Month End Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following 156-315.77 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-315.77 Exam Dumps - Check Point Certified Security Expert

Go to page:
Question # 57

Identity Agent is a lightweight endpoint agent that authenticates securely with Single Sign-On (SSO). Which of the following is NOT a recommended use for this method?

A.

Leveraging machine name or identity

B.

When accuracy in detecting identity is crucial

C.

Identity based enforcement for non-AD users (non-Windows and guest users)

D.

Protecting highly sensitive servers

Full Access
Question # 58

Which is NOT a method through which Identity Awareness receives its identities?

A.

AD Query

B.

Group Policy

C.

Identity Agent

D.

Captive Portal

Full Access
Question # 59

Which two processes are responsible on handling Identity Awareness?

A.

pdp and lad

B.

pdp and pdp-11

C.

pep and lad

D.

pdp and pep

Full Access
Question # 60

In the following cluster configuration; if you reboot sglondon_1 which device will be active when sglondon_1 is back up and running? Why?

A.

sglondon_1 because it the first configured object with the lowest IP.

B.

sglondon_2 because sglondon_1 has highest IP.

C.

sglondon_1, because it is up again, sglondon_2 took over during reboot.

D.

sglondon_2 because it has highest priority.

Full Access
Question # 61

MultiCorp has bought company OmniCorp and now has two active AD domains. How would you deploy Identity Awareness in this environment?

A.

You must run an ADquery for every domain.

B.

Identity Awareness can only manage one AD domain.

C.

Only one ADquery is necessary to ask for all domains.

D.

Only Captive Portal can be used.

Full Access
Question # 62

If using AD Query for seamless identity data reception from Microsoft Active Directory (AD), which of the following methods is NOT Check Point recommended?

A.

Identity-based enforcement for non-AD users (non-Windows and guest users)

B.

Basic identity enforcement in the internal network

C.

Leveraging identity in Internet application control

D.

Identity-based auditing and logging

Full Access
Question # 63

All of the following are used by the DLP engine to match a message during a scan, EXCEPT:

A.

Message Body

B.

Protocol

C.

Data Type

D.

Destination

Full Access
Question # 64

Which command would you use to save the interface information before upgrading a Windows Gateway?

A.

cp /etc/sysconfig/network.C [location]

B.

ipconfig -a > [filename].txt

C.

ifconfig > [filename].txt

D.

netstat -m > [filename].txt

Full Access
Go to page: