Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

156-915.77 Questions and Answers

Note! Following 156-915.77 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-915.77 Questions and Answers

Question # 6

MegaCorps' disaster recovery plan is past due for an update to the backup and restore section to enjoy the benefits of the new distributed R77 installation. You must propose a plan that meets the following required and desired objectives:

Required: Security Policy repository must be backed up no less frequently than every 24 hours.

Desired: Back up R77 components enforcing the Security Policies at least once a week.

Desired: Back up R77 logs at least once a week.

You develop a disaster recovery plan proposing the following:

* Use the utility cron to run the command upgrade_export each night on the Security Management Servers.

* Configure the organization's routine backup software to back up files created by the command upgrade_export.

* Configure GAiA back up utility to back up Security Gateways every Saturday night.

* Use the utility cron to run the command upgrade_export each Saturday night on the log servers.

* Configure an automatic, nightly logswitch.

* Configure the organization's routine back up software to back up the switched logs every night.

The corporate IT change review committee decides your plan:

A.

meets the required objective and only one desired objective.

B.

meets the required objective and both desired objectives.

C.

meets the rquired objective but does not meet either deisred objective.

D.

does not meet the required objective.

Full Access
Question # 7

Which is the lowest Gateway version manageable by SmartCenter R77?

A.

R65

B.

S71

C.

R55

D.

R60A

Full Access
Question # 8

Many companies have defined more than one administrator. To increase security, only one administrator should be able to install a Rule Base on a specific Firewall. How do you configure this?

A.

Define a permission profile in SmartDashboard with read/write privileges, but restrict it to all other firewalls by placing them in the Policy Targets field. Then, an administrator with this permission profile cannot install a policy on any Firewall not listed here.

B.

Put the one administrator in an Administrator group and configure this group in the specific Firewall object in Advanced > Permission to Install.

C.

In the object General Properties representing the specific Firewall, go to the Software Blades product list and select Firewall. Right-click in the menu, select Administrator to Install to define only this administrator.

D.

Right-click on the object representing the specific administrator, and select that Firewall in Policy Targets.

Full Access
Question # 9

Which operating systems are supported by a Check Point Security Gateway on an open server? Select MOST complete list.

A.

Sun Solaris, Red Hat Enterprise Linux, Check Point SecurePlatform, IPSO, Microsoft Windows

B.

Check Point GAiA and SecurePlatform, and Microsoft Windows

C.

Check Point GAiA, Microsoft Windows, Red Hat Enterprise Linux, Sun Solaris, IPSO

D.

Check Point GAiA and SecurePlatform, IPSO, Sun Solaris, Microsoft Windows

Full Access
Question # 10

Which command line interface utility allows the administrator to verify the Security Policy name and timestamp currently installed on a firewall module?

A.

cpstat fwd

B.

fw ver

C.

fw stat

D.

fw ctl pstat

Full Access
Question # 11

Where do you verify that UserDirectory is enabled?

A.

Verify that Security Gateway > General Properties > Authentication > Use UserDirectory (LDAP) for Security Gateways is checked

B.

Verify that Global Properties > Authentication > Use UserDirectory (LDAP) for Security Gateways is checked

C.

Verify that Security Gateway > General Properties > UserDirectory (LDAP) > Use UserDirectory (LDAP) for Security Gateways is checked

D.

Verify that Global Properties > UserDirectory (LDAP) > Use UserDirectory (LDAP) for Security Gateways is checked

Full Access
Question # 12

Your organization maintains several IKE VPN’s. Executives in your organization want to know which mechanism Security Gateway R77 uses to guarantee the authenticity and integrity of messages. Which technology should you explain to the executives?

A.

Certificate Revocation Lists

B.

Application Intelligence

C.

Key-exchange protocols

D.

Digital signatures

Full Access
Question # 13

You want to establish a VPN, using certificates. Your VPN will exchange certificates with an external partner. Which of the following activities should you do first?

A.

Exchange exported CA keys and use them to create a new server object to represent your partner’s Certificate Authority (CA).

B.

Create a new logical-server object to represent your partner’s CA.

C.

Manually import your partner’s Access Control List.

D.

Manually import your partner’s Certificate Revocation List.

Full Access
Question # 14

Which three of the following are ClusterXL member requirements?

1) same operating systems

2) same Check Point version

3) same appliance model

4) same policy

A.

1, 3, and 4

B.

1, 2, and 4

C.

2, 3, and 4

D.

1, 2, and 3

Full Access
Question # 15

To bind a NIC to a single processor when using CoreXL on GAiA, you would use the command

Full Access
Question # 16

What is Check Point's CoreXL?

A.

A way to synchronize connections across cluster members

B.

TCP-18190

C.

Multiple core interfaces on the device to accelerate traffic

D.

Multi Core support for Firewall Inspection

Full Access
Question # 17

Select the correct statement about Secure Internal Communications (SIC) Certificates. SIC Certificates:

A.

Are used for securing internal network communications between the SmartDashboard and the Security Management Server.

B.

For R75 Security Gateways are created during the Security Management Server installation.

C.

Decrease network security by securing administrative communication among the Security Management Servers and the Security Gateway.

D.

Uniquely identify Check Point enabled machines; they have the same function as VPN Certificates.

Full Access
Question # 18

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned a static IP address 10.0.0.19.

John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop with a static IP (10.0.0.19). He wants to move around the organization and continue to have access to the HR Web Server.

To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the policy.

2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.

What should John do when he cannot access the web server from a different personal computer?

A.

John should lock and unlock his computer

B.

Investigate this as a network connectivity issue

C.

The access should be changed to authenticate the user instead of the PC

D.

John should install the Identity Awareness Agent

Full Access
Question # 19

Which of the following allows administrators to allow or deny traffic to or from a specific network based on the user’s credentials?

A.

Access Policy

B.

Access Role

C.

Access Rule

D.

Access Certificate

Full Access
Question # 20

You run cphaprob -a if. When you review the output, you find the word DOWN. What does DOWN mean?

A.

The cluster link is down.

B.

The physical interface is administratively set to DOWN.

C.

The physical interface is down.

D.

CCP pakets couldn't be sent to or didn't arrive from neighbor member.

Full Access
Question # 21

Which command will only show the number of entries in the connection table?

A.

fw tab -t connections -s

B.

fw tab -t connections -u

C.

fw tab -t connections

D.

fw tab

Full Access
Question # 22

Your main internal network 10.10.10.0/24 allows all traffic to the Internet using Hide NAT. You also have a small network 10.10.20.0/24 behind the internal router. You want to configure the kernel to translate the source address only when network 10.10.20.0 tries to access the Internet for HTTP, SMTP, and FTP services. Which of the following configurations will allow this network to access the Internet?

A.

Configure three Manual Static NAT rules for network 10.10.20.0/24, one for each service.

B.

Configure Automatic Static NAT on network 10.10.20.0/24.

C.

Configure one Manual Hide NAT rule for HTTP, FTP, and SMTP services for network 10.10.20.0/24.

D.

Configure Automatic Hide NAT on network 10.10.20.0/24 and then edit the Service column in the NAT Rule Base on the automatic rule.

Full Access
Question # 23

You are MegaCorp’s Security Administrator. There are various network objects which must be NATed. Some of them use the Automatic Hide NAT method, while others use the Automatic Static NAT method. What is the rule order if both methods are used together? Give the BEST answer.

A.

The Administrator decides the rule order by shifting the corresponding rules up and down.

B.

The Static NAT rules have priority over the Hide NAT rules and the NAT on a node has priority over the NAT on a network or an address range.

C.

The Hide NAT rules have priority over the Static NAT rules and the NAT on a node has priority over the NAT on a network or an address range.

D.

The rule position depends on the time of their creation. The rules created first are placed at the top; rules created later are placed successively below the others.

Full Access
Question # 24

Which of the following is NOT defined by an Access Role object?

A.

Source Network

B.

Source Machine

C.

Source User

D.

Source Server

Full Access
Question # 25

To run GAiA in 64bit mode, which of the following is true?

1) Run set edition default 64-bit.

2) Install more than 4 GB RAM.

3) Install more than 4 TB of Hard Disk.

A.

1 and 3

B.

1 and 2

C.

2 and 3

D.

1, 2, and 3

Full Access
Question # 26

You have a diskless appliance platform. How do you keep swap file wear to a minimum?

A.

Issue FW-1 bases its package structure on the Security Management Server, dynamically loading when the firewall is booted.

B.

The external PCMCIA-based flash extension has the swap file mapped to it, allowing easy replacement.

C.

Use PRAM flash devices, eliminating the longevity.

D.

A RAM drive reduces the swap file thrashing which causes fast wear on the device.

Full Access
Question # 27

Assume you are a Security Administrator for ABCTech. You have allowed authenticated access to users from Mkting_net to Finance_net. But in the user’s properties, connections are only permitted within Mkting_net. What is the BEST way to resolve this conflict?

A.

Select Ignore Database in the Action Properties window.

B.

Permit access to Finance_net.

C.

Select Intersect with user database in the Action Properties window.

D.

Select Intersect with user database or Ignore Database in the Action Properties window.

Full Access
Question # 28

You find that Users are not prompted for authentication when they access their Web servers, even though you have created an HTTP rule via User Authentication. Choose the BEST reason why.

A.

You checked the cache password on desktop option in Global Properties.

B.

Another rule that accepts HTTP without authentication exists in the Rule Base.

C.

You have forgotten to place the User Authentication Rule before the Stealth Rule.

D.

Users must use the SecuRemote Client, to use the User Authentication Rule.

Full Access
Question # 29

The technical-support department has a requirement to access an intranet server. When configuring a User Authentication rule to achieve this, which of the following should you remember?

A.

You can only use the rule for Telnet, FTP, SMTP, and rlogin services.

B.

The Security Gateway first checks if there is any rule that does not require authentication for this type of connection before invoking the Authentication Security Server.

C.

Once a user is first authenticated, the user will not be prompted for authentication again until logging out.

D.

You can limit the authentication attempts in the User Properties’ Authentication tab.

Full Access
Question # 30

All R77 Security Servers can perform authentication with the exception of one. Which of the Security Servers can NOT perform authentication?

A.

FTP

B.

SMTP

C.

HTTP

D.

RLOGIN

Full Access