A Review Of Realistic 156-315.77 training materials

Considering the variety of types of certification these days covering up almost every computer program offered, it can be tough to know what certification could be important to be able to get plus which often other ones wouldn?¡¥t enjoy the extreme yank you are researching for. In the of people offered, quite a few IT pros experience a Check Point among the the majority of greatly regarded plus respectable certification accessible in the information know-how entire world. So if you feel undecided, Check Point certification may end up being value picking a second examine. Or if you have by now thought i would bring this particular one on, you are well on on your path with an really important plus pleasing credential.

2016 Nov 156-315.77 exams

Q191. - (Topic 5) 

When synchronizing clusters, which of the following statements are true? 

Select all that apply. 

A. Only cluster members running on the same OS platform can be synchronized. 

B. Client Auth or Session Auth connections through a cluster member will be lost of the cluster member fails. 

C. The state of connections using resources is maintained by a Security Server, so these connections cannot be synchronized. 

D. In the case of a failover, accounting information on the failed member may be lost despite a properly 

Answer: A,B,C 


Q192. - (Topic 5) 

You are using SmartUpdate to fetch data and perform a remote upgrade of an NGX Security Gateway. 

Which of the following statements is FALSE? 

A. If SmartDashboard is open during package upload and upgrade, the upgrade will fail. 

B. A remote installation can be performed without the SVN Foundation package installed on a remote NG with Application Intelligence Security Gateway 

C. SmartUpdate can query the SmartCenter Server and VPN-1 Gateway for product information 

D. SmartUpdate can query license information running locally on the VPN-1 Gateway 

Answer:


Q193. - (Topic 5) 

When you add a resource service to a rule, which ONE of the following actions occur? 

A. VPN-1 Secure Client users attempting to connect to the object defined in the Destination column of the rule will receive a new Desktop Policy from the resource. 

B. All packets that match the resource in the rule will be dropped. 

C. All packets matching the resource service rule are analyzed or authenticated, based on the resource properties. 

D. Users attempting to connect to the destination of the rule will be required to authenticate. 

E. All packets matching that rule are either encrypted or decrypted by the defined resource. 

Answer:


Q194. - (Topic 4) 

Jerry is concerned that a denial-oF. service (DoS) attack may affect his VPN Communities. He decides to implement IKE DoS protection. Jerry needs to minimize the performance impact of implementing this new protection. Which of the following configurations is MOST appropriate for Jerry? 

A. Set Support IKE DoS protection from identified source to "Puzzles", and Support IKE DoS protection from unidentified source to "Stateless". 

B. Set Support IKE Dos Protection from identified source, and Support IKE DoS protection from unidentified source to "Puzzles". 

C. Set Support IKE DoS protection from identified source to "Stateless," and Support IKE DoS protection from unidentified source to "Puzzles". 

D. Set "Support IKE DoS protection" from identified source, and "Support IKE DoS protection" from unidentified source to "Stateless". 

E. Set Support IKE DoS protection from identified source to "Stateless", and Support IKE DoS protection from unidentified source to "None". 

Answer:


Q195. - (Topic 4) 

How does a standby SmartCenter Server receive logs from all Security Gateways, when an active SmartCenter Server fails over? 

A. The remote Gateways must set up SIC with the secondary SmartCenter Server, for logging. 

B. Establish Secure Internal Communications (SIC) between the primary and secondary Servers. The secondary Server can then receive logs from the Gateways, when the active Server fails over. 

C. On the Log Servers screen (from the Logs and Masters tree on the gateway object's General Properties screen), add the secondary SmartCenter Server object as the additional log server. Reinstall the Security Policy. 

D. Create a Check Point host object to represent the standby SmartCenter Server. Then select "Secondary SmartCenter Server" and Log Server", from the list of Check Point Products on the General properties screen. 

E. The secondary Server's host name and IP address must be added to the Masters file, on the remote Gateways. 

Answer:


Up to date 156-315.77 exam guide:

Q196. - (Topic 3) 

You are concerned that the processor for your firewall running NGX R71Secure Platformmay be overloaded. What file would you view to determine the speed of your processor(s)? 

A. cat /etc/cpuinfo 

B. cat /proc/cpuinfo 

C. cat /var/opt/CPsuite-R71/fw1/conf/cpuinfo 

D. cat /etc/sysconfig/cpuinfo 

Answer:


Q197. - (Topic 6) 

Domain name can NOT be changed inSmart Provisioningand Domain Name is grayed out. What is a possible reason for this? 

A. There is noSmart Provisioninglicense installed. 

B. Profile is not assigned to any Gateway. 

C. Override profile setting on device level is set to Mandatory. 

D. Domain name settings are always fetched from firewall object. 

Answer:


Q198. - (Topic 1) 

Which of the following statements accurately describes theupgrade exportcommand? 

A. Used primarily when upgrading the Security Management Server,upgrade exportstores all object databases and the conf directories for importing to a newer version of the Security Gateway. 

B. Used when upgrading the Security Gateway,upgrade exportincludes modified files, such as in the directories /lib and /conf. 

C. upgrade exportis used when upgrading the Security Gateway, and allows certain files to be included or excluded before exporting. 

D. upgrade exportstores network-configuration data, objects, global properties, and the database revisions prior to upgrading the Security Management Server. 

Answer:


Q199. - (Topic 6) 

How is Smart Workflow disabled? 

A. In cpconfig, choose Disable Smart Workflow from the menu 

B. InSmart ViewTracker, click onSmart Workflow> Disable Smart Workflow 

C. InSmart Dashboard, click on View > Smart Workflow > Disable Smart Workflow 

D. Open Smart Workflow as admin. Create new session and name it Disable Smart Workflow. InSmart Dashboardclick Smart Workflow > Disable Smart Workflow, click OK in the warning box, click Save and Continue 

Answer:


Q200. - (Topic 3) 

Your customer complains of the weak performance of his systems. He has heard that Connection Templates accelerate traffic. How do you explain to the customer about template restrictions and how to verify that they are enabled? 

A. To enhance connection-establishment acceleration, a mechanism attempts to "group together" all connections that match a particular service and whose sole discriminating element is the source port. To test if connection templates are enabled, use the command fwaccel stat. 

B. To enhance connection-establishment acceleration, a mechanism attempts to "group together" all connections that match a particular service and whose sole discriminating element is the destination port. To test if connection templates are enabled, use the command fwacel templates. 

C. To enhance connection-establishment acceleration, a mechanism attempts to "group together" all connections that match a particular service and whose sole discriminating element is the destination port. To test if connection templates are enabled, use the command fw ctl templates. 

D. To enhance connection-establishment acceleration, a mechanism attempts to "group together" all connections that match a particular service and whose sole discriminating element is the source port. To test if connection templates are enabled, use the command fw ctl templates. 

Answer:

235. - (Topic 3) 

There are times when you want to use Link Selection to manage high-traffic VPN connections. With Link Selection you can: 

A. Assign links to specific VPN communities. 

B. Assign links to use Dynamic DNS. 

C. Use links based on services. 

D. Prohibit Dynamic DNS. 

Answer:



see more 156-315.77 dumps