Month End Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following 156-315.77 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-315.77 Exam Dumps - Check Point Certified Security Expert

Go to page:
Question # 9

You want to upgrade a cluster with two members to VPN-1 NGX. The Smart CenterServer and both members are version VPN-1/Firewall-1 NG FP3, with the latest Hotfix.

What is the correct upgrade procedure?

1. Change the version, in the General Properties of the gateway-cluster object.

2. Upgrade the Smart CenterServer, and reboot after upgrade.

3. Run cpstop on one member, while leaving the other member running. Upgrade one member at a time, and reboot after upgrade.

4. Reinstall the Security Policy.

A.

3, 2, 1, 4

B.

2, 4, 3, 1

C.

1, 3, 2, 4

D.

2, 3, 1, 4

E.

1, 2, 3, 4

Full Access
Question # 10

Lilly has generated an IKE debug on her Security Gateway. She has asked Jack to transfer the file to Support. Where is the file located?

A.

$FWDIR/log/ike.elg

B.

$FWDIR/opt/vpnd.elg

C.

$FWDIR/opt/ike.elg

D.

$FWDIR/log/vpnd.elg

Full Access
Question # 11

MicroCorp experienced a security appliance failure. (LEDs of all NICs are off.) The age of the unit required that the RMA-unit be a different model. Will a revert to an existing snapshot bring the new unit up and running?

A.

There is no dynamic update at reboot.

B.

No. The revert will most probably not match to hard disk.

C.

Yes. Everything is dynamically updated at reboot.

D.

No. At installation the necessary hardware support is selected. The snapshot saves this state.

Full Access
Question # 12

How does Check Point recommend that you secure the sync interface between gateways?

A.

Use a dedicated sync network.

B.

Configure the sync network to operate within the DMZ.

C.

Secure each sync interface in a cluster with Endpoint.

D.

Encrypt all sync traffic between cluster members.

Full Access
Question # 13

In Gaia, the operating system can be changed to 32-bit or 64-bit, provided the processor supports 64-bit. What command toggles to 64-bit.

A.

set bitrate 64

B.

set edition default 64

C.

configure edition 64-bit

D.

set edition default 64-bit

Full Access
Question # 14

When an Endpoint user is able to authenticate but receives a message from the client that it is unable to enforce the desktop policy, what is the most likely scenario?

A.

The gateway could not locate the user in SmartDirectory and is allowing the connection with limitations based on a generic profile.

B.

The user’s rights prevent access to the protected network.

C.

A Desktop Policy is not configured.

D.

The user is attempting to connect with the wrong Endpoint client.

Full Access
Question # 15

When troubleshooting user authentication, you may see the following entries in a debug of the user authentication process. In which order are these messages likely to appear?

A.

make_au, au_auth, au_fetchuser, au_auth_auth, cpLdapCheck, cpLdapGetUser

B.

make_au, au_auth, au_fetchuser, cpLdapGetUser, cpLdapCheck, au_auth_auth

C.

cpLdapGetUser, au_fetchuser, cpLdapCheck, make_au, au_auth, au_auth_auth

D.

au_fetchuser, make_au, au_auth, cpLdapGetUser, au_auth_auth, cpLdapCheck

Full Access
Question # 16

Anytime a client initiates a connection to a server, the firewall kernel signals the FWD process using a trap. FWD spawns the _____ child service, which runs the security server.

A.

FWSD

B.

FWD

C.

In.httpd

D.

FWSSD

Full Access
Go to page: