156-915.77 Premium Bundle

156-915.77 Premium Bundle

Check Point Certified Security Expert Update Blade Certification Exam

4.5 
(54960 ratings)
203 QuestionsPractice Tests
203 PDFPrint version
September 29, 2024Last update

CheckPoint 156-915.77 Free Practice Questions

Proper study guides for Up to the immediate present CheckPoint Check Point Certified Security Expert Update Blade certified begins with CheckPoint 156-915.77 preparation products which designed to deliver the Best Quality 156-915.77 questions by making you pass the 156-915.77 test at your first time. Try the free 156-915.77 demo right now.

Free 156-915.77 Demo Online For CheckPoint Certifitcation:

NEW QUESTION 1

Your R77 primary Security Management Server is installed on GAiA. You plan to schedule the Security Management Server to run fw logswitch automatically every 48 hours. How do you create this schedule?

  • A. On a GAiA Security Management Server, this can only be accomplished by configuring the command fw logswitch via the cron utility.
  • B. Create a time object, and add 48 hours as the interva
  • C. Open the primary Security Management Server object’s Logs and Masters window, enable Schedule log switch, and select the Time object.
  • D. Create a time object, and add 48 hours as the interva
  • E. Open the Security Gateway object's Logs and Masters window, enable Schedule log switch, and select the Time object.
  • F. Create a time object, and add 48 hours as the interva
  • G. Select that time object’s Global Properties > Logs and Masters window, to schedule a logswitch.

Answer: B

NEW QUESTION 2

Which of the following items should be configured for the Security Management Server to authenticate via LDAP?

  • A. Check Point Password
  • B. Active Directory Server object
  • C. Windows logon password
  • D. WMI object

Answer: B

NEW QUESTION 3
CORRECT TEXT
The command useful for debugging by capturing packet information, including verifying LDAP authentication on all Check Point platforms is


Solution:
fw monitor

Does this meet the goal?
  • A. Yes
  • B. Not Mastered

Answer: A

NEW QUESTION 4

Which Security Gateway R77 configuration setting forces the Client Authentication authorization time-out to refresh, each time a new user is authenticated? The:

  • A. Time properties, adjusted on the user objects for each user, in the Client Authentication rule Source.
  • B. IPS > Application Intelligence > Client Authentication > Refresh User Timeout option enabled.
  • C. Refreshable Timeout setting, in Client Authentication Action Properties > Limits.
  • D. Global Properties > Authentication parameters, adjusted to allow for Regular Client Refreshment.

Answer: C

NEW QUESTION 5

After filtering a fw monitor trace by port and IP, a packet is displayed three times; in the i, I, and o inspection points, but not in the O inspection point. Which is the likely source of the issue?

  • A. The packet has been sent out through a VPN tunnel unencrypted.
  • B. An IPSO ACL has blocked the packet’s outbound passage.
  • C. A SmartDefense module has blocked the packet.
  • D. It is due to NAT.

Answer: D

NEW QUESTION 6

Your company has the requirement that SmartEvent reports should show a detailed and accurate view of network activity but also performance should be guaranteed. Which actions should be taken to achieve that?
1) Use same hard drive for database directory, log files, and temporary directory.
2) Use Consolidation Rules.
3) Limit logging to blocked traffic only.
4) Use Multiple Database Tables.

  • A. 2, 4
  • B. 1, 3, 4
  • C. 1, 2, 4
  • D. 1, 2

Answer: A

NEW QUESTION 7

Which process should you debug if SmartDashboard login fails?

  • A. sdm
  • B. cpd
  • C. fwd
  • D. fwm

Answer: D

NEW QUESTION 8

Which of the following statements accurately describes the command snapshot?

  • A. snapshot creates a full OS-level backup, including network-interface data, Check Point product information, and configuration settings during an upgrade of a GAiA Security Gateway.
  • B. snapshot creates a Security Management Server full system-level backup on any OS.
  • C. snapshot stores only the system-configuration settings on the Gateway.
  • D. A Gateway snapshot includes configuration settings and Check Point product information from the remote Security Management Server.

Answer: A

NEW QUESTION 9
CORRECT TEXT
Fill in the blank. To save your OSPF configuration in GAiA, enter the command _____.


Solution:
save config

Does this meet the goal?
  • A. Yes
  • B. Not Mastered

Answer: A

NEW QUESTION 10

When do modifications to the Event Policy take effect?

  • A. As soon as the Policy Tab window is closed.
  • B. When saved on the SmartEvent Server and installed to the Correlation Units.
  • C. When saved on the Correlation Units, and pushed as a policy.
  • D. When saved on the SmartEvent Client, and installed on the SmartEvent Server.

Answer: B

NEW QUESTION 11

Users with Identity Awareness Agent installed on their machines login with , so that when the user logs into the domain, that information is also used to meet Identity Awareness credential requests.

  • A. Key-logging
  • B. ICA Certificates
  • C. SecureClient
  • D. Single Sign-On

Answer: D

NEW QUESTION 12

Your internal network is configured to be 10.1.1.0/24. This network is behind your perimeter R77 Gateway, which connects to your ISP provider. How do you configure the Gateway to allow this network to go out to the Internet?

  • A. Use Hide NAT for network 10.1.1.0/24 behind the external IP address of your perimeter Gateway.
  • B. Use Hide NAT for network 10.1.1.0/24 behind the internal interface of your perimeter Gateway.
  • C. Use automatic Static NAT for network 10.1.1.0/24.
  • D. Do nothing, as long as 10.1.1.0 network has the correct default Gateway.

Answer: A

NEW QUESTION 13

Match the VPN-related terms with their definitions. Each correct term is only used once.
Exhibit:
156-915.77 dumps exhibit

  • A. A-3, B-4, C-1, D-5
  • B. A-4, B-3, C-5, D-2
  • C. A-2, B-5, C-4, D-1
  • D. A-3, B-2, C-1, D-4

Answer: B

NEW QUESTION 14

You cannot use SmartDashboard’s User Directory features to connect to the LDAP server. What should you investigate?
1) Verify you have read-only permissions as administrator for the operating system.
2) Verify there are no restrictions blocking SmartDashboard's User Manager from connecting to the LDAP server.
3) Check that the login Distinguished Name configured has root permission (or at least write permission Administrative access) in the LDAP Server's access control configuration.

  • A. 1, 2, and 3
  • B. 2 and 3
  • C. 1 and 2
  • D. 1 and 3

Answer: B

NEW QUESTION 15

In the Rule Base displayed, user authentication in Rule 4 is configured as fully automatic. Eric is a member of the LDAP group, MSD_Group.
156-915.77 dumps exhibit
What happens when Eric tries to connect to a server on the Internet?

  • A. None of these things will happen.
  • B. Eric will be authenticated and get access to the requested server.
  • C. Eric will be blocked because LDAP is not allowed in the Rule Base.
  • D. Eric will be dropped by the Stealth Rule.

Answer: D

NEW QUESTION 16

A Web server behind the Security Gateway is set to Automatic Static NAT. Client side NAT is not checked in the Global Properties. A client on the Internet initiates a session to the Web Server. Assuming there is a rule allowing this traffic, what other configuration must be done to allow the traffic to reach the Web server?

  • A. Automatic ARP must be unchecked in the Global Properties.
  • B. Nothing else must be configured.
  • C. A static route must be added on the Security Gateway to the internal host.
  • D. A static route for the NAT IP must be added to the Gateway’s upstream router.

Answer: C

NEW QUESTION 17
CORRECT TEXT
Type the command and syntax to view critical devices on a cluster member in a ClusterXL environment.


Solution:
cphaprob -ia list

Does this meet the goal?
  • A. Yes
  • B. Not Mastered

Answer: A

NEW QUESTION 18
Update the new topology in the cluster object from SmartDashboard.


Solution:


Does this meet the goal?
  • A. Yes
  • B. Not Mastered

Answer: A

NEW QUESTION 19

You have created a Rule Base for firewall, websydney. Now you are going to create a new policy package with security and address translation rules for a second Gateway.
156-915.77 dumps exhibit
What is TRUE about the new package’s NAT rules?

  • A. Rules 1, 2, 3 will appear in the new package.
  • B. Only rule 1 will appear in the new package.
  • C. NAT rules will be empty in the new package.
  • D. Rules 4 and 5 will appear in the new package.

Answer: A

NEW QUESTION 20

Which command will erase all CRL’s?

  • A. vpn crladmin
  • B. cpstop/cpstart
  • C. vpn crl_zap
  • D. vpn flush

Answer: C

NEW QUESTION 21
......

Recommend!! Get the Full 156-915.77 dumps in VCE and PDF From Dumpscollection.com, Welcome to Download: https://www.dumpscollection.net/dumps/156-915.77/ (New 203 Q&As Version)


START 156-915.77 EXAM