 21

Check Point Management (cpm) is the main management process in that it provides the architecture for the consolidated management console. It empowers the migration from legacy Client side logic to Server side-logic. The cpm process:

Options:

A.

Allow GUI Client and management server to communicate via TCP Port 19001

B.

Allow GUI Client and management server to communicate via TCP Port 18191

C.

Performs database tasks such as creating, deleting, and modifying objects and compiling policy.

D.

Performs database taskssuch as creating, deleting, and modifying objects and compiling as well as policy code generation.

Buy Now
Questions 22

You find one of your cluster gateways showing “Down” when you run the “cphaprob stat” command. You then run the “clusterXL_admin up” on the down member but unfortunately the member continues to show down. What command do you run to determine the case?

Options:

A.

cphaprob –f register

B.

cphaprob –d–s report

C.

cpstat–f-all

D.

cphaprob –a list

Buy Now
Questions 23

What is the purpose of Priority Delta in VRRP?

Options:

A.

When a box is up, Effective Priority = Priority + Priority Delta

B.

When an Interface is up, Effective Priority = Priority + Priority Delta

C.

When an Interface fail, Effective Priority = Priority – Priority Delta

D.

When a box fail, Effective Priority = Priority – Priority Delta

Buy Now
Questions 24

Events can be categorized and assigned to System Administrators to track their path through the workflow. Which of the following is NOT an option?

Options:

A.

Under Investigation

B.

Pending Investigation

C.

FalsePositive

D.

Open

Buy Now
Questions 25

Fill in the blank: TheR80 feature ________ permits blocking specific IP addresses for a specified time period.

Options:

A.

Block Port Overflow

B.

Local Interface Spoofing

C.

Suspicious Activity Monitoring

D.

Adaptive Threat Prevention

Buy Now
Questions 26

What happen when IPS profile is set in Detect-Only Mode fortroubleshooting?

Options:

A.

It will generate Geo-Protection traffic

B.

Automatically uploads debugging logs to Check Point Support Center

C.

It will not block malicious traffic

D.

Bypass licenses requirement for Geo-Protection control

Buy Now
Questions 27

What command syntax would you use to turn on PDP logging in a distributed environment?

Options:

A.

pdp track=1

B.

pdp tracker on

C.

pdp logging on

D.

pdp log=1

Buy Now
Questions 28

Select the command set best used to verify proper failover function of a new ClusterXL configuration.

Options:

A.

reboot

B.

cphaprob -d failDevice -s problem -t 0 register / cphaprob -d failDeviceunregister

C.

clusterXL_admin down / clusterXL_admin up

D.

cpstop/cpstart

Buy Now
Questions 29

Which TCP-port does CPM process listen to?

Options:

A.

18191

B.

18190

C.

8983

D.

19009

Buy Now
Questions 30

What command would show the API server status?

Options:

A.

cpmstatus

B.

api restart

C.

api status

D.

show api status

Buy Now
Questions 31

All R80 Security Servers can perform authentication with the exception of one. Which of the Security Servers can NOT perform authentication?

Options:

A.

FTP

B.

SMTP

C.

HTTP

D.

RLOGIN

Buy Now
Questions 32

Which command would provide the most comprehensive diagnostic information to Check Point Technical Support?

Options:

A.

fw cpinfo

B.

cpinfo -o date.cpinfo.txt

C.

diag

D.

cpstat - date.cpstat.txt

Buy Now
Questions 33

In Gaia, if one is unsure about a possible command, what command lists all possible commands.

Options:

A.

show all |grep commands

B.

show configuration

C.

show commands

D.

get allcommands

Buy Now
Questions 34

The system administrator of a company is trying to find out why acceleration is not working for the traffic. The traffic is allowed according to the rule base and checked for viruses. But it is not accelerated. What is the most likely reason that the traffic is not accelerated?

Options:

A.

There is a virus found. Traffic is still allowed but not accelerated.

B.

The connection required a Security server.

C.

Acceleration is not enabled.

D.

The traffic is originating from the gateway itself.

Buy Now
Questions 35

ALL of the following options are provided by the GAiAsysconfig utility, EXCEPT:

Options:

A.

Export setup

B.

DHCP Server configuration

C.

Time & Date

D.

GUI Clients

Buy Now
Questions 36

You are running a R80 Security Gateway on GAiA. In case of a hardware failure, you have a server with the exact same hardware and firewall version installed. What back up method could be used to quickly put the secondary firewall into production?

Options:

A.

manual backup

B.

upgrade_export

C.

backup

D.

snapshot

Buy Now
Questions 37

How is the processing order for overall inspection and routing of packets?

Options:

A.

Firewall, NAT, Routing

B.

NAT, Firewall, Routing

C.

Firewall, NAT

D.

NAT, Firewall

Buy Now
Questions 38

Mobile Accesssupports all of the following methods of Link Translation EXCEPT:

Options:

A.

Hostname Translation (HT)

B.

Path Translation (PT)

C.

URL Translation (UT)

D.

Identity Translation (IT)

Buy Now
Questions 39

What are the blades of Threat Prevention?

Options:

A.

IPS, QoS, AntiVirus, AntiBot, Threat Emulation/Extraction

B.

DLP, AntiVirus, QoS, AntiBot, Threat Emulation/Extraction

C.

IPS, AntiVirus, AntiBot

D.

IPS, AntiVirus, AntiBot, Threat Emulation/Extraction

Buy Now
Questions 40

By default, the R80 web API uses which content-type in its response?

Options:

A.

Java Script

B.

XML

C.

Text

D.

JSON

Buy Now
Questions 41

Which view is NOT a valid CPVIEW view?

Options:

A.

IDA

B.

DLP

C.

PDP

D.

VPN

Buy Now
Questions 42

Check Point APIs allow system engineers and developers to make changes to their organization’s security policy with CLI tools and Web Services for all of the following except?

Options:

A.

Create new dashboards to manage 3rd party task

B.

Create products that use and enhance 3rd party solutions.

C.

Execute automated scripts to perform common tasks.

D.

Create products that use and enhance the Check Point Solution.

Buy Now
Questions 43

Which two processes are responsible on handling Identity Awareness?

Options:

A.

pdp and lad

B.

pdp and pdp-11

C.

pep and lad

D.

pdp and pep

Buy Now
Questions 44

MultiCorp is located in Atlanta. It has a branch office in Europe, Asia, and Africa. Each location has its own AD controller for local user login. How many ADqueries have to be configured?

Options:

Buy Now
Questions 45

Fill in the blank. The command that typically generates the firewall application, operating system, and hardware specific drivers is_________ .

Options:

Buy Now
Questions 46

Paul has just joined the MegaCorp security administration team. Natalie, the administrator, creates a newadministrator account for Paul in SmartDashboard and installs the policy. When Paul tries to login it fails. How can Natalie verify whether Paul’s IP address is predefined on the security management server?

Options:

A.

Login to Smart Dashboard, access Properties of the SMS, and verify whether Paul’s IP address is listed.

B.

Type cpconfig on the Management Server and select the option “GUI client List” to see if Paul’s IP address is listed.

C.

Login in to Smart Dashboard, access Global Properties, and select Security Management, to verify whether Paul’s IP address is listed.

D.

Access the WEBUI on the Security Gateway, and verify whether Paul’s IP address is listed as a GUI client.

Buy Now
Questions 47

Which CLI tool helps on verifying proper ClusterXL sync?

Options:

A.

fw stat

B.

fw ctl sync

C.

fw ctl pstat

D.

cphaprob stat

Buy Now
Questions 48

Which of the following CLISH commands would you use to set the admin user's shell to bash?

Options:

A.

set user admin shell bash

B.

set user admin shell /bin/bash

C.

set user admin shell = /bin/bash

D.

set user admin /bin/bash

Buy Now
Questions 49

You want VPN traffic to match packets from internal interfaces. You also want the traffic to exit theSecurity Gateway bound for all site-to-site VPN Communities, including Remote Access Communities. How should you configure the VPN match rule?

Options:

A.

internal_clear > All_communities

B.

Internal_clear > External_Clear

C.

Communities > Communities

D.

internal_clear > All_GwToGw

Buy Now
Questions 50

Which of the following items should be configured for the Security Management Server to authenticate using LDAP?

Options:

A.

Check Point Password

B.

WMI object

C.

Domain Adminusername

D.

Windows logon password

Buy Now
Questions 51

You run cphaprob -a if. When you review the output, you find the word DOWN. What does DOWN mean?

Options:

A.

The cluster link is down.

B.

The physical interface is administratively set to DOWN.

C.

Thephysical interface is down.

D.

CCP pakets couldn't be sent to or didn't arrive from neighbor member.

Buy Now
Questions 52

John is configuring a new R80 Gateway cluster but he can not configure the cluster as Third Party IP Clustering because thisoption is not available in Gateway Cluster Properties.

What’s happening?

Options:

A.

ClusterXL needs to be unselected to permit third party clustering configuration.

B.

Third Party Clustering is not available for R80 Security Gateways.

C.

John has an invalid ClusterXL license.

D.

John is not using third party hardware as IP Clustering is part of Check Point’s IP Appliance.

Buy Now
Questions 53

Your organization maintains several IKE VPN’s. Executives in your organization want to know which mechanism Security Gateway R80 uses to guarantee the authenticity and integrity of messages. Which technology should you explain to the executives?

Options:

A.

Certificate Revocation Lists

B.

Application Intelligence

C.

Key-exchange protocols

D.

Digital signatures

Buy Now
Questions 54

Type the command and syntax to view critical devices on a cluster member in a ClusterXL environment.

Options:

Buy Now
Questions 55

To provide full connectivity upgrade status, use command

Options:

Buy Now
Questions 56

To qualify as an Identity Awareness enabled rule, which column MAY include an Access Role?

Options:

A.

Source

B.

Track

C.

User

D.

Action

Buy Now
Questions 57

MegaCorps' disaster recovery plan is past due for an update to the backup and restore section to enjoy the benefits of the new distributed R80 installation. You must propose a plan that meets the following required and desired objectives:

Required: Security Policy repository must be backed up no less frequently than every 24 hours.

Desired: Back up R80 components enforcing the Security Policies at least once a week.

Desired: Back up R80 logs at least once a week.

You develop a disaster recovery plan proposing the following:

* Use the utility cron to run the command upgrade_export each night on the Security Management Servers.

* Configure the organization's routine backup software to back up files created by the command upgrade_export.

* Configure GAiA back up utility to back up Security Gateways every Saturday night.

* Use the utility cron to run the command upgrade_export each Saturday night on the log servers.

* Configure an automatic, nightly logswitch.

* Configure the organization's routine back up software to back up the switched logs every night.

The corporate IT change review committee decides your plan:

Options:

A.

meets the required objective and only one desired objective.

B.

meets the required objective and both desired objectives.

C.

meets the rquired objective but does not meet either deisred objective.

D.

does notmeet the required objective.

Buy Now
Questions 58

What mechanism does a gateway configured with Identity Awareness and LDAP initially use to communicate with aWindows 2003 or 2008 server?

Options:

A.

WMI

B.

CIFS

C.

RCP

D.

LDAP

Buy Now
Questions 59

You have adiskless appliance platform. How do you keep swap file wear to a minimum?

Options:

A.

Issue FW-1 bases its package structure on the Security Management Server, dynamically loading when the firewall is booted.

B.

The external PCMCIA-based flash extension has the swap file mapped to it, allowing easy replacement.

C.

Use PRAM flash devices, eliminating the longevity.

D.

A RAM drive reduces the swap file thrashing which causes fast wear on the device.

Buy Now
Questions 60

You enable Hide NAT on the network object, 10.1.1.0 behind the Security Gateway’s external interface. You browse to the Google Website from host, 10.1.1.10 successfully. You enable a log on the rule that allows 10.1.1.0 to exit the network. How many log entries do you see for that connection in SmartView Tracker?

Options:

A.

Two, one for outbound, one for inbound

B.

Only one, outbound

C.

Two, both outbound, one for the real IP connection and one for the NAT IP connection

D.

Only one, inbound

Buy Now
Questions 61

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimizemalware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned a static IP address 10.0.0.19.

John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop with a static IP (10.0.0.19). He wants tomove around the organization and continue to have access to the HR Web Server.

To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the policy.

2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.

What should John do when he cannot access the web server from a different personal computer?

Options:

A.

John should lock and unlock his computer

B.

Investigate this as a network connectivity issue

C.

The access should be changed to authenticate the user instead of the PC

D.

John should install the Identity Awareness Agent

Buy Now
Questions 62

Suppose the Security Gateway hard drive fails and you are forced to rebuild it. You have a snapshot file stored to a TFTP server andbackups of your Security Management Server. What is the correct procedure for rebuilding the Gateway quickly?

Options:

A.

Reinstall the base operating system (i.e., GAiA). Configure the Gateway interface so that the Gateway can communicate with the TFTP server. Revert to the stored snapshot image, and install the Security Policy.

B.

Run the command revert to restore the snapshot, establish SIC, and install the Policy.

C.

Run the command revert to restore the snapshot. Reinstall any necessary Check Point products. Establish SIC and install the Policy.

D.

Reinstall the base operating system (i.e., GAia). Configure the Gateway interface so that the Gateway can communicate with the TFTP server. Reinstall any necessary Check Point products and previously applied hotfixes.Revert to the stored snapshot image, and install the Policy.

Buy Now
Questions 63

The Identity Agent is a lightweight endpoint agent that authenticates securely with Single Sign-On (SSO). What is nota recommended usage of this method?

Options:

A.

When accuracy in detecting identity is crucial

B.

Leveraging identity for Data Center protection

C.

Protecting highly sensitive servers

D.

Identity based enforcement for non-AD users (non-Windows and guestusers)

Buy Now
Questions 64

Your perimeter Security Gateway’sexternal IP is 200.200.200.3. Your network diagram shows:

Required: Allow only network 192.168.10.0 and 192.168.20.0 to go out to the Internet, using 200.200.200.5.

The local network 192.168.1.0/24 needs to use 200.200.200.3 to go out to the Internet.

Assuming you enable all the settings in the NAT page of Global Properties, how could you achieve these requirements?

Options:

A.

Create network objects for 192.168.10.0/24 and 192.168.20.0/24. Enable Hide NAT on both network objects, using 200.200.200.5 as hiding IPaddress. Add an ARP entry for 200.200.200.3 for the MAC address of 200.200.200.5.

B.

Create an Address Range object, starting from 192.168.10.1 to 192.168.20.254. Enable Hide NAT on the NAT page of the address range object. Enter Hiding IP address 200.200.200.5. Add an ARP entry for 200.200.200.5 for the MAC address of 200.200.200.3.

C.

Create a network object 192.168.0.0/16. Enable Hide NAT on the NAT page. Enter 200.200.200.5 as the hiding IP address. Add an ARP entry for 200.200.200.5 for the MAC address of 200.200.200.3.

D.

Create two network objects: 192.168.10.0/24 and 192.168.20.0/24. Add the two network objects to a group object. Create a manual NAT rule like the following: Original source - group object; Destination - any; Service - any; Translatedsource - 200.200.200.5; Destination - original; Service - original.

Buy Now
Questions 65

Match the followingcommands to their correct function.

Each command has one function only listed.

Options:

A.

C1>F6; C2>F4; C3>F2; C4>F5

B.

C1>F2; C2>F1; C3>F6; C4>F4

C.

C1>F2; C2>F4; C3>F1; C4>F5

D.

C1>F4; C2>F6; C3>F3; C4>F2

Buy Now
Questions 66

Which operating systems are supported by a Check Point Security Gateway on an open server? Select MOST complete list.

Options:

A.

Sun Solaris, Red Hat Enterprise Linux, Check Point SecurePlatform, IPSO, Microsoft Windows

B.

Check Point GAiA and SecurePlatform, and Microsoft Windows

C.

Check Point GAiA, Microsoft Windows, Red Hat Enterprise Linux, Sun Solaris, IPSO

D.

Check Point GAiA and SecurePlatform, IPSO, Sun Solaris, Microsoft Windows

Buy Now
Questions 67

Looking at the SYN packets in the Wireshark output, select the statement that is true about NAT.

Options:

A.

This is an example of Hide NAT.

B.

There is not enough information provided in the Wireshark capture to determine the NAT settings.

C.

This is an exampleof Static NAT and Translate destination on client side unchecked in Global Properties.

D.

This is an example of Static NAT and Translate destination on client side checked in Global Properties.

Buy Now
Questions 68

You want to implement Static Destination NAT in order to provide external, Internet users access to an internal Web Serverthat has a reserved (RFC 1918) IP address. You have an unused valid IP address on the network between your Security Gateway and ISP router. You control the router that sits between the firewall external interface and the Internet.

What is an alternative configuration if proxy ARP cannot be used on your Security Gateway?

Options:

A.

Publish a proxy ARP entry on the ISP router instead of the firewall for the valid IP address.

B.

Place a static ARP entry on the ISP router for the valid IP address to the firewall's external address.

C.

Publish a proxy ARP entry on the internal Web server instead of the firewall for the valid IP address.

D.

Place a static host route on the firewall for the valid IP address to the internal Web server.

Buy Now
Questions 69

Where can you find the Check Point’s SNMP MIB file?

Options:

A.

$CPDIR/lib/snmp/chkpt.mib

B.

$FWDIR/conf/snmp.mib

C.

It is obtained only by request from the TAC.

D.

There is no specific MIB file for Check Point products.

Buy Now
Questions 70

What are you required to do beforerunning the command upgrade_export?

Options:

A.

Run a cpstop on the Security Gateway.

B.

Run a cpstop on the Security Management Server.

C.

Close all GUI clients.

D.

Run cpconfig and set yourself up as a GUI client.

Buy Now
Questions 71

You are a Security Administrator who has installed Security Gateway R80 on your network. You need to allow a specific IP address range for a partner site to access your intranet Web server. To limit the partner’s access for HTTP and FTP only, you did the following:

1)Created manual Static NAT rules for the Web server.

2) Cleared the following settings in the Global Properties > Network Address Translation screen:

- Allow bi-directional NAT

- Translate destination on client side

Do the above settings limit the partner’s access?

Options:

A.

Yes. This will ensure that traffic only matches the specific rule configured for this traffic, and that the Gateway translates the traffic after accepting the packet.

B.

No. The first setting is not applicable. The second setting will reduce performance.

C.

Yes. Both of these settings are only applicable to automatic NAT rules.

D.

No. The first setting is only applicable to automatic NAT rules. The second setting will force translation by the kernel on the interface nearest to the client.

Buy Now
Questions 72

Which of the following statements accurately describes the command upgrade_export?

Options:

A.

upgrade_export stores network-configuration data, objects, global properties, and the database revisions prior to upgrading the Security Management Server.

B.

Used primarily when upgrading the Security Management Server, upgrade_export stores all object databases and the /conf directories for importing to a newer Security Gateway version.

C.

upgrade_export is used when upgrading the Security Gateway, and allows certain files to be included or excluded before exporting.

D.

This command is no longer supported in GAiA.

Buy Now
Questions 73

Which Security Gateway R80 configuration setting forces the Client Authentication authorization time-out to refresh, each time a new user is authenticated? The:

Options:

A.

Time properties, adjusted on the user objects for each user, in the Client Authentication rule Source.

B.

IPS > Application Intelligence > Client Authentication > Refresh User Timeout option enabled.

C.

Refreshable Timeout setting, in Client AuthenticationAction Properties > Limits.

D.

Global Properties > Authentication parameters, adjusted to allow for Regular Client Refreshment.

Buy Now
Questions 74

You are responsible for the configuration of MegaCorp’s Check Point Firewall. You need to allow two NAT rules to match a connection. Is it possible? Give the BEST answer.

Options:

A.

No, it is not possible to have more than one NAT rule matching a connection. When the firewall receives a packet belonging to a connection, it compares it against the first rule in the Rule Base, then the second rule, and so on. When it finds a rule that matches, it stops checking and applies that rule.

B.

Yes, itis possible to have two NAT rules which match a connection, but only in using Manual NAT (bidirectional NAT).

C.

Yes, there are always as many active NAT rules as there are connections.

D.

Yes, it is possible to have two NAT rules which match aconnection, but only when using Automatic NAT (bidirectional NAT).

Buy Now
Questions 75

Your internal network is configured to be 10.1.1.0/24. This network is behind your perimeter R80 Gateway, which connects to your ISP provider. How do you configure the Gateway to allow this network to go out to the Internet?

Options:

A.

Use Hide NAT for network 10.1.1.0/24 behind the external IP address of your perimeter Gateway.

B.

Use Hide NAT for network10.1.1.0/24 behind the internal interface of your perimeter Gateway.

C.

Use automatic Static NAT for network 10.1.1.0/24.

D.

Do nothing, as long as 10.1.1.0 network has the correct default Gateway.

Buy Now
Status:
Expired
Exam Code: 156-915.80
Exam Name: Check Point Certified Security Expert Update - R80.10
Last Update: Apr 14, 2023
Questions: 502
$64  $159.99
$48  $119.99
$40  $99.99
buy now 156-915.80