Weekend Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

Note! The 156-915.77 Exam is no longer available.

156-915.77 Check Point Certified Security Expert Update Questions and Answers

Questions 4

Which file defines the fields for each object used in the file objects.C (color, num/string, default value…)?

Options:

A.

$FWDIR/conf/classes.C

B.

$FWDIR/conf/scheam.C

C.

$FWDIR/conf/fields.C

D.

$FWDIR/conf/table.C

Buy Now
Questions 5

Assume you are a Security Administrator for ABCTech. You have allowed authenticated access to users from Mkting_net to Finance_net. But in the user’s properties, connections are only permitted within Mkting_net. What is the BEST way to resolve this conflict?

Options:

A.

Select Ignore Database in the Action Properties window.

B.

Permit access to Finance_net.

C.

Select Intersect with user database in the Action Properties window.

D.

Select Intersect with user database or Ignore Database in the Action Properties window.

Buy Now
Questions 6

What is Check Point's CoreXL?

Options:

A.

A way to synchronize connections across cluster members

B.

TCP-18190

C.

Multiple core interfaces on the device to accelerate traffic

D.

Multi Core support for Firewall Inspection

Buy Now
Questions 7

You find that Users are not prompted for authentication when they access their Web servers, even though you have created an HTTP rule via User Authentication. Choose the BEST reason why.

Options:

A.

You checked the cache password on desktop option in Global Properties.

B.

Another rule that accepts HTTP without authentication exists in the Rule Base.

C.

You have forgotten to place the User Authentication Rule before the Stealth Rule.

D.

Users must use the SecuRemote Client, to use the User Authentication Rule.

Buy Now
Questions 8

Fill in the blank.

156-915.77 Question 8

In New Mode HA, the internal cluster IP VIP address is 10.4.8.3. An internal host 10.4.8.108 successfully pings its Cluster and receives replies. Review the ARP table from the internal Windows host 10.4.8.108. Based on this information, what is the active cluster member’s IP address?

Options:

Buy Now
Questions 9

John is configuring a new R77 Gateway cluster but he can not configure the cluster as Third Party IP Clustering because this option is not available in Gateway Cluster Properties.

156-915.77 Question 9

What’s happening?

Options:

A.

ClusterXL needs to be unselected to permit third party clustering configuration.

B.

Third Party Clustering is not available for R77 Security Gateways.

C.

John has an invalid ClusterXL license.

D.

John is not using third party hardware as IP Clustering is part of Check Point’s IP Appliance.

Buy Now
Questions 10

Which two processes are responsible on handling Identity Awareness?

Options:

A.

pdp and lad

B.

pdp and pdp-11

C.

pep and lad

D.

pdp and pep

Buy Now
Questions 11

Which process should you debug if SmartDashboard login fails?

Options:

A.

sdm

B.

cpd

C.

fwd

D.

fwm

Buy Now
Questions 12

Complete this statement. To save interface information before upgrading a Windows Gateway, use command

Options:

Buy Now
Questions 13

MegaCorps' disaster recovery plan is past due for an update to the backup and restore section to enjoy the benefits of the new distributed R77 installation. You must propose a plan that meets the following required and desired objectives:

Required: Security Policy repository must be backed up no less frequently than every 24 hours.

Desired: Back up R77 components enforcing the Security Policies at least once a week.

Desired: Back up R77 logs at least once a week.

You develop a disaster recovery plan proposing the following:

* Use the utility cron to run the command upgrade_export each night on the Security Management Servers.

* Configure the organization's routine backup software to back up files created by the command upgrade_export.

* Configure GAiA back up utility to back up Security Gateways every Saturday night.

* Use the utility cron to run the command upgrade_export each Saturday night on the log servers.

* Configure an automatic, nightly logswitch.

* Configure the organization's routine back up software to back up the switched logs every night.

The corporate IT change review committee decides your plan:

Options:

A.

meets the required objective and only one desired objective.

B.

meets the required objective and both desired objectives.

C.

meets the rquired objective but does not meet either deisred objective.

D.

does not meet the required objective.

Buy Now
Questions 14

Which of the following options is available with the GAiA cpconfig utility on a Management Server?

Options:

A.

Export setup

B.

DHCP Server configuration

C.

GUI Clients

D.

Time & Date

Buy Now
Questions 15

ALL of the following options are provided by the GAiA sysconfig utility, EXCEPT:

Options:

A.

Export setup

B.

DHCP Server configuration

C.

Time & Date

D.

GUI Clients

Buy Now
Questions 16

Fill in the blank. To save your OSPF configuration in GAiA, enter the command ___________ .

Options:

Buy Now
Questions 17

Your organization maintains several IKE VPN’s. Executives in your organization want to know which mechanism Security Gateway R77 uses to guarantee the authenticity and integrity of messages. Which technology should you explain to the executives?

Options:

A.

Certificate Revocation Lists

B.

Application Intelligence

C.

Key-exchange protocols

D.

Digital signatures

Buy Now
Questions 18

When do modifications to the Event Policy take effect?

Options:

A.

As soon as the Policy Tab window is closed.

B.

When saved on the SmartEvent Server and installed to the Correlation Units.

C.

When saved on the Correlation Units, and pushed as a policy.

D.

When saved on the SmartEvent Client, and installed on the SmartEvent Server.

Buy Now
Questions 19

Your company has the requirement that SmartEvent reports should show a detailed and accurate view of network activity but also performance should be guaranteed. Which actions should be taken to achieve that?

1) Use same hard drive for database directory, log files, and temporary directory.

2) Use Consolidation Rules.

3) Limit logging to blocked traffic only.

4) Use Multiple Database Tables.

Options:

A.

2, 4

B.

1, 3, 4

C.

1, 2, 4

D.

1, 2

Buy Now
Questions 20

Charles requests a Website while using a computer not in the net_singapore network.

156-915.77 Question 20

What is TRUE about his location restriction?

Options:

A.

Source setting in Source column always takes precedence.

B.

Source setting in User Properties always takes precedence.

C.

As location restrictions add up, he would be allowed from net_singapore and net_sydney.

D.

It depends on how the User Auth object is configured; whether User Properties or Source Restriction takes precedence.

Buy Now
Questions 21

The technical-support department has a requirement to access an intranet server. When configuring a User Authentication rule to achieve this, which of the following should you remember?

Options:

A.

You can only use the rule for Telnet, FTP, SMTP, and rlogin services.

B.

The Security Gateway first checks if there is any rule that does not require authentication for this type of connection before invoking the Authentication Security Server.

C.

Once a user is first authenticated, the user will not be prompted for authentication again until logging out.

D.

You can limit the authentication attempts in the User Properties’ Authentication tab.

Buy Now
Questions 22

What command syntax would you use to turn on PDP logging in a distributed environment?

Options:

A.

pdp track=1

B.

pdp tracker on

C.

pdp logging on

D.

pdp log=1

Buy Now
Questions 23

Which of the following items should be configured for the Security Management Server to authenticate via LDAP?

Options:

A.

Check Point Password

B.

Active Directory Server object

C.

Windows logon password

D.

WMI object

Buy Now
Questions 24

Where do you verify that UserDirectory is enabled?

Options:

A.

Verify that Security Gateway > General Properties > Authentication > Use UserDirectory (LDAP) for Security Gateways is checked

B.

Verify that Global Properties > Authentication > Use UserDirectory (LDAP) for Security Gateways is checked

C.

Verify that Security Gateway > General Properties > UserDirectory (LDAP) > Use UserDirectory (LDAP) for Security Gateways is checked

D.

Verify that Global Properties > UserDirectory (LDAP) > Use UserDirectory (LDAP) for Security Gateways is checked

Buy Now
Questions 25

How granular may an administrator filter an Access Role with identity awareness? Per:

Options:

A.

Specific ICA Certificate

B.

AD User

C.

Radius Group

D.

Windows Domain

Buy Now
Questions 26

What are you required to do before running the command upgrade_export?

Options:

A.

Run a cpstop on the Security Gateway.

B.

Run a cpstop on the Security Management Server.

C.

Close all GUI clients.

D.

Run cpconfig and set yourself up as a GUI client.

Buy Now
Questions 27

You need to back up the routing, interface, and DNS configuration information from your R77 GAiA Security Gateway. Which backup-and-restore solution do you use?

Options:

A.

Manual copies of the directory $FWDIR/conf

B.

GAiA back up utilities

C.

upgrade_export and upgrade_import commands

D.

Database Revision Control

Buy Now
Questions 28

A host on the Internet initiates traffic to the Static NAT IP of your Web server behind the Security Gateway. With the default settings in place for NAT, the initiating packet will translate the _________.

Options:

A.

destination on server side

B.

source on server side

C.

source on client side

D.

destination on client side

Buy Now
Questions 29

Your main internal network 10.10.10.0/24 allows all traffic to the Internet using Hide NAT. You also have a small network 10.10.20.0/24 behind the internal router. You want to configure the kernel to translate the source address only when network 10.10.20.0 tries to access the Internet for HTTP, SMTP, and FTP services. Which of the following configurations will allow this network to access the Internet?

Options:

A.

Configure three Manual Static NAT rules for network 10.10.20.0/24, one for each service.

B.

Configure Automatic Static NAT on network 10.10.20.0/24.

C.

Configure one Manual Hide NAT rule for HTTP, FTP, and SMTP services for network 10.10.20.0/24.

D.

Configure Automatic Hide NAT on network 10.10.20.0/24 and then edit the Service column in the NAT Rule Base on the automatic rule.

Buy Now
Questions 30

The Identity Agent is a lightweight endpoint agent that authenticates securely with Single Sign-On (SSO). What is not a recommended usage of this method?

Options:

A.

When accuracy in detecting identity is crucial

B.

Leveraging identity for Data Center protection

C.

Protecting highly sensitive servers

D.

Identity based enforcement for non-AD users (non-Windows and guest users)

Buy Now
Exam Code: 156-915.77
Exam Name: Check Point Certified Security Expert Update
Last Update: Nov 27, 2023
Questions: 203
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 20 May 2024