Month End Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following 156-215.77 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-215.77 Exam Dumps - Check Point Certified Security Administrator

Go to page:
Question # 25

Which of the following methods will provide the most complete backup of an R77 configuration?

A.

Policy Package Management

B.

Copying the directories $FWDIR\conf and $CPDIR\conf to another server

C.

Execute command upgrade_export

D.

Database Revision Control

Full Access
Question # 26

Static NAT connections, by default, translate on which firewall kernel inspection point?

A.

Inbound

B.

Outbound

C.

Post-inbound

D.

Eitherbound

Full Access
Question # 27

Which Check Point address translation method allows an administrator to use fewer ISP-assigned IP addresses than the number of internal hosts requiring Internet connectivity?

A.

Hide

B.

Static Destination

C.

Static Source

D.

Dynamic Destination

Full Access
Question # 28

You are MegaCorp’s Security Administrator. There are various network objects which must be NATed. Some of them use the Automatic Hide NAT method, while others use the Automatic Static NAT method. What is the rule order if both methods are used together? Give the BEST answer.

A.

The Administrator decides the rule order by shifting the corresponding rules up and down.

B.

The Static NAT rules have priority over the Hide NAT rules and the NAT on a node has priority over the NAT on a network or an address range.

C.

The Hide NAT rules have priority over the Static NAT rules and the NAT on a node has priority over the NAT on a network or an address range.

D.

The rule position depends on the time of their creation. The rules created first are placed at the top; rules created later are placed successively below the others.

Full Access
Question # 29

Which rule is responsible for the client authentication failure?

Exhibit:

A.

Rule 4

B.

Rule 6

C.

Rule 3

D.

Rule 5

Full Access
Question # 30

Several Security Policies can be used for different installation targets. The Firewall protecting Human Resources’ servers should have its own Policy Package. These rules must be installed on this machine and not on the Internet Firewall.

How can this be accomplished?

A.

A Rule Base is always installed on all possible targets. The rules to be installed on a Firewall are defined by the selection in the Rule Base row Install On.

B.

When selecting the correct Firewall in each line of the Rule Base row Install On, only this Firewall is shown in the list of possible installation targets after selecting Policy > Install on Target.

C.

In the menu of SmartDashboard, go to Policy > Policy Installation Targets and select the correct firewall via Specific Targets.

D.

A Rule Base can always be installed on any Check Point Firewall object. It is necessary to select the appropriate target directly after selecting Policy > Install on Target.

Full Access
Question # 31

You are working with three other Security Administrators.

Which SmartConsole component can be used to monitor changes to rules or object properties made by the other administrators?

A.

Eventia Tracker

B.

SmartView Monitor

C.

Eventia Monitor

D.

SmartView Tracker

Full Access
Question # 32

What is the default setting when you use NAT?

A.

Destination Translated on Server side

B.

Destination Translated on Client side

C.

Source Translated on both sides

D.

Source Translated on Client side

Full Access
Go to page: