1 / 6

CheckPoint 156-215.77 Exam Best Study Guide - 156-215.77 Exam Questions Answers

Quality of 156-215.77 Real Exam Dumps cannot be challenged as it has been designed by the experts. Realexamdumps.com has elevated its regard by providing students the material that leads them to the success.156-215.77 Braindumps is the most reliable and handy material that fulfills all the requirements of the exam.This material can be downloaded in PDF form. Demo questions are also available if you confirmation of the quality.We are also providing online testing engine that will train you to perform by your best in the final.You will repeat the practice test and will get a stronger grip over your knowledge with each try.If you fail to pass your exam then your money will be returned according to our policy.You can ask for any further information at Realexamdumps.com.<br>For More Info :https://www.realexamdumps.com/checkpoint/156-215-77-braindumps.html<br>

dugdug323
Télécharger la présentation

CheckPoint 156-215.77 Exam Best Study Guide - 156-215.77 Exam Questions Answers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Checkpoint Exam 156-215.77 Check Point Certified Security Administrator Verson: Demo [ Total Questions: 10 ]

  2. Topic 1, Volume A Question No : 1 - (Topic 1) Your internal network is configured to be 10.1.1.0/24. This network is behind your perimeter R77 Gateway, which connects to your ISP provider. How do you configure the Gateway to allow this network to go out to the Internet? A. Use Hide NAT for network 10.1.1.0/24 behind the external IP address of your perimeter Gateway. B. Use Hide NAT for network 10.1.1.0/24 behind the internal interface of your perimeter Gateway. C. Use automatic Static NAT for network 10.1.1.0/24. D. Do nothing, as long as 10.1.1.0 network has the correct default Gateway. Answer: A Question No : 2 - (Topic 1) Tom has been tasked to install Check Point R77 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations? A. Three machines B. One machine C. Two machines D. One machine, but it needs to be installed using SecurePlatform for compatibility purposes Answer: C Question No : 3 - (Topic 1) You have detected a possible intruder listed in SmartView Tracker’s active pane. What is the fastest method to block this intruder from accessing your network indefinitely? A. Modify the Rule Base to drop these connections from the network. B. In SmartView Tracker, select Tools > Block Intruder.

  3. C. In SmartView Monitor, select Tools > Suspicious Activity Rules. D. In SmartDashboard, select IPS > Network Security > Denial of Service. Answer: B Topic 2, Volume B Question No : 4 - (Topic 2) How many packets does the IKE exchange use for Phase 1 Aggressive Mode? A. 12 B. 6 C. 3 D. 1 Answer: C Question No : 5 - (Topic 2) Which of the following allows administrators to allow or deny traffic to or from a specific network based on the user’s credentials? A. Access Policy B. Access Role C. Access Rule D. Access Certificate Answer: B Question No : 6 - (Topic 2) The User Directory Software Blade is used to integrate which of the following with Security Gateway R77? A. RADIUS server B. Account Management Client server

  4. C. UserAuthority server D. LDAP server Answer: D Question No : 7 - (Topic 2) You want to establish a VPN, using certificates. Your VPN will exchange certificates with an external partner. Which of the following activities should you do first? A. Create a new logical-server object to represent your partner’s CA. B. Exchange exported CA keys and use them to create a new server object to represent your partner’s Certificate Authority (CA). C. Manually import your partner’s Certificate Revocation List. D. Manually import your partner’s Access Control List. Answer: B Topic 3, Volume C Question No : 8 - (Topic 3) Where is the fingerprint generated, based on the output display? Exhibit:

  5. A. SmartConsole B. SmartUpdate C. Security Management Server D. SmartDashboard Answer: C Question No : 9 - (Topic 3) Which of the following is NOT defined by an Access Role object? A. Source Network B. Source Machine C. Source User D. Source Server

  6. Answer: D Question No : 10 - (Topic 3) Can you use Captive Portal with HTTPS? A. No, it only works with FTP B. No, it only works with FTP and HTTP C. Yes D. No, it only works with HTTP Answer: C 156-215.77 Exam Dumps

More Related