Our pass rate is high to 98.9% and the similarity percentage between our 156-215.77 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Check-Point 156-215.77 exam in just one try? I am currently studying for the Check-Point 156-215.77 exam. Latest Check-Point 156-215.77 Test exam practice questions and answers, Try Check-Point 156-215.77 Brain Dumps First.

Online Check-Point 156-215.77 free dumps demo Below:

NEW QUESTION 1
Spoofing is a method of:

  • A. Making packets appear as if they come from an authorized IP address.
  • B. Detecting people using false or wrong authentication logins.
  • C. Disguising an illegal IP address behind an authorized IP address through Port Address Translation.
  • D. Hiding your firewall from unauthorized users.

Answer: A

NEW QUESTION 2
What action can be performed from SmartUpdate R77?

  • A. upgrade_export
  • B. fw stat -l
  • C. cpinfo
  • D. remote_uninstall_verifier

Answer: C

NEW QUESTION 3
When using LDAP as an authentication method for Identity Awareness, the query:

  • A. Requires client and server side software.
  • B. Prompts the user to enter credentials.
  • C. Requires administrators to specifically allow LDAP traffic to and from the LDAP Server and the Security Gateway.
  • D. Is transparent, requiring no client or server side software, or client intervention.

Answer: D

NEW QUESTION 4
Your company is running Security Management Server R77 on GAiA, which has been migrated through each version starting from Check Point 4.1.
How do you add a new administrator account?

  • A. Using SmartDashboard, under Users, select Add New Administrator
  • B. Using SmartDashboard or cpconfig
  • C. Using the Web console on GAiA under Product configuration, select Administrators
  • D. Using cpconfig on the Security Management Server, choose Administrators

Answer: A

NEW QUESTION 5
Lilly needs to review VPN History counters for the last week. Where would she do this?

  • A. SmartView Monitor > Tunnels > VPN History
  • B. SmartView Monitor > System Counters > VPN History
  • C. SmartView Monitor > System Counters > Firewall Security History
  • D. SmartView Monitor > System Counters > VPN

Answer: B

NEW QUESTION 6
You find a suspicious connection from a problematic host. You decide that you want to block everything from that whole network, not just the problematic host. You want to block this for an hour while you investigate further, but you do not want to add any rules to the Rule Base.
How do you achieve this?

  • A. Use dbedit to script the addition of a rule directly into the Rule Bases_5_0.fws configuration file.
  • B. Select Block intruder from the Tools menu in SmartView Tracker.
  • C. Create a Suspicious Activity Rule in SmartView Monitor.
  • D. Add a temporary rule using SmartDashboard and select hide rule.

Answer: C

NEW QUESTION 7
Which of the following is an authentication method used by Identity Awareness?

  • A. SSL
  • B. Captive Portal
  • C. RSA
  • D. PKI

Answer: B

NEW QUESTION 8
Which of these attributes would be critical for a site-to-site VPN?

  • A. Scalability to accommodate user groups
  • B. Centralized management
  • C. Strong authentication
  • D. Strong data encryption

Answer: D

NEW QUESTION 9
When configuring LDAP authentication, which of the following items should be configured for the Security Management Server?

  • A. Login Distinguished Name and password
  • B. Windows logon password
  • C. Check Point Password
  • D. WMI object

Answer: A

NEW QUESTION 10
You want to establish a VPN, using certificates. Your VPN will exchange certificates with an external partner. Which of the following activities should you do first?

  • A. Create a new logical-server object to represent your partner’s CA.
  • B. Exchange exported CA keys and use them to create a new server object to represent your partner’s Certificate Authority (CA).
  • C. Manually import your partner’s Certificate Revocation List.
  • D. Manually import your partner’s Access Control List.

Answer: B

NEW QUESTION 11
Which statement is TRUE about implicit rules?

  • A. You create them in SmartDashboard.
  • B. The Gateway enforces implicit rules that enable outgoing packets only.
  • C. Changes to the Security Gateway’s default settings do not affect implicit rules.
  • D. They are derived from Global Properties and explicit object properties.

Answer: D

NEW QUESTION 12
When you hide a rule in a Rule Base, how can you then disable the rule?

  • A. Hidden rules are already effectively disabled from Security Gateway enforcement.
  • B. Right-click on the hidden rule place-holder bar and select Disable Rule(s).
  • C. Right-click on the hidden rule place-holder bar and uncheck Hide, then right-click and select Disable Rule(s); re-hide the rule.
  • D. Use the search utility in SmartDashboard to view all hidden rule
  • E. Select the relevant rule and click Disable Rule(s).

Answer: C

NEW QUESTION 13
Complete this statement. The block Intruder option in the Active log is available _____.

  • A. in the SmartView Monitor client
  • B. in the SmartView Tracker client
  • C. since R75.40 release
  • D. only if you have the IPS blade enabled at least in one gateway

Answer: B

NEW QUESTION 14
SmartUpdate is mainly for which kind of work –
1. Monitoring Performance and traffic
2. Provision Package
3. Managing licenses
4. Creating a Rule Base

  • A. 2, 3
  • B. 1, 2
  • C. 1, 3
  • D. 2, 4

Answer: A

NEW QUESTION 15
All R77 Security Servers can perform authentication with the exception of one. Which of the Security Servers can NOT perform authentication?

  • A. FTP
  • B. SMTP
  • C. HTTP
  • D. RLOGIN

Answer: B

NEW QUESTION 16
Jack has locked himself out of the Kirk Security Gateway with an incorrect policy and can no longer connect from the McCoy Management Server.
Jack still has access to an out of band console connection on the Kirk Security Gateway. He is logged into the Gaia CLI, what does he need to enter in order to be able to fix his mistake and push policy?

  • A. Kirk> fw unload local
  • B. Kirk> fw unloadlocal
  • C. Kirk> fw unload policy
  • D. Kirk> fw fetch policy

Answer: B

NEW QUESTION 17
Which of the following describes the default behavior of an R77 Security Gateway?

  • A. Traffic not explicitly permitted is dropped.
  • B. Traffic is filtered using controlled port scanning.
  • C. All traffic is expressly permitted via explicit rules.
  • D. IP protocol types listed as secure are allowed by default, i.
  • E. ICMP, TCP, UDP sessions are inspected.

Answer: A

NEW QUESTION 18
Which SmartView Tracker selection would most effectively show who installed a Security Policy blocking all traffic from the corporate network?

  • A. Management tab
  • B. Custom filter
  • C. Network and Endpoint tab
  • D. Active tab

Answer: A

NEW QUESTION 19
......

100% Valid and Newest Version 156-215.77 Questions & Answers shared by Thedumpscentre.com, Get Full Dumps HERE: https://www.thedumpscentre.com/156-215.77-dumps/ (New 388 Q&As)