Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! 156-915.77 has been withdrawn.

156-915.77 Practice Exam Questions with Answers Check Point Certified Security Expert Update Certification

Question # 6

Which of the following is NOT defined by an Access Role object?

A.

Source Network

B.

Source Machine

C.

Source User

D.

Source Server

Full Access
Question # 7

What is Check Point's CoreXL?

A.

A way to synchronize connections across cluster members

B.

TCP-18190

C.

Multiple core interfaces on the device to accelerate traffic

D.

Multi Core support for Firewall Inspection

Full Access
Question # 8

Which of the following CLISH commands would you use to set the admin user's shell to bash?

A.

set user admin shell bash

B.

set user admin shell /bin/bash

C.

set user admin shell = /bin/bash

D.

set user admin /bin/bash

Full Access
Question # 9

Review the rules.

156-915.77 question answer

Assume domain UDP is enabled in the impled rules.

What happens when a user from the internal network tries to browse to the internet using HTTP? The user:

A.

can connect to the Internet successfully after being authenticated.

B.

is prompted three times before connecting to the Internet successfully.

C.

can go to the Internet after Telnetting to the client authentication daemon port 259.

D.

can go to the Internet, without being prompted for authentication.

Full Access
Question # 10

Assume you are a Security Administrator for ABCTech. You have allowed authenticated access to users from Mkting_net to Finance_net. But in the user’s properties, connections are only permitted within Mkting_net. What is the BEST way to resolve this conflict?

A.

Select Ignore Database in the Action Properties window.

B.

Permit access to Finance_net.

C.

Select Intersect with user database in the Action Properties window.

D.

Select Intersect with user database or Ignore Database in the Action Properties window.

Full Access
Question # 11

You intend to upgrade a Check Point Gateway from R71 to R77. Prior to upgrading, you want to back up the Gateway should there be any problems with the upgrade. Which of the following allows for the Gateway configuration to be completely backed up into a manageable size in the least amount of time?

A.

database revision

B.

snapshot

C.

upgrade_export

D.

backup

Full Access
Question # 12

You need to back up the routing, interface, and DNS configuration information from your R77 GAiA Security Gateway. Which backup-and-restore solution do you use?

A.

Manual copies of the directory $FWDIR/conf

B.

GAiA back up utilities

C.

upgrade_export and upgrade_import commands

D.

Database Revision Control

Full Access
Question # 13

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to a set of designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned a static IP address 10.0.0.19.

He has received a new laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop with a static IP (10.0.0.19).

He wants to move around the organization and continue to have access to the HR Web Server. To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources, and installs the policy.

2) Adds an access role object to the Firewall Rule Base that lets John Adams access the HR Web Server from any machine and from any location and installs policy.

John plugged in his laptop to the network on a different network segment and was not able to connect to the HR Web server. What is the next BEST troubleshooting step?

A.

Investigate this as a network connectivity issue

B.

Install the Identity Awareness Agent

C.

Set static IP to DHCP

D.

After enabling Identity Awareness, reboot the gateway

Full Access
Question # 14

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned a static IP address 10.0.0.19.

John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop with a static IP (10.0.0.19). He wants to move around the organization and continue to have access to the HR Web Server.

To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the policy.

2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.

What should John do when he cannot access the web server from a different personal computer?

A.

John should lock and unlock his computer

B.

Investigate this as a network connectivity issue

C.

The access should be changed to authenticate the user instead of the PC

D.

John should install the Identity Awareness Agent

Full Access
Question # 15

Which of the following statements accurately describes the command snapshot?

A.

snapshot creates a full OS-level backup, including network-interface data, Check Point product information, and configuration settings during an upgrade of a GAiA Security Gateway.

B.

snapshot creates a Security Management Server full system-level backup on any OS.

C.

snapshot stores only the system-configuration settings on the Gateway.

D.

A Gateway snapshot includes configuration settings and Check Point product information from the remote Security Management Server.

Full Access
Question # 16

Which command would provide the most comprehensive diagnostic information to Check Point Technical Support?

A.

fw cpinfo

B.

cpinfo -o date.cpinfo.txt

C.

diag

D.

cpstat - date.cpstat.txt

Full Access
Question # 17

If Jack was concerned about the number of log entries he would receive in the SmartReporter system, which policy would he need to modify?

A.

Log Sequence Policy

B.

Report Policy

C.

Log Consolidator Policy

D.

Consolidation Policy

Full Access
Question # 18

You have selected the event Port Scan from Internal Network in SmartEvent, to detect an event when 30 port scans have occurred within 60 seconds. You also want to detect two port scans from a host within 10 seconds of each other. How would you accomplish this?

A.

Define the two port-scan detections as an exception.

B.

You cannot set SmartEvent to detect two port scans from a host within 10 seconds of each other.

C.

Select the two port-scan detections as a sub-event.

D.

Select the two port-scan detections as a new event.

Full Access
Question # 19

Type the command and syntax that you would use to view the virtual cluster interfaces of a ClusterXL environment.

Full Access
Question # 20

Fill in the blank.

156-915.77 question answer

In Load Sharing Unicast mode, the internal cluster IP address is 10.4.8.3. The internal interfaces on two members are 10.4.8.1 and 10.4.8.2. Internal host 10.4.8.108 Pings 10.4.8.3, and receives replies. The following is the ARP table from the internal Windows host 10.4.8.108. Review the exhibit and type the IP address of the member serving as the pivot machine in the space below.

Full Access
Question # 21

MegaCorp is running Smartcenter R70, some Gateways at R65 and some other Gateways with R60. Management wants to upgrade to the most comprehensive IPv6 support. What should the administrator do first?

A.

Upgrade Smartcenter to R77 first.

B.

Upgrade R60-Gateways to R65.

C.

Upgrade every unit directly to R77.

D.

Check the ReleaseNotes to verify that every step is supported.

Full Access
Question # 22

In a zero downtime scenario, which command do you run manually after all cluster members are upgraded?

Full Access
Question # 23

Which of the following authentication methods can be configured in the Identity Awareness setup wizard?

A.

Check Point Password

B.

TACACS

C.

LDAP

D.

Windows password

Full Access
Question # 24

What gives administrators more flexibility when configuring Captive Portal instead of LDAP query for Identity Awareness authentication?

A.

Captive Portal is more secure than standard LDAP

B.

Nothing, LDAP query is required when configuring Captive Portal

C.

Captive Portal works with both configured users and guests

D.

Captive Portal is more transparent to the user

Full Access
Question # 25

Users with Identity Awareness Agent installed on their machines login with __________, so that when the user logs into the domain, that information is also used to meet Identity Awareness credential requests.

A.

Key-logging

B.

ICA Certificates

C.

SecureClient

D.

Single Sign-On

Full Access
Question # 26

Captive Portal is a __________ that allows the gateway to request login information from the user.

A.

Pre-configured and customizable web-based tool

B.

Transparent network inspection tool

C.

LDAP server add-on

D.

Separately licensed feature

Full Access
Question # 27

Security Gateway R77 supports User Authentication for which of the following services? Select the response below that contains the MOST correct list of supported services.

A.

SMTP, FTP, TELNET

B.

SMTP, FTP, HTTP, TELNET

C.

FTP, HTTP, TELNET

D.

FTP, TELNET

Full Access
Question # 28

As a Security Administrator, you must refresh the Client Authentication authorization time-out every time a new user connection is authorized. How do you do this? Enable the Refreshable Timeout setting:

A.

in the user object's Authentication screen.

B.

in the Gateway object's Authentication screen.

C.

in the Limit tab of the Client Authentication Action Properties screen.

D.

in the Global Properties Authentication screen.

Full Access
Question # 29

After implementing Static Address Translation to allow Internet traffic to an internal Web Server on your DMZ, you notice that any NATed connections to that machine are being dropped by anti-spoofing protections. Which of the following is the MOST LIKELY cause?

A.

The Global Properties setting Translate destination on client side is unchecked. But the topology on the DMZ interface is set to Internal - Network defined by IP and Mask. Check the Global Properties setting Translate destination on client side.

B.

The Global Properties setting Translate destination on client side is unchecked. But the topology on the external interface is set to Others +. Change topology to External.

C.

The Global Properties setting Translate destination on client side is checked. But the topology on the external interface is set to External. Change topology to Others +.

D.

The Global Properties setting Translate destination on client side is checked. But the topology on the DMZ interface is set to Internal - Network defined by IP and Mask. Uncheck the Global Properties setting Translate destination on client side.

Full Access
Question # 30

You want to implement Static Destination NAT in order to provide external, Internet users access to an internal Web Server that has a reserved (RFC 1918) IP address. You have an unused valid IP address on the network between your Security Gateway and ISP router. You control the router that sits between the firewall external interface and the Internet.

What is an alternative configuration if proxy ARP cannot be used on your Security Gateway?

A.

Publish a proxy ARP entry on the ISP router instead of the firewall for the valid IP address.

B.

Place a static ARP entry on the ISP router for the valid IP address to the firewall's external address.

C.

Publish a proxy ARP entry on the internal Web server instead of the firewall for the valid IP address.

D.

Place a static host route on the firewall for the valid IP address to the internal Web server.

Full Access