Month End Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following 156-915.77 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-915.77 Exam Dumps - Check Point Certified Security Expert Update

Go to page:
Question # 17

Security Gateway R77 supports User Authentication for which of the following services? Select the response below that contains the MOST correct list of supported services.

A.

SMTP, FTP, TELNET

B.

SMTP, FTP, HTTP, TELNET

C.

FTP, HTTP, TELNET

D.

FTP, TELNET

Full Access
Question # 18

The third-shift Administrator was updating Security Management Server access settings in Global Properties. He managed to lock all administrators out of their accounts. How should you unlock these accounts?

A.

Delete the file admin.lock in the Security Management Server directory $FWDIR/tmp/.

B.

Reinstall the Security Management Server and restore using upgrade_import.

C.

Type fwm lock_admin -ua from the Security Management Server command line.

D.

Login to SmartDashboard as the special cpconfig_admin user account; right-click on each administrator object and select unlock.

Full Access
Question # 19

Many companies have defined more than one administrator. To increase security, only one administrator should be able to install a Rule Base on a specific Firewall. How do you configure this?

A.

Define a permission profile in SmartDashboard with read/write privileges, but restrict it to all other firewalls by placing them in the Policy Targets field. Then, an administrator with this permission profile cannot install a policy on any Firewall not listed here.

B.

Put the one administrator in an Administrator group and configure this group in the specific Firewall object in Advanced > Permission to Install.

C.

In the object General Properties representing the specific Firewall, go to the Software Blades product list and select Firewall. Right-click in the menu, select Administrator to Install to define only this administrator.

D.

Right-click on the object representing the specific administrator, and select that Firewall in Policy Targets.

Full Access
Question # 20

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to a set of designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned a static IP address 10.0.0.19.

He has received a new laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop with a static IP (10.0.0.19).

He wants to move around the organization and continue to have access to the HR Web Server. To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources, and installs the policy.

2) Adds an access role object to the Firewall Rule Base that lets John Adams access the HR Web Server from any machine and from any location and installs policy.

John plugged in his laptop to the network on a different network segment and was not able to connect to the HR Web server. What is the next BEST troubleshooting step?

A.

Investigate this as a network connectivity issue

B.

Install the Identity Awareness Agent

C.

Set static IP to DHCP

D.

After enabling Identity Awareness, reboot the gateway

Full Access
Question # 21

What happens if the identity of a user is known?

A.

If the user credentials do not match an Access Role, the system displays the Captive Portal.

B.

If the user credentials do not match an Access Role, the system displays a sandbox.

C.

If the user credentials do not match an Access Role, the traffic is automatically dropped.

D.

If the user credentials match an Access Role, the rule is applied and traffic is accepted or dropped based on the defined action.

Full Access
Question # 22

When do modifications to the Event Policy take effect?

A.

As soon as the Policy Tab window is closed.

B.

When saved on the SmartEvent Server and installed to the Correlation Units.

C.

When saved on the Correlation Units, and pushed as a policy.

D.

When saved on the SmartEvent Client, and installed on the SmartEvent Server.

Full Access
Question # 23

MegaCorp is using SmartCenter Server with several gateways. Their requirements result in a heavy log load. Would it be feasible to add the SmartEvent Correlation Unit and SmartEvent Server to their SmartCenter Server?

A.

No. SmartCenter SIC will interfere with the function of SmartEvent.

B.

No. If SmartCenter is already under stress, the use of a separate server for SmartEvent is recommended.

C.

No, SmartEvent and Smartcenter cannot be installed on the same machine at the same time.

D.

Yes. SmartEvent must be installed on your SmartCenter Server.

Full Access
Question # 24

MegaCorp is running Smartcenter R70, some Gateways at R65 and some other Gateways with R60. Management wants to upgrade to the most comprehensive IPv6 support. What should the administrator do first?

A.

Upgrade Smartcenter to R77 first.

B.

Upgrade R60-Gateways to R65.

C.

Upgrade every unit directly to R77.

D.

Check the ReleaseNotes to verify that every step is supported.

Full Access
Go to page: