156-215.77 Premium Bundle

156-215.77 Premium Bundle

Check Point Certified Security Administrator – GAiA Certification Exam

4.5 
(29760 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
September 20, 2024Last update

Check-Point 156-215.77 Free Practice Questions

Q1. - (Topic 3) 

Your company has two headquarters, one in London, one in New York. Each of the headquarters includes several branch offices. The branch offices only need to communicate with the headquarters in their country, not with each other, and the headquarters need to communicate directly. What is the BEST configuration for establishing VPN Communities among the branch offices and their headquarters, and between the two headquarters? VPN Communities comprised of: 

A. Three star Communities: The first one is between New York headquarters and its branches. The second star Community is between London headquarters and its branches. The third star Community is between New York and London headquarters but it is irrelevant which site is "center" and which "satellite". 

B. One star Community with the option to mesh the center of the star: New York and London Gateways added to the center of the star with the "mesh center Gateways" option checked; all London branch offices defined in one satellite window; but, all New York branch offices defined in another satellite window. 

C. Two mesh and one star Community: Each mesh Community is set up for each site between headquarters their branches. The star Community has New York as the center and London as its satellite. 

D. Three mesh Communities: one for London headquarters and its branches; one for New York headquarters and its branches; and one for London and New York headquarters. 

Answer:

Q2. - (Topic 2) 

You are working with three other Security Administrators. Which SmartConsole component can be used to monitor changes to rules or object properties made by the other administrators? 

A. Eventia Tracker 

B. SmartView Monitor 

C. Eventia Monitor 

D. SmartView Tracker 

Answer:

Q3. - (Topic 3) 

For which service is it NOT possible to configure user authentication? 

A. FTP 

B. Telnet 

C. HTTPS 

D. SSH 

Answer:

Q4. - (Topic 1) 

What is the officially accepted diagnostic tool for IP Appliance Support? 

A. ipsoinfo 

B. cpinfo C. uag-diag 

D. CST 

Answer:

Q5. - (Topic 3) 

You have just installed your Gateway and want to analyze the packet size distribution of your traffic with SmartView Monitor. Unfortunately, you get the message. 

"There are no machines that contain Firewall Blade and SmartView Monitor." What should you do to analyze the packet size distribution of your traffic? 

Give the BEST answer. 

A. Enable Monitoring on your Security Management Server. 

B. Purchase the SmartView Monitor license for your Security Gateway. 

C. Purchase the SmartView Monitor license for your Security Management Server. 

D. Enable Monitoring on your Security Gateway. 

Answer:

Q6. - (Topic 2) 

You plan to create a backup of the rules, objects, policies, and global properties from an R77 Security Management Server. Which of the following backup and restore solutions can you use? 

1) Upgrade_export and upgrade_import utilities 

2) Database revision control 

3) SecurePlatform backup utilities 

4) Policy package management 

5) Manual copies of the $CPDIR/conf directory 

A. 2, 4, and 5 

B. 1, 3, and 4 

C. 1, 2, and 3 

D. 1, 2, 3, 4, and 5 

Answer:

Q7. - (Topic 3) 

Which authentication type requires specifying a contact agent in the Rule Base? 

A. Session Authentication 

B. User Authentication 

C. Client Authentication with Partially Automatic Sign On 

D. Client Authentication with Manual Sign On 

Answer:

Q8. - (Topic 2) 

You are a Security Administrator using one Security Management Server managing three different firewalls. One firewall does NOT show up in the dialog box when attempting to install a Security Policy. Which of the following is a possible cause? 

A. The firewall has failed to sync with the Security Management Server for 60 minutes. 

B. The firewall object has been created but SIC has not yet been established. 

C. The firewall is not listed in the Policy Installation Targets screen for this policy package. 

D. The license for this specific firewall has expired. 

Answer:

Q9. - (Topic 3) 

Which of the following are authentication methods that Security Gateway R77 uses to validate connection attempts? Select the response below that includes the MOST complete list of valid authentication methods. 

A. User, Client, Session 

B. Proxied, User, Dynamic, Session 

C. Connection, User, Client 

D. User, Proxied, Session 

Answer:

Q10. - (Topic 3) 

Which of the following is an authentication method used by Identity Awareness? 

A. Captive Portal 

B. PKI 

C. SSL 

D. RSA 

Answer:

Q11. - (Topic 3) 

What command syntax would you use to turn on PDP logging in a distributed environment? 

A. pdp tracker on 

B. pdp log=1 

C. pdp track=1 

D. pdp logging on 

Answer:

Q12. - (Topic 1) 

The customer has a small Check Point installation which includes one Windows 7 workstation as the SmartConsole, one GAiA device working as Security Management Server, and a third server running SecurePlatform as Security Gateway. This is an example of a(n): 

A. Unsupported configuration 

B. Stand-Alone Installation 

C. Hybrid Installation 

D. Distributed Installation 

Answer:

Q13. - (Topic 1) 

The customer has a small Check Point installation which includes one Windows 2008 server as SmartConsole and Security Management Server with a second server running SecurePlatform as Security Gateway. This is an example of a(n): 

A. Stand-Alone Installation. 

B. Distributed Installation. 

C. Hybrid Installation. 

D. Unsupported configuration. 

Answer:

Q14. - (Topic 3) 

Where are SmartEvent licenses installed? 

A. Security Gateway 

B. Log Server 

C. Security Management Server 

D. SmartEvent server 

Answer:

Q15. - (Topic 3) 

What happens if you select Web Server in the dialog box? 

A. An implied rule will be added allowing HTTP request from and to the host. 

B. Anti-virus settings will be applied to the host. 

C. An implied rule will be added allowing HTTP requests to the host. 

D. Web Intelligence will be applied to the host. 

Answer:

START 156-215.77 EXAM