Facts about exam 156 215.77
Proper study guides for Renew Check Point Check Point Certified Security Administrator – GAiA certified begins with Check Point checkpoint 156 215.77 preparation products which designed to deliver the Top Quality exam 156 215.77 questions by making you pass the 156 215.77 pdf test at your first time. Try the free checkpoint 156 215.77 demo right now.
Q11. - (Topic 3)
Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use her iPad to access the internal Finance Web server. Because the iPad is not a member of the Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter her AD credentials in the Captive Portal and then get the same access as on her office computer. Her access to resources is based on rules in the R77 Firewall Rule Base.
To make this scenario work, the IT administrator must:
1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity Sources.
2) In the Portal Settings window in the User Access section, make sure that Name and password login is selected.
3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network destinations. Select accept as the Action.
Ms. McHanry tries to access the resource but is unable. What should she do?
A. Have the security administrator select the Action field of the Firewall Rule "Redirect HTTP connections to an authentication (captive) portal"
B. Install the Identity Awareness agent on her iPad
C. Have the security administrator reboot the firewall
D. Have the security administrator select Any for the Machines tab in the appropriate Access Role
Q12. - (Topic 3)
If a Security Gateway enforces three protections, LDAP Injection, Malicious Code Protector, and Header Rejection, which Check Point license is required in SmartUpdate?
A. SmartEvent Intro
C. SSL: VPN
D. Data Loss Prevention
Q13. - (Topic 3)
The User Directory Software Blade is used to integrate which of the following with Security Gateway R77?
A. Account Management Client server
B. RADIUS server
C. LDAP server
D. UserAuthority server
Q14. - (Topic 1)
Suppose the Security Gateway hard drive fails and you are forced to rebuild it. You have a snapshot file stored to a TFTP server and backups of your Security Management Server. What is the correct procedure for rebuilding the Gateway quickly?
A. Run the command revert to restore the snapshot. Reinstall any necessary Check Point products. Establish SIC and install the Policy.
B. Reinstall the base operating system (i.e., SecurePlatform). Configure the Gateway interface so that the Gateway can communicate with the TFTP server. Revert to the stored snapshot image, and install the Security Policy.
C. Run the command revert to restore the snapshot, establish SIC, and install the Policy.
D. Reinstall the base operating system (i.e., SecurePlatform). Configure the Gateway interface so that the Gateway can communicate with the TFTP server. Reinstall any necessary Check Point products and previously applied hotfixes. Revert to the stored snapshot image, and install the Policy.
Q15. - (Topic 2)
In SmartDashboard, Translate destination on client side is checked in Global Properties. When Network Address Translation is used:
A. VLAN tagging cannot be defined for any hosts protected by the Gateway.
B. The Security Gateway's ARP file must be modified.
C. It is not necessary to add a static route to the Gateway's routing table.
D. It is necessary to add a static route to the Gateway's routing table.
Q16. - (Topic 1)
A snapshot delivers a complete SecurePlatform backup. The resulting file can be stored on servers or as a local file in /var/CPsnapshot/snapshots. How do you restore a local snapshot named MySnapshot.tgz?
A. As expert user, type the command revert --file MySnapshot.tgz.
B. As expert user, type the command snapshot -r MySnapshot.tgz.
C. As expert user, type the command snapshot - R to restore from a local file. Then, provide the correct file name.
D. Reboot the system and call the start menu. Select the option Snapshot Management, provide the Expert password and select [L] for a restore from a local file. Then, provide the correct file name.
Q17. - (Topic 1)
When you use the Global Properties' default settings on R77, which type of traffic will be dropped if NO explicit rule allows the traffic?
A. Firewall logging and ICA key-exchange information
B. RIP traffic
C. Outgoing traffic originating from the Security Gateway
D. SmartUpdate connections
Q18. - (Topic 3)
Central license management allows a Security Administrator to perform which of the following functions?
Check for expired licenses.
Sort licenses and view license properties.
Attach both R77 Central and Local licesnes to a remote module.
Delete both R77 Local Licenses and Central licenses from a remote module.
Add or remove a license to or from the license repository.
Attach and/or delete only R77 Central licenses to a remote module (not Local licenses).
A. 1, 2, 3, 4, & 5
B. 2, 3, 4, & 5
C. 2, 5, & 6
D. 1, 2, 5, & 6
Q19. - (Topic 3)
You review this Security Policy because Rule 4 is inhibited.
Which Rule is responsible?
A. Rule 1
B. Rule 2
C. Rule 3
D. No rule inhibits Rule 4.
Q20. - (Topic 3)
Where does the security administrator activate Identity Awareness within SmartDashboard?
A. LDAP Server Object > General Properties
B. Gateway Object > General Properties
C. Policy > Global Properties > Identity Awareness
D. Security Management Server > Identity Awareness