2024 Check Point Official New Released 156-215.77 Q&As
100% Free Download! 100% Pass Guaranteed!
https://www.certleader.com/156-215.77-dumps.html
Q1. - (Topic 1) Over the weekend, an Administrator without access to SmartDashboard installed a new R77 Security Gateway using GAiA. You want to confirm communication between the Gateway and the Management Server by installing the Security Policy. What might prevent you from installing the Policy? A. You first need to run the command fw unloadlocal on the new Security Gateway. B. You have not
Q1. - (Topic 3) You are trying to save a custom log query in R77 SmartView Tracker, but getting the following error: Could not save <query-name> (Error: Database is Read Only) Which of the following is a likely explanation for this? A. You do not have OS write permissions on the local SmartView Tracker PC in order to save the custom query locally. B. You do not have the explicit right
Q1. - (Topic 3) To qualify as an Identity Awareness enabled rule, which column MAY include an Access Role? A. Track B. Action C. Source D. User View AnswerAnswer: C Q2. - (Topic 3) What is a possible reason for the IKE failure shown in this screenshot? A. Mismatch in preshared secrets. B. Mismatch in Diffie-Hellman group. C. Mismatch in VPN Domains. D. Mismatch in encryption schemes
Q1. - (Topic 3) Match the following commands to their correct function. Each command has one function only listed. Exhibit: A. C1>F6; C2>F4; C3>F2; C4>F5 B. C1>F2; C2>F1; C3>F6; C4>F4 C. C1>F2; C2>F4; C3>F1; C4>F5 D. C1>F4; C2>F6; C3>F3; C4>F2 View AnswerAnswer: A Q2. - (Topic 2) Which SmartView Tracker mode allows you to read the SMTP e-
Q1. - (Topic 1) You are running a R77 Security Gateway on SecurePlatform. In case of a hardware failure, you have a server with the exact same hardware and firewall version installed. What back up method could be used to quickly put the secondary firewall into production? A. manual backup B. snapshot C. upgrade_export D. backup View AnswerAnswer: B Q2. - (Topic 3) Your bank’s distribu
Q1. - (Topic 2)Â One of your remote Security Gateway's suddenly stops sending logs, and you cannot install the Security Policy on the Gateway. All other remote Security Gateways are logging normally to the Security Management Server, and Policy installation is not affected. When you click the Test SIC status button in the problematic Gateway object, you receive an error message. What is the p
Q1. - (Topic 2) Which SmartView Tracker selection would most effectively show who installed a Security Policy blocking all traffic from the corporate network? A. Network and Endpoint tab B. Custom filter C. Management tab D. Active tab View AnswerAnswer: C Q2. - (Topic 2) When configuring anti-spoofing on the Security Gateway object interfaces, which of the following is NOT a valid R77
Q1. - (Topic 1) Which of the following tools is used to generate a Security Gateway R77 configuration report? A. infoCP B. cpinfo C. infoview D. fw cpinfo View AnswerAnswer: B Q2. - (Topic 3) Your company's Security Policy forces users to authenticate to the Gateway explicitly, before they can use any services. The Gateway does not allow the Telnet service to itself from any locatio
Q1. - (Topic 1) The Security Gateway is installed on SecurePlatform R77. The default port for the Web User Interface is ____________. A. TCP 443 B. TCP 4433 C. TCP 18211 D. TCP 257 View AnswerAnswer: A Topic 2, Volume B Q2. - (Topic 2) You have included the Cleanup Rule in your Rule Base. Where in the Rule Base should the Accept ICMP Requests implied rule have no effect? A. After Stea
Q1. - (Topic 3) Which do you configure to give remote access VPN users a local IP address? A. Office mode IP pool B. Encryption domain pool C. NAT pool D. Authentication pool View AnswerAnswer: A Q2. - (Topic 1) When you use the Global Properties' default settings on R77, which type of traffic will be dropped if NO explicit rule allows the traffic? A. Firewall logging and ICA key-e
Q1. - (Topic 3)Â Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use her iPad to access the internal Finance Web server. Because the iPad is not a member of the Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter her AD credentials in the Captive Portal and then get the same access as on her office computer. Her acces
Q1. - (Topic 2) Which R77 SmartConsole tool would you use to verify the installed Security Policy name on a Security Gateway? A. SmartView Server B. SmartView Tracker C. None, SmartConsole applications only communicate with the Security Management Server. D. SmartUpdate View AnswerAnswer: B 123. - (Topic 2) You are reviewing the Security Administrator activity for a bank and comparing it
Q1. - (Topic 1) When Jon first installed his new security system, he forgot to configure DNS servers on his Security Gateway. How could Jon configure DNS servers now that his Security Gateway is in production? A. Login to the SmartDashboard, edit the firewall Gateway object, select the tab Interfaces > Domain Name Servers. B. Login to the firewall using SSH and run cpconfig, then select Dom
Q1. - (Topic 2) A client has created a new Gateway object that will be managed at a remote location. When the client attempts to install the Security Policy to the new Gateway object, the object does not appear in the Install On check box. What should you look for? A. Secure Internal Communications (SIC) not configured for the object. B. A Gateway object created using the Check Point > Secu
Q1. - (Topic 1) You installed Security Management Server on a computer using GAiA in the MegaCorp home office. You use IP address 10.1.1.1. You also installed the Security Gateway on a second SecurePlatform computer, which you plan to ship to another Administrator at a MegaCorp hub office. What is the correct order for pushing SIC certificates to the Gateway before shipping it? A. 2, 1, 3, 4, 5
Q1. - (Topic 3) When using vpn tu, which option must you choose if you want to rebuild your VPN for a specific IP (gateway)? Exhibit: A. (6) Delete all IPsec SAs for a given User (Client) B. (5) Delete all IPsec SAs for a given peer (GW) C. (8) Delete all IPsec+IKE SAs for a given User (Client) D. Delete all IPsec+IKE SAs for a given peer (GW) View AnswerAnswer: D Q2. - (Topic 1) You m
Q1. - (Topic 1) Which command enables IP forwarding on IPSO? A. echo 1 > /proc/sys/net/ipv4/ip_forward B. ipsofwd on admin C. echo 0 > /proc/sys/net/ipv4/ip_forward D. clish -c set routing active enable View AnswerAnswer: B Q2. - (Topic 3) If you were NOT using IKE aggressive mode for your IPsec tunnel, how many packets would you see for normal Phase 1 exchange? A. 9 B. 6 C. 3Â
Q1. - (Topic 1) Which component functions as the Internal Certificate Authority for R77? A. Security Gateway B. Management Server C. Policy Server D. SmartLSM View AnswerAnswer: B 69. - (Topic 1) Which command allows you to view the contents of an R77 table? A. fw tab -s <tablename> B. fw tab -t <tablename> C. fw tab -x <tablename> D. fw tab -a <tablename> Q2
Q1. - (Topic 3) Which of the following is NOT true for Clientless VPN? A. User Authentication is supported. B. Secure communication is provided between clients and servers that support HTTP. C. The Gateway accepts any encryption method that is proposed by the client and supported in the VPN. D. The Gateway can enforce the use of strong encryption. View AnswerAnswer: B Q2. - (Topic 1) Yo
Q1. - (Topic 3) In which Rule Base can you implement an Access Role? A. DLP B. Mobile Access C. IPS D. Firewall View AnswerAnswer: D Q2. - (Topic 1) When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component? A. SecureClient B. Security Gateway C. None, Security Management Server would be installed by it