How to pass ccsa 156 215.77 in Feb 2018

Proper study guides for Avant-garde Check Point Check Point Certified Security Administrator – GAiA certified begins with Check Point checkpoint 156 215.77 preparation products which designed to deliver the Accurate 156 215.77 pdf questions by making you pass the checkpoint 156 215.77 test at your first time. Try the free ccsa 156 215.77 demo right now.

Q151. - (Topic 3) 

When using GAiA, it might be necessary to temporarily change the MAC address of the interface eth 0 to 00:0C:29:12:34:56. After restarting the network the old MAC address should be active. How do you configure this change? 

As expert user, issue these commands: 

A. Edit the file /etc/sysconfig/netconf.C and put the new MAC address in the field 

B. As expert user, issue the command: 

C. # IP link set eth0 addr 00:0C:29:12:34:56 

D. Open the WebUI, select Network > Connections > eth0. Place the new MAC address in the field Physical Address, and press Apply to save the settings. 

Answer:


Q152. - (Topic 2) 

What CANNOT be configured for existing connections during a policy install? 

A. Reset all connections 

B. Re-match connections 

C. Keep all connections D. Keep data connections 

Answer:


Q153. - (Topic 1) 

You are the Security Administrator for MegaCorp. A Check Point firewall is installed and in use on a platform using GAiA. You have trouble configuring the speed and duplex settings of your Ethernet interfaces. Which of the following commands can be used in Expert Mode to configure the speed and duplex settings of an Ethernet interface and will survive a reboot? Give the BEST answer. 

A. eth_set 

B. mii_tool 

C. ifconfig -a 

D. ethtool 

Answer:


Q154. - (Topic 2) 

Which NAT option applicable for Automatic NAT applies to Manual NAT as well? 

A. Translate destination on client-side 

B. Enable IP Pool NAT 

C. Allow bi-directional NAT 

D. Automatic ARP configuration 

Answer:


Q155. - (Topic 2) 

Which answers are TRUE? Automatic Static NAT CANNOT be used when: 

1) NAT decision is based on the destination port. 

2) Both Source and Destination IP's have to be translated. 

3) The NAT rule should only be installed on a dedicated Gateway. 

4) NAT should be performed on the server side. 

A. 2 and 3 

B. 1, 3, and 4 

C. 1 and 2 

D. 2 and 4 

Answer:


Q156. - (Topic 3) 

Your boss wants you to closely monitor an employee suspected of transferring company secrets to the competition. The IT department discovered the suspect installed a WinSCP client in order to use encrypted communication. Which of the following methods is BEST to accomplish this task? 

A. Use SmartView Tracker to follow his actions by filtering log entries that feature the WinSCP destination port. Then, export the corresponding entries to a separate log file for documentation. 

B. Watch his IP in SmartView Monitor by setting an alert action to any packet that matches your Rule Base and his IP address for inbound and outbound traffic. 

C. Send the suspect an email with a keylogging Trojan attached, to get direct information about his wrongdoings. 

D. Use SmartDashboard to add a rule in the firewall Rule Base that matches his IP address, and those of potential targets and suspicious protocols. Apply the alert action or customized messaging. 

Answer:


Q157. - (Topic 3) 

Your manager requires you to setup a VPN to a new business partner site. The administrator from the partner site gives you his VPN settings and you notice that he setup AES 128 for IKE phase 1 and AES 256 for IKE phase 2. Why is this a problematic setup? 

A. All is fine as the longest key length has been chosen for encrypting the data and a shorter key length for higher performance for setting up the tunnel. 

B. All is fine and can be used as is. 

C. The two algorithms do not have the same key length and so don't work together. You will get the error …. No proposal chosen…. 

D. Only 128 bit keys are used for phase 1 keys which are protecting phase 2, so the longer key length in phase 2 only costs performance and does not add security due to a shorter key in phase 1. 

Answer:


Q158. - (Topic 1) 

Which of the following describes the default behavior of an R77 Security Gateway? 

A. Traffic is filtered using controlled port scanning. 

B. IP protocol types listed as secure are allowed by default, i.e. ICMP, TCP, UDP sessions are inspected. 

C. All traffic is expressly permitted via explicit rules. 

D. Traffic not explicitly permitted is dropped. 

Answer:


Q159. - (Topic 1) 

When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component? 

A. SecureClient 

B. Security Gateway 

C. None, Security Management Server would be installed by itself. 

D. SmartConsole 

Answer:


Q160. - (Topic 2) 

You have configured Automatic Static NAT on an internal host-node object. You clear the box Translate destination on client site from Global Properties > NAT. Assuming all other NAT settings in Global Properties are selected, what else must be configured so that a host on the Internet can initiate an inbound connection to this host? 

A. A proxy ARP entry, to ensure packets destined for the public IP address will reach the Security Gateway's external interface. 

B. No extra configuration is needed. 

C. The NAT IP address must be added to the external Gateway interface anti-spoofing group. 

D. A static route, to ensure packets destined for the public NAT IP address will reach the Gateway's internal interface. 

Answer: