It is impossible to pass Check Point 156-315.77 exam without any help in the short term. Come to Pass4sure soon and find the most advanced, correct and guaranteed Check Point 156-315.77 practice questions. You will get a surprising result by our Improved Check Point Security Expert R77 practice guides.

2016 Dec 156-315.77 dumps

Q381. - (Topic 5) 

Which of the following commands shows full synchronization status? 

A. cphaprob.i list 

B. cphastop 

C. fw ctl pstat 

D. cphaprob.a if 

E. fwhastat 

Answer:


Q382. - (Topic 6) 

You are a SSL VPN Administrator. Your users complain that their Outlook Web Access is running extremely slowly, and their overall browsing experience continues to worsen. You suspect it could be a logging problem. Which of the following log files does Check Point recommend you purge? 

A. httpd*.log 

B. event_ws.log 

C. mod_ws_owd.log 

D. alert_owd.log 

Answer:


Q383. - (Topic 5) 

How should Check Point packages be uninstalled? 

A. In the same order in which the installation wrapper initially installed from. 

B. In the opposite order in which the installation wrapper initially installed them. 

C. In any order, CPsuite must be the last package uninstalled 

D. In any order as long as all packages are removed 

Answer:


Q384. - (Topic 4) 

How could you compare the Fingerprint shown to the Fingerprint on the server? 

A. Run cpconfig, select the Certificate's Fingerprint option and view the fingerprint 

B. Run cpconfig, select the GUI Clients option and view the fingerprint 

C. Run cpconfig, select the Certificate Authority option and view the fingerprint 

D. Run sysconfig, select the Server Fingerprint option and view the fingerprint 

Answer:


Q385. - (Topic 1) 

If no flags are defined during a back up on the Security Management Server, where does the system store the *.tgz file? 

A. /var/opt/backups 

B. /var/backups 

C. /var/CPbackup/backups 

D. /var/tmp/backups 

Answer:


Abreast of the times 156-315.77 free exam questions:

Q386. - (Topic 3) 

Match the VPN-related terms with their definitions: A. A-3,B-2, C-1, D-4 

B. A-3, B-4, C-1, D-2 

C. A-3, B-2, C-4, D-1 

D. A-2, B-3, C-4, D-1 

Answer:


Q387. - (Topic 5) 

How would you configure a rule in a Security Policy to allow SIP traffic from end point Net_Ato end point Net_B, through an NGX Security Gateway? 

A. Net_A/Net_B/sip/accept 

B. Net_A/Net_B/sip and sip_any/accept 

C. Net_A/Net_B/VolP_any/accept 

D. Net_A/Net_BM3lP/accept 

Answer:


Q388. - (Topic 2) 

What configuration change must you make to change an existing ClusterXL cluster object from Multicast to Unicast mode? 

A. Reset Secure Internal Communications (SIC) on the cluster-member objects. Reinstall the Security Policy. 

B. Run cpstop and cpstart, to re-enable High Availability on both objects. Select Pivot mode in cpconfig. 

C. Change the cluster mode to Unicast on the cluster object. Reinstall the Security Policy. 

D. Change the cluster mode to Unicast on each of the cluster-member objects. 

Answer:


Q389. - (Topic 1) 

Typically, when you upgrade the Security Management Server, you install and configure a freshR76installation on a new computer and then migrate the database from the original machine. Which of the following statements are TRUE? 

A. Both machines must have the same number of interfaces installed and configured before migration can be attempted. 

B. The new machine may not have more Check Point products installed than the original Security Management Server. 

C. All product databases are included in the migration. 

D. The Security Management Server on the new machine must be the same or greater than the version on the original machine. 

Answer:


Q390. - (Topic 1) 

Anytime a client initiates a connection to a server, the firewall kernel signals the FWD process using a trap. FWD spawns the ________ child service, which runs the security server. 

A. FWD 

B. FWSD 

C. In.httpd 

D. FWSSD 

Answer:



see more 156-315.77 dumps