Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

156-215.77 Questions and Answers

Note! Following 156-215.77 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-215.77 Questions and Answers

Question # 6

You are conducting a security audit. While reviewing configuration files and logs, you notice logs accepting POP3 traffic, but you do not see a rule allowing POP3 traffic in the Rule Base. Which of the following is the most likely cause?

A.

The POP3 rule is disabled.

B.

POP3 is accepted in Global Properties.

C.

The POP3 rule is hidden.

D.

POP3 is one of 3 services (POP3, IMAP, and SMTP) accepted by the default mail object in R77.

Full Access
Question # 7

The Captive Portal tool:

A.

Acquires identities from unidentified users.

B.

Is only used for guest user authentication.

C.

Allows access to users already identified.

D.

Is deployed from the Identity Awareness page in the Global Properties settings.

Full Access
Question # 8

You are using SmartView Tracker to troubleshoot NAT entries. Which column do you check to view the NAT'd source port if you are using Source NAT?

A.

XlateDst

B.

XlateSPort

C.

XlateDPort

D.

XlateSrc

Full Access
Question # 9

In SmartDashboard, you configure 45 MB as the required free hard-disk space to accommodate logs. What can you do to keep old log files, when free space falls below 45 MB?

A.

Do nothing. Old logs are deleted, until free space is restored.

B.

Use the command fwm logexport to export the old log files to another location.

C.

Configure a script to run fw logswitch and SCP the output file to a separate file server.

D.

Do nothing. The Security Management Server automatically copies old logs to a backup server before purging.

Full Access
Question # 10

Is it possible to track the number of connections each rule matches in a Rule Base?

A.

Yes, but you need SPLAT operating system to enable the feature Hits Count in the SmartDashboard client.

B.

Yes, since R75 40 you can use the feature Hits Count in the SmartDashboard client.

C.

Yes, but you need Gala operating system to enable the feature Hits Count in the SmartDashboard client.

D.

No, due to an architecture limitation it is not possible to track the number of connections each rule matches.

Full Access
Question # 11

Your Security Gateways are running near performance capacity and will get upgraded hardware next week. Which of the following would be MOST effective for quickly dropping all connections from a specific attacker’s IP at a peak time of day?

A.

Intrusion Detection System (IDS) Policy install

B.

Change the Rule Base and install the Policy to all Security Gateways

C.

SAM - Block Intruder feature of SmartView Tracker

D.

SAM - Suspicious Activity Rules feature of SmartView Monitor

Full Access
Question # 12

Sally has a Hot Fix Accumulator (HFA) she wants to install on her Security Gateway which operates with GAiA, but she cannot SCP the HFA to the system. She can SSH into the Security Gateway, but she has never been able to SCP files to it. What would be the most likely reason she cannot do so?

A.

She needs to edit /etc/SSHd/SSHd_config and add the Standard Mode account.

B.

She needs to run sysconfig and restart the SSH process.

C.

She needs to edit /etc/scpusers and add the Standard Mode account.

D.

She needs to run cpconfig to enable the ability to SCP files.

Full Access
Question # 13

Which of the following is true of a Stealth Rule?

A.

The Stealth rule should not be logged

B.

The Stealth rule is required for proper firewall protection

C.

The Stealth rule should be located just before the Cleanup rule

D.

The Stealth rule must be the first rule in a policy

Full Access
Question # 14

A third-shift Security Administrator configured and installed a new Security Policy early this morning. When you arrive, he tells you that he has been receiving complaints that Internet access is very slow. You suspect the Security Gateway virtual memory might be the problem. Which SmartConsole component would you use to verify this?

A.

Eventia Analyzer

B.

SmartView Tracker

C.

SmartView Monitor

D.

This information can only be viewed with the command fw ctl pstat from the CLI.

Full Access
Question # 15

Which type of R77 Security Server does not provide User Authentication?

A.

SMTP Security Server

B.

HTTP Security Server

C.

FTP Security Server

D.

HTTPS Security Server

Full Access
Question # 16

What is a possible reason for the IKE failure shown in this screenshot?

A.

Mismatch in VPN Domains.

B.

Mismatch in preshared secrets.

C.

Mismatch in Diffie-Hellman group.

D.

Mismatch in encryption schemes.

Full Access
Question # 17

Which of these attributes would be critical for a site-to-site VPN?

A.

Scalability to accommodate user groups

B.

Centralized management

C.

Strong authentication

D.

Strong data encryption

Full Access
Question # 18

Which of the following describes the default behavior of an R77 Security Gateway?

A.

Traffic not explicitly permitted is dropped.

B.

Traffic is filtered using controlled port scanning.

C.

All traffic is expressly permitted via explicit rules.

D.

IP protocol types listed as secure are allowed by default, i.e. ICMP, TCP, UDP sessions are inspected.

Full Access
Question # 19

Exhibit:

You installed Security Management Server on a computer using GAiA in the MegaCorp home office. You use IP address 10.1.1.1. You also installed the Security Gateway on a second GAiA computer, which you plan to ship to another Administrator at a MegaCorp hub office.

What is the correct order for pushing SIC certificates to the Gateway before shipping it?

A.

2, 3, 4, 1, 5

B.

2, 1, 3, 4, 5

C.

1, 3, 2, 4, 5

D.

2, 3, 4, 5, 1

Full Access
Question # 20

Which of the following actions do NOT take place in IKE Phase 1?

A.

Peers agree on encryption method.

B.

Diffie-Hellman key is combined with the key material to produce the symmetrical IPsec key.

C.

Peers agree on integrity method.

D.

Each side generates a session key from its private key and the peer’s public key.

Full Access
Question # 21

The INSPECT engine inserts itself into the kernel between which two OSI model layers?

A.

Session and Transport

B.

Physical and Data

C.

Presentation and Application

D.

Datalink and Network

Full Access
Question # 22

Which of the following uses the same key to decrypt as it does to encrypt?

A.

Asymmetric encryption

B.

Dynamic encryption

C.

Certificate-based encryption

D.

Symmetric encryption

Full Access
Question # 23

You can include External commands in SmartView Tracker by the menu Tools > Custom Commands.

The Security Management Server is running under GAiA, and the GUI is on a system running Microsoft Windows. How do you run the command traceroute on an IP address?

A.

There is no possibility to expand the three pre-defined options Ping, Whois, and Nslookup.

B.

Go to the menu Tools > Custom Commands and configure the Windows command tracert.exe to the list.

C.

Use the program GUIdbedit to add the command traceroute to the Security Management Server properties.

D.

Go to the menu, Tools > Custom Commands and configure the Linux command traceroute to the list.

Full Access
Question # 24

Several Security Policies can be used for different installation targets. The Firewall protecting Human Resources’ servers should have its own Policy Package. These rules must be installed on this machine and not on the Internet Firewall.

How can this be accomplished?

A.

A Rule Base is always installed on all possible targets. The rules to be installed on a Firewall are defined by the selection in the Rule Base row Install On.

B.

When selecting the correct Firewall in each line of the Rule Base row Install On, only this Firewall is shown in the list of possible installation targets after selecting Policy > Install on Target.

C.

In the menu of SmartDashboard, go to Policy > Policy Installation Targets and select the correct firewall via Specific Targets.

D.

A Rule Base can always be installed on any Check Point Firewall object. It is necessary to select the appropriate target directly after selecting Policy > Install on Target.

Full Access
Question # 25

You enable Hide NAT on the network object, 10.1.1.0 behind the Security Gateway’s external interface. You browse to the Google Website from host, 10.1.1.10 successfully. You enable a log on the rule that allows 10.1.1.0 to exit the network.

How many log entries do you see for that connection in SmartView Tracker?

A.

Two, one for outbound, one for inbound

B.

Only one, outbound

C.

Two, both outbound, one for the real IP connection and one for the NAT IP connection

D.

Only one, inbound

Full Access
Question # 26

Your bank’s distributed R77 installation has Security Gateways up for renewal.

Which SmartConsole application will tell you which Security Gateways have licenses that will expire within the next 30 days?

A.

SmartView Tracker

B.

SmartPortal

C.

SmartUpdate

D.

SmartDashboard

Full Access
Question # 27

Your Security Management Server fails and does not reboot. One of your remote Security Gateways managed by the Security Management Server reboots.

What occurs with the remote Gateway after reboot?

A.

Since the Security Management Server is not available, the remote Gateway cannot fetch the Security Policy. Therefore, all traffic is allowed through the Gateway.

B.

Since the Security Management Server is not available, the remote Gateway cannot fetch the Security Policy. Therefore, no traffic is allowed through the Gateway.

C.

The remote Gateway fetches the last installed Security Policy locally and passes traffic normally. The Gateway will log locally, since the Security Management Server is not available.

D.

Since the Security Management Server is not available, the remote Gateway uses the local Security Policy, but does not log traffic.

Full Access
Question # 28

Which of the following commands can provide the most complete restoration of a R77 configuration?

A.

upgrade_import

B.

cpinfo -recover

C.

cpconfig

D.

fwm dbimport -p

Full Access
Question # 29

SmartView Tracker R77 consists of three different modes. They are:

A.

Log, Active, and Audit

B.

Log, Active, and Management

C.

Network and Endpoint, Active, and Management

D.

Log, Track, and Management

Full Access
Question # 30

You plan to create a backup of the rules, objects, policies, and global properties from an R77 Security Management Server. Which of the following backup and restore solutions can you use?

A.

2, 4, and 5

B.

1, 2, 3, 4, and 5

C.

1, 2, and 3

D.

1, 3, and 4

Full Access
Question # 31

You have created a Rule Base for firewall, websydney. Now you are going to create a new policy package with security and address translation rules for a second Gateway. What is TRUE about the new package’s NAT rules?

Exhibit:

A.

Rules 1, 2, 3 will appear in the new package.

B.

Only rule 1 will appear in the new package.

C.

NAT rules will be empty in the new package.

D.

Rules 4 and 5 will appear in the new package.

Full Access
Question # 32

Which command allows Security Policy name and install date verification on a Security Gateway?

A.

fw show policy

B.

fw stat -l

C.

fw ctl pstat -policy

D.

fw ver -p

Full Access
Question # 33

Exhibit:

Of the following, what parameters will not be preserved when using Database Revision Control?

A.

2, 4, 7, 10, 11

B.

3, 4, 5, 6, 9, 12, 13

C.

5, 6, 9, 12, 13

D.

1, 2, 8, 10, 11

Full Access
Question # 34

Your perimeter Security Gateway’s external IP is 200.200.200.3. Your network diagram shows:

Required. Allow only network 192.168.10.0 and 192.168.20.0 to go out to the Internet, using 200.200.200.5.

The local network 192.168.1.0/24 needs to use 200.200.200.3 to go out to the Internet.

Assuming you enable all the settings in the NAT page of Global Properties, how could you achieve these requirements?

A.

Create network objects for 192.168.10.0/24 and 192.168.20.0/24. Enable Hide NAT on both network objects, using 200.200.200.5 as hiding IP address. Add an ARP entry for 200.200.200.3 for the MAC address of 200.200.200.5.

B.

Create an Address Range object, starting from 192.168.10.1 to 192.168.20.254. Enable Hide NAT on the NAT page of the address range object. Enter Hiding IP address 200.200.200.5. Add an ARP entry for 200.200.200.5 for the MAC address of 200.200.200.3.

C.

Create a network object 192.168.0.0/16. Enable Hide NAT on the NAT page. Enter 200.200.200.5 as the hiding IP address. Add an ARP entry for 200.200.200.5 for the MAC address of 200.200.200.3.

D.

Create two network objects: 192.168.10.0/24 and 192.168.20.0/24. Add the two network objects to a group object. Create a manual NAT rule like the following: Original source - group object; Destination - any; Service - any; Translated source - 200.200.200.5; Destination - original; Service - original.

Full Access
Question # 35

Which SmartView Tracker mode allows you to read the SMTP e-mail body sent from the Chief Executive Officer (CEO) of a company?

A.

This is not a SmartView Tracker feature.

B.

Display Capture Action

C.

Network and Endpoint Tab

D.

Display Payload View

Full Access
Question # 36

Peter is your new Security Administrator. On his first working day, he is very nervous and enters the wrong password three times. His account is locked.

What can be done to unlock Peter’s account? Give the BEST answer.

A.

You can unlock Peter’s account by using the command fwm lock_admin -u Peter on the Security Management Server.

B.

You can unlock Peter’s account by using the command fwm unlock_admin -u Peter on the Security Management Server

C.

It is not possible to unlock Peter’s account. You have to install the firewall once again or abstain from Peter’s help.

D.

You can unlock Peter’s account by using the command fwm unlock_admin -u Peter on the Security Gateway.

Full Access
Question # 37

Which of these components does NOT require a Security Gateway R77 license?

A.

Security Management Server

B.

Check Point Gateway

C.

SmartConsole

D.

SmartUpdate upgrading/patching

Full Access
Question # 38

How do you recover communications between your Security Management Server and Security Gateway if you lock yourself out through a rule or policy mis-configuration?

A.

fw unload policy

B.

fw unloadlocal

C.

fw delete all.all@localhost

D.

fwm unloadlocal

Full Access
Question # 39

You are working with multiple Security Gateways that enforce an extensive number of rules. To simplify security administration, which one of the following would you choose to do?

A.

Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.

B.

Run separate SmartConsole instances to login and configure each Security Gateway directly.

C.

Create network objects that restrict all applicable rules to only certain networks.

D.

Create a separate Security Policy package for each remote Security Gateway.

Full Access
Question # 40

In a distributed management environment, the administrator has removed all default check boxes from the Policy > Global Properties > Firewall tab. In order for the Security Gateway to send logs to the Security Management Server, an explicit rule must be created to allow the Security Gateway to communicate to the Security Management Server on port ______.

A.

259

B.

900

C.

256

D.

257

Full Access
Question # 41

As you review this Security Policy, what changes could you make to accommodate Rule 4?

Exhibit:

A.

Remove the service HTTP from the column Service in Rule 4.

B.

Modify the column VPN in Rule 2 to limit access to specific traffic.

C.

Nothing at all

D.

Modify the columns Source or Destination in Rule 4.

Full Access
Question # 42

Suppose the Security Gateway hard drive fails and you are forced to rebuild it. You have a snapshot file stored to a TFTP server and backups of your Security Management Server.

What is the correct procedure for rebuilding the Gateway quickly?

A.

Reinstall the base operating system (i.e., GAiA). Configure the Gateway interface so that the Gateway can communicate with the TFTP server. Revert to the stored snapshot image, and install the Security Policy.

B.

Run the command revert to restore the snapshot, establish SIC, and install the Policy.

C.

Run the command revert to restore the snapshot. Reinstall any necessary Check Point products. Establish SIC and install the Policy.

D.

Reinstall the base operating system (i.e., GAia). Configure the Gateway interface so that the Gateway can communicate with the TFTP server. Reinstall any necessary Check Point products and previously applied hotfixes. Revert to the stored snapshot image, and install the Policy.

Full Access
Question # 43

Which of the following statements accurately describes the command snapshot?

A.

snapshot creates a full OS-level backup, including network-interface data, Check Point product information, and configuration settings during an upgrade of a GAiA Security Gateway.

B.

snapshot creates a Security Management Server full system-level backup on any OS.

C.

snapshot stores only the system-configuration settings on the Gateway.

D.

A Gateway snapshot includes configuration settings and Check Point product information from the remote Security Management Server.

Full Access
Question # 44

You need to back up the routing, interface, and DNS configuration information from your R77 GAiA Security Gateway. Which backup-and-restore solution do you use?

A.

Manual copies of the directory $FWDIR/conf

B.

GAiA back up utilities

C.

upgrade_export and upgrade_import commands

D.

Database Revision Control

Full Access
Question # 45

Where is the fingerprint generated, based on the output display?

Exhibit:

A.

SmartConsole

B.

SmartUpdate

C.

Security Management Server

D.

SmartDashboard

Full Access
Question # 46

To check the Rule Base, some rules can be hidden so they do not distract the administrator from the unhidden rules. Assume that only rules accepting HTTP or SSH will be shown. How do you accomplish this?

A.

Ask your reseller to get a ticket for Check Point SmartUse and deliver him the Security Management Server cpinfo file.

B.

In SmartDashboard, right-click in the column field Service > Query Column. Then, put the services HTTP and SSH in the list. Do the same in the field Action and select Accept here.

C.

In SmartDashboard menu, select Search > Rule Base Queries. In the window that opens, create a new Query, give it a name (e.g. “HTTP_SSH”?) and define a clause regarding the two services HTTP and SSH. When having applied this, define a second clause for the action Accept and combine them with the Boolean operator AND.

D.

This cannot be configured since two selections (Service, Action) are not possible.

Full Access
Question # 47

What is the syntax for uninstalling a package using newpkg?

A.

-u

B.

-i

C.

-S

D.

newpkg CANNOT be used to uninstall a package

Full Access
Question # 48

Which command would provide the most comprehensive diagnostic information to Check Point Technical Support?

A.

fw cpinfo

B.

cpinfo -o date.cpinfo.txt

C.

diag

D.

cpstat - date.cpstat.txt

Full Access
Question # 49

You need to completely reboot the Operating System after making which of the following changes on the Security Gateway? (i.e. the command cprestart is not sufficient.)

1. Adding a hot-swappable NIC to the Operating System for the first time.

2. Uninstalling the R77 Power/UTM package.

3. Installing the R77 Power/UTM package.

4. Re-establishing SIC to the Security Management Server.

5. Doubling the maximum number of connections accepted by the Security Gateway.

A.

3 only

B.

1, 2, 3, 4, and 5

C.

2, 3 only

D.

3, 4, and 5 only

Full Access
Question # 50

Over the weekend, an Administrator without access to SmartDashboard installed a new R77 Security Gateway using GAiA. You want to confirm communication between the Gateway and the Management Server by installing the Security Policy. What might prevent you from installing the Policy?

A.

You have not established Secure Internal Communications (SIC) between the Security Gateway and Management Server. You must initialize SIC on both the Security Gateway and the Management Server.

B.

You first need to run the command fw unloadlocal on the new Security Gateway.

C.

You first need to initialize SIC in SmartUpdate.

D.

You have not established Secure Internal Communications (SIC) between the Security Gateway and Management Server. You must initialize SIC on the Security Management Server.

Full Access
Question # 51

In a distributed management environment, the administrator has removed the default check from Accept Control Connections under the Policy > Global Properties > FireWall tab. In order for the Security Management Server to install a policy to the Firewall, an explicit rule must be created to allow the server to communicate to the Security Gateway on port ______.

A.

259

B.

900

C.

256

D.

80

Full Access
Question # 52

What is the difference between Standard and Specific Sign On methods?

A.

Standard Sign On allows the user to be automatically authorized for all services that the rule allows. Specific Sign On requires that the user re-authenticate for each service specifically defined in the window Specific Action Properties.

B.

Standard Sign On allows the user to be automatically authorized for all services that the rule allows, but re-authenticate for each host to which he is trying to connect. Specific Sign On requires that the user re-authenticate for each service.

C.

Standard Sign On allows the user to be automatically authorized for all services that the rule allows. Specific Sign On requires that the user re-authenticate for each service and each host to which he is trying to connect.

D.

Standard Sign On requires the user to re-authenticate for each service and each host to which he is trying to connect. Specific Sign On allows the user to sign on only to a specific IP address.

Full Access
Question # 53

What CLI utility allows an administrator to capture traffic along the firewall inspection chain?

A.

show interface (interface) - chain

B.

tcpdump

C.

tcpdump/ snoop

D.

fw monitor

Full Access
Question # 54

Study the Rule base and Client Authentication Action properties screen -

After being authenticated by the Security Gateway, when a user starts an HTTP connection to a Web site, the user tries to FTP to another site using the command line. What happens to the user?

A.

user is prompted for authentication by the Security Gateway again.

B.

FTP data connection is dropped after the user is authenticated successfully.

C.

user is prompted to authenticate from that FTP site only, and does not need to enter his username and password for Client Authentication.

D.

FTP connection is dropped by Rule 2.

Full Access
Question # 55

What is the appropriate default Gaia Portal address?

A.

HTTP: // [IPADDRESS]

B.

HTTPS:// [IPADDRESS] : 8080

C.

HTTPS:// [IPADDRESS] : 4434

D.

HTTPS:// [IPADDRESS]

Full Access
Question # 56

What does SmartUpdate allow you to do?

A.

SmartUpdate only allows you to update Check Point and OPSEC certified products.

B.

SmartUpdate only allows you to manage product licenses.

C.

SmartUpdate allows you to update Check Point and OPSEC certified products and to manage product licenses.

D.

SmartUpdate is not a Check Point product.

Full Access
Question # 57

Which port must be allowed to pass through enforcement points in order to allow packet logging to operate correctly?

A.

514

B.

257

C.

256

D.

258

Full Access
Question # 58

Which of the following are available SmartConsole clients which can be installed from the R77 Windows CD? Read all answers and select the most complete and valid list.

A.

SmartView Tracker, SmartDashboard, CPINFO, SmartUpdate, SmartView Status

B.

SmartView Tracker, SmartDashboard, SmartLSM, SmartView Monitor

C.

SmartView Tracker, CPINFO, SmartUpdate

D.

Security Policy Editor, Log Viewer, Real Time Monitor GUI

Full Access