Month End Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following 156-915.77 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-915.77 Exam Dumps - Check Point Certified Security Expert Update

Go to page:
Question # 9

Which Check Point tool allows you to open a debug file and see the VPN packet exchange details.

A.

PacketDebug.exe

B.

VPNDebugger.exe

C.

IkeView.exe

D.

IPSECDebug.exe

Full Access
Question # 10

You are trying to configure Directional VPN Rule Match in the Rule Base. But the Match column does not have the option to see the Directional Match. You see the following window.

What must you enable to see the Directional Match?

A.

directional_match(true) in the objects_5_0.C file on Security Management Server

B.

VPN Directional Match on the Gateway object’s VPN tab

C.

VPN Directional Match on the VPN advanced window, in Global Properties

D.

Advanced Routing on each Security Gateway

Full Access
Question # 11

You are responsible for the configuration of MegaCorp’s Check Point Firewall. You need to allow two NAT rules to match a connection. Is it possible? Give the BEST answer.

A.

No, it is not possible to have more than one NAT rule matching a connection. When the firewall receives a packet belonging to a connection, it compares it against the first rule in the Rule Base, then the second rule, and so on. When it finds a rule that matches, it stops checking and applies that rule.

B.

Yes, it is possible to have two NAT rules which match a connection, but only in using Manual NAT (bidirectional NAT).

C.

Yes, there are always as many active NAT rules as there are connections.

D.

Yes, it is possible to have two NAT rules which match a connection, but only when using Automatic NAT (bidirectional NAT).

Full Access
Question # 12

Which Check Point address translation method allows an administrator to use fewer ISP-assigned IP addresses than the number of internal hosts requiring Internet connectivity?

A.

Hide

B.

Static Destination

C.

Static Source

D.

Dynamic Destination

Full Access
Question # 13

To run GAiA in 64bit mode, which of the following is true?

1) Run set edition default 64-bit.

2) Install more than 4 GB RAM.

3) Install more than 4 TB of Hard Disk.

A.

1 and 3

B.

1 and 2

C.

2 and 3

D.

1, 2, and 3

Full Access
Question # 14

When a packet is flowing through the security gateway, which one of the following is a valid inspection path?

A.

Acceleration Path

B.

Small Path

C.

Firewall Path

D.

Medium Path

Full Access
Question # 15

Study the Rule base and Client Authentication Action properties screen -

After being authenticated by the Security Gateway, when a user starts an HTTP connection to a Web site, the user tries to FTP to another site using the command line. What happens to the user? The:

A.

user is prompted for authentication by the Security Gateway again.

B.

FTP data connection is dropped after the user is authenticated successfully.

C.

user is prompted to authenticate from that FTP site only, and does not need to enter his username and password for Client Authentication.

D.

FTP connection is dropped by Rule 2.

Full Access
Question # 16

Review the rules.

Assume domain UDP is enabled in the impled rules.

What happens when a user from the internal network tries to browse to the internet using HTTP? The user:

A.

can connect to the Internet successfully after being authenticated.

B.

is prompted three times before connecting to the Internet successfully.

C.

can go to the Internet after Telnetting to the client authentication daemon port 259.

D.

can go to the Internet, without being prompted for authentication.

Full Access
Go to page: