Shortcuts To 156-115.77(51 to 60)

Check Point 156-115.77 solutions, 156-115.77 recognition issues, Recent times, Check Point becomes more and more well known. And Check Point 156-115.77 examination may be very get accustomed to individuals who are exciting during the i . t site. When someone desires to go away the Check Point 156-115.77 examination, and find the Check Point recognition productively, need to opt for Check Point 156-115.77 evaluation Q&As for preparation elements cautiously.

2021 Jan 156-115.77 real exam

Q51. - (Topic 11) 

What is the limit to the number of VPN directions that can be configured in a single rule? 

A. There is no limit. 

B. It is limited to the number of communities that exist in your dashboard. 

C. You may only configure one direction per rule. 

D. After configuring ten you must use a standard bi-directional condition. 


Q52. - (Topic 9) 

Which of the following CANNOT be used as a source/destination for an IPS network exception? 

A. Network Group 

B. Identity Awareness Access Role 

C. Any 

D. IP Address 


Q53. - (Topic 2) 

Since R76 GAiA, what is the method for configuring proxy ARP entries for manual NAT rules? 

A. WebUI or add proxy ARP ... commands via CLISH 

B. SmartView Tracker 

C. local.arp file 

D. SmartDashboard 


Q54. - (Topic 9) 

Where do you run the command from? 

A. $FWDIR/conf on the Management Server 

B. $FWDIR/scripts on the Management Server 

C. $FWDIR/conf on the gateway 

D. $FWDIR/scripts on the gateway 


Q55. - (Topic 1) 

John is a Security Administrator of a Check Point platform. He has a mis-configuration issue that points to the Rule Base. To obtain information about the issue, John runs the command: 

A. fw debug fw on and checks the file fwm.elg. 

B. fw kdebug fwm on and checks the file fwm.elg. 

C. fw debug fwm on and checks the file fwm.elg. 

D. fw kdebug fwm on and checks the file fw.elg. 


27. - (Topic 1) 

True or False: Software blades perform their inspection primarily through the kernel chain modules. 

A. False. Software blades do not pass through the chain modules. 

B. True. Many software blades have their own dedicated kernel chain module for inspection. 

C. True. All software blades are inspected by the IP Options chain module. 

D. True. Most software blades are inspected by the TCP streaming or Passive Streaming chain module. 


Regenerate 156-115.77 exams:

Q56. - (Topic 11) 

How can an administrator stay up-to-date on the status of their VPN Tunnels? 

A. Tracking settings can be configured on the Tunnel Management screen of the Community Properties screen for all VPN tunnels. 

B. Make a change in /proc/net/tun. 

C. Run vpn tu and select the option Live Monitoring. 

D. In Smartview Tracker. 


277. - (Topic 11) 

Where do you enable Route-based VPN? 

A. WebUI 

B. VPN shell 

C. Security Gateway Object 

D. vpn_route.conf 


Q57. - (Topic 1) 

The command that lists the firewall kernel modules on a Security Gateway is: 

A. fw list kernel modules 

B. fw ctl kernel chain 

C. fw ctl debug -m 

D. fw list modules 


Q58. - (Topic 11) 

Which technology is not supported with route-based VPNs? 

A. Unnumbered VTI 

B. Numbered VTI 

C. IKEv2 



Q59. - (Topic 6) 

In an HA cluster, you modify the number of cores given to CoreXL on only one member using cpconfig and then issue a reboot. What is the expected ClusterXL status of this 

member when it comes up? 

A. Standby 

B. Ready 

C. Active 

D. Down 


Q60. - (Topic 11) 

In Check Point, Domain-based VPN's take precedence over route-based VPN. If implementing a route-based VPN, what is one configuration step you must make on the gateway object taking part in the route-based VPN? 

A. You should remove the gateway from all communities. 

B. Check Point does not support route-based VPN's. 

C. You need to create a new simple group with no objects in it and apply this as the VPN domain under that gateway's topology tab. 

D. You should check the "Use route-based VPN" checkbox in the community properties. 


see more 156-115.77 dumps