Ideas to ccsa 156 215.77
Want to know Ucertify ccsa 156 215.77 Exam practice test features? Want to lear more about Check Point Check Point Certified Security Administrator – GAiA certification experience? Study Certified Check Point 156 215.77 pdf answers to Down to date 156 215.77 pdf questions at Ucertify. Gat a success with an absolute guarantee to pass Check Point 156 215.77 pdf (Check Point Certified Security Administrator – GAiA) test on your first attempt.
Q131. - (Topic 2)
You are a Security Administrator using one Security Management Server managing three different firewalls. One firewall does NOT show up in the dialog box when attempting to install a Security Policy. Which of the following is a possible cause?
A. The firewall has failed to sync with the Security Management Server for 60 minutes.
B. The firewall object has been created but SIC has not yet been established.
C. The firewall is not listed in the Policy Installation Targets screen for this policy package.
D. The license for this specific firewall has expired.
Q132. - (Topic 3)
What happens if the identity of a user is known?
A. If the user credentials do not match an Access Role, the system displays the Captive Portal.
B. If the user credentials do not match an Access Role, the system displays a sandbox.
C. If the user credentials do not match an Access Role, the traffic is automatically dropped.
D. If the user credentials match an Access Role, the rule is applied and traffic is accepted or dropped based on the defined action.
Q133. - (Topic 3)
How can you recreate the Security Administrator account, which was created during initial Management Server installation on GAiA?
A. Export the user database into an ASCII file with fwm dbexport. Open this file with an editor, and delete the Administrator Account portion of the file. You will be prompted to create a new account.
B. Type cpm -a, and provide the existing Administrator’s account name. Reset the Security Administrator’s password.
C. Launch cpconfig and delete the Administrator's account. Recreate the account with the same name.
D. Launch SmartDashboard in the User Management screen, and delete the cpconfig administrator.
Q134. - (Topic 3)
Which of the following actions take place in IKE Phase 2 with Perfect Forward Secrecy disabled?
A. Peers authenticate using certificates or preshared secrets.
B. The DH public keys are exchanged.
C. Each Security Gateway generates a private Diffie-Hellman (DH) key from random pools.
D. Symmetric IPsec keys are generated.
Q135. - (Topic 1)
UDP packets are delivered if they are ___________.
A. referenced in the SAM related dynamic tables
B. a valid response to an allowed request on the inverse UDP ports and IP
C. a stateful ACK to a valid SYN-SYN/ACK on the inverse UDP ports and IP
D. bypassing the kernel by the forwarding layer of ClusterXL
Q136. - (Topic 3)
Your company enforces a strict change control policy. Which of the following would be MOST effective for quickly dropping an attacker's specific active connection?
A. Intrusion Detection System (IDS) Policy install
B. SAM - Suspicious Activity Rules feature of SmartView Monitor
C. Block Intruder feature of SmartView Tracker
D. Change the Rule Base and install the Policy to all Security Gateways
Q137. - (Topic 3)
How many packets does the IKE exchange use for Phase 1 Aggressive Mode?
Q138. - (Topic 3)
What happens when you run the commanD. fw sam -J src [Source IP Address]?
A. Connections to and from the specified target are blocked without the need to change the Security Policy.
B. Connections to and from the specified target are blocked with the need to change the Security Policy.
C. Connections from the specified source are blocked without the need to change the Security Policy.
D. Connections to the specified target are blocked without the need to change the Security Policy.
Q139. - (Topic 3)
Reviewing the Rule Base, you see that ________ is responsible for the client authentication failure.
A. Rule 4
B. Rule 7
C. Rule 8
D. Rule 5
Q140. - (Topic 1)
Which of the following statements is TRUE about management plug-ins?
A. A management plug-in interacts with a Security Management Server to provide new features and support for new products.
B. The plug-in is a package installed on the Security Gateway.
C. Using a plug-in offers full central management only if special licensing is applied to specific features of the plug-in.
D. Installing a management plug-in is just like an upgrade process.