Tips to Pass 156-315.77 Exam (231 to 240)

Verified of 156-315.77 braindumps materials and faq for Check Point certification for IT learners, Real Success Guaranteed with Updated 156-315.77 pdf dumps vce Materials. 100% PASS Check Point Security Expert R77 exam Today!

Q231. - (Topic 4) 

Your organization has many VPN-1 Edge gateways at various branch offices, to allow VPN-1 Secure Client users to access company resources. For security reasons, your organization's Security Policy requires all Internet traffic initiated behind the VPN-1 Edge gateways first be inspected by your headquarters' VPN-1 Pro Security Gateway. How do you configure VPN routing in this star VPN Community? 

A. To the Internet and other targets only 

B. To the center and other satellites, through the center 

C. To the center only 

D. To the center; or through the center to other satellites, then to the Internet and other VPN targets 

Answer:


Q232. - (Topic 3) 

What is used to validate a digital certificate? 

A. S/MIME 

B. CRL 

C. IPsec 

D. PKCS 

Answer:


Q233. - (Topic 7) 

Which of the following is NOT TRUE regarding HTTPS traffic being passed through a DLP gateway? 

A. You must edit the $FWDIR/conf/fwauthd.conf file in order for HTTPS traffic to be passed to your Web Proxy through a DLP gateway. 

B. HTTPS traffic is not scanned by DLP 

C. Only one proxy can be configured for DLP 

D. You must configure the DLP gateway to allow HTTP/HTTPS traffic through the proxy if you have a web proxy between the DLP gateway and the internet. 

Answer:


Q234. - (Topic 3) 

How many pre-defined exclusions are included by default inSmart EventR76as part of the product installation? 

A. 3 

B. 0 

C. 5 

D. 10 

Answer:


Q235. - (Topic 4) 

Based on the following information, which of the statements below is FALSE? 

A DLP Rule Base has the following conditions: Data Type =Password Protected File Source=My Organization Destination=Outside My Organization Protocol=Any Action=Ask User Exception: Data Type=Any, Source=Research and Development (R&D) Destination=Pratner1.com Protocol=Any All other rules are set to Detect.User Checkis enabled and installed on all client machines. 

A. When a user from R&D sends an e-mail with a password protected PDF file as an attachment to xyz@partner1 .com, he will be prompted byUser Check. 

B. When a user from Finance sends an e-mail with an encrypted ZIP file as an attachment to. He will be prompted byUser Check. 

C. Another rule is added: Source = R&D, Destination = partner1.com, Protocol = Any, Action = Inform. When a user from R&D sends an e-mail with an encrypted ZIP file as an attachment to, he will be prompted byUser Check. 

D. When a user from R&D sends an e-mail with an encrypted ZIP file as an attachment to , he will NOT be prompted byUser Check. 

Answer:


Q236. - (Topic 6) 

Your customer wishes to install theSmart WorkflowSoftware Blade on a R70 Security Management server (Secure Platform). Which is the correct method? 

A. When you install the R70.1 package on an R70 Security Management server, it will be upgraded to version R70.1 withSmart Workflow. 

B. TheSmart Workflowworks directly on the version R70. Install theSmart Workflowas an add-on. The version of the Management server remains R70. 

C. You must upgrade the Management Server to the version R70.1 first before you start the installation of theSmart WorkflowSoftware Blade plug-in. 

D. TheSmart WorkflowSoftware Blade is included in the standard R70 version. You need to enable it via cpconfig. 

Answer:


Q237. - (Topic 1) 

A Minimal Effort Upgrade of a cluster: 

A. Is only supported in major releases (R70 to R71, R71 to R76). 

B. Is not a valid upgrade method inR76. 

C. Treats each individual cluster member as an individual gateway. 

D. Upgrades all cluster members except one at the same time. 

Answer:

16. - (Topic 1) 

Which of the following access options would you NOT use when configuring Captive Portal? 

A. Through the Firewall policy 

B. From the Internet 

C. Through all interfaces 

D. Through internal interfaces 

Answer:


Q238. - (Topic 6) 

The Management Portal allows all of the following EXCEPT: 

A. Manage firewall logs 

B. Schedule policy installation 

C. View administrator activity 

D. View the status of Check Point products 

Answer:


Q239. - (Topic 1) 

What process is responsible for transferring the policy file fromSmart Centerto the Gateway? 

A. FWD 

B. FWM 

C. CPRID 

D. CPD 

Answer:

Topic 2, Volume B 


Q240. - (Topic 4) 

Which procedure creates a new administrator inSmart Workflow? 

A. Run cpconfig, supply the Login Name. Profile Properties, Name, Access Applications and Permissions. 

B. InSmart Dashboard, clickSmart Workflow/ EnableSmart Workflowand the EnableSmart Workflowwizard will start. Supply the Login Name, Profile Properties, Name, Access Applications and Permissions when prompted. 

C. On the Provider-1 primary MDS, run cpconfig, supply the Login Name, Profile Properties, Name, Access Applications and Permissions. 

D. InSmart Dashboard, click Users and Administrators right click Administrators / New Administrator and supply the Login Name. Profile Properties, Name, Access Applications and Permissions. 

Answer: