Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

156-315.77 Questions and Answers

Note! Following 156-315.77 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-315.77 Questions and Answers

Question # 6

Which of the following are valid PKI architectures?

A.

mesh architecture

B.

Bridge architecture

C.

Gateway architecture

D.

Hierarchical architecture

Full Access
Question # 7

The following graphic illustrates which command being issued on GaiA?

Exhibit:

A.

fwsecurexl stats

B.

fwaccel stats

C.

fw securexl stats

D.

fw accel stats

Full Access
Question # 8

The relay mail server configured under Email Notifications is used by the DLP Gateway to: (Choose the BEST answer.)

A.

If User Check is configured, there is no need to configure this relay server if there are no Ask User rules and there is no need to notify any Data Owners.

B.

Send e-mail notifications to users and Data Owners.

C.

Define My Organization / DLP Gateway and scan only e-mails that originate from this relay server.

D.

Synchronize with other mail servers in the network.

Full Access
Question # 9

What is the proper CLISH syntax to configure a default route via 192.168.255.1 in GAiA?

A.

set static-route default nexthop gateway address 192.168.255.1 priority 1 on

B.

set static-route 192.168.255.0/24 nexthop gateway logical ethl on

C.

set static-route 192.168.255.0/24 nexthop gateway address 192.168.255.1 priority 1 on

D.

set static-route nexthop default gateway logical 192.168.255.1 priority 1 on

Full Access
Question # 10

Where do you define NAT properties so that NAT is performed either client side or server side? In SmartDashboard under:

A.

Gateway Setting

B.

NAT Rules

C.

Global Properties > NAT definition

D.

Implied Rules

Full Access
Question # 11

The “MAC Magic” value must be modified under the following condition:

A.

There is more than one cluster connected to the same VLAN

B.

A firewall cluster is configured to use Multicast for CCP traffic

C.

There are more than two members in a firewall cluster

D.

A firewall cluster is configured to use Broadcast for CCP traffic

Full Access
Question # 12

In a R77 ClusterXL Load Sharing configuration, which type of ARP related problem can force the use of Unicast Mode (Pivot) configuration due to incompatibility on some adjacent routers and switches?

A.

MGCP MAC address response to a Multicast IP request

B.

Multicast MAC address response to a Unicast IP request

C.

Unicast MAC address response to a Multicast IP request

D.

Multicast MAC address response to a RARP request

Full Access
Question # 13

Organizations are sometimes faced with the need to locate cluster members in different geographic locations that are distant from each other. A typical example is replicated data centers whose location is widely separated for disaster recovery purposes. What are the restrictions of this solution?

A.

There are two restrictions: 1. The synchronization network must guarantee no more than 100ms latency and no more than 5% packet loss. 2. The synchronization network may only include switches and hubs.

B.

There is one restriction: The synchronization network must guarantee no more than 150 ms latency (ITU Standard G.114).

C.

There is one restriction: The synchronization network must guarantee no more than 100 ms latency.

D.

There are no restrictions.

Full Access
Question # 14

Identity Agent is a lightweight endpoint agent that authenticates securely with Single Sign-On (SSO). Which of the following is NOT a recommended use for this method?

A.

Leveraging machine name or identity

B.

When accuracy in detecting identity is crucial

C.

Identity based enforcement for non-AD users (non-Windows and guest users)

D.

Protecting highly sensitive servers

Full Access
Question # 15

Which two processes are responsible on handling Identity Awareness?

A.

pdp and lad

B.

pdp and pdp-11

C.

pep and lad

D.

pdp and pep

Full Access
Question # 16

Which is NOT a method through which Identity Awareness receives its identities?

A.

AD Query

B.

Group Policy

C.

Identity Agent

D.

Captive Portal

Full Access
Question # 17

Which of the following access options would you NOT use when configuring Captive Portal?

A.

From the Internet

B.

Through all interfaces

C.

Through internal interfaces

D.

Through the Firewall policy

Full Access
Question # 18

You are the MegaCorp Security Administrator. This company uses a firewall cluster, consisting of two cluster members. The cluster generally works well but one day you find that the cluster is behaving strangely. You assume that there is a connectivity problem with the cluster synchronization link (cross-over cable). Which of the following commands is the BEST for testing the connectivity of the crossover cable?

A.

ifconfig -a

B.

arping

C.

telnet

D.

ping

Full Access
Question # 19

Which of these components does NOT require a VPN-1 NGX R65 license?

A.

SmartConsole

B.

Check Point Gateway

C.

SmartCenter Server

D.

SmartUpdate upgrading/patching

Full Access
Question # 20

MultiCorp has bought company OmniCorp and now has two active AD domains. How would you deploy Identity Awareness in this environment?

A.

You must run an ADquery for every domain.

B.

Identity Awareness can only manage one AD domain.

C.

Only one ADquery is necessary to ask for all domains.

D.

Only Captive Portal can be used.

Full Access
Question # 21

What happens to the session information after they are approved and a policy installation is done?

A.

Session information is never deleted from the database.

B.

It depends on the SmartWorkflow settings in Global Properties.

C.

An option is given to retain the session information, default being deletion of session information from the database.

D.

Session information can only be deleted before a policy is installed.

Full Access
Question # 22

What is the primary benefit of using upgrade_export over either backup or snapshot?

A.

upgrade_export will back up routing tables, hosts files, and manual ARP configurations, where backup and snapshot will not.

B.

upgrade_export is operating system independent and can be used when backup or snapshot is not available.

C.

upgrade_export has an option to backup the system and SmartView Tracker logs while backup and snapshot will not.

D.

The commands backup and snapshot can take a long time to run whereas upgrade_export will take a much shorter amount of time.

Full Access
Question # 23

Your customer asks you about the Performance Pack.

You explain to him that a Performance Pack is a software acceleration product which improves the performance of the Security Gateway.

You may enable or disable this acceleration by either:

1) the command:cpconfig

2) the command: fwaccel on ff

What is the difference between these two commands?

A.

The fwaccel command determines the default setting. The command cpconfig can dynamically change the setting, but after the reboot it reverts to the default setting.

B.

Both commands function identically.

C.

The command cpconfig works on the Security Platform only. The command fwaccel can be used on all platforms.

D.

The cpconfig command enables acceleration. The command fwaccel can dynamically change the setting, but after the reboot it reverts to the default setting.

Full Access
Question # 24

You want to verify that your Check Point cluster is working correctly.

Which command line tool can you use?

A.

cphastart -status

B.

cphainfo -s

C.

cphaprob state

D.

cphaconf state

Full Access
Question # 25

Fred is troubleshooting a NAT issue and wants to check to see if the inbound connection from this internal network is being translated across the interface in the firewall correctly. He decides to use the fw monitor to capture the traffic from the source 192.168.3.5 or the destination of 10.1.1.25 on his Security Gateway. Green that has an IP of 192.168.4.5. What command captures this traffic in a file that he can download and review with WireShark?

A.

Expert@Green# fwmonitor –e “accept src=192.168.3.5 and dst=10.1.1.25;” –o monitor.out

B.

Expert@Green# fw monitor –e “accept src=192.168.3.5 and dst=10.1.1.25;” –o monitor.out

C.

Expert@Green# fwmonitor –e “accept src=192.168.3.5 or dst=10.1.1.25;” –o monitor.out

D.

Expert@Green# fw monitor –e “accept src=192.168.3.5 or dst=10.1.1.25;” –o monitor.out

Full Access
Question # 26

Your primary Security Management Server runs on GAiA. What is the fastest way to back up your Security Gateway R77 configuration, including routing and network configuration files?

A.

Copying the directories $FWDIR/conf and $FWDIR/lib to another location.

B.

Use the command snapshot.

C.

Using the command upgrade_export.

D.

Using the native GAiA back up utility from command line or in the Web-based user interface.

Full Access
Question # 27

What firewall kernel table stores information about port allocations for Hide NAT connections?

A.

NAT_dst_any_list

B.

NAT_alloc

C.

NAT_src_any_list

D.

fwx_alloc

Full Access
Question # 28

You have a production implementation of Management High Availability, at version VPN-1 NG with Application Intelligence R55.

You must upgrade your two SmartCenter Servers to VPN-1 NGX. What is the correct procedure?

A.

1. Synchronize the two SmartCenter Servers.2. Upgrade the secondary SmartCenter Server.3. Upgrade the primary SmartCenter Server.4. Configure both SmartCenter Server host objects version to VPN-1 NGX.5. Synchronize the Servers again.

B.

1. Synchronize the two SmartCenter Servers.2. Perform an advanced upgrade on the primary SmartCenter Server.3. Upgrade the secondary SmartCenter Server.4. Configure both SmartCenter Server host objects to version VPN-1 NGX.5. Synchronize the Servers again.

C.

1. Perform an advanced upgrade on the primary SmartCenter Server.2. Configure the primary SmartCenter Server host object to version VPN-1 NGX.3. Synchronize the primary with the secondary SmartCenter Server.4. Upgrade the secondary SmartCenter Server.5. Configure the secondary SmartCenter Server host object to version VPN-1 NGX.6. Synchronize the Servers again.

D.

1. Synchronize the two SmartCenter Servers.2. Perform an advanced upgrade on the primary SmartCenter Server.3. Configure the primary SmartCenter Server host object to version VPN-1 NGX.4. Synchronize the two Servers again.5. Upgrade the secondary SmartCenter Server.6. Configure the secondary SmartCenter Server host object to version VPN-1 NGX.7. Synchronize the Servers again.

Full Access
Question # 29

If using AD Query for seamless identity data reception from Microsoft Active Directory (AD), which of the following methods is NOT Check Point recommended?

A.

Identity-based enforcement for non-AD users (non-Windows and guest users)

B.

Basic identity enforcement in the internal network

C.

Leveraging identity in Internet application control

D.

Identity-based auditing and logging

Full Access
Question # 30

In Company XYZ, the DLP Administrator defined a new Keywords Data Type that contains a list of secret project names; i.e., Ayalon, Yarkon, Yarden. The threshold is set to At least 2 keywords or phrases. Based on this information, which of the following scenarios will be a match to the Rule Base?

A.

A PDF file that contains the following textYarkon1 can be the code name for the new product.Yardens list of protected sites

B.

An MS Excel file that contains the following text Mort resources for Yarkon project..Are you certain this is about Yarden?

C.

A word file that contains the following text will match:AyalonayalonAYALON

D.

A password protected MS Excel file that contains the following text AyalonYarkonYarden

Full Access
Question # 31

Paul has just joined the MegaCorp security administration team. Natalie, the administrator, creates a new administrator account for Paul in SmartDashboard and installs the policy. When Paul tries to login it fails. How can Natalie verify whether Paul’s IP address is predefined on the security management server?

A.

Login to Smart Dashboard, access Properties of the SMS, and verify whether Paul’s IP address is listed.

B.

Type cpconfig on the Management Server and select the option “GUI client List” to see if Paul’s IP address is listed.

C.

Login in to Smart Dashboard, access Global Properties, and select Security Management, to verify whether Paul’s IP address is listed.

D.

Access the WEBUI on the Security Gateway, and verify whether Paul’s IP address is listed as a GUI client.

Full Access
Question # 32

When using Captive Portal to send unidentified users to a Web portal for authentication, which of the following is NOT a recommended use for this method?

A.

For deployment of Identity Agents

B.

Identity-based enforcement for non-AD users (non-Windows and guest users)

C.

Leveraging identity in Internet application control

D.

Basic identity enforcement in the internal network

Full Access
Question # 33

Katie has enabled User Directory and applied the license to Security Management Server, Green. Her supervisor has asked her to configure the Password Strength options of the least one digit, one symbol, 8 characters long and include an uppercase character. How should she accomplish this?

A.

Open the SmartDashboard, Select Global properties, select Identity Awareness; check the boxes for Password must include an upper character, Password must include a digit, Password must include a symbol and change the password length to 8 characters.

B.

Open the SmartDashboard, Select Global properties, select User Authority; check the boxes for Password must include an upper character, Password must include a digit and Password must include a symbol.

C.

Open the SmartDashboard, Select Global Properties, select User Directory, check the boxes for Password must include an uppercase character, Password must include a digit, and Password must include a symbol.

D.

Open the SmartDashboard, Select Global Properties, select User Directory, check the boxes for Password must include an uppercase character, Password must include a digit, Password must include a symbol and change the password length to 8 characters.

Full Access
Question # 34

Fill in the blank.

You can set Acceleration to ON or OFF using command syntax _____.

Full Access
Question # 35

What does the command vpn crl_zap do?

A.

Nothing, it is not a valid command

B.

Erases all CRL’s from the gateway cache

C.

Erases VPN certificates from cache

D.

Erases CRL’s from the management server cache

Full Access
Question # 36

An administrator has installed the latest HFA on the system for fixing traffic problems after creating a backup file. A large number of routes were added or modified, causing network problems. The Check Point configuration has not been changed. What would be the most efficient way to revert to a working configuration?

A.

A back up cannot be restored, because the binary files are missing.

B.

The restore is not possible because the backup file does not have the same build number (version).

C.

Select Snapshot Management from the SecurePlatform boot menu.

D.

Use the command restore and select the appropriate backup file.

Full Access
Question # 37

By default, what happens to the existing connections on a firewall when a new policy is installed?

A.

All existing data connections will be kept open until the connections have ended.

B.

Existing connections are always allowed

C.

All existing control and data connections will be kept open until the connections have ended.

D.

All existing connections not allowed under the new policy will be terminated.

Full Access
Question # 38

Fill in the blank.

In a zero downtime scenario, which command do you run manually after all cluster members are upgraded?

Full Access
Question # 39

The process _____ is responsible for GUI Client communication with the SmartCenter.

A.

CPGUI

B.

CPD

C.

FWD

D.

FWM

Full Access
Question # 40

Which three of the following components are required to get a SmartEvent up and running?

1) SmartEvent SIC

2) SmartEvent Correlation Unit

3) SmartEvent Server

4) SmartEvent Analyzer

5) SmartEvent Client

A.

2, 3, and 5

B.

1, 2, and 4

C.

1, 2, and 3

D.

3, 4, and 5

Full Access
Question # 41

Fill in the blank.

In New Mode HA, the internal cluster IP VIP address is 10.4.8.3. The internal interfaces on two members are 10.4.8.1 and 10.4.8.2 Internal host 10.4.8.108 pings 10.4.8.3, and receives replies.

Review the ARP table from the internal Windows host 10.4.8.108. According to the output, which member is the standby machine?

Full Access
Question # 42

Fill in the blank.

Type the command and syntax that you would use to view the virtual cluster interfaces of a ClusterXL environment.

Full Access
Question # 43

Fill in the blank.

Type the full cphaprob command and syntax that will show full synchronization status.

Full Access
Question # 44

Fill in the blank.

To enter the router shell, use command _____.

Full Access
Question # 45

Fill in the blank.

In New Mode HA, the internal cluster IP VIP address is 10.4.8.3. An internal host 10.4.8.108 successfully pings its Cluster and receives replies.

Review the ARP table from the internal Windows host 10.4.8.108. Based on this information, what is the active cluster member’s IP address?

Full Access
Question # 46

_____ is the called process that starts when opening SmartView Tracker application.

A.

FWM

B.

CPLMD

C.

logtrackerd

D.

fwlogd

Full Access
Question # 47

How does Check Point recommend that you secure the sync interface between gateways?

A.

Use a dedicated sync network.

B.

Configure the sync network to operate within the DMZ.

C.

Secure each sync interface in a cluster with Endpoint.

D.

Encrypt all sync traffic between cluster members.

Full Access
Question # 48

In the following cluster configuration; if you reboot sglondon_1 which device will be active when sglondon_1 is back up and running? Why?

A.

sglondon_1 because it the first configured object with the lowest IP.

B.

sglondon_2 because sglondon_1 has highest IP.

C.

sglondon_1, because it is up again, sglondon_2 took over during reboot.

D.

sglondon_2 because it has highest priority.

Full Access
Question # 49

Frank is concerned with performance and wants to configure the affinities settings. His gateway does not have the Performance pack running. What would Frank need to perform in order configure those settings?

A.

Edit affinity.conf and change the settings

B.

Run fw affinity and change the settings

C.

Edit $FWDIR/conf/fwaffinity.conf and change the settings

D.

Run sim affinity and change the settings

Full Access
Question # 50

Which of the following is NOT an internal/native Check Point command?

A.

fwaccel on

B.

fw ctl debug

C.

tcpdump

D.

cphaprob

Full Access
Question # 51

In a “zero downtime” firewall cluster environment, what command do you run to avoid switching problems around the cluster.

A.

cphaconf set mc_relod

B.

cphaconf set clear_subs

C.

cphaconf set_ccp broadcast

D.

cphaconf set_ccp multicast

Full Access
Question # 52

Which of the following actions is most likely to improve the performance of Check Point QoS?

A.

Put the most frequently used rules at the bottom of the QoS Rule Base.

B.

Define Check Point QoS only on the external interfaces of the QoS Module.

C.

Turn per rule limits into per connection limits

D.

Turn per rule guarantees into per connection guarantees.

Full Access
Question # 53

How can you view the critical devices on a cluster member in a Cluster XL environment?

A.

cphaprob -ia list

B.

cphaprob -a if

C.

cphaprob -a list

D.

cphaprob -ia if

Full Access
Question # 54

MultiCorp is running Smartcenter R71 on an IPSO platform and wants to upgrade to a new Appliance with R77. Which migration tool is recommended?

A.

Download Migration Tool R77 for IPSO and Splat/Linux from Check Point website.

B.

Use already installed Migration Tool.

C.

Use Migration Tool from CD/ISO

D.

Fetch Migration Tool R71 for IPSO and Migration Tool R77 for Splat/Linux from CheckPoint website

Full Access
Question # 55

MegaCorp is running Smartcenter R70, some Gateways at R65 and some other Gateways with R60. Management wants to upgrade to the most comprehensive IPv6 support. What should the administrator do first?

A.

Upgrade Smartcenter to R77 first.

B.

Upgrade R60-Gateways to R65.

C.

Upgrade every unit directly to R77.

D.

Check the ReleaseNotes to verify that every step is supported.

Full Access
Question # 56

Your online bookstore has customers connecting to a variety of Web servers to place or change orders and check order status. You ran penetration tests through the Security Gateway to determine if the Web servers were protected from a recent series of cross-site scripting attacks. The penetration testing indicated the Web servers were still vulnerable.

You have checked every box in the Web Intelligence tab, and installed the Security Policy.

What else might you do to reduce the vulnerability?

A.

Configure the Security Gateway protecting the Web servers as a Web server.

B.

Check the Products / Web Server box on the host node objects representing your Web servers.

C.

Add Port (TCP 443) as an additional port on the Web Server tab for the host node.

D.

The penetration software you are using is malfunctioning and is reporting a false- positive.

Full Access
Question # 57

To backup all events stored in the SmartEvent Server, you should back up the contents of which folder(s)?

A.

$RTDIR/distrib_db and $FWDIR/events

B.

$RTDIR/events_db

C.

$RTDIR/distrib and $FWDIR/events_db

D.

$RTDIR/distrib

Full Access
Question # 58

Which command displays the installed Security Gateway version?

A.

fw ver

B.

fw stat

C.

fw printver

D.

cpstat -gw

Full Access
Question # 59

In a particular IPS protection in R76 in the Logging Settings, what does the Capture Packets

option do?

A.

This is not a valid selection in R76

B.

Attaches a packet capture of the traffic that matches this particular protection to each log that the protection generates.

C.

Starts a packet capture at the time of policy install to capture all of the traffic until this protection is hit.

D.

Collects all of the logs for packets that have matched this protection within the last 30 days

Full Access
Question # 60

Which command line interface utility allows the administrator to verify the Security Policy name and timestamp currently installed on a firewall module?

A.

fw stat

B.

fw ctl pstat

C.

fw ver

D.

cpstat fwd

Full Access
Question # 61

Which of the following commands can be used to stop Management portal services?

A.

fw stopportal

B.

cpportalstop

C.

cpstop / portal

D.

smartportalstop

Full Access
Question # 62

Which command would you use to save the interface information before upgrading a Windows Gateway?

A.

cp /etc/sysconfig/network.C [location]

B.

ipconfig -a > [filename].txt

C.

ifconfig > [filename].txt

D.

netstat -m > [filename].txt

Full Access
Question # 63

Snapshot is available on which Security Management Server and Security Gateway platforms?

A.

Solaris

B.

Windows 2003 Server

C.

Windows XP Server

D.

Secure Platform

Full Access
Question # 64

In R71, how would you define a rule to block all traffic sent to or from Germany?

A.

This action is not possible.

B.

Create a policy rule with destination being a custom dynamic object representing Germany and action block. You must also create a rule in the opposite direction.

C.

Create a country specific policy within IPS Geo Protections with Germany as the country, block as the action, and from and to country for direction.

D.

Go to Policy / Global Properties / Geographical Protection Enforcement and add Germany to the blocked countries list.

Full Access
Question # 65

Which of the following is NOT TRUE regarding HTTPS traffic being passed through a DLP gateway?

A.

You must edit the $FWDIR/conf/fwauthd.conf file in order for HTTPS traffic to be passed to your Web Proxy through a DLP gateway.

B.

HTTPS traffic is not scanned by DLP

C.

Only one proxy can be configured for DLP

D.

You must configure the DLP gateway to allow HTTP/HTTPS traffic through the proxy if you have a web proxy between the DLP gateway and the internet.

Full Access
Question # 66

In Gaia, the operating system can be changed to 32-bit or 64-bit, provided the processor supports 64-bit. What command toggles to 64-bit.

A.

set bitrate 64

B.

set edition default 64

C.

configure edition 64-bit

D.

set edition default 64-bit

Full Access
Question # 67

Which Check Point ClusterXL mode is used to synchronize the physical interface IP and MAC addresses on all clustered interfaces.

A.

Legacy Mode HA

B.

Pivot Mode Load Sharing

C.

New Mode HA

D.

Multicast Mode Load Sharing

Full Access
Question # 68

Which of the following is a valid Active Directory designation for user John Doe in the Sales department of AcmeCorp.com?

A.

Cn=john_doe,ca=Sales,ou=acmecorp,dc=com

B.

Cn=john_doe,ou=Sales,ou=acmecorp,dc=com

C.

Cn=john_doe,ou=Sales,dc=acmecorp,dc=com

D.

Cn=john_doe,ca=Sales,dc=acmecorp,dc=com

Full Access
Question # 69

When using a template to define a user in SmartDirectory, the user’s password should be defined in the _____ object.

A.

VPN Community

B.

LDAP

C.

Template

D.

User

Full Access
Question # 70

The process that performs the authentication for SSL VPN Users is:

A.

cpd

B.

cvpnd

C.

fwm

D.

vpnd

Full Access
Question # 71

When configuring an LDAP Group object, select option _____ if you want the gateway to reference a specific group defined on the LDAP server for authentication purposes.

A.

Group Agnostic

B.

All Account-Unit's Users

C.

Only Sub Tree

D.

Only Group in Branch

Full Access
Question # 72

Which process should you debug if SmartDashboard login fails?

A.

sdm

B.

cpd

C.

fwd

D.

fwm

Full Access
Question # 73

The process _____ is responsible for the authentication for Remote Access clients.

A.

fwm

B.

vpnd

C.

cvpnd

D.

cpd

Full Access
Question # 74

When configuring an LDAP Group object, select the option _____ if you want the gateway to reference all groups defined on the LDAP server for authentication purposes.

A.

Only Sub Tree

B.

Only Group in Branch

C.

OU Accept and select appropriate domain

D.

All Account-Unit’s Users

Full Access
Question # 75

When an Endpoint user is able to authenticate but receives a message from the client that it is unable to enforce the desktop policy, what is the most likely scenario?

A.

The gateway could not locate the user in SmartDirectory and is allowing the connection with limitations based on a generic profile.

B.

The user’s rights prevent access to the protected network.

C.

A Desktop Policy is not configured.

D.

The user is attempting to connect with the wrong Endpoint client.

Full Access
Question # 76

Which of the following CLISH commands would you use to set the admin user's shell to bash?

A.

set user admin shell bash

B.

set user admin shell /bin/bash

C.

set user admin shell = /bin/bash

D.

set user admin /bin/bash

Full Access
Question # 77

The process _____ executes the authentication for logging in to SmartDashboard.

A.

fwm

B.

vpnd

C.

cpd

D.

cvpnd

Full Access
Question # 78

Which statement is TRUE for route-based VPN’s?

A.

IP Pool NAT must be configured on each Gateway.

B.

Dynamic-routing protocols are not required.

C.

Route-based VPN’s are a form of partial overlap VPN Domain.

D.

Route-based VPN’s replace domain-based VPN’s.

Full Access
Question # 79

Which of the following statements is TRUE concerning MEP VPN’s?

A.

The VPN Client is assigned a Security Gateway to connect to based on a priority list, should the first connection fail.

B.

MEP VPN’s are not restricted to the location of the gateways.

C.

MEP Security Gateways cannot be managed by separate Management Servers.

D.

State synchronization between Security Gateways is required.

Full Access
Question # 80

Which of the following statements is TRUE concerning MEP VPN’s?

A.

The VPN Client selects which Security Gateway takes over, should the first connection fail.

B.

MEP VPN’s are restricted to the location of the gateways.

C.

State synchronization between Security Gateways is required.

D.

MEP Security Gateways cannot be managed by separate Management Servers.

Full Access
Question # 81

Which of the following is TRUE concerning numbered VPN Tunnel Interfaces (VTIs)?

A.

VTIs are assigned only local addresses, not remote addresses

B.

VTIs cannot share IP addresses

C.

VTIs are only supported on IPSO

D.

VTIs cannot use an already existing physical-interface IP address

Full Access
Question # 82

Which command will erase all CRL’s?

A.

vpn crladmin

B.

cpstop/cpstart

C.

vpn crl_zap

D.

vpn flush

Full Access
Question # 83

You want VPN traffic to match packets from internal interfaces. You also want the traffic to exit the Security Gateway bound for all site-to-site VPN Communities, including Remote Access Communities. How should you configure the VPN match rule?

A.

internal_clear > All_communities

B.

Internal_clear > External_Clear

C.

Communities > Communities

D.

internal_clear > All_GwToGw

Full Access
Question # 84

Which statement defines Public Key Infrastructure? Security is provided:

A.

by authentication.

B.

via both private and public keys, without the use of digital Certificates.

C.

by Certificate Authorities, digital certificates, and public key encryption.

D.

by Certificate Authorities, digital certificates, and two-way symmetric-key encryption.

Full Access
Question # 85

You have configured a site to site VPN, but the tunnel in not coming up. Review the following screen shots. What is a likely cause?

A.

Link selection is set to use Main address.

B.

General Properties IP address is required to be the external interface.

C.

Nothing, it is configured properly

Full Access
Question # 86

The process _____ is responsible for Management High Availability synchronization.

A.

CPD

B.

FWSYNC

C.

CPLMD

D.

FWM

Full Access
Question # 87

What utility would you use to configure route-based VPNs?

A.

vpn shell

B.

vpn tu

C.

vpn sw_topology

D.

vpn set_slim_server

Full Access
Question # 88

Match the VPN-related terms with their definitions. Each correct term is only used once.

Exhibit:

A.

A-3, B-4, C-1, D-5

B.

A-4, B-3, C-5, D-2

C.

A-2, B-5, C-4, D-1

D.

A-3, B-2, C-1, D-4

Full Access
Question # 89

In GAiA, if one is unsure about a possible command, what command lists all possible commands.

A.

show all |grep commands

B.

show configuration

C.

show commands

D.

get all commands

Full Access
Question # 90

How do you verify the Check Point kernel running on a firewall?

A.

fw ver -k

B.

fw ctl pstat

C.

fw ctl get kernel

D.

fw kernel

Full Access