Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following 156-315.77 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-315.77 Exam Dumps - Check Point Certified Security Expert

Question # 4

You run cphaprob -a if. When you review the output, you find the word DOWN. What does DOWN mean?

A.

The cluster link is down.

B.

The physical interface is administratively set to DOWN.

C.

The physical interface is down.

D.

CCP packets couldn't be sent to or didn't arrive from neighbor member.

Full Access
Question # 5

Fill in the blank.

Type the command and syntax to configure the Cluster Control Protocol (CCP) to use Broadcast.

Full Access
Question # 6

Which command will only show the number of entries in the connection table?

A.

fw tab -t connections -s

B.

fw tab -t connections -u

C.

fw tab -t connections

D.

fw tab

Full Access
Question # 7

Fill in the blanks.

To view the number of concurrent connections going through your firewall, you would use the command and syntax _____ _____ _____ _____ _____.

Full Access
Question # 8

Fill in the blank.

In New Mode HA, the internal cluster IP VIP address is 10.4.8.3. The internal interfaces on two members are 10.4.8.1 and 10.4.8.2 Internal host 10.4.8.108 pings 10.4.8.3, and receives replies.

Review the ARP table from the internal Windows host 10.4.8.108. According to the output, which member is the standby machine?

Full Access
Question # 9

You want to upgrade a cluster with two members to VPN-1 NGX. The Smart CenterServer and both members are version VPN-1/Firewall-1 NG FP3, with the latest Hotfix.

What is the correct upgrade procedure?

1. Change the version, in the General Properties of the gateway-cluster object.

2. Upgrade the Smart CenterServer, and reboot after upgrade.

3. Run cpstop on one member, while leaving the other member running. Upgrade one member at a time, and reboot after upgrade.

4. Reinstall the Security Policy.

A.

3, 2, 1, 4

B.

2, 4, 3, 1

C.

1, 3, 2, 4

D.

2, 3, 1, 4

E.

1, 2, 3, 4

Full Access
Question # 10

Lilly has generated an IKE debug on her Security Gateway. She has asked Jack to transfer the file to Support. Where is the file located?

A.

$FWDIR/log/ike.elg

B.

$FWDIR/opt/vpnd.elg

C.

$FWDIR/opt/ike.elg

D.

$FWDIR/log/vpnd.elg

Full Access
Question # 11

MicroCorp experienced a security appliance failure. (LEDs of all NICs are off.) The age of the unit required that the RMA-unit be a different model. Will a revert to an existing snapshot bring the new unit up and running?

A.

There is no dynamic update at reboot.

B.

No. The revert will most probably not match to hard disk.

C.

Yes. Everything is dynamically updated at reboot.

D.

No. At installation the necessary hardware support is selected. The snapshot saves this state.

Full Access
Question # 12

How does Check Point recommend that you secure the sync interface between gateways?

A.

Use a dedicated sync network.

B.

Configure the sync network to operate within the DMZ.

C.

Secure each sync interface in a cluster with Endpoint.

D.

Encrypt all sync traffic between cluster members.

Full Access
Question # 13

In Gaia, the operating system can be changed to 32-bit or 64-bit, provided the processor supports 64-bit. What command toggles to 64-bit.

A.

set bitrate 64

B.

set edition default 64

C.

configure edition 64-bit

D.

set edition default 64-bit

Full Access
Question # 14

When an Endpoint user is able to authenticate but receives a message from the client that it is unable to enforce the desktop policy, what is the most likely scenario?

A.

The gateway could not locate the user in SmartDirectory and is allowing the connection with limitations based on a generic profile.

B.

The user’s rights prevent access to the protected network.

C.

A Desktop Policy is not configured.

D.

The user is attempting to connect with the wrong Endpoint client.

Full Access
Question # 15

When troubleshooting user authentication, you may see the following entries in a debug of the user authentication process. In which order are these messages likely to appear?

A.

make_au, au_auth, au_fetchuser, au_auth_auth, cpLdapCheck, cpLdapGetUser

B.

make_au, au_auth, au_fetchuser, cpLdapGetUser, cpLdapCheck, au_auth_auth

C.

cpLdapGetUser, au_fetchuser, cpLdapCheck, make_au, au_auth, au_auth_auth

D.

au_fetchuser, make_au, au_auth, cpLdapGetUser, au_auth_auth, cpLdapCheck

Full Access
Question # 16

Anytime a client initiates a connection to a server, the firewall kernel signals the FWD process using a trap. FWD spawns the _____ child service, which runs the security server.

A.

FWSD

B.

FWD

C.

In.httpd

D.

FWSSD

Full Access
Question # 17

The process that performs the authentication for legacy session authentication is:

A.

cvpnd

B.

fwm

C.

vpnd

D.

fwssd

Full Access
Question # 18

While authorization for users managed by SmartDirectory is performed by the gateway, the authentication mostly occurs in _____.

A.

ldapauth

B.

cpauth

C.

ldapd

D.

cpShared

Full Access
Question # 19

User definitions are stored in _____.

A.

$FWDIR/conf/users.NDB

B.

$FWDIR/conf/fwmuser.conf

C.

$FWDIR/conf/fwusers.conf

D.

$FWDIR/conf/fwauth.NDB

Full Access
Question # 20

The process that performs the authentication for SSL VPN Users is:

A.

cpd

B.

cvpnd

C.

fwm

D.

vpnd

Full Access
Question # 21

The process _____ executes the authentication for logging in to SmartDashboard.

A.

fwm

B.

vpnd

C.

cpd

D.

cvpnd

Full Access
Question # 22

When configuring an LDAP Group object, select option _____ if you want the gateway to reference a specific group defined on the LDAP server for authentication purposes.

A.

Group Agnostic

B.

All Account-Unit's Users

C.

Only Sub Tree

D.

Only Group in Branch

Full Access
Question # 23

Frank is concerned with performance and wants to configure the affinities settings. His gateway does not have the Performance pack running. What would Frank need to perform in order configure those settings?

A.

Edit affinity.conf and change the settings

B.

Run fw affinity and change the settings

C.

Edit $FWDIR/conf/fwaffinity.conf and change the settings

D.

Run sim affinity and change the settings

Full Access
Question # 24

CPD is a core Check Point process that does all of the following EXCEPT:

A.

AMON status pull from the Gateway

B.

Management High Availability (HA) sync

C.

SIC (Secure Internal Communication) functions

D.

Policy installation

Full Access
Question # 25

Katie has enabled User Directory and applied the license to Security Management Server, Green. Her supervisor has asked her to configure the Password Strength options of the least one digit, one symbol, 8 characters long and include an uppercase character. How should she accomplish this?

A.

Open the SmartDashboard, Select Global properties, select Identity Awareness; check the boxes for Password must include an upper character, Password must include a digit, Password must include a symbol and change the password length to 8 characters.

B.

Open the SmartDashboard, Select Global properties, select User Authority; check the boxes for Password must include an upper character, Password must include a digit and Password must include a symbol.

C.

Open the SmartDashboard, Select Global Properties, select User Directory, check the boxes for Password must include an uppercase character, Password must include a digit, and Password must include a symbol.

D.

Open the SmartDashboard, Select Global Properties, select User Directory, check the boxes for Password must include an uppercase character, Password must include a digit, Password must include a symbol and change the password length to 8 characters.

Full Access
Question # 26

Fill in the blank.

MultiCorp is located in Atlanta. It has a branch office in Europe, Asia, and Africa. Each location has its own AD controller for local user login. How many ADqueries have to be configured?

Full Access
Question # 27

Which of the following uses the same key to decrypt as it does to encrypt?

A.

dynamic encryption

B.

Certificate-based encryption

C.

static encryption

D.

Symmetric encryption

E.

Asymmetric encryption

Full Access
Question # 28

How do you control the maximum mail messages in a spool directory?

A.

In the Security Server window in Global Properties

B.

In SmartDefense SMTP settings

C.

In the smtp.conf file on the SmartCenter Server

D.

In the gateway object's SMTP settings in the Advanced window

E.

In the SMTP resource object

Full Access
Question # 29

MultiCorp is running Smartcenter R71 on an IPSO platform and wants to upgrade to a new Appliance with R77. Which migration tool is recommended?

A.

Download Migration Tool R77 for IPSO and Splat/Linux from Check Point website.

B.

Use already installed Migration Tool.

C.

Use Migration Tool from CD/ISO

D.

Fetch Migration Tool R71 for IPSO and Migration Tool R77 for Splat/Linux from CheckPoint website

Full Access
Question # 30

Which operating system is NOT supported by VPN-1 Secure Client?

A.

IPSO 3.9

B.

Windows XP SP2

C.

Windows 2000 Professional

D.

RedHat Linux 8.0

E.

MacOSX

Full Access
Question # 31

What is the best method for scheduling backup's on multiple firewalls?

A.

WebUI

B.

SmartProvisioning

C.

Smart Dashboard

D.

SmartUpdate

Full Access
Question # 32

Which of the following SSL Network Extender server-side prerequisites are correct? Select all that apply.

A.

The VPN1-Gateway must be configured to work with Visitor Mode

B.

The specific VPN-1 Security Gateway must be configured as a member of the VPN-1 Remote Access Community.

C.

There are distinctly separate access rules required for Secure Client users vs. SSL Network Extender users.

D.

To use Integrity Clientless Security (ICS), you must install the ICS server or configuration tool.

Full Access
Question # 33

You need to determine if your company's Web servers are accessed an excessive number of times from the same host. How would you configure this in the IPS tab?

A.

Successive alerts

B.

Successive DoS attacks

C.

Successive multiple connections

D.

HTTP protocol inspection

Full Access
Question # 34

MegaCorp is running Smartcenter R70, some Gateways at R65 and some other Gateways with R60. Management wants to upgrade to the most comprehensive IPv6 support. What should the administrator do first?

A.

Upgrade Smartcenter to R77 first.

B.

Upgrade R60-Gateways to R65.

C.

Upgrade every unit directly to R77.

D.

Check the ReleaseNotes to verify that every step is supported.

Full Access
Question # 35

What command will stop all (and only) Management Portal services?

A.

cpstop

B.

spstop

C.

sportalstop

D.

smartportalstop

Full Access
Question # 36

What proprietary Check Point protocol is the basis of the functionality of Check Point ClusterXL inter-module communication?

A.

RDP

B.

IPSec

C.

CCP

D.

HA OPCODE

E.

CKPP

Full Access
Question # 37

Which changes are tracked by SmartWorkflow?

A.

SmartDashboard, SmartView Tracker and SmartView Monitor logins and logouts

B.

Security Policies and the Rule Base, Network Objects, Network Services, VPN Communities.

C.

Users, Administrators, Groups and VPN Communities

D.

Security Policies and the Rule Base, Network Objects, Network Services, Resources, Users, Administrators, Groups, VPN Communities and Servers and OPSEC Applications.

Full Access
Question # 38

If ClusterXL Load Sharing is enabled with state synchronization enabled, what will happen if one member goes down?

A.

The processing of all connections handled by the faulty machine is immediately taken over by the other member(s).

B.

The processing of all connections handled by the faulty machine is dropped, so all connections need to be re-established through the other machine(s).

C.

There is no state synchronization on Load Sharing, only on High Availability.

D.

The connections are dropped as Load Sharing does not support High Availability.

Full Access
Question # 39

You receive an alert indicating a suspicious FTP connection is trying to connect to one of your internal hosts. How do you block the connection in real time and verify the connection is successfully blocked?

A.

Highlight the suspicious connection in SmartView Tracker > Active mode.Block the connection using the Tools > Block Intruder menu.Use the Active mode to confirm that the suspicious connection does not reappear.

B.

Highlight the suspicious connection in SmartView Tracker > Log mode.Block the connection using Tools > Block Intruder menu.Use Log mode to confirm that the suspicious connection does not reappear.

C.

Highlight the suspicious connection in SmartView Tracker > Active mode.Block the connection using Tools > Block Intruder menu.Use Active mode to confirm that the suspicious connection is dropped.

D.

Highlight the suspicious connection in SmartView Tracker > Log mode.Block the connection using Tools > Block Intruder menu.Use the Log mode to confirm that the suspicious connection is dropped.

Full Access
Question # 40

Paul has just joined the MegaCorp security administration team. Natalie, the administrator, creates a new administrator account for Paul in SmartDashboard and installs the policy. When Paul tries to login it fails. How can Natalie verify whether Paul’s IP address is predefined on the security management server?

A.

Login to Smart Dashboard, access Properties of the SMS, and verify whether Paul’s IP address is listed.

B.

Type cpconfig on the Management Server and select the option “GUI client List” to see if Paul’s IP address is listed.

C.

Login in to Smart Dashboard, access Global Properties, and select Security Management, to verify whether Paul’s IP address is listed.

D.

Access the WEBUI on the Security Gateway, and verify whether Paul’s IP address is listed as a GUI client.

Full Access
Question # 41

You need to back up the routing, interface, and DNS configuration information from your R77 GAiA Security Gateway. Which backup-and-restore solution do you use?

A.

Manual copies of the directory $FWDIR/conf

B.

GAiA back up utilities

C.

Database Revision Control

D.

Commands upgrade_export and upgrade_import

Full Access
Question # 42

Fill in the blank.

In New Mode HA, the internal cluster IP VIP address is 10.4.8.3. An internal host 10.4.8.108 successfully pings its Cluster and receives replies.

Review the ARP table from the internal Windows host 10.4.8.108. Based on this information, what is the active cluster member’s IP address?

Full Access
Question # 43

Fill in the blank.

Type the full fw command and syntax that allows you to disable only sync on a cluster firewall member.

Full Access
Question # 44

Which of the following is NOT part of the policy installation process?

A.

Initiation

B.

Validation

C.

Code compilation

D.

Code generation

Full Access
Question # 45

You are preparing computers for a new ClusterXL deployment. For your cluster, you plan to use three machines with the following configurations:

Cluster Member 1: OS - GAiA; NICs - QuadCard; Memory - 1 GB; Security Gateway - version: R71 and primary Security Management Server installed, version: R77

Cluster Member 2: OS - GAiA; NICs - 4 Intel 3Com; Memory - 1 GB; Security Gateway only, version: R77

Cluster Member 3: OS - GAiA; NICs - 4 other manufacturers; Memory - 512 MB; Security Gateway only, version: R77

Are these machines correctly configured for a ClusterXL deployment?

A.

No, Cluster Member 3 does not have the required memory.

B.

Yes, these machines are configured correctly for a ClusterXL deployment.

C.

No, the Security Management Server is not running the same operating system as the cluster members.

D.

No, the Security Gateway cannot be installed on the Security Management Server.

Full Access
Question # 46

What is the primary benefit of using upgrade_export over either backup or snapshot?

A.

upgrade_export will back up routing tables, hosts files, and manual ARP configurations, where backup and snapshot will not.

B.

upgrade_export is operating system independent and can be used when backup or snapshot is not available.

C.

upgrade_export has an option to backup the system and SmartView Tracker logs while backup and snapshot will not.

D.

The commands backup and snapshot can take a long time to run whereas upgrade_export will take a much shorter amount of time.

Full Access
Question # 47

MegaCorp has two different types of hardware with Check Point GAiA installed and set up as gateways. The Administrator wants to provide redundancy in case one of them fails. Choose the best approach.

A.

Configure Gateway HA

B.

Configure Management HA for gateways

C.

Configure ClusterXL

D.

Configure VRRP

Full Access
Question # 48

How do you check the version of “CPSIZEME” on GAiA?

A.

[expert@HostName]# ./cpsizeme.exe –v

B.

[expert@HostName]# ./cpsizeme.exe –version

C.

[expert@HostName]# ./cpsizeme –V

D.

[expert@HostName]# ./cpsizeme –version

Full Access
Question # 49

Which of the following is the preferred method for adding static routes in GAiA?

A.

In the CLI with the command “route add”

B.

In Web Portal, under Network Management > IPv4 Static Routes

C.

In the CLI via sysconfig

D.

In SmartDashboard under Gateway Properties > Topology

Full Access
Question # 50

Which of the following is NOT a valid way to view interface’s IP address settings in GAiA?

A.

Using the command ethtool in Expert Mode

B.

Viewing the file /config/active

C.

Via the Gaia WebUI

D.

Via the command show configuration in CLISH

Full Access
Question # 51

The process _____ provides service to access the GAIA configuration database.

A.

configdbd

B.

confd

C.

fwm

D.

ipsrd

Full Access
Question # 52

Which command would you use to save the routing information before upgrading a Windows Gateway?

A.

cp /etc/sysconfig/network.C [location]

B.

ifconfig > [filename].txt

C.

ipconfig –a > [filename].txt

D.

netstat –rn > [filename].txt

Full Access
Question # 53

If both domain-based and route-based VPN’s are configured, which will take precedence?

A.

Route-based

B.

Must be chosen/configured manually by the Administrator in the Policy > Global Properties

C.

Domain-based

D.

Must be chosen/configured manually by the Administrator in the VPN community object

Full Access
Question # 54

Which of the following statements is TRUE concerning MEP VPN’s?

A.

The VPN Client selects which Security Gateway takes over, should the first connection fail.

B.

MEP VPN’s are restricted to the location of the gateways.

C.

State synchronization between Security Gateways is required.

D.

MEP Security Gateways cannot be managed by separate Management Servers.

Full Access
Question # 55

When using Captive Portal to send unidentified users to a Web portal for authentication, which of the following is NOT a recommended use for this method?

A.

For deployment of Identity Agents

B.

Identity-based enforcement for non-AD users (non-Windows and guest users)

C.

Leveraging identity in Internet application control

D.

Basic identity enforcement in the internal network

Full Access
Question # 56

Which of the following access options would you NOT use when configuring Captive Portal?

A.

From the Internet

B.

Through all interfaces

C.

Through internal interfaces

D.

Through the Firewall policy

Full Access
Question # 57

Identity Agent is a lightweight endpoint agent that authenticates securely with Single Sign-On (SSO). Which of the following is NOT a recommended use for this method?

A.

Leveraging machine name or identity

B.

When accuracy in detecting identity is crucial

C.

Identity based enforcement for non-AD users (non-Windows and guest users)

D.

Protecting highly sensitive servers

Full Access
Question # 58

Which is NOT a method through which Identity Awareness receives its identities?

A.

AD Query

B.

Group Policy

C.

Identity Agent

D.

Captive Portal

Full Access
Question # 59

Which two processes are responsible on handling Identity Awareness?

A.

pdp and lad

B.

pdp and pdp-11

C.

pep and lad

D.

pdp and pep

Full Access
Question # 60

In the following cluster configuration; if you reboot sglondon_1 which device will be active when sglondon_1 is back up and running? Why?

A.

sglondon_1 because it the first configured object with the lowest IP.

B.

sglondon_2 because sglondon_1 has highest IP.

C.

sglondon_1, because it is up again, sglondon_2 took over during reboot.

D.

sglondon_2 because it has highest priority.

Full Access
Question # 61

MultiCorp has bought company OmniCorp and now has two active AD domains. How would you deploy Identity Awareness in this environment?

A.

You must run an ADquery for every domain.

B.

Identity Awareness can only manage one AD domain.

C.

Only one ADquery is necessary to ask for all domains.

D.

Only Captive Portal can be used.

Full Access
Question # 62

If using AD Query for seamless identity data reception from Microsoft Active Directory (AD), which of the following methods is NOT Check Point recommended?

A.

Identity-based enforcement for non-AD users (non-Windows and guest users)

B.

Basic identity enforcement in the internal network

C.

Leveraging identity in Internet application control

D.

Identity-based auditing and logging

Full Access
Question # 63

All of the following are used by the DLP engine to match a message during a scan, EXCEPT:

A.

Message Body

B.

Protocol

C.

Data Type

D.

Destination

Full Access
Question # 64

Which command would you use to save the interface information before upgrading a Windows Gateway?

A.

cp /etc/sysconfig/network.C [location]

B.

ipconfig -a > [filename].txt

C.

ifconfig > [filename].txt

D.

netstat -m > [filename].txt

Full Access
Question # 65

When you use the Global Properties' default settings on R77, which type of traffic will be dropped if NO explicit rule allows the traffic?

A.

Firewall logging and ICA key-exchange information

B.

RIP traffic

C.

Outgoing traffic originating from the Security Gateway

D.

SmartUpdate connections

Full Access
Question # 66

Which of the following functions CANNOT be performed in Client Info on computer information collected?

A.

Copy the contents of the selected cells.

B.

Save the information in the active tab to an .exe file.

C.

Enter new credential for accessing the computer information.

D.

Run Google.com search using the contents of the selected cell.

Full Access
Question # 67

Before upgrading SecurePlatform, you should create a backup.

To save time, many administrators use the command backup.

This creates a backup of the Check Point configuration as well as the system configuration.

An administrator has installed the latest HFA on the system for fixing traffic problems after creating a backup file. There is a mistake in the very complex static routing configuration.

The Check Point configuration has not been changed.

Can the administrator use a restore to fix the errors in static routing?

A.

The restore is not possible because the backup file does not have the same build number (version).

B.

The restore is done by selecting Snapshot Management from the SecurePlatform boot menu.

C.

The restore can be done easily by the command restore and selecting the appropriate backup file.

D.

A back up cannot be restored, because the binary files are missing.

Full Access
Question # 68

You are the MegaCorp Security Administrator. This company uses a firewall cluster, consisting of two cluster members. The cluster generally works well but one day you find that the cluster is behaving strangely. You assume that there is a connectivity problem with the cluster synchronization link (cross-over cable). Which of the following commands is the BEST for testing the connectivity of the crossover cable?

A.

ifconfig -a

B.

arping

C.

telnet

D.

ping

Full Access
Question # 69

Where do you define NAT properties so that NAT is performed either client side or server side? In SmartDashboard under:

A.

Gateway Setting

B.

NAT Rules

C.

Global Properties > NAT definition

D.

Implied Rules

Full Access
Question # 70

What firewall kernel table stores information about port allocations for Hide NAT connections?

A.

NAT_dst_any_list

B.

NAT_alloc

C.

NAT_src_any_list

D.

fwx_alloc

Full Access
Question # 71

What is the proper CLISH syntax to configure a default route via 192.168.255.1 in GAiA?

A.

set static-route default nexthop gateway address 192.168.255.1 priority 1 on

B.

set static-route 192.168.255.0/24 nexthop gateway logical ethl on

C.

set static-route 192.168.255.0/24 nexthop gateway address 192.168.255.1 priority 1 on

D.

set static-route nexthop default gateway logical 192.168.255.1 priority 1 on

Full Access
Question # 72

The “MAC Magic” value must be modified under the following condition:

A.

There is more than one cluster connected to the same VLAN

B.

A firewall cluster is configured to use Multicast for CCP traffic

C.

There are more than two members in a firewall cluster

D.

A firewall cluster is configured to use Broadcast for CCP traffic

Full Access
Question # 73

You have just upgraded your Load Sharing gateway cluster (both members) from NGX R65 to R77. cphaprob stat shows:

Cluster Mode: New High Availability (Active Up)

Member Unique Address Assigned Load State

1 (local) 172.16.185.21 100% Active

2 172.16.185.22 0% Ready

Which of the following is NOT a possible cause of this?

A.

Member 1 is at a lower version than member 2

B.

You have not run cpconfig on member 2 yet.

C.

You have a different number of cores defined for CoreXL between the two members

D.

Member 1 has CoreXL disabled and member 2 does not

Full Access
Question # 74

Review the R77 configuration. Is it correct for Management High Availability?

Exhibit:

A.

No, the Security Management Servers must reside on the same network.

B.

No, the Security Management Servers do not have the same number of NICs.

C.

No, the Security Management Servers must be installed on the same operating system.

D.

No, a R77 Security Management Server cannot run on Red Hat Linux 9.0.

Full Access
Question # 75

You are reviewing computer information collected in ClientInfo. You can NOT:

A.

Run Google.com search using the contents of the selected cell.

B.

Enter new credential for accessing the computer information.

C.

Save the information in the active tab to an .exe file.

D.

Copy the contents of the selected cells.

Full Access
Question # 76

Which component receives events and assigns severity levels to the events; invokes any defined automatic reactions, and adds the events to the Events Data Base?

A.

SmartEvent Correlation Unit

B.

SmartEvent Server

C.

SmartEvent Analysis DataServer

D.

SmartEvent Client

Full Access
Question # 77

Which describes the function of the account unit?

A.

An Account Unit is the Check Point account that SmartDirectory uses to access an (LDAP) server

B.

An Account Unit is a system account on the Check Point gateway that SmartDirectory uses to access an (LDAP) server

C.

An Account Unit is the administration account on the LDAP server that SmartDirectory uses to access to (LDAP) server

D.

An Account Unit is the interface which allows interaction between the Security Management server and Security Gateways, and the SmartDirectory (LDAP) server.

Full Access
Question # 78

In a R77 ClusterXL Load Sharing configuration, which type of ARP related problem can force the use of Unicast Mode (Pivot) configuration due to incompatibility on some adjacent routers and switches?

A.

MGCP MAC address response to a Multicast IP request

B.

Multicast MAC address response to a Unicast IP request

C.

Unicast MAC address response to a Multicast IP request

D.

Multicast MAC address response to a RARP request

Full Access
Question # 79

What is the best tool to produce a report which represents historical system information?

A.

SmartReporter-Standard Reports

B.

SmartView Tracker

C.

Smartview Monitor

D.

SmartReporter-Express Reports

Full Access
Question # 80

In which ClusterXL Load Sharing mode, does the pivot machine get chosen automatically by ClusterXL?

A.

Hot Standby Load Sharing

B.

Multicast Load Sharing

C.

Unicast Load Sharing

D.

CCP Load Sharing

Full Access
Question # 81

SmartReporter reports can be used to analyze data from a penetration-testing regimen in all of the following examples, EXCEPT:

A.

Analyzing traffic patterns against public resources.

B.

Possible worm/malware activity.

C.

Analyzing access attempts via social-engineering.

D.

Tracking attempted port scans.

Full Access
Question # 82

The process that performs the authentication for Smart Dashboard is:

A.

fwm

B.

vpnd

C.

cvpnd

D.

cpd

Full Access
Question # 83

A Smart ProvisioningGateway could be a member of which VPN communities?

(i) Center In Star Topology

(ii) Satellite in Star Topology

(iii) Carter in Remote Access Community

(iv) Meshed Community

A.

(ii) and (iii)

B.

All

C.

(i), (ii) and (iii)

D.

(ii) only

Full Access
Question # 84

What type of packet does a VPN-1 SecureClient send to its Policy Server, to report its Secure Configuration Verification status?

A.

ICMP Port Unreachable

B.

TCP keep alive

C.

IKE Key Exchange

D.

ICMP Destination Unreachable

E.

UDP keep alive

Full Access
Question # 85

Which Security Servers can perform Content Security tasks, but CANNOT perform authentication tasks?

A.

Telnet

B.

FTP

C.

SMTP

D.

HTTP

Full Access
Question # 86

Your customer asks you about the Performance Pack.

You explain to him that a Performance Pack is a software acceleration product which improves the performance of the Security Gateway.

You may enable or disable this acceleration by either:

1) the command:cpconfig

2) the command: fwaccel on ff

What is the difference between these two commands?

A.

The fwaccel command determines the default setting. The command cpconfig can dynamically change the setting, but after the reboot it reverts to the default setting.

B.

Both commands function identically.

C.

The command cpconfig works on the Security Platform only. The command fwaccel can be used on all platforms.

D.

The cpconfig command enables acceleration. The command fwaccel can dynamically change the setting, but after the reboot it reverts to the default setting.

Full Access
Question # 87

Which of the following operating systems support numbered VTI's?

A.

Secure PlatformPro

B.

Solaris

C.

IPSO 4.0 +

D.

Windows Server 2008

Full Access
Question # 88

You set up a mesh VPN Community, so your internal networks can access your partner's network, and vice versa. Your Security Policy encrypts only FTP and HTTP traffic through a VPN tunnel. All other traffic among your internal and partner networks is sent in clear text.

How do you configure the VPN Community?

A.

Disable "accept all encrypted traffic", and put FTP and HTTP in the Excluded services in the Community object. Add a rule in the Security Policy for services FTP and http, with the Community object in the VPN field.

B.

Disable "accept all encrypted traffic" in the Community, and add FTP and HTTP services to the Security Policy, with that Community object in the VPN field.

C.

Enable "accept all encrypted traffic", but put FTP and HTTP in the Excluded services in the Community. Add a rule in the Security Policy, with services FTP and http, and the Community object in the VPN field.

D.

Put FTP and HTTP in the Excluded services in the Community object. Then add a rule in the Security Policy to allow Any as the service, with the Community object in the VPN field.

Full Access
Question # 89

To change the default port of the Management Portal:

A.

Edit the masters. conf file on the Portal server.

B.

Modify the file cp_httpd_admin .conf.

C.

Run sysconfig and change the management interface

D.

Re-initialize SIC

Full Access
Question # 90

What is the lowest possible version a Security Gateway may be running in order to use it as an LSM enabled Gateway?

A.

NG-AI R55 HFAJ7

B.

NGX R60

C.

NGXR65HFA_50

D.

NGX R71

Full Access