Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following 156-915.77 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-915.77 Exam Dumps - Check Point Certified Security Expert Update

Question # 4

How granular may an administrator filter an Access Role with identity awareness? Per:

A.

Specific ICA Certificate

B.

AD User

C.

Radius Group

D.

Windows Domain

Full Access
Question # 5

Which of the following authentication methods can be configured in the Identity Awareness setup wizard?

A.

TACACS

B.

Captive Portal

C.

Check Point Password

D.

Windows password

Full Access
Question # 6

How do you configure the Security Policy to provide user access to the Captive Portal through an external (Internet) interface?

A.

Change the gateway settings to allow Captive Portal access via an external interface.

B.

No action is necessary. This access is available by default.

C.

Change the Identity Awareness settings under Global Properties to allow Captive Portal access on all interfaces.

D.

Change the Identity Awareness settings under Global Properties to allow Captive Portal access for an external interface.

Full Access
Question # 7

Users with Identity Awareness Agent installed on their machines login with __________, so that when the user logs into the domain, that information is also used to meet Identity Awareness credential requests.

A.

Key-logging

B.

ICA Certificates

C.

SecureClient

D.

Single Sign-On

Full Access
Question # 8

Complete this statement from the options provided. Using Captive Portal, unidentified users may be either; blocked, allowed to enter required credentials, or required to download the _____________.

A.

Identity Awareness Agent

B.

Full Endpoint Client

C.

ICA Certificate

D.

SecureClient

Full Access
Question # 9

Which Check Point tool allows you to open a debug file and see the VPN packet exchange details.

A.

PacketDebug.exe

B.

VPNDebugger.exe

C.

IkeView.exe

D.

IPSECDebug.exe

Full Access
Question # 10

You are trying to configure Directional VPN Rule Match in the Rule Base. But the Match column does not have the option to see the Directional Match. You see the following window.

What must you enable to see the Directional Match?

A.

directional_match(true) in the objects_5_0.C file on Security Management Server

B.

VPN Directional Match on the Gateway object’s VPN tab

C.

VPN Directional Match on the VPN advanced window, in Global Properties

D.

Advanced Routing on each Security Gateway

Full Access
Question # 11

You are responsible for the configuration of MegaCorp’s Check Point Firewall. You need to allow two NAT rules to match a connection. Is it possible? Give the BEST answer.

A.

No, it is not possible to have more than one NAT rule matching a connection. When the firewall receives a packet belonging to a connection, it compares it against the first rule in the Rule Base, then the second rule, and so on. When it finds a rule that matches, it stops checking and applies that rule.

B.

Yes, it is possible to have two NAT rules which match a connection, but only in using Manual NAT (bidirectional NAT).

C.

Yes, there are always as many active NAT rules as there are connections.

D.

Yes, it is possible to have two NAT rules which match a connection, but only when using Automatic NAT (bidirectional NAT).

Full Access
Question # 12

Which Check Point address translation method allows an administrator to use fewer ISP-assigned IP addresses than the number of internal hosts requiring Internet connectivity?

A.

Hide

B.

Static Destination

C.

Static Source

D.

Dynamic Destination

Full Access
Question # 13

To run GAiA in 64bit mode, which of the following is true?

1) Run set edition default 64-bit.

2) Install more than 4 GB RAM.

3) Install more than 4 TB of Hard Disk.

A.

1 and 3

B.

1 and 2

C.

2 and 3

D.

1, 2, and 3

Full Access
Question # 14

When a packet is flowing through the security gateway, which one of the following is a valid inspection path?

A.

Acceleration Path

B.

Small Path

C.

Firewall Path

D.

Medium Path

Full Access
Question # 15

Study the Rule base and Client Authentication Action properties screen -

After being authenticated by the Security Gateway, when a user starts an HTTP connection to a Web site, the user tries to FTP to another site using the command line. What happens to the user? The:

A.

user is prompted for authentication by the Security Gateway again.

B.

FTP data connection is dropped after the user is authenticated successfully.

C.

user is prompted to authenticate from that FTP site only, and does not need to enter his username and password for Client Authentication.

D.

FTP connection is dropped by Rule 2.

Full Access
Question # 16

Review the rules.

Assume domain UDP is enabled in the impled rules.

What happens when a user from the internal network tries to browse to the internet using HTTP? The user:

A.

can connect to the Internet successfully after being authenticated.

B.

is prompted three times before connecting to the Internet successfully.

C.

can go to the Internet after Telnetting to the client authentication daemon port 259.

D.

can go to the Internet, without being prompted for authentication.

Full Access
Question # 17

Security Gateway R77 supports User Authentication for which of the following services? Select the response below that contains the MOST correct list of supported services.

A.

SMTP, FTP, TELNET

B.

SMTP, FTP, HTTP, TELNET

C.

FTP, HTTP, TELNET

D.

FTP, TELNET

Full Access
Question # 18

The third-shift Administrator was updating Security Management Server access settings in Global Properties. He managed to lock all administrators out of their accounts. How should you unlock these accounts?

A.

Delete the file admin.lock in the Security Management Server directory $FWDIR/tmp/.

B.

Reinstall the Security Management Server and restore using upgrade_import.

C.

Type fwm lock_admin -ua from the Security Management Server command line.

D.

Login to SmartDashboard as the special cpconfig_admin user account; right-click on each administrator object and select unlock.

Full Access
Question # 19

Many companies have defined more than one administrator. To increase security, only one administrator should be able to install a Rule Base on a specific Firewall. How do you configure this?

A.

Define a permission profile in SmartDashboard with read/write privileges, but restrict it to all other firewalls by placing them in the Policy Targets field. Then, an administrator with this permission profile cannot install a policy on any Firewall not listed here.

B.

Put the one administrator in an Administrator group and configure this group in the specific Firewall object in Advanced > Permission to Install.

C.

In the object General Properties representing the specific Firewall, go to the Software Blades product list and select Firewall. Right-click in the menu, select Administrator to Install to define only this administrator.

D.

Right-click on the object representing the specific administrator, and select that Firewall in Policy Targets.

Full Access
Question # 20

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to a set of designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned a static IP address 10.0.0.19.

He has received a new laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop with a static IP (10.0.0.19).

He wants to move around the organization and continue to have access to the HR Web Server. To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources, and installs the policy.

2) Adds an access role object to the Firewall Rule Base that lets John Adams access the HR Web Server from any machine and from any location and installs policy.

John plugged in his laptop to the network on a different network segment and was not able to connect to the HR Web server. What is the next BEST troubleshooting step?

A.

Investigate this as a network connectivity issue

B.

Install the Identity Awareness Agent

C.

Set static IP to DHCP

D.

After enabling Identity Awareness, reboot the gateway

Full Access
Question # 21

What happens if the identity of a user is known?

A.

If the user credentials do not match an Access Role, the system displays the Captive Portal.

B.

If the user credentials do not match an Access Role, the system displays a sandbox.

C.

If the user credentials do not match an Access Role, the traffic is automatically dropped.

D.

If the user credentials match an Access Role, the rule is applied and traffic is accepted or dropped based on the defined action.

Full Access
Question # 22

When do modifications to the Event Policy take effect?

A.

As soon as the Policy Tab window is closed.

B.

When saved on the SmartEvent Server and installed to the Correlation Units.

C.

When saved on the Correlation Units, and pushed as a policy.

D.

When saved on the SmartEvent Client, and installed on the SmartEvent Server.

Full Access
Question # 23

MegaCorp is using SmartCenter Server with several gateways. Their requirements result in a heavy log load. Would it be feasible to add the SmartEvent Correlation Unit and SmartEvent Server to their SmartCenter Server?

A.

No. SmartCenter SIC will interfere with the function of SmartEvent.

B.

No. If SmartCenter is already under stress, the use of a separate server for SmartEvent is recommended.

C.

No, SmartEvent and Smartcenter cannot be installed on the same machine at the same time.

D.

Yes. SmartEvent must be installed on your SmartCenter Server.

Full Access
Question # 24

MegaCorp is running Smartcenter R70, some Gateways at R65 and some other Gateways with R60. Management wants to upgrade to the most comprehensive IPv6 support. What should the administrator do first?

A.

Upgrade Smartcenter to R77 first.

B.

Upgrade R60-Gateways to R65.

C.

Upgrade every unit directly to R77.

D.

Check the ReleaseNotes to verify that every step is supported.

Full Access
Question # 25

Complete this statement. To save interface information before upgrading a Windows Gateway, use command

Full Access
Question # 26

Select the correct statement about Secure Internal Communications (SIC) Certificates. SIC Certificates:

A.

Are used for securing internal network communications between the SmartDashboard and the Security Management Server.

B.

For R75 Security Gateways are created during the Security Management Server installation.

C.

Decrease network security by securing administrative communication among the Security Management Servers and the Security Gateway.

D.

Uniquely identify Check Point enabled machines; they have the same function as VPN Certificates.

Full Access
Question # 27

How do you recover communications between your Security Management Server and Security Gateway if you lock yourself out through a rule or policy mis-configuration?

A.

fw unload policy

B.

fw unloadlocal

C.

fw delete all.all@localhost

D.

fwm unloadlocal

Full Access
Question # 28

Fill in the blank with a numeric value. The default port number for standard TCP connections with the LDAP server is

Full Access
Question # 29

Paul has just joined the MegaCorp security administration team. Natalie, the administrator, creates a new administrator account for Paul in SmartDashboard and installs the policy. When Paul tries to login it fails. How can Natalie verify whether Paul’s IP address is predefined on the security management server?

A.

Login to Smart Dashboard, access Properties of the SMS, and verify whether Paul’s IP address is listed.

B.

Type cpconfig on the Management Server and select the option “GUI client List” to see if Paul’s IP address is listed.

C.

Login in to Smart Dashboard, access Global Properties, and select Security Management, to verify whether Paul’s IP address is listed.

D.

Access the WEBUI on the Security Gateway, and verify whether Paul’s IP address is listed as a GUI client.

Full Access
Question # 30

As a Security Administrator, you must refresh the Client Authentication authorization time-out every time a new user connection is authorized. How do you do this? Enable the Refreshable Timeout setting:

A.

in the user object's Authentication screen.

B.

in the Gateway object's Authentication screen.

C.

in the Limit tab of the Client Authentication Action Properties screen.

D.

in the Global Properties Authentication screen.

Full Access