Top Tips Of 156-315.77 preparation

Your success in Check Point 156-315.77 is our sole target and we develop all our 156-315.77 braindumps in a way that facilitates the attainment of this target. Not only is our 156-315.77 study material the best you can find, it is also the most detailed and the most updated. 156-315.77 Practice Exams for Check Point 156-315.77 are written to the highest standards of technical accuracy.

Q311. - (Topic 5) 

Which of the following is part of the PKI? Select all that apply. 

A. User certificate 

B. Attribute Certificate 

C. Certificate Revocation Lists 

D. Public-key certificate 

Answer: A,C,D 


Q312. - (Topic 6) 

Which of the following can NOT approve a change in aSmart Workflowsession? 

A. FirewallAdministrators 

B. FirewallManagers 

C. Provider-1Super users 

D. CustomerSuper users 

Answer:


Q313. - (Topic 6) 

You need to verify the effectiveness of your IPS configuration for your Web server farm. You have a colleague run penetration tests to confirm that the Web servers are secure against traffic hijacks. Of the following, which would be the best configuration to protect from a traffic hijack attempt? 

A. Enable the Web intelligence > SQL injection setting. 

B. Activate the Cross-Site Scripting property. 

C. Configure TCP defenses such as Small PMTU size. 

D. Create resource objects for the Web farm servers and configure rules for the Web farm. 

Answer:


Q314. - (Topic 2) 

A customer calls saying that a Load Sharing cluster shows drops with the error First packet is not SYN. Complete the following sentence. I will recommend: 

A. turning on SDF (Sticky Decision Function) 

B. turning off SDF (Sticky Decision Function) 

C. changing the load on each member 

D. configuring flush and ack 

Answer:


Q315. - (Topic 5) 

DShield is a Check Point feature used to block which of the following threats? 

A. Cross Site Scripting 

B. SQL injection 

C. DDOS 

D. Buffer overflows 

E. Trojan horses 

Answer:


Q316. - (Topic 4) 

When migrating theSmart Eventdata base from one server to another, the last step is to save the files on the new server. Which of the following commands should you run to save theSmart Eventdata base files on the new server? 

A. cp 

B. migrate import 

C. eva_db_restore 

D. restore 

Answer:


Q317. - (Topic 5) 

Which of the following is an example of the hash function? 

A. DES and CBC 

B. DAC and MAC 

C. SHA and 3DES 

D. MD5 and SHA-1 

Answer:


Q318. CORRECT TEXT - (Topic 8) 

To stop acceleration on a GAiA Security Gateway, enter command: 

Answer: fwaccel off 


Q319. - (Topic 3) 

You want VPN traffic to match packets from internal interfaces. You also want the traffic to exit the Security Gateway bound for all site-to-site VPN Communities, including Remote Access Communities. How should you configure the VPN match rule? 

A. Communities > Communities 

B. internal_clear > All_GwToGw 

C. internal_clear > All_communities 

D. Internal_clear > External_Clear 

Answer:


Q320. - (Topic 8) 

While authorization for users managed by SmartDirectory is performed by the gateway, the authentication mostly occurs in __________. 

A. ldapauth 

B. cpauth 

C. ldapd 

D. cpShared 

Answer: