Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! 156-215.77 has been withdrawn.

156-215.77 Practice Exam Questions with Answers Check Point Certified Security Administrator Certification

Question # 6

Where is the easiest and BEST place to find information about connections between two machines?

A.

All options are valid.

B.

On a Security Gateway using the command fw log.

C.

On a Security Management Server, using SmartView Tracker.

D.

On a Security Gateway Console interface; it gives you detailed access to log files and state table information.

Full Access
Question # 7

Your Security Management Server fails and does not reboot. One of your remote Security Gateways managed by the Security Management Server reboots.

What occurs with the remote Gateway after reboot?

A.

Since the Security Management Server is not available, the remote Gateway cannot fetch the Security Policy. Therefore, all traffic is allowed through the Gateway.

B.

Since the Security Management Server is not available, the remote Gateway cannot fetch the Security Policy. Therefore, no traffic is allowed through the Gateway.

C.

The remote Gateway fetches the last installed Security Policy locally and passes traffic normally. The Gateway will log locally, since the Security Management Server is not available.

D.

Since the Security Management Server is not available, the remote Gateway uses the local Security Policy, but does not log traffic.

Full Access
Question # 8

A digital signature:

A.

Guarantees the authenticity and integrity of a message.

B.

Automatically exchanges shared keys.

C.

Decrypts data to its original form.

D.

Provides a secure key exchange mechanism over the Internet.

Full Access
Question # 9

What must a Security Administrator do to comply with a management requirement to log all traffic accepted through the perimeter Security Gateway?

A.

In Global Properties > Reporting Tools check the box Enable tracking all rules (including rules marked as None in the Track column). Send these logs to a secondary log server for a complete logging history. Use your normal log server for standard logging for troubleshooting.

B.

Install the View Implicit Rules package using SmartUpdate.

C.

Define two log servers on the R77 Gateway object. Enable Log Implied Rules on the first log server. Enable Log Rule Base on the second log server. Use SmartReporter to merge the two log server records into the same database for HIPPA log audits.

D.

Check the Log Implied Rules Globally box on the R77 Gateway object.

Full Access
Question # 10

You are MegaCorp’s Security Administrator. There are various network objects which must be NATed. Some of them use the Automatic Hide NAT method, while others use the Automatic Static NAT method. What is the rule order if both methods are used together? Give the BEST answer.

A.

The Administrator decides the rule order by shifting the corresponding rules up and down.

B.

The Static NAT rules have priority over the Hide NAT rules and the NAT on a node has priority over the NAT on a network or an address range.

C.

The Hide NAT rules have priority over the Static NAT rules and the NAT on a node has priority over the NAT on a network or an address range.

D.

The rule position depends on the time of their creation. The rules created first are placed at the top; rules created later are placed successively below the others.

Full Access
Question # 11

You are responsible for the configuration of MegaCorp’s Check Point Firewall. You need to allow two NAT rules to match a connection. Is it possible? Give the BEST answer.

A.

No, it is not possible to have more than one NAT rule matching a connection. When the firewall receives a packet belonging to a connection, it compares it against the first rule in the Rule Base, then the second rule, and so on. When it finds a rule that matches, it stops checking and applies that rule.

B.

Yes, it is possible to have two NAT rules which match a connection, but only in using Manual NAT (bidirectional NAT).

C.

Yes, there are always as many active NAT rules as there are connections.

D.

Yes, it is possible to have two NAT rules which match a connection, but only when using Automatic NAT (bidirectional NAT).

Full Access
Question # 12

How can you configure an application to automatically launch on the Security Management Server when traffic is dropped or accepted by a rule in the Security Policy?

A.

SNMP trap alert script

B.

Custom scripts cannot be executed through alert scripts.

C.

User-defined alert script

D.

Pop-up alert script

Full Access
Question # 13

You have a diskless appliance platform. How do you keep swap file wear to a minimum?

A.

Issue FW-1 bases its package structure on the Security Management Server, dynamically loading when the firewall is booted.

B.

The external PCMCIA-based flash extension has the swap file mapped to it, allowing easy replacement.

C.

Use PRAM flash devices, eliminating the longevity.

D.

A RAM drive reduces the swap file thrashing which causes fast wear on the device.

Full Access
Question # 14

Which command would provide the most comprehensive diagnostic information to Check Point Technical Support?

A.

fw cpinfo

B.

cpinfo -o date.cpinfo.txt

C.

diag

D.

cpstat - date.cpstat.txt

Full Access
Question # 15

What command syntax would you use to see accounts the gateway suspects are service accounts?

A.

pdp check_log

B.

pdp show service

C.

adlog check_accounts

D.

adlog a service_accounts

Full Access
Question # 16

Access Role objects define users, machines, and network locations as:

A.

Credentialed objects

B.

Linked objects

C.

One object

D.

Separate objects

Full Access
Question # 17

What physical machine must have access to the User Center public IP address when checking for new packages with SmartUpdate?

A.

A Security Gateway retrieving the new upgrade package

B.

SmartUpdate installed Security Management Server PC

C.

SmartUpdate GUI PC

D.

SmartUpdate Repository SQL database Server

Full Access
Question # 18

Which of the following authentication methods can be configured in the Identity Awareness setup wizard?

A.

TACACS

B.

Captive Portal

C.

Check Point Password

D.

Windows password

Full Access
Question # 19

A snapshot delivers a complete GAiA backup. The resulting file can be stored on servers or as a local file in /var/CPsnapshot/snapshots. How do you restore a local snapshot named MySnapshot.tgz?

A.

Reboot the system and call the start menu. Select the option Snapshot Management, provide the Expert password and select [L] for a restore from a local file. Then, provide the correct file name.

B.

As expert user, type the command snapshot -r MySnapshot.tgz.

C.

As expert user, type the command revert --file MySnapshot.tgz.

D.

As expert user, type the command snapshot - R to restore from a local file. Then, provide the correct file name.

Full Access
Question # 20

What is the primary benefit of using the command upgrade_export over either backup or snapshot?

A.

upgrade_export is operating system independent and can be used when backup or snapshot is not available.

B.

upgrade_export will back up routing tables, hosts files, and manual ARP configurations, where backup and snapshot will not.

C.

The commands backup and snapshot can take a long time to run whereas upgrade_export will take a much shorter amount of time.

D.

upgrade_export has an option to back up the system and SmartView Tracker logs while backup and snapshot will not.

Full Access
Question # 21

Over the weekend, an Administrator without access to SmartDashboard installed a new R77 Security Gateway using GAiA. You want to confirm communication between the Gateway and the Management Server by installing the Security Policy. What might prevent you from installing the Policy?

A.

You have not established Secure Internal Communications (SIC) between the Security Gateway and Management Server. You must initialize SIC on both the Security Gateway and the Management Server.

B.

You first need to run the command fw unloadlocal on the new Security Gateway.

C.

You first need to initialize SIC in SmartUpdate.

D.

You have not established Secure Internal Communications (SIC) between the Security Gateway and Management Server. You must initialize SIC on the Security Management Server.

Full Access
Question # 22

During which step in the installation process is it necessary to note the fingerprint for first-time verification?

A.

When configuring the Gateway in the WebUI

B.

When configuring the Security Management Server using cpconfig

C.

When establishing SIC between the Security Management Server and the Gateway

D.

When configuring the Security Gateway object in SmartDashboard

Full Access
Question # 23

You are running the license_upgrade tool on your GAiA Gateway. Which of the following can you NOT do with the upgrade tool?

A.

Perform the actual license-upgrade process

B.

Simulate the license-upgrade process

C.

View the licenses in the SmartUpdate License Repository

D.

View the status of currently installed licenses

Full Access
Question # 24

What are you required to do before running the command upgrade_export?

A.

Run a cpstop on the Security Gateway.

B.

Run a cpstop on the Security Management Server.

C.

Close all GUI clients.

D.

Run cpconfig and set yourself up as a GUI client.

Full Access
Question # 25

What CANNOT be configured for existing connections during a policy install?

A.

Keep all connections

B.

Keep data connections

C.

Re-match connections

D.

Reset all connections

Full Access
Question # 26

Captive Portal is a __________ that allows the gateway to request login information from the user.

A.

Pre-configured and customizable web-based tool

B.

Transparent network inspection tool

C.

LDAP server add-on

D.

Separately licensed feature

Full Access
Question # 27

What happens when you open the Gateway object window Trusted Communication and press and confirm Reset?

Exhibit:

156-215.77 question answer

A.

Sic will be reset on the Gateway only.

B.

The Gateway certificate will be revoked on the Gateway only.

C.

The Gateway certificate will be revoked on the Security Management Server only.

D.

The Gateway certificate will be revoked on the Security Management Server and SIC will be reset on the Gateway.

Full Access
Question # 28

Complete this statement from the options provided. Using Captive Portal, unidentified users may be either; blocked, allowed to enter required credentials, or required to download the _____________.

A.

Identity Awareness Agent

B.

Full Endpoint Client

C.

ICA Certificate

D.

SecureClient

Full Access
Question # 29

If you were NOT using IKE aggressive mode for your IPsec tunnel, how many packets would you see for normal Phase 1 exchange?

A.

9

B.

2

C.

3

D.

6

Full Access
Question # 30

The Identity Agent is a lightweight endpoint agent that authenticates securely with Single Sign-On (SSO). What is not a recommended usage of this method?

A.

When accuracy in detecting identity is crucial

B.

Leveraging identity for Data Center protection

C.

Protecting highly sensitive servers

D.

Identity based enforcement for non-AD users (non-Windows and guest users)

Full Access
Question # 31

Which of these attributes would be critical for a site-to-site VPN?

A.

Scalability to accommodate user groups

B.

Centralized management

C.

Strong authentication

D.

Strong data encryption

Full Access
Question # 32

Certificates for Security Gateways are created during a simple initialization from _____________.

A.

sysconfig

B.

The ICA management tool

C.

SmartUpdate

D.

SmartDashboard

Full Access
Question # 33

Which authentication type permits five different sign-on methods in the authentication properties window?

A.

Client Authentication

B.

Manual Authentication

C.

User Authentication

D.

Session Authentication

Full Access
Question # 34

Which Client Authentication sign-on method requires the user to first authenticate via the User Authentication mechanism, when logging in to a remote server with Telnet?

A.

Manual Sign On

B.

Agent Automatic Sign On

C.

Partially Automatic Sign On

D.

Standard Sign On

Full Access
Question # 35

You run cpconfig to reset SIC on the Security Gateway. After the SIC reset operation is complete, the policy that will be installed is the:

A.

Standard policy.

B.

Initial policy.

C.

Last policy that was installed.

D.

Default filter.

Full Access
Question # 36

When using vpn tu, which option must you choose if you want to rebuild your VPN for a specific IP (gateway)?

Exhibit:

156-215.77 question answer

A.

(6) Delete all IPsec SAs for a given User (Client)

B.

(5) Delete all IPsec SAs for a given peer (GW)

C.

(8) Delete all IPsec+IKE SAs for a given User (Client)

D.

Delete all IPsec+IKE SAs for a given peer (GW)

Full Access
Question # 37

You want to establish a VPN, using certificates. Your VPN will exchange certificates with an external partner. Which of the following activities should you do first?

A.

Create a new logical-server object to represent your partner’s CA.

B.

Exchange exported CA keys and use them to create a new server object to represent your partner’s Certificate Authority (CA).

C.

Manually import your partner’s Certificate Revocation List.

D.

Manually import your partner’s Access Control List.

Full Access
Question # 38

Which of the following describes the default behavior of an R77 Security Gateway?

A.

Traffic not explicitly permitted is dropped.

B.

Traffic is filtered using controlled port scanning.

C.

All traffic is expressly permitted via explicit rules.

D.

IP protocol types listed as secure are allowed by default, i.e. ICMP, TCP, UDP sessions are inspected.

Full Access
Question # 39

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned an IP address 10.0.0.19 via DHCP.

John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop. He wants to move around the organization and continue to have access to the HR Web Server.

To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the policy.

2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.

John plugged in his laptop to the network on a different network segment and he is not able to connect. How does he solve this problem?

A.

John should install the Identity Awareness Agent

B.

The firewall admin should install the Security Policy

C.

John should lock and unlock the computer

D.

Investigate this as a network connectivity issue

Full Access
Question # 40

A marketing firm’s networking team is trying to troubleshoot user complaints regarding access to audio-streaming material from the Internet. The networking team asks you to check the object and rule configuration settings for the perimeter Security Gateway.

Which SmartConsole application should you use to check these objects and rules?

A.

SmartView Tracker

B.

SmartView Monitor

C.

SmartView Status

D.

SmartDashboard

Full Access
Question # 41

Which of the following statements BEST describes Check Point’s Hide Network Address Translation method?

A.

Translates many destination IP addresses into one destination IP address

B.

One-to-one NAT which implements PAT (Port Address Translation) for accomplishing both Source and Destination IP address translation

C.

Translates many source IP addresses into one source IP address

D.

Many-to-one NAT which implements PAT (Port Address Translation) for accomplishing both Source and Destination IP address translation

Full Access
Question # 42

Which of the following can be found in cpinfo from an enforcement point?

A.

Everything NOT contained in the file r2info

B.

VPN keys for all established connections to all enforcement points

C.

The complete file objects_5_0.c

D.

Policy file information specific to this enforcement point

Full Access
Question # 43

The third-shift Administrator was updating Security Management Server access settings in Global Properties. He managed to lock all administrators out of their accounts.

How should you unlock these accounts?

A.

Delete the file admin.lock in the Security Management Server directory $FWDIR/tmp/.

B.

Reinstall the Security Management Server and restore using upgrade_import.

C.

Type fwm lock_admin -ua from the Security Management Server command line.

D.

Login to SmartDashboard as the special cpconfig_admin user account; right-click on each administrator object and select unlock.

Full Access
Question # 44

After filtering a fw monitor trace by port and IP, a packet is displayed three times; in the i, I, and o inspection points, but not in the O inspection point.

Which is the likely source of the issue?

A.

The packet has been sent out through a VPN tunnel unencrypted.

B.

An IPSO ACL has blocked the packet’s outbound passage.

C.

A SmartDefense module has blocked the packet.

D.

It is due to NAT.

Full Access
Question # 45

While in SmartView Tracker, Brady has noticed some very odd network traffic that he thinks could be an intrusion. He decides to block the traffic for 60 minutes, but cannot remember all the steps. What is the correct order of steps needed to set up the block?

1) Select Active Mode tab in SmartView Tracker.

2) Select Tools > Block Intruder.

3) Select Log Viewing tab in SmartView Tracker.

4) Set Blocking Timeout value to 60 minutes.

5) Highlight connection that should be blocked.

A.

1, 2, 5, 4

B.

3, 2, 5, 4

C.

1, 5, 2, 4

D.

3, 5, 2, 4

Full Access
Question # 46

Jack has locked himself out of the Kirk Security Gateway with an incorrect policy and can no longer connect from the McCoy Management Server.

Jack still has access to an out of band console connection on the Kirk Security Gateway. He is logged into the Gaia CLI, what does he need to enter in order to be able to fix his mistake and push policy?

A.

Kirk> fw unload local

B.

Kirk> fw unloadlocal

C.

Kirk> fw unload policy

D.

Kirk> fw fetch policy

Full Access
Question # 47

What is also referred to as Dynamic NAT?

A.

Automatic NAT

B.

Static NAT

C.

Manual NAT

D.

Hide NAT

Full Access
Question # 48

Which NAT option is available for Manual NAT as well as Automatic NAT?

A.

Allow bi-directional NAT

B.

Automatic ARP configuration

C.

Translate destination on client-side

D.

Enable IP Pool NAT

Full Access
Question # 49

What is the appropriate default Gaia Portal address?

A.

HTTP: // [IPADDRESS]

B.

HTTPS:// [IPADDRESS] : 8080

C.

HTTPS:// [IPADDRESS] : 4434

D.

HTTPS:// [IPADDRESS]

Full Access
Question # 50

Which set of objects have an Authentication tab?

A.

Templates, Users

B.

Users, Networks

C.

Users, User Groups

D.

Networks, Hosts

Full Access
Question # 51

Your company enforces a strict change control policy. Which of the following would be MOST effective for quickly dropping an attacker’s specific active connection?

A.

Change the Rule Base and install the Policy to all Security Gateways

B.

Block Intruder feature of SmartView Tracker

C.

Intrusion Detection System (IDS) Policy install

D.

SAM - Suspicious Activity Rules feature of SmartView Monitor

Full Access
Question # 52

Lilly needs to review VPN History counters for the last week.

Where would she do this?

A.

SmartView Monitor > Tunnels > VPN History

B.

SmartView Monitor > System Counters > VPN History

C.

SmartView Monitor > System Counters > Firewall Security History

D.

SmartView Monitor > System Counters > VPN

Full Access
Question # 53

Katie has been asked to do a backup on the Blue Security Gateway. Which command would accomplish this in the Gaia CLI?

A.

Blue> add local backup

B.

Expert@Blue#add local backup

C.

Blue> set backup local

D.

Blue> add backup local

Full Access
Question # 54

The R77 fw monitor utility is used to troubleshoot which of the following problems?

A.

Traffic issues

B.

Log Consolidation Engine

C.

User data base corruption

D.

Phase two key negotiation

Full Access
Question # 55

How can you activate the SNMP daemon on a Check Point Security Management Server?

A.

Using the command line, enter snmp_install.

B.

From cpconfig, select SNMP extension.

C.

Any of these options will work.

D.

In SmartDashboard, right-click a Check Point object and select Activate SNMP.

Full Access
Question # 56

You are trying to save a custom log query in R77 SmartView Tracker, but getting the following error:

Could not save (Error: Database is Read Only)

Which of the following is a likely explanation for this?

A.

Another administrator is currently connected to the Security Management Server with read/write permissions which impacts your ability to save custom log queries to the Security Management Server.

B.

You do not have OS write permissions on the local SmartView Tracker PC in order to save the custom query locally.

C.

You have read-only rights to the Security Management Server database.

D.

You do not have the explicit right to save a custom query in your administrator permission profile under SmartConsole customization.

Full Access
Question # 57

What statement is true regarding Visitor Mode?

A.

VPN authentication and encrypted traffic are tunneled through port TCP 443.

B.

Only ESP traffic is tunneled through port TCP 443.

C.

Only Main mode and Quick mode traffic are tunneled on TCP port 443.

D.

All VPN traffic is tunneled through UDP port 4500.

Full Access
Question # 58

Assume you are a Security Administrator for ABCTech. You have allowed authenticated access to users from Mkting_net to Finance_net. But in the user’s properties, connections are only permitted within Mkting_net. What is the BEST way to resolve this conflict?

A.

Select Ignore Database in the Action Properties window.

B.

Permit access to Finance_net.

C.

Select Intersect with user database in the Action Properties window.

D.

Select Intersect with user database or Ignore Database in the Action Properties window.

Full Access