The Only Tip You Need: ccsa dump

If you are currently our Check Point 156-215.77 exam consumer, you can locate everything available in Pdf files. They are also printable as well as downloadable for free. The Check Point 156-215.77 examination engine software is also downloadable. It can develop almost actual test surrounding. It is possible to learn by means of our Check Point 156-215.77 practice questions as well as answers.

2017 Feb 156-215.77:

Q171. - (Topic 1) 

When Jon first installed his new security system, he forgot to configure DNS servers on his Security Gateway. How could Jon configure DNS servers now that his Security Gateway is in production? 

A. Login to the SmartDashboard, edit the firewall Gateway object, select the tab Interfaces > Domain Name Servers. 

B. Login to the firewall using SSH and run cpconfig, then select Domain Name Servers. 

C. Login to the firewall using SSH and run fwm, then select System Configuration > Domain Name Servers. 

D. Login to the firewall using SSH and run sysconfig, then select Domain Name Servers. 

Answer:


Q172. - (Topic 3) 

Which of these attributes would be critical for a site-to-site VPN? 

A. Strong data encryption 

B. Centralized management 

C. Scalability to accommodate user groups 

D. Strong authentication 

Answer:


Q173. - (Topic 1) 

Message digests use which of the following? 

A. SHA-1 and MD5 

B. IDEA and RC4 

C. SSL and MD4 

D. DES and RC4 

Answer:


Q174. - (Topic 3) 

An Administrator without access to SmartDashboard installed a new IPSO-based R77 Security Gateway over the weekend. He e-mailed you the SIC activation key. You want to confirm communication between the Security Gateway and the Management Server by installing the Policy. What might prevent you from installing the Policy? 

A. An intermediate local Security Gateway does not allow a policy install through it to the remote new Security Gateway appliance. Resolve by running the command fw unloadlocal on the local Security Gateway. 

B. You first need to run the command fw unloadlocal on the R77 Security Gateway appliance in order to remove the restrictive default policy. 

C. You first need to create a new Gateway object in SmartDashboard, establish SIC via the Communication button, and define the Gateway’s topology. 

D. You have not established Secure Internal Communications (SIC) between the Security Gateway and Management Server. You must initialize SIC on the Security Management Server. 

Answer:


Q175. - (Topic 3) 

Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use her iPad to access the internal Finance Web server. Because the iPad is not a member of the Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter her AD credentials in the Captive Portal and then get the same access as on her office computer. Her access to resources is based on rules in the R77 Firewall Rule Base. 

To make this scenario work, the IT administrator must: 

1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity Sources. 

2) In the Portal Settings window in the User Access section, make sure that Name and password login is selected. 

3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network destinations. Select accept as the Action. 

Ms. McHanry tries to access the resource but is unable. What should she do? 

A. Have the security administrator select the Action field of the Firewall Rule "Redirect HTTP connections to an authentication (captive) portal" 

B. Install the Identity Awareness agent on her iPad 

C. Have the security administrator reboot the firewall 

D. Have the security administrator select Any for the Machines tab in the appropriate Access Role 

Answer:


Avant-garde ccsa exam code:

Q176. - (Topic 2) 

What must a Security Administrator do to comply with a management requirement to log all traffic accepted through the perimeter Security Gateway? 

A. Install the View Implicit Rules package using SmartUpdate. 

B. Define two log servers on the R77 Gateway object. Enable Log Implied Rules on the first log server. Enable Log Rule Base on the second log server. Use SmartReporter to merge the two log server records into the same database for HIPPA log audits. 

C. In Global Properties > Reporting Tools check the box Enable tracking all rules (including rules marked as None in the Track column). Send these logs to a secondary log server for a complete logging history. Use your normal log server for standard logging for troubleshooting. 

D. Check the Log Implied Rules Globally box on the R77 Gateway object. 

Answer:


Q177. - (Topic 1) 

Many companies have defined more than one administrator. To increase security, only one administrator should be able to install a Rule Base on a specific Firewall. How do you configure this? 

A. Define a permission profile in SmartDashboard with read/write privileges, but restrict it to all other firewalls by placing them in the Policy Targets field. Then, an administrator with this permission profile cannot install a policy on any Firewall not listed here. 

B. Put the one administrator in an Administrator group and configure this group in the specific Firewall object in Advanced > Permission to Install. 

C. Right-click on the object representing the specific administrator, and select that Firewall in Policy Targets. 

D. In the object General Properties representing the specific Firewall, go to the Software Blades product list and select Firewall. Right-click in the menu, select Administrator to Install to define only this administrator. 

Answer:


Q178. - (Topic 1) 

When you change an implicit rule's order from Last to First in Global Properties, how do you make the change take effect? 

A. Run fw fetch from the Security Gateway. 

B. Select Install Database from the Policy menu. 

C. Reinstall the Security Policy. 

D. Select Save from the File menu. 

Answer:


Q179. - (Topic 3) 

Choose the BEST sequence for configuring user management in SmartDashboard, using an LDAP server. 

A. Configure a server object for the LDAP Account Unit, and create an LDAP resource object. 

B. Enable User Directory in Global Properties, configure a host-node object for the LDAP server, and configure a server object for the LDAP Account Unit. 

C. Configure a workstation object for the LDAP server, configure a server object for the LDAP Account Unit, and enable LDAP in Global Properties. 

D. Configure a server object for the LDAP Account Unit, enable LDAP in Global Properties, and create an LDAP resource object. 

Answer:


Q180. - (Topic 2) 

After implementing Static Address Translation to allow Internet traffic to an internal Web Server on your DMZ, you notice that any NATed connections to that machine are being dropped by anti-spoofing protections. Which of the following is the MOST LIKELY cause? 

A. The Global Properties setting Translate destination on client side is checked. But the topology on the DMZ interface is set to Internal - Network defined by IP and Mask. Uncheck the Global Properties setting Translate destination on client side. 

B. The Global Properties setting Translate destination on client side is unchecked. But the topology on the external interface is set to Others +. Change topology to External. 

C. The Global Properties setting Translate destination on client side is checked. But the topology on the external interface is set to External. Change topology to Others +. 

D. The Global Properties setting Translate destination on client side is unchecked. But the topology on the DMZ interface is set to Internal - Network defined by IP and Mask. Check the Global Properties setting Translate destination on client side. 

Answer:



see more 156-215.77 dumps