Master the 156-215.77 Check Point Certified Security Administrator – GAiA content and be ready for exam day success quickly with this Actualtests 156-215.77 practice test. We guarantee it!We make it a reality and give you real 156-215.77 questions in our Check-Point 156-215.77 braindumps.Latest 100% VALID Check-Point 156-215.77 Exam Questions Dumps at below page. You can use our Check-Point 156-215.77 braindumps and pass your exam.
Free 156-215.77 Demo Online For Check-Point Certifitcation:
NEW QUESTION 1
Your company enforces a strict change control policy. Which of the following would be MOST effective for quickly dropping an attacker’s specific active connection?
- A. Change the Rule Base and install the Policy to all Security Gateways
- B. Block Intruder feature of SmartView Tracker
- C. Intrusion Detection System (IDS) Policy install
- D. SAM - Suspicious Activity Rules feature of SmartView Monitor
Answer: B
NEW QUESTION 2
Your manager requires you to setup a VPN to a new business partner site. The administrator from the partner site gives you his VPN settings and you notice that he setup AES 128 for IKE phase 1 and AES 256 for IKE phase 2. Why is this a problematic setup?
- A. The two algorithms do not have the same key length and so don’t work togethe
- B. You will get the error …. No proposal chosen….
- C. All is fine as the longest key length has been chosen for encrypting the data and a shorter key length for higher performance for setting up the tunnel.
- D. Only 128 bit keys are used for phase 1 keys which are protecting phase 2, so the longer key length in phase 2 only costs performance and does not add security due to a shorter key in phase 1.
- E. All is fine and can be used as is.
Answer: C
NEW QUESTION 3
You have three servers located in a DMZ, using private IP addresses. You want internal users from 10.10.10.x to access the DMZ servers by public IP addresses. Internal_net
10.10.10.x is configured for Hide NAT behind the Security Gateway’s external interface.
What is the best configuration for 10.10.10.x users to access the DMZ servers, using the DMZ servers’ public IP addresses?
- A. When connecting to internal network 10.10.10.x, configure Hide NAT for the DMZ network behind the Security Gateway DMZ interface.
- B. When the source is the internal network 10.10.10.x, configure manual static NAT rules to translate the DMZ servers.
- C. When connecting to the Internet, configure manual Static NAT rules to translate the DMZ servers.
- D. When trying to access DMZ servers, configure Hide NAT for 10.10.10.x behind the DMZ’s interface.
Answer: B
NEW QUESTION 4
Which R77 GUI would you use to see the number of packets accepted since the last policy install?
- A. SmartView Monitor
- B. SmartView Tracker
- C. SmartDashboard
- D. SmartView Status
Answer: A
NEW QUESTION 5
Which of the following is a viable consideration when determining Rule Base order?
- A. Placing frequently accessed rules before less frequently accessed rules
- B. Grouping IPS rules with dynamic drop rules
- C. Adding SAM rules at the top of the Rule Base
- D. Grouping rules by date of creation
Answer: A
NEW QUESTION 6
You are running the license_upgrade tool on your GAiA Gateway. Which of the following can you NOT do with the upgrade tool?
- A. Perform the actual license-upgrade process
- B. Simulate the license-upgrade process
- C. View the licenses in the SmartUpdate License Repository
- D. View the status of currently installed licenses
Answer: C
NEW QUESTION 7
Your Security Gateways are running near performance capacity and will get upgraded
hardware next week. Which of the following would be MOST effective for quickly dropping all connections from a specific attacker’s IP at a peak time of day?
- A. Intrusion Detection System (IDS) Policy install
- B. Change the Rule Base and install the Policy to all Security Gateways
- C. SAM - Block Intruder feature of SmartView Tracker
- D. SAM - Suspicious Activity Rules feature of SmartView Monitor
Answer: D
NEW QUESTION 8
The London Security Gateway Administrator has just installed the Security Gateway and Management Server. He has not changed any default settings. As he tries to configure the Gateway, he is unable to connect.
Which troubleshooting suggestion will NOT help him?
- A. Check if some intermediate network device has a wrong routing table entry, VLAN assignment, duplex-mismatch, or trunk issue.
- B. Test the IP address assignment and routing settings of the Security Management Server, Gateway, and console client.
- C. Verify the SIC initialization.
- D. Verify that the Rule Base explicitly allows management connections.
Answer: D
NEW QUESTION 9
Which of the following items should be configured for the Security Management Server to authenticate using LDAP?
- A. Check Point Password
- B. WMI object
- C. Domain Admin username
- D. Windows logon password
Answer: A
NEW QUESTION 10
What is a Consolidation Policy?
- A. The collective name of the Security Policy, Address Translation, and IPS Policies.
- B. The specific Policy written in SmartDashboard to configure which log data is stored in the SmartReporter database.
- C. The collective name of the logs generated by SmartReporter.
- D. A global Policy used to share a common enforcement policy for multiple Security Gateways.
Answer: B
NEW QUESTION 11
MegaCorp’s security infrastructure separates Security Gateways geographically. You must request a central license for one remote Security Gateway.
How do you apply the license?
- A. Using the remote Gateway’s IP address, and attaching the license to the remote Gateway via SmartUpdate.
- B. Using your Security Management Server's IP address, and attaching the license to the remote Gateway via SmartUpdate.
- C. Using the remote Gateway's IP address, and applying the license locally with the command cplic put.
- D. Using each of the Gateways’ IP addresses, and applying the licenses on the Security Management Server with the command.
Answer: B
NEW QUESTION 12
Exhibit:
Of the following, what parameters will not be preserved when using Database Revision Control?
- A. 2, 4, 7, 10, 11
- B. 3, 4, 5, 6, 9, 12, 13
- C. 5, 6, 9, 12, 13
- D. 1, 2, 8, 10, 11
Answer: B
NEW QUESTION 13
Jack has been asked do enable Identify Awareness.
What are the three methods for Acquiring Identify available in the Identify Awareness Configuration Wizard?
- A. LDAP Query, Terminal Servers, Light-weight Identity Agent
- B. AD Query, Browser-Based Authentication, Light-Weight Identity Agent
- C. AD Query, Browser-Based Authentication, Terminal Servers
- D. LDAP Query, Browser-Based Authentication, Terminal Servers
Answer: C
NEW QUESTION 14
Because of pre-existing design constraints, you set up manual NAT rules for your HTTP server. However, your FTP server and SMTP server are both using automatic NAT rules. All traffic from your FTP and SMTP servers are passing through the Security Gateway without a problem, but traffic from the Web server is dropped on rule 0 because of anti- spoofing settings.
What is causing this?
- A. Manual NAT rules are not configured correctly.
- B. Allow bi-directional NAT is not checked in Global Properties.
- C. Routing is not configured correctly.
- D. Translate destination on client side is not checked in Global Properties under Manual NAT Rules.
Answer: D
NEW QUESTION 15
In which Rule Base can you implement an Access Role?
- A. DLP
- B. Mobile Access
- C. IPS
- D. Firewall
Answer: D
NEW QUESTION 16
How do you recover communications between your Security Management Server and Security Gateway if you lock yourself out through a rule or policy mis-configuration?
- A. fw unload policy
- B. fw unloadlocal
- C. fw delete all.all@localhost
- D. fwm unloadlocal
Answer: B
NEW QUESTION 17
The fw monitor utility is used to troubleshoot which of the following problems?
- A. Phase two key negotiation
- B. Address translation
- C. Log Consolidation Engine
- D. User data base corruption
Answer: B
NEW QUESTION 18
You have detected a possible intruder listed in SmartView Tracker’s active pane. What is the fastest method to block this intruder from accessing your network indefinitely?
- A. Modify the Rule Base to drop these connections from the network.
- B. In SmartView Tracker, select Tools > Block Intruder.
- C. In SmartView Monitor, select Tools > Suspicious Activity Rules.
- D. In SmartDashboard, select IPS > Network Security > Denial of Service.
Answer: B
NEW QUESTION 19
......
Thanks for reading the newest 156-215.77 exam dumps! We recommend you to try the PREMIUM Surepassexam 156-215.77 dumps in VCE and PDF here: https://www.surepassexam.com/156-215.77-exam-dumps.html (388 Q&As Dumps)