Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following 156-215.77 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-215.77 Exam Dumps - Check Point Certified Security Administrator

Go to page:
Question # 4

Choose the SmartLog property that is TRUE.

A.

SmartLog has been an option since release R71.10.

B.

SmartLog is not a Check Point product.

C.

SmartLog and SmartView Tracker are mutually exclusive.

D.

SmartLog is a client of SmartConsole that enables enterprises to centrally track log records and security activity with Google-like search.

Full Access
Question # 5

How are locally cached usernames and passwords cleared from the memory of a R77 Security Gateway?

A.

By using the Clear User Cache button in SmartDashboard.

B.

Usernames and passwords only clear from memory after they time out.

C.

By retrieving LDAP user information using the command fw fetchldap.

D.

By installing a Security Policy.

Full Access
Question # 6

Is it possible to track the number of connections each rule matches in a Rule Base?

A.

Yes, but you need SPLAT operating system to enable the feature Hits Count in the SmartDashboard client.

B.

Yes, since R75 40 you can use the feature Hits Count in the SmartDashboard client.

C.

Yes, but you need Gala operating system to enable the feature Hits Count in the SmartDashboard client.

D.

No, due to an architecture limitation it is not possible to track the number of connections each rule matches.

Full Access
Question # 7

Your boss wants you to closely monitor an employee suspected of transferring company secrets to the competition. The IT department discovered the suspect installed a WinSCP client in order to use encrypted communication. Which of the following methods is BEST to accomplish this task?

A.

Use SmartView Tracker to follow his actions by filtering log entries that feature the WinSCP destination port. Then, export the corresponding entries to a separate log file for documentation.

B.

Use SmartDashboard to add a rule in the firewall Rule Base that matches his IP address, and those of potential targets and suspicious protocols. Apply the alert action or customized messaging.

C.

Watch his IP in SmartView Monitor by setting an alert action to any packet that matches your Rule Base and his IP address for inbound and outbound traffic.

D.

Send the suspect an email with a keylogging Trojan attached, to get direct information about his wrongdoings.

Full Access
Question # 8

What is a Consolidation Policy?

A.

The collective name of the Security Policy, Address Translation, and IPS Policies.

B.

The specific Policy written in SmartDashboard to configure which log data is stored in the SmartReporter database.

C.

The collective name of the logs generated by SmartReporter.

D.

A global Policy used to share a common enforcement policy for multiple Security Gateways.

Full Access
Go to page: