Month End Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following 156-215.77 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-215.77 Exam Dumps - Check Point Certified Security Administrator

Go to page:
Question # 33

Your company is running Security Management Server R77 on GAiA, which has been migrated through each version starting from Check Point 4.1.

How do you add a new administrator account?

A.

Using SmartDashboard, under Users, select Add New Administrator

B.

Using SmartDashboard or cpconfig

C.

Using the Web console on GAiA under Product configuration, select Administrators

D.

Using cpconfig on the Security Management Server, choose Administrators

Full Access
Question # 34

Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use her iPad to access the internal Finance Web server. Because the iPad is not a member of the Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter her AD credentials in the Captive Portal and then get the same access as on her office computer. Her access to resources is based on rules in the R77 Firewall Rule Base.

To make this scenario work, the IT administrator must:

1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity Sources.

2) In the Portal Settings window in the User Access section, make sure that Name and password login is selected.

3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network destinations. Select accept as the Action.

Ms. McHanry tries to access the resource but is unable. What should she do?

A.

Have the security administrator select the Action field of the Firewall Rule “Redirect HTTP connections to an authentication (captive) portal?

B.

Have the security administrator reboot the firewall

C.

Have the security administrator select Any for the Machines tab in the appropriate Access Role

D.

Install the Identity Awareness agent on her iPad

Full Access
Question # 35

Which of the following actions do NOT take place in IKE Phase 1?

A.

Peers agree on encryption method.

B.

Diffie-Hellman key is combined with the key material to produce the symmetrical IPsec key.

C.

Peers agree on integrity method.

D.

Each side generates a session key from its private key and the peer’s public key.

Full Access
Question # 36

Which of the below is the MOST correct process to reset SIC from SmartDashboard?

A.

Run cpconfig, and click Reset.

B.

Click the Communication button for the firewall object, then click Reset. Run cpconfig and type a new activation key.

C.

Run cpconfig, and select Secure Internal Communication > Change One Time Password.

D.

Click Communication > Reset on the Gateway object, and type a new activation key.

Full Access
Question # 37

How many packets does the IKE exchange use for Phase 1 Main Mode?

A.

12

B.

1

C.

3

D.

6

Full Access
Question # 38

Which of the following methods is NOT used by Identity Awareness to catalog identities?

A.

AD Query

B.

Captive Portal

C.

Identity Agent

D.

GPO

Full Access
Question # 39

Identify the ports to which the Client Authentication daemon listens by default.

A.

259, 900

B.

256, 600

C.

80, 256

D.

8080, 529

Full Access
Question # 40

A Security Policy installed by another Security Administrator has blocked all SmartDashboard connections to the stand-alone installation of R77. After running the command fw unloadlocal, you are able to reconnect with SmartDashboard and view all changes. Which of the following change is the most likely cause of the block?

A.

The Allow Control Connections setting in Policy > Global Properties has been unchecked.

B.

A Stealth Rule has been configured for the R77 Gateway.

C.

The Security Policy installed to the Gateway had no rules in it.

D.

The Gateway Object representing your Gateway was configured as an Externally Managed VPN Gateway.

Full Access
Go to page: