Black Friday Special - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

Note! The 156-315.77 Exam is no longer available.

156-315.77 Check Point Certified Security Expert Questions and Answers

Questions 4

Frank is concerned with performance and wants to configure the affinities settings. His gateway does not have the Performance pack running. What would Frank need to perform in order configure those settings?

Options:

A.

Edit affinity.conf and change the settings

B.

Run fw affinity and change the settings

C.

Edit $FWDIR/conf/fwaffinity.conf and change the settings

D.

Run sim affinity and change the settings

Buy Now
Questions 5

In Gaia, the operating system can be changed to 32-bit or 64-bit, provided the processor supports 64-bit. What command toggles to 64-bit.

Options:

A.

set bitrate 64

B.

set edition default 64

C.

configure edition 64-bit

D.

set edition default 64-bit

Buy Now
Questions 6

How do you verify the Check Point kernel running on a firewall?

Options:

A.

fw ver -k

B.

fw ctl pstat

C.

fw ctl get kernel

D.

fw kernel

Buy Now
Questions 7

Which of the following is NOT an internal/native Check Point command?

Options:

A.

fwaccel on

B.

fw ctl debug

C.

tcpdump

D.

cphaprob

Buy Now
Questions 8

MultiCorp has bought company OmniCorp and now has two active AD domains. How would you deploy Identity Awareness in this environment?

Options:

A.

You must run an ADquery for every domain.

B.

Identity Awareness can only manage one AD domain.

C.

Only one ADquery is necessary to ask for all domains.

D.

Only Captive Portal can be used.

Buy Now
Questions 9

You have pushed a policy to your firewall and you are not able to access the firewall. What command will allow you to remove the current policy from the machine?

Options:

A.

fw purge active

B.

fw purge policy

C.

fw fetch policy

D.

fw unloadlocal

Buy Now
Questions 10

What is the lowest possible version a Security Gateway may be running in order to use it as an LSM enabled Gateway?

Options:

A.

NG-AI R55 HFAJ7

B.

NGX R60

C.

NGXR65HFA_50

D.

NGX R71

Buy Now
Questions 11

Which Check Point QoS feature marks the ToS byte in the IP header?

Options:

A.

Differentiated Services

B.

Guarantees

C.

Weighted Fair Queuing

D.

Low Latency Queuing

Buy Now
Questions 12

Which command would you use to save the interface information before upgrading a GAiA Gateway?

Options:

A.

ipconfig –a > [filename].txt

B.

cp /etc/sysconfig/network.C [location]

C.

netstat –rn > [filename].txt

D.

ifconfig > [filename].txt

Buy Now
Questions 13

Check Point recommends that you back up systems running Check Point products. Run your back ups during maintenance windows to limit disruptions to services, improve CPU usage, and simplify time allotment. Which back up method does Check Point recommend before major changes, such as upgrades?

Options:

A.

upgrade_export

B.

migrate export

C.

snapshot

D.

backup

Buy Now
Questions 14

If using AD Query for seamless identity data reception from Microsoft Active Directory (AD), which of the following methods is NOT Check Point recommended?

Options:

A.

Identity-based enforcement for non-AD users (non-Windows and guest users)

B.

Basic identity enforcement in the internal network

C.

Leveraging identity in Internet application control

D.

Identity-based auditing and logging

Buy Now
Questions 15

Which two processes are responsible on handling Identity Awareness?

Options:

A.

pdp and lad

B.

pdp and pdp-11

C.

pep and lad

D.

pdp and pep

Buy Now
Questions 16

In the following cluster configuration; if you reboot sglondon_1 which device will be active when sglondon_1 is back up and running? Why?

Options:

A.

sglondon_1 because it the first configured object with the lowest IP.

B.

sglondon_2 because sglondon_1 has highest IP.

C.

sglondon_1, because it is up again, sglondon_2 took over during reboot.

D.

sglondon_2 because it has highest priority.

Buy Now
Questions 17

Identity Agent is a lightweight endpoint agent that authenticates securely with Single Sign-On (SSO). Which of the following is NOT a recommended use for this method?

Options:

A.

Leveraging machine name or identity

B.

When accuracy in detecting identity is crucial

C.

Identity based enforcement for non-AD users (non-Windows and guest users)

D.

Protecting highly sensitive servers

Buy Now
Questions 18

You are the MegaCorp Security Administrator. This company uses a firewall cluster, consisting of two cluster members. The cluster generally works well but one day you find that the cluster is behaving strangely. You assume that there is a connectivity problem with the cluster synchronization link (cross-over cable). Which of the following commands is the BEST for testing the connectivity of the crossover cable?

Options:

A.

ifconfig -a

B.

arping

C.

telnet

D.

ping

Buy Now
Questions 19

What is the proper CLISH syntax to configure a default route via 192.168.255.1 in GAiA?

Options:

A.

set static-route default nexthop gateway address 192.168.255.1 priority 1 on

B.

set static-route 192.168.255.0/24 nexthop gateway logical ethl on

C.

set static-route 192.168.255.0/24 nexthop gateway address 192.168.255.1 priority 1 on

D.

set static-route nexthop default gateway logical 192.168.255.1 priority 1 on

Buy Now
Questions 20

Where do you define NAT properties so that NAT is performed either client side or server side? In SmartDashboard under:

Options:

A.

Gateway Setting

B.

NAT Rules

C.

Global Properties > NAT definition

D.

Implied Rules

Buy Now
Questions 21

Your customer complains of the weak performance of his systems. He has heard that Connection Templates accelerate traffic. How do you explain to the customer about template restrictions and how to verify that they are enabled?

Options:

A.

To enhance connection-establishment acceleration, a mechanism attempts to “group together” all connections that match a particular service and whose sole discriminating element is the source port. To test if connection templates are enabled, use the command fwaccel stat.

B.

To enhance connection-establishment acceleration, a mechanism attempts to “group together” all connections that match a particular service and whose sole discriminating element is the destination port. To test if connection templates are enabled, use the command fwacel templates.

C.

To enhance connection-establishment acceleration, a mechanism attempts to “group together” all connections that match a particular service and whose sole discriminating element is the destination port. To test if connection templates are enabled, use the command fw ctl templates.

D.

To enhance connection-establishment acceleration, a mechanism attempts to “group together” all connections that match a particular service and whose sole discriminating element is the source port. To test if connection templates are enabled, use the command fw ctl templates.

Buy Now
Questions 22

You want to establish a VPN, using certificates. Your VPN will exchange certificates with an external partner. Which of the following activities should you do first?

Options:

A.

Exchange exported CA keys and use them to create a new server object to represent your partner’s Certificate Authority (CA).

B.

Create a new logical-server object to represent your partner’s CA.

C.

Manually import your partner’s Access Control List.

D.

Manually import your partner’s Certificate Revocation List.

Buy Now
Questions 23

MEP VPN’s use the Proprietary Probing Protocol to send special UDP RDP packets to port ____ to discover if an IP is accessible.

Options:

A.

259

B.

256

C.

264

D.

201

Buy Now
Questions 24

VPN routing can also be configured by editing which file?

Options:

A.

$FWDIR/VPN/route_conf.c

B.

$FWDIR/conf/vpn_route.conf

C.

$FWDIR/bin/vpn_route.conf

D.

$FWDIR/conf/vpn_route.c

Buy Now
Questions 25

Fill in the blank.

To stop acceleration on a GAiA Security Gateway, enter command:

Options:

Buy Now
Questions 26

When you use the Global Properties' default settings on R77, which type of traffic will be dropped if NO explicit rule allows the traffic?

Options:

A.

Firewall logging and ICA key-exchange information

B.

RIP traffic

C.

Outgoing traffic originating from the Security Gateway

D.

SmartUpdate connections

Buy Now
Questions 27

Your primary SmartCenter Server is installed on a Secure PlatformPro machine, which is also a VPN-1 Pro Gateway. You want to implement Management High Availability (HA). You have a spare machine to configure as the secondary SmartCenter Server. How do you configure the new machine to be the standby SmartCenter Server, without making any changes to the existing primary SmartCenter Server? (Changes can include uninstalling and reinstalling.)

Options:

A.

You cannot configure Management HA, when either the primary or secondary SmartCenter Server is running on a VPN-1 Pro Gateway.

B.

The new machine cannot be installed as the Internal Certificate Authority on its own.

C.

The secondary Server cannot be installed on a SecurePlatform Pro machine alone.

D.

Install the secondary Server on the spare machine. Add the new machine to the same network as the primary Server.

Buy Now
Questions 28

A Fast Path Upgrade of a cluster:

Options:

A.

Upgrades all cluster members except one at the same time.

B.

Treats each individual cluster member as an individual gateway.

C.

Is not a valid upgrade method in R76.

D.

Is only supported in major releases (R70 to R71, R75 to R76).

Buy Now
Questions 29

What Shell is required in Gaia to use WinSCP?

Options:

A.

UNIX

B.

CPShell

C.

CLISH

D.

Bash

Buy Now
Questions 30

The “MAC Magic” value must be modified under the following condition:

Options:

A.

There is more than one cluster connected to the same VLAN

B.

A firewall cluster is configured to use Multicast for CCP traffic

C.

There are more than two members in a firewall cluster

D.

A firewall cluster is configured to use Broadcast for CCP traffic

Buy Now
Questions 31

When configuring an LDAP Group object, select the option _____ if you want the gateway to reference all groups defined on the LDAP server for authentication purposes.

Options:

A.

Only Sub Tree

B.

Only Group in Branch

C.

OU Accept and select appropriate domain

D.

All Account-Unit’s Users

Buy Now
Questions 32

When configuring an LDAP Group object, select option _____ if you want the gateway to reference a specific group defined on the LDAP server for authentication purposes.

Options:

A.

Group Agnostic

B.

All Account-Unit's Users

C.

Only Sub Tree

D.

Only Group in Branch

Buy Now
Questions 33

Remote clients are using IPSec VPN to authenticate via LDAP server to connect to the organization. Which gateway process is responsible for the authentication?

Options:

A.

fwm

B.

fwd

C.

vpnd

D.

cvpnd

Buy Now
Questions 34

In Company XYZ, the DLP Administrator defined a new Keywords Data Type that contains a list of secret project names; i.e., Ayalon, Yarkon, Yarden. The threshold is set to At least 2 keywords or phrases. Based on this information, which of the following scenarios will be a match to the Rule Base?

Options:

A.

A PDF file that contains the following textYarkon1 can be the code name for the new product.Yardens list of protected sites

B.

An MS Excel file that contains the following text Mort resources for Yarkon project..Are you certain this is about Yarden?

C.

A word file that contains the following text will match:AyalonayalonAYALON

D.

A password protected MS Excel file that contains the following text AyalonYarkonYarden

Buy Now
Questions 35

When configuring an LDAP Group object, which option should you select if you want the gateway to reference the groups defined on the LDAP server for authentication purposes?

Options:

A.

Only Group in Branch

B.

Only Sub Tree

C.

OU Auth and select Group Name

D.

All Account-Unit's Users

Buy Now
Questions 36

What is NOT true about Management Portal?

Options:

A.

Choosing Accept control connections in Implied Rules includes Management Portal access

B.

Management Portal requires a license

C.

Default Port for Management Portal access is 4433

D.

Management Portal could be reconfigured for using HTTP instead of HTTPS

Buy Now
Questions 37

CPD is a core Check Point process that does all of the following EXCEPT:

Options:

A.

AMON status pull from the Gateway

B.

Management High Availability (HA) sync

C.

SIC (Secure Internal Communication) functions

D.

Policy installation

Buy Now
Questions 38

A Threat Prevention profile is a set of configurations based on the following. Select the right answer.

Options:

A.

Anti-Virus settings, Anti-Bot settings, Threat Emulation settings.

B.

Anti-Virus settings, Anti-Bot settings, Threat Emulation settings, Intrusion-prevention settings.

C.

Anti-Virus settings, Anti-Bot settings, Threat Emulation settings, Intrusion-prevention settings, HTTPS inspection settings.

D.

Anti-Bot settings, Threat Emulation settings, Intrusion-prevention settings, HTTPS inspection settings

Buy Now
Questions 39

MicroCorp experienced a security appliance failure. (LEDs of all NICs are off.) The age of the unit required that the RMA-unit be a different model. Will a revert to an existing snapshot bring the new unit up and running?

Options:

A.

There is no dynamic update at reboot.

B.

No. The revert will most probably not match to hard disk.

C.

Yes. Everything is dynamically updated at reboot.

D.

No. At installation the necessary hardware support is selected. The snapshot saves this state.

Buy Now
Questions 40

Which Check Point ClusterXL mode is used to synchronize the physical interface IP and MAC addresses on all clustered interfaces.

Options:

A.

Legacy Mode HA

B.

Pivot Mode Load Sharing

C.

New Mode HA

D.

Multicast Mode Load Sharing

Buy Now
Questions 41

Which graded parameters help determine the protections to activate for security and which can be safely deactivated? Select the most correct answer.

Options:

A.

Type, Severity, Confidence level, Performance impact, Geo information.

B.

Severity, Confidence level, Performance impact, Protection type.

C.

Type, Severity, Confidence level, Performance impact.

D.

Type, Severity, Confidence level, Performance impact, Protection type.

Buy Now
Questions 42

To force clients to use Integrity Secure Workspace when accessing sensitive applications, the Administrator can configure Connectra:

Options:

A.

Via protection levels

B.

To implement Integrity Clientless Security

C.

To force the user to re-authenticate at login

D.

Without a special setting. Secure Workspace is automatically configured.

Buy Now
Questions 43

Which statements about Management HA are correct?

1) Primary SmartCenter describes first installed SmartCenter

2) Active SmartCenter is always used to administrate with SmartConsole

3) Active SmartCenter describes first installed SmartCenter

4) Primary SmartCenter is always used to administrate with SmartConsole

Options:

A.

1 and 4

B.

2 and 3

C.

1 and 2

D.

3 and 4

Buy Now
Questions 44

Review the R77 configuration. Is it correct for Management High Availability?

Exhibit:

156-315.77 Question 44

Options:

A.

No, the Security Management Servers must reside on the same network.

B.

No, the Security Management Servers do not have the same number of NICs.

C.

No, the Security Management Servers must be installed on the same operating system.

D.

No, a R77 Security Management Server cannot run on Red Hat Linux 9.0.

Buy Now
Questions 45

What configuration change must you make to change an existing ClusterXL cluster object from Multicast to Unicast mode?

Options:

A.

Change the cluster mode to Unicast on the cluster object. Reinstall the Security Policy.

B.

Change the cluster mode to Unicast on each of the cluster-member objects.

C.

Run cpstop and cpstart, to re-enable High Availability on both objects. Select Pivot mode in cpconfig.

D.

Reset Secure Internal Communications (SIC) on the cluster-member objects. Reinstall the Security Policy.

Buy Now
Questions 46

Which of the following is NOT a feature of ClusterXL?

Options:

A.

Transparent upgrades

B.

Zero downtime for mission-critical environments with State Synchronization

C.

Enhanced throughput in all ClusterXL modes (2 gateway cluster compared with 1 gateway)

D.

Transparent failover in case of device failures

Buy Now
Questions 47

With the User Directory Software Blade, you can create R77 user definitions on a(n) _____ Server.

Options:

A.

RSA ACE/Authentication Manager

B.

Radius

C.

NT Domain

D.

LDAP

Buy Now
Questions 48

What is the SmartEvent Analyzer's function?

Options:

A.

Generate a threat analysis report from the Analyzer database.

B.

Display received threats and tune the Events Policy.

C.

Assign severity levels to events.

D.

Analyze log entries, looking for Event Policy patterns.

Buy Now
Questions 49

Can the smallest appliance handle all Blades simultaneously?

Options:

A.

Depends on the number of protected clients and throughput.

B.

Depends on number of concurrent sessions.

C.

Firewall throughput is the only relevant factor.

D.

It depends on required SPU for customer environment.

Buy Now
Questions 50

Where do you verify that SmartDirectory is enabled?

Options:

A.

Global properties > Authentication > Use SmartDirectory (LDAP) for Security Gateways is checked

B.

Gateway properties > Smart Directory (LDAP) > Use SmartDirectory (LDAP) for Security Gateways is checked

C.

Gateway properties > Authentication > Use SmartDirectory (LDAP) for Security Gateways is checked

D.

Global properties > Smart Directory (LDAP) > Use SmartDirectory (LDAP) for Security Gateways is checked

Buy Now
Questions 51

If Jack was concerned about the number of log entries he would receive in the SmartReporter system, which policy would he need to modify?

Options:

A.

Log Sequence Policy

B.

Report Policy

C.

Log Consolidator Policy

D.

Consolidation Policy

Buy Now
Questions 52

How do you run “CPSIZEME” on SPLAT?

Options:

A.

[expert@HostName]#>./cpsizeme -h

B.

[expert@HostName]# ./cpsizeme -R

C.

This is not possible on SPLAT

D.

[expert@HostName]# ./cpsizeme

Buy Now
Questions 53

Anytime a client initiates a connection to a server, the firewall kernel signals the FWD process using a trap. FWD spawns the _____ child service, which runs the security server.

Options:

A.

FWSD

B.

FWD

C.

In.httpd

D.

FWSSD

Buy Now
Questions 54

The process _____ executes the authentication for logging in to SmartDashboard.

Options:

A.

fwm

B.

vpnd

C.

cpd

D.

cvpnd

Buy Now
Questions 55

Security server configuration settings are stored in _____.

Options:

A.

$FWDIR/conf/fwauthd.conf

B.

$FWDIR/conf/AMT.conf

C.

$FWDIR/conf/fwopsec.conf

D.

$FWDIR/conf/Fwauth.c

Buy Now
Questions 56

The process that performs the authentication for SSL VPN Users is:

Options:

A.

cpd

B.

cvpnd

C.

fwm

D.

vpnd

Buy Now
Questions 57

Which of the following is a valid Active Directory designation for user John Doe in the Sales department of AcmeCorp.com?

Options:

A.

Cn=john_doe,ca=Sales,ou=acmecorp,dc=com

B.

Cn=john_doe,ou=Sales,ou=acmecorp,dc=com

C.

Cn=john_doe,ou=Sales,dc=acmecorp,dc=com

D.

Cn=john_doe,ca=Sales,dc=acmecorp,dc=com

Buy Now
Questions 58

Which of the following CLISH commands would you use to set the admin user's shell to bash?

Options:

A.

set user admin shell bash

B.

set user admin shell /bin/bash

C.

set user admin shell = /bin/bash

D.

set user admin /bin/bash

Buy Now
Questions 59

Which of the following does IPSec use during IPSec key negotiation?

Options:

A.

IPSec SA

B.

RSA Exchange

C.

ISAKMP SA

D.

Diffie-Hellman exchange

Buy Now
Questions 60

Which OPSEC server is used to prevent users from accessing certain Web sites?

Options:

A.

LEA

B.

URI

C.

UFP

D.

AMON

E.

CVP

Buy Now
Questions 61

Which of the following can NOT be done on the Management Portal?

Options:

A.

Set the Management Portal to use HTTP instead of HTTPS

B.

Configure Management Portal to bypass authentication when connecting from a specific IP address

C.

Restrict hosts / networks that can access the portal

D.

Run the Management Portal on a port other than the default port 4433

Buy Now
Questions 62

The process _____ is responsible for the authentication for Remote Access clients.

Options:

A.

fwm

B.

vpnd

C.

cvpnd

D.

cpd

Buy Now
Questions 63

When Converting Gateways to Smart LSM Security Gateways, you can:

Options:

A.

do nothing, the conversion is automatic.

B.

delete the device and re-install it in Smart Provisioning.

C.

reset SIC and re-establish communication with the new Smart Provisioning.

D.

convert a Security Gateway or UTM-1 Edge Gateway managed with Smart Dashboard to a Smart

E.

LSM Security Gateway managed with Smart Provisioning.

Buy Now
Questions 64

Which changes are tracked by SmartWorkflow?

Options:

A.

SmartDashboard, SmartView Tracker and SmartView Monitor logins and logouts

B.

Security Policies and the Rule Base, Network Objects, Network Services, VPN Communities.

C.

Users, Administrators, Groups and VPN Communities

D.

Security Policies and the Rule Base, Network Objects, Network Services, Resources, Users, Administrators, Groups, VPN Communities and Servers and OPSEC Applications.

Buy Now
Questions 65

You logged in to your firewall and discovered that the scheduled backup has been modified.

Which of the below options is NOT a reason for the change?

Options:

A.

Another administrator pushed a SmartProvisioning profile to the firewall

B.

Another administrator issued a new backup command through the command line

C.

Another administrator logged in to the WebUI and changed the setting without your knowledge

D.

Another administrator updated the Backup Schedule using SmartUpdate

Buy Now
Questions 66

MegaCorp is running Smartcenter R70, some Gateways at R65 and some other Gateways with R60. Management wants to upgrade to the most comprehensive IPv6 support. What should the administrator do first?

Options:

A.

Upgrade Smartcenter to R77 first.

B.

Upgrade R60-Gateways to R65.

C.

Upgrade every unit directly to R77.

D.

Check the ReleaseNotes to verify that every step is supported.

Buy Now
Questions 67

Paul has just joined the MegaCorp security administration team. Natalie, the administrator, creates a new administrator account for Paul in SmartDashboard and installs the policy. When Paul tries to login it fails. How can Natalie verify whether Paul’s IP address is predefined on the security management server?

Options:

A.

Login to Smart Dashboard, access Properties of the SMS, and verify whether Paul’s IP address is listed.

B.

Type cpconfig on the Management Server and select the option “GUI client List” to see if Paul’s IP address is listed.

C.

Login in to Smart Dashboard, access Global Properties, and select Security Management, to verify whether Paul’s IP address is listed.

D.

Access the WEBUI on the Security Gateway, and verify whether Paul’s IP address is listed as a GUI client.

Buy Now
Questions 68

MultiCorp is running Smartcenter R71 on an IPSO platform and wants to upgrade to a new Appliance with R77. Which migration tool is recommended?

Options:

A.

Download Migration Tool R77 for IPSO and Splat/Linux from Check Point website.

B.

Use already installed Migration Tool.

C.

Use Migration Tool from CD/ISO

D.

Fetch Migration Tool R71 for IPSO and Migration Tool R77 for Splat/Linux from CheckPoint website

Buy Now
Questions 69

There are times when you want to use Link Selection to manage high-traffic VPN connections. With Link Selection you can:

Options:

A.

Assign links to use Dynamic DNS.

B.

Use Load Sharing to distribute VPN traffic.

C.

Use links based on Day/Time.

D.

Use links based on authentication method.

Buy Now
Questions 70

Which statement defines Public Key Infrastructure? Security is provided:

Options:

A.

by authentication.

B.

via both private and public keys, without the use of digital Certificates.

C.

by Certificate Authorities, digital certificates, and public key encryption.

D.

by Certificate Authorities, digital certificates, and two-way symmetric-key encryption.

Buy Now
Questions 71

There are times when you want to use Link Selection to manage high-traffic VPN connections. With Link Selection you can:

Options:

A.

Assign links to specific VPN communities.

B.

Probe links for availability.

C.

Use links based on authentication method.

D.

Use links based on Day/Time.

Buy Now
Questions 72

Which of the following statements is TRUE concerning MEP VPN’s?

Options:

A.

The VPN Client is assigned a Security Gateway to connect to based on a priority list, should the first connection fail.

B.

MEP VPN’s are not restricted to the location of the gateways.

C.

MEP Security Gateways cannot be managed by separate Management Servers.

D.

State synchronization between Security Gateways is required.

Buy Now
Questions 73

Which type of VPN routing relies on a VPN Tunnel Interface (VTI) to route traffic?

Options:

A.

Host-based VPN

B.

Route-based VPN

C.

Domain-based VPN

D.

Subnet-based VPN

Buy Now
Questions 74

What is used to validate a digital certificate?

Options:

A.

IPsec

B.

CRL

C.

PKCS

D.

S/MIME

Buy Now
Questions 75

What process manages the dynamic routing protocols (OSPF, RIP, etc.) on GAiA?

Options:

A.

gated

B.

There's no separate process, but the Linux default router can take care of that.

C.

routerd

D.

arouted

Buy Now
Questions 76

The process _____ is responsible for Management High Availability synchronization.

Options:

A.

CPD

B.

FWSYNC

C.

CPLMD

D.

FWM

Buy Now
Questions 77

What step should you take before running migrate_export?

Options:

A.

Install policy and exit SmartDashboard.

B.

Disconnect all GUI clients.

C.

Run a cpstop on the Security Management Server.

D.

Run a cpstop on the Security Gateway.

Buy Now
Questions 78

The process _____ is responsible for all other security server processes run on the Gateway.

Options:

A.

CPD

B.

FWM

C.

FWD

D.

FWSSD

Buy Now
Questions 79

What firewall kernel table stores information about port allocations for Hide NAT connections?

Options:

A.

NAT_dst_any_list

B.

NAT_alloc

C.

NAT_src_any_list

D.

fwx_alloc

Buy Now
Questions 80

Which of the following commands can be used to bind a NIC to a single processor when using a Performance Pack onSecure Platform?

156-315.77 Question 80

Options:

A.

sim affinity

B.

splat proc

C.

set proc

D.

fw fat path nic

Buy Now
Questions 81

Which of the following actions is most likely to improve the performance of Check Point QoS?

Options:

A.

Put the most frequently used rules at the bottom of the QoS Rule Base.

B.

Define Check Point QoS only on the external interfaces of the QoS Module.

C.

Turn per rule limits into per connection limits

D.

Turn per rule guarantees into per connection guarantees.

Buy Now
Questions 82

You need to back up the routing, interface, and DNS configuration information from your R76

Secure Platform Security Gateway. Which backup-and-restore solution do you use?

Options:

A.

Secure Platform back up utilities

B.

Manual copies of the directory $FWDIR/conf

C.

Database Revision Control

D.

Commands upgrade_export and upgrade_import

Buy Now
Questions 83

John is the MegaCorp Security Administrator, and is using Check Point R71. Malcolm is the Security Administrator of a partner company and is using a different vendor's product and both have to build a VPN tunnel between their companies. Both are using clusters with Load Sharing for their firewalls and John is using ClusterXL as a Check Point clustering solution.

While trying to establish the VPN, they are constantly noticing problems and the tunnel is not stable and then Malcolm notices that there seems to be 2 SPIs with the same IP from the Check Point site. How can they solve this problem and stabilize the tunnel?

Options:

A.

This can be solved by running the command Sticky VPN on the Check Point CLI. This keeps the VPN Sticky to one member and the problem is resolved.

B.

This is surely a problem in the ISPs network and not related to the VPN configuration.

C.

This can be solved when using clusters; they have to use single firewalls.

D.

This can easily be solved by using the Sticky decision function in ClusterXL.

Buy Now
Questions 84

You plan to migrate a VPN-1 NG with Application Intelligence (Al) R55 SmartCenter Server to VPN-1 NGX. You also plan to upgrade four VPN-1 Pro Gateways at remote offices, and one local VPN-1 Pro Gateway at your company's headquarters. The SmartCenter Server configuration must be migrated. What is the correct procedure to migrate the configuration?

Options:

A.

Upgrade the SmartCenter Server and the five remote Gateways via Smart Update, at the same time.

B.

1. Copy the $FWDIR\conf directory from the SmartCenter Server.2. Save directory contents to another directory.3. Uninstall the SmartCenter Server, and install a new SmartCenter Server.4. Move directory contents to $FWDIR\conf.5. Reinstall all gateways using NGX and install a policy.

C.

1. From the VPN-1 NGX CD in the SmartCenter Server, select "advance upgrade".2. After importing the SmartCenter configuration into the new NGX SmartCenter, reboot.3. Upgrade all licenses and software on all five remote Gateways via SmartUpdate.

D.

1. Upgrade the five remote Gateways via SmartUpdate.2. Upgrade the SmartCenter Server, using the VPN-1 NGX CD.

E.

1. Upgrade the SmartCenter Server, using the VPN-1 NGX CD.2. Reinstall and update the licenses of the five remote Gateways.

Buy Now
Questions 85

Which command would you use to save the interface information before upgrading a Windows Gateway?

Options:

A.

cp /etc/sysconfig/network.C [location]

B.

ipconfig -a > [filename].txt

C.

ifconfig > [filename].txt

D.

netstat -m > [filename].txt

Buy Now
Questions 86

Which procedure creates a new administrator in Smart Workflow?

Options:

A.

Run cpconfig, supply the Login Name. Profile Properties, Name, Access Applications and Permissions.

B.

In Smart Dashboard, click Smart Workflow/ Enable Smart Workflow and the Enable SmartWorkflow wizard will start. Supply the Login Name, Profile Properties, Name, Access Applications and Permissions when prompted.

C.

On the Provider-1 primary MDS, run cpconfig, supply the Login Name, Profile Properties, Name, Access Applications and Permissions.

D.

In Smart Dashboard, click Users and Administrators right click Administrators / New Administrator and supply the Login Name. Profile Properties, Name, Access Applications and Permissions.

Buy Now
Questions 87

For proper system operation, the Administrator has to configure the DLP Portal and define its DNS name for which of the following conditions?

Options:

A.

If the DLP Policy is applied to HTTP traffic.

B.

If there are one or more Inform Rules.

C.

If there are one or more Ask User rules.

D.

If the action of all rules is Detect and no Data Owners are configured.

Buy Now
Questions 88

What is a task of the SmartEvent Server?

Options:

A.

Assign a severity level to an event.

B.

Display the received events.

C.

Analyze each IPS log entry as it enters the Log server.

D.

Forward what is known as an event to the SmartEvent Server.

Buy Now
Questions 89

Jon is explaining how the inspection module works to a colleague. If a new connection passes through the inspection module and the packet matches the rule, what is the next step in the process?

Options:

A.

Verify if another rule exists.

B.

Verify if any logging or alerts are defined.

C.

Verify if the packet should be moved through the TCP/IP stack.

D.

Verify if the packet should be rejected.

Buy Now
Questions 90

Fill in the blank.

Type the full fw command and syntax that will show full synchronization status.

Options:

Buy Now
Questions 91

MegaCorp is using SmartCenter Server with several gateways. Their requirements result in a heavy log load. Would it be feasible to add the SmartEvent Correlation Unit and SmartEvent Server to their SmartCenter Server?

Options:

A.

No. SmartCenter SIC will interfere with the function of SmartEvent.

B.

No. If SmartCenter is already under stress, the use of a separate server for SmartEvent is recommended.

C.

No, SmartEvent and Smartcenter cannot be installed on the same machine at the same time.

D.

Yes. SmartEvent must be installed on your SmartCenter Server.

Buy Now
Questions 92

You are troubleshooting a HTTP connection problem. You've started fw monitor -o http.pcap. When you open http.pcap with Wireshark there is only one line. What is the most likely reason?

Options:

A.

fw monitor was restricted to the wrong interface.

B.

Like SmartView Tracker only the first packet of a connection will be captured by fw monitor.

C.

By default only SYN pakets are captured.

D.

Acceleration was turned on and therefore fw monitor sees only SYN.

Buy Now
Questions 93

Fill in the blank.

To verify SecureXL statistics, you would use the command _____.

Options:

Buy Now
Questions 94

Which CLI tool helps on verifying proper ClusterXL sync?

Options:

A.

fw stat

B.

fw ctl sync

C.

fw ctl pstat

D.

cphaprob stat

Buy Now
Questions 95

Fill in the blank.

Type the full fw command and syntax that allows you to disable only sync on a cluster firewall member.

Options:

Buy Now
Questions 96

Fill in the blank.

Type the command and syntax to configure the Cluster Control Protocol (CCP) to use Broadcast.

Options:

Buy Now
Questions 97

Fill in the blank.

To enter the router shell, use command _____.

Options:

Buy Now
Questions 98

Fill in the blank.

To verify the SecureXL status, you would enter command _____.

Options:

Buy Now
Exam Code: 156-315.77
Exam Name: Check Point Certified Security Expert
Last Update: Nov 27, 2023
Questions: 754
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 24 Nov 2024