Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following 156-215.77 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-215.77 Exam Dumps - Check Point Certified Security Administrator

Question # 4

Choose the SmartLog property that is TRUE.

A.

SmartLog has been an option since release R71.10.

B.

SmartLog is not a Check Point product.

C.

SmartLog and SmartView Tracker are mutually exclusive.

D.

SmartLog is a client of SmartConsole that enables enterprises to centrally track log records and security activity with Google-like search.

Full Access
Question # 5

How are locally cached usernames and passwords cleared from the memory of a R77 Security Gateway?

A.

By using the Clear User Cache button in SmartDashboard.

B.

Usernames and passwords only clear from memory after they time out.

C.

By retrieving LDAP user information using the command fw fetchldap.

D.

By installing a Security Policy.

Full Access
Question # 6

Is it possible to track the number of connections each rule matches in a Rule Base?

A.

Yes, but you need SPLAT operating system to enable the feature Hits Count in the SmartDashboard client.

B.

Yes, since R75 40 you can use the feature Hits Count in the SmartDashboard client.

C.

Yes, but you need Gala operating system to enable the feature Hits Count in the SmartDashboard client.

D.

No, due to an architecture limitation it is not possible to track the number of connections each rule matches.

Full Access
Question # 7

Your boss wants you to closely monitor an employee suspected of transferring company secrets to the competition. The IT department discovered the suspect installed a WinSCP client in order to use encrypted communication. Which of the following methods is BEST to accomplish this task?

A.

Use SmartView Tracker to follow his actions by filtering log entries that feature the WinSCP destination port. Then, export the corresponding entries to a separate log file for documentation.

B.

Use SmartDashboard to add a rule in the firewall Rule Base that matches his IP address, and those of potential targets and suspicious protocols. Apply the alert action or customized messaging.

C.

Watch his IP in SmartView Monitor by setting an alert action to any packet that matches your Rule Base and his IP address for inbound and outbound traffic.

D.

Send the suspect an email with a keylogging Trojan attached, to get direct information about his wrongdoings.

Full Access
Question # 8

What is a Consolidation Policy?

A.

The collective name of the Security Policy, Address Translation, and IPS Policies.

B.

The specific Policy written in SmartDashboard to configure which log data is stored in the SmartReporter database.

C.

The collective name of the logs generated by SmartReporter.

D.

A global Policy used to share a common enforcement policy for multiple Security Gateways.

Full Access
Question # 9

The fw monitor utility is used to troubleshoot which of the following problems?

A.

Phase two key negotiation

B.

Address translation

C.

Log Consolidation Engine

D.

User data base corruption

Full Access
Question # 10

The customer has a small Check Point installation which includes one Windows 2008 server as SmartConsole and Security Management Server with a second server running GAiA as Security Gateway. This is an example of a(n):

A.

Stand-Alone Installation.

B.

Distributed Installation.

C.

Unsupported configuration.

D.

Hybrid Installation.

Full Access
Question # 11

The customer has a small Check Point installation which includes one Windows 2008 server as the SmartConsole and a second server running GAiA as both Security Management Server and the Security Gateway. This is an example of a(n):

A.

Distributed Installation

B.

Unsupported configuration

C.

Hybrid Installation

D.

Stand-Alone Installation

Full Access
Question # 12

Which of the following uses the same key to decrypt as it does to encrypt?

A.

Asymmetric encryption

B.

Dynamic encryption

C.

Certificate-based encryption

D.

Symmetric encryption

Full Access
Question # 13

When restoring R77 using the command upgrade_import, which of the following items are NOT restored?

A.

SIC Certificates

B.

Licenses

C.

Route tables

D.

Global properties

Full Access
Question # 14

You want to establish a VPN, using certificates. Your VPN will exchange certificates with an external partner. Which of the following activities should you do first?

A.

Create a new logical-server object to represent your partner’s CA.

B.

Exchange exported CA keys and use them to create a new server object to represent your partner’s Certificate Authority (CA).

C.

Manually import your partner’s Certificate Revocation List.

D.

Manually import your partner’s Access Control List.

Full Access
Question # 15

Exhibit:

Of the following, what parameters will not be preserved when using Database Revision Control?

A.

2, 4, 7, 10, 11

B.

3, 4, 5, 6, 9, 12, 13

C.

5, 6, 9, 12, 13

D.

1, 2, 8, 10, 11

Full Access
Question # 16

When using vpn tu, which option must you choose if you only want to clear phase 2 for a specific IP (gateway)?

Exhibit:

A.

(5) Delete all IPsec SAs for a given peer (GW)

B.

(7) Delete all IPsec+IKE SAs for a given peer (GW)

C.

(6) Delete all IPsec SAs for a given User (Client)

D.

(8) Delete all IPsec+IKE SAs for a given User (Client)

Full Access
Question # 17

The INSPECT engine inserts itself into the kernel between which two OSI model layers?

A.

Session and Transport

B.

Physical and Data

C.

Presentation and Application

D.

Datalink and Network

Full Access
Question # 18

You are a Security Administrator using one Security Management Server managing three different firewalls. One firewall does NOT show up in the dialog box when attempting to install a Security Policy. Which of the following is a possible cause?

A.

The firewall has failed to sync with the Security Management Server for 60 minutes.

B.

The firewall object has been created but SIC has not yet been established.

C.

The firewall is not listed in the Policy Installation Targets screen for this policy package.

D.

The license for this specific firewall has expired.

Full Access
Question # 19

Which rule is responsible for the installation failure?

Exhibit:

A.

Rule 3

B.

Rule 4

C.

Rule 6

D.

Rule 5

Full Access
Question # 20

The Identity Agent is a lightweight endpoint agent that authenticates securely with Single Sign-On (SSO). What is not a recommended usage of this method?

A.

When accuracy in detecting identity is crucial

B.

Leveraging identity for Data Center protection

C.

Protecting highly sensitive servers

D.

Identity based enforcement for non-AD users (non-Windows and guest users)

Full Access
Question # 21

According to Check Point Best Practice, when adding a non-managed Check Point Gateway to a Check Point security solution what object SHOULD be added? A(n):

A.

Gateway

B.

Interoperable Device

C.

Externally managed gateway

D.

Network Node

Full Access
Question # 22

Review the rules.

Assume domain UDP is enabled in the impled rules.

What happens when a user from the internal network tries to browse to the internet using HTTP? The user:

A.

can connect to the Internet successfully after being authenticated.

B.

is prompted three times before connecting to the Internet successfully.

C.

can go to the Internet after Telnetting to the client authentication daemon port 259.

D.

can go to the Internet, without being prompted for authentication.

Full Access
Question # 23

How do you configure an alert in SmartView Monitor?

A.

An alert cannot be configured in SmartView Monitor.

B.

By choosing the Gateway, and Configure Thresholds.

C.

By right-clicking on the Gateway, and selecting Properties.

D.

By right-clicking on the Gateway, and selecting System Information.

Full Access
Question # 24

Study the Rule base and Client Authentication Action properties screen -

After being authenticated by the Security Gateway, when a user starts an HTTP connection to a Web site, the user tries to FTP to another site using the command line. What happens to the user?

A.

user is prompted for authentication by the Security Gateway again.

B.

FTP data connection is dropped after the user is authenticated successfully.

C.

user is prompted to authenticate from that FTP site only, and does not need to enter his username and password for Client Authentication.

D.

FTP connection is dropped by Rule 2.

Full Access
Question # 25

Which of the following methods will provide the most complete backup of an R77 configuration?

A.

Policy Package Management

B.

Copying the directories $FWDIR\conf and $CPDIR\conf to another server

C.

Execute command upgrade_export

D.

Database Revision Control

Full Access
Question # 26

Static NAT connections, by default, translate on which firewall kernel inspection point?

A.

Inbound

B.

Outbound

C.

Post-inbound

D.

Eitherbound

Full Access
Question # 27

Which Check Point address translation method allows an administrator to use fewer ISP-assigned IP addresses than the number of internal hosts requiring Internet connectivity?

A.

Hide

B.

Static Destination

C.

Static Source

D.

Dynamic Destination

Full Access
Question # 28

You are MegaCorp’s Security Administrator. There are various network objects which must be NATed. Some of them use the Automatic Hide NAT method, while others use the Automatic Static NAT method. What is the rule order if both methods are used together? Give the BEST answer.

A.

The Administrator decides the rule order by shifting the corresponding rules up and down.

B.

The Static NAT rules have priority over the Hide NAT rules and the NAT on a node has priority over the NAT on a network or an address range.

C.

The Hide NAT rules have priority over the Static NAT rules and the NAT on a node has priority over the NAT on a network or an address range.

D.

The rule position depends on the time of their creation. The rules created first are placed at the top; rules created later are placed successively below the others.

Full Access
Question # 29

Which rule is responsible for the client authentication failure?

Exhibit:

A.

Rule 4

B.

Rule 6

C.

Rule 3

D.

Rule 5

Full Access
Question # 30

Several Security Policies can be used for different installation targets. The Firewall protecting Human Resources’ servers should have its own Policy Package. These rules must be installed on this machine and not on the Internet Firewall.

How can this be accomplished?

A.

A Rule Base is always installed on all possible targets. The rules to be installed on a Firewall are defined by the selection in the Rule Base row Install On.

B.

When selecting the correct Firewall in each line of the Rule Base row Install On, only this Firewall is shown in the list of possible installation targets after selecting Policy > Install on Target.

C.

In the menu of SmartDashboard, go to Policy > Policy Installation Targets and select the correct firewall via Specific Targets.

D.

A Rule Base can always be installed on any Check Point Firewall object. It is necessary to select the appropriate target directly after selecting Policy > Install on Target.

Full Access
Question # 31

You are working with three other Security Administrators.

Which SmartConsole component can be used to monitor changes to rules or object properties made by the other administrators?

A.

Eventia Tracker

B.

SmartView Monitor

C.

Eventia Monitor

D.

SmartView Tracker

Full Access
Question # 32

What is the default setting when you use NAT?

A.

Destination Translated on Server side

B.

Destination Translated on Client side

C.

Source Translated on both sides

D.

Source Translated on Client side

Full Access
Question # 33

Your company is running Security Management Server R77 on GAiA, which has been migrated through each version starting from Check Point 4.1.

How do you add a new administrator account?

A.

Using SmartDashboard, under Users, select Add New Administrator

B.

Using SmartDashboard or cpconfig

C.

Using the Web console on GAiA under Product configuration, select Administrators

D.

Using cpconfig on the Security Management Server, choose Administrators

Full Access
Question # 34

Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use her iPad to access the internal Finance Web server. Because the iPad is not a member of the Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter her AD credentials in the Captive Portal and then get the same access as on her office computer. Her access to resources is based on rules in the R77 Firewall Rule Base.

To make this scenario work, the IT administrator must:

1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity Sources.

2) In the Portal Settings window in the User Access section, make sure that Name and password login is selected.

3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network destinations. Select accept as the Action.

Ms. McHanry tries to access the resource but is unable. What should she do?

A.

Have the security administrator select the Action field of the Firewall Rule “Redirect HTTP connections to an authentication (captive) portal?

B.

Have the security administrator reboot the firewall

C.

Have the security administrator select Any for the Machines tab in the appropriate Access Role

D.

Install the Identity Awareness agent on her iPad

Full Access
Question # 35

Which of the following actions do NOT take place in IKE Phase 1?

A.

Peers agree on encryption method.

B.

Diffie-Hellman key is combined with the key material to produce the symmetrical IPsec key.

C.

Peers agree on integrity method.

D.

Each side generates a session key from its private key and the peer’s public key.

Full Access
Question # 36

Which of the below is the MOST correct process to reset SIC from SmartDashboard?

A.

Run cpconfig, and click Reset.

B.

Click the Communication button for the firewall object, then click Reset. Run cpconfig and type a new activation key.

C.

Run cpconfig, and select Secure Internal Communication > Change One Time Password.

D.

Click Communication > Reset on the Gateway object, and type a new activation key.

Full Access
Question # 37

How many packets does the IKE exchange use for Phase 1 Main Mode?

A.

12

B.

1

C.

3

D.

6

Full Access
Question # 38

Which of the following methods is NOT used by Identity Awareness to catalog identities?

A.

AD Query

B.

Captive Portal

C.

Identity Agent

D.

GPO

Full Access
Question # 39

Identify the ports to which the Client Authentication daemon listens by default.

A.

259, 900

B.

256, 600

C.

80, 256

D.

8080, 529

Full Access
Question # 40

A Security Policy installed by another Security Administrator has blocked all SmartDashboard connections to the stand-alone installation of R77. After running the command fw unloadlocal, you are able to reconnect with SmartDashboard and view all changes. Which of the following change is the most likely cause of the block?

A.

The Allow Control Connections setting in Policy > Global Properties has been unchecked.

B.

A Stealth Rule has been configured for the R77 Gateway.

C.

The Security Policy installed to the Gateway had no rules in it.

D.

The Gateway Object representing your Gateway was configured as an Externally Managed VPN Gateway.

Full Access
Question # 41

You are about to integrate RSA SecurID users into the Check Point infrastructure. What kind of users are to be defined via SmartDashboard?

A.

A group with generic user

B.

All users

C.

LDAP Account Unit Group

D.

Internal user Group

Full Access
Question # 42

Which authentication type permits five different sign-on methods in the authentication properties window?

A.

Client Authentication

B.

Manual Authentication

C.

User Authentication

D.

Session Authentication

Full Access
Question # 43

A _______ rule is used to prevent all traffic going to the R77 Security Gateway.

A.

IPS

B.

Cleanup

C.

Reject

D.

Stealth

Full Access
Question # 44

ALL of the following options are provided by the GAiA sysconfig utility, EXCEPT:

A.

Export setup

B.

DHCP Server configuration

C.

Time & Date

D.

GUI Clients

Full Access
Question # 45

Which of the following options is available with the GAiA cpconfig utility on a Management Server?

A.

Export setup

B.

DHCP Server configuration

C.

GUI Clients

D.

Time & Date

Full Access
Question # 46

A snapshot delivers a complete GAiA backup. The resulting file can be stored on servers or as a local file in /var/CPsnapshot/snapshots. How do you restore a local snapshot named MySnapshot.tgz?

A.

Reboot the system and call the start menu. Select the option Snapshot Management, provide the Expert password and select [L] for a restore from a local file. Then, provide the correct file name.

B.

As expert user, type the command snapshot -r MySnapshot.tgz.

C.

As expert user, type the command revert --file MySnapshot.tgz.

D.

As expert user, type the command snapshot - R to restore from a local file. Then, provide the correct file name.

Full Access
Question # 47

Which statement is TRUE about implicit rules?

A.

You create them in SmartDashboard.

B.

The Gateway enforces implicit rules that enable outgoing packets only.

C.

Changes to the Security Gateway’s default settings do not affect implicit rules.

D.

They are derived from Global Properties and explicit object properties.

Full Access
Question # 48

How can you check whether IP forwarding is enabled on an IP Security Appliance?

A.

clish -c show routing active enable

B.

cat /proc/sys/net/ipv4/ip_forward

C.

echo 1 > /proc/sys/net/ipv4/ip_forward

D.

ipsofwd list

Full Access
Question # 49

Which rules are not applied on a first-match basis?

A.

User Authentication

B.

Client Authentication

C.

Session Authentication

D.

Cleanup

Full Access
Question # 50

You are running a R77 Security Gateway on GAiA. In case of a hardware failure, you have a server with the exact same hardware and firewall version installed. What back up method could be used to quickly put the secondary firewall into production?

A.

manual backup

B.

upgrade_export

C.

backup

D.

snapshot

Full Access
Question # 51

Which operating systems are supported by a Check Point Security Gateway on an open server? Select MOST complete list.

A.

Sun Solaris, Red Hat Enterprise Linux, Check Point SecurePlatform, IPSO, Microsoft Windows

B.

Check Point GAiA and SecurePlatform, and Microsoft Windows

C.

Check Point GAiA, Microsoft Windows, Red Hat Enterprise Linux, Sun Solaris, IPSO

D.

Check Point GAiA and SecurePlatform, IPSO, Sun Solaris, Microsoft Windows

Full Access
Question # 52

How granular may an administrator filter an Access Role with identity awareness? Per:

A.

Specific ICA Certificate

B.

AD User

C.

Radius Group

D.

Windows Domain

Full Access
Question # 53

What happens if the identity of a user is known?

A.

If the user credentials do not match an Access Role, the system displays the Captive Portal.

B.

If the user credentials do not match an Access Role, the system displays a sandbox.

C.

If the user credentials do not match an Access Role, the traffic is automatically dropped.

D.

If the user credentials match an Access Role, the rule is applied and traffic is accepted or dropped based on the defined action.

Full Access
Question # 54

Which rule position in the Rule Base should hold the Cleanup Rule? Why?

A.

First. It explicitly accepts otherwise dropped traffic.

B.

Last. It explicitly drops otherwise accepted traffic.

C.

Last. It serves a logging function before the implicit drop.

D.

Before last followed by the Stealth Rule.

Full Access
Question # 55

What command with appropriate switches would you use to test Identity Awareness connectivity?

A.

test_ldap

B.

test_ad_connectivity

C.

test_ldap_connectivity

D.

test_ad

Full Access
Question # 56

Which item below in a Security Policy would be enforced first?

A.

IP spoofing/IP options

B.

Security Policy First rule

C.

Administrator-defined Rule Base

D.

Network Address Translation

Full Access
Question # 57

MegaCorp’s security infrastructure separates Security Gateways geographically. You must request a central license for one remote Security Gateway.

How do you apply the license?

A.

Using the remote Gateway’s IP address, and attaching the license to the remote Gateway via SmartUpdate.

B.

Using your Security Management Server's IP address, and attaching the license to the remote Gateway via SmartUpdate.

C.

Using the remote Gateway's IP address, and applying the license locally with the command cplic put.

D.

Using each of the Gateways’ IP addresses, and applying the licenses on the Security Management Server with the command.

Full Access
Question # 58

How can you activate the SNMP daemon on a Check Point Security Management Server?

A.

Using the command line, enter snmp_install.

B.

From cpconfig, select SNMP extension.

C.

Any of these options will work.

D.

In SmartDashboard, right-click a Check Point object and select Activate SNMP.

Full Access