Actualtests offers free demo for 156 215.77 pdf exam. "Check Point Certified Security Administrator – GAiA", also known as exam 156 215.77 exam, is a Check Point Certification. This set of posts, Passing the Check Point checkpoint 156 215.77 exam, will help you answer those questions. The exam 156 215.77 Questions & Answers covers all the knowledge points of the real exam. 100% real Check Point 156 215.77 pdf exams and revised by experts!
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Check Point 156-215.77 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 156-215.77 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/156-215.77-exam-dumps.html
Q191. - (Topic 3)
Which Client Authentication sign-on method requires the user to first authenticate via the User Authentication mechanism, when logging in to a remote server with Telnet?
A. Agent Automatic Sign On
B. Partially Automatic Sign On
C. Standard Sign On
D. Manual Sign On
Answer: B
Q192. - (Topic 2)
You have detected a possible intruder listed in SmartView Tracker's active pane. What is the fastest method to block this intruder from accessing your network indefinitely?
A. In SmartView Monitor, select Tools > Suspicious Activity Rules.
B. Modify the Rule Base to drop these connections from the network.
C. In SmartView Tracker, select Tools > Block Intruder.
D. In SmartDashboard, select IPS > Network Security > Denial of Service.
Answer: C
Q193. - (Topic 3)
Your perimeter Security Gateway’s external IP is 200.200.200.3. Your network diagram shows:
A. Required. Allow only network 192.168.10.0 and 192.168.20.0 to go out to the Internet,
using 200.200.200.5.
The local network 192.168.1.0/24 needs to use 200.200.200.3 to go out to the Internet.
Assuming you enable all the settings in the NAT page of Global Properties, how could you
achieve these requirements?
B. Create network objects for 192.168.10.0/24 and 192.168.20.0/24. Enable Hide NAT on
both network objects, using 200.200.200.5 as hiding IP address. Add an ARP entry for
200.200.200.3 for the MAC address of 200.200.200.5.
C. Create an Address Range object, starting from 192.168.10.1 to 192.168.20.254. Enable
Hide NAT on the NAT page of the address range object. Enter Hiding IP address
200.200.200.5. Add an ARP entry for 200.200.200.5 for the MAC address of
200.200.200.3.
D. Create a network object 192.168.0.0/16. Enable Hide NAT on the NAT page. Enter
200.200.200.5 as the hiding IP address. Add an ARP entry for 200.200.200.5 for the MAC
address of 200.200.200.3.
Create two network objects: 192.168.10.0/24 and 192.168.20.0/24. Add the two network
objects to a group object. Create a manual NAT rule like the following: Original source -group object; Destination - any; Service - any; Translated source - 200.200.200.5;
Destination - original; Service - original.
Answer: B
Q194. - (Topic 3)
Your bank’s distributed R77 installation has Security Gateways up for renewal. Which SmartConsole application will tell you which Security Gateways have licenses that will expire within the next 30 days?
A. SmartView Tracker
B. SmartPortal
C. SmartUpdate
D. SmartDashboard
Answer: A
Q195. - (Topic 3)
You review this Security Policy because Rule 4 is inhibited. Which Rule is responsible? Exhibit:
A. No rule inhibits Rule 4.
B. Rule 1
C. Rule 2
D. Rule 3
Answer: C
Q196. - (Topic 2)
You are working with multiple Security Gateways that enforce an extensive number of rules. To simplify security administration, which one of the following would you choose to do?
A. Create network objects that restrict all applicable rules to only certain networks.
B. Run separate SmartConsole instances to login and configure each Security Gateway directly.
C. Create a separate Security Policy package for each remote Security Gateway.
D. Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.
Answer: C
Q197. - (Topic 3)
How are cached usernames and passwords cleared from the memory of a R77 Security Gateway?
A. By retrieving LDAP user information using the command fw fetchldap.
B. By installing a Security Policy.
C. By using the Clear User Cache button in SmartDashboard.
D. Usernames and passwords only clear from memory after they time out.
Answer: B
Q198. - (Topic 2)
Which of these Security Policy changes optimize Security Gateway performance?
A. Use Automatic NAT rules instead of Manual NAT rules whenever possible.
B. Using domain objects in rules when possible.
C. Using groups within groups in the manual NAT Rule Base.
D. Putting the least-used rule at the top of the Rule Base.
Answer: A
Q199. - (Topic 1)
UDP packets are delivered if they are ___________.
A. referenced in the SAM related dynamic tables
B. a valid response to an allowed request on the inverse UDP ports and IP
C. a stateful ACK to a valid SYN-SYN/ACK on the inverse UDP ports and IP
D. bypassing the kernel by the forwarding layer of ClusterXL
Answer: B
Q200. - (Topic 3)
Security Gateway R77 supports User Authentication for which of the following services? Select the response below that contains the MOST correct list of supported services.
A. FTP, HTTP, TELNET
B. SMTP, FTP, TELNET
C. SMTP, FTP, HTTP, TELNET
D. FTP, TELNET
Answer: A
