Month End Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following 156-315.77 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-315.77 Exam Dumps - Check Point Certified Security Expert

Go to page:
Question # 49

Which of the following is the preferred method for adding static routes in GAiA?

A.

In the CLI with the command “route add”

B.

In Web Portal, under Network Management > IPv4 Static Routes

C.

In the CLI via sysconfig

D.

In SmartDashboard under Gateway Properties > Topology

Full Access
Question # 50

Which of the following is NOT a valid way to view interface’s IP address settings in GAiA?

A.

Using the command ethtool in Expert Mode

B.

Viewing the file /config/active

C.

Via the Gaia WebUI

D.

Via the command show configuration in CLISH

Full Access
Question # 51

The process _____ provides service to access the GAIA configuration database.

A.

configdbd

B.

confd

C.

fwm

D.

ipsrd

Full Access
Question # 52

Which command would you use to save the routing information before upgrading a Windows Gateway?

A.

cp /etc/sysconfig/network.C [location]

B.

ifconfig > [filename].txt

C.

ipconfig –a > [filename].txt

D.

netstat –rn > [filename].txt

Full Access
Question # 53

If both domain-based and route-based VPN’s are configured, which will take precedence?

A.

Route-based

B.

Must be chosen/configured manually by the Administrator in the Policy > Global Properties

C.

Domain-based

D.

Must be chosen/configured manually by the Administrator in the VPN community object

Full Access
Question # 54

Which of the following statements is TRUE concerning MEP VPN’s?

A.

The VPN Client selects which Security Gateway takes over, should the first connection fail.

B.

MEP VPN’s are restricted to the location of the gateways.

C.

State synchronization between Security Gateways is required.

D.

MEP Security Gateways cannot be managed by separate Management Servers.

Full Access
Question # 55

When using Captive Portal to send unidentified users to a Web portal for authentication, which of the following is NOT a recommended use for this method?

A.

For deployment of Identity Agents

B.

Identity-based enforcement for non-AD users (non-Windows and guest users)

C.

Leveraging identity in Internet application control

D.

Basic identity enforcement in the internal network

Full Access
Question # 56

Which of the following access options would you NOT use when configuring Captive Portal?

A.

From the Internet

B.

Through all interfaces

C.

Through internal interfaces

D.

Through the Firewall policy

Full Access
Go to page: