All About 156-315.77 answers Feb 2018
Master the 156-315.77 Check Point Security Expert R77 content and be ready for exam day success quickly with this Exambible 156-315.77 practice. We guarantee it!We make it a reality and give you real 156-315.77 questions in our Check Point 156-315.77 braindumps.Latest 100% VALID Check Point 156-315.77 Exam Questions Dumps at below page. You can use our Check Point 156-315.77 braindumps and pass your exam.
Q321. - (Topic 5)
When synchronizing clusters, which of the following statements are true?
Select all that apply.
A. Only cluster members running on the same OS platform can be synchronized.
B. Client Auth or Session Auth connections through a cluster member will be lost of the cluster member fails.
C. The state of connections using resources is maintained by a Security Server, so these connections cannot be synchronized.
D. In the case of a failover, accounting information on the failed member may be lost despite a properly
Q322. CORRECT TEXT - (Topic 8)
Fill in the blank. To verify the SecureXL status, you would enter command _____________ .
Answer: fwaccel stat
Q323. - (Topic 1)
When upgrading a cluster in Full Connectivity Mode, the first thing you must do is see if all cluster members have the same products installed. Which command should you run?
A. fw fcu
B. cphaprob fcustat
D. fw ctl conn –a
Q324. - (Topic 4)
Laura notices the Microsoft Visual Basic Bits Protection is set to inactive. She wants to set the Microsoft Visual Basic Kill Bits Protection and all other Low Performance Impact Protections to Prevent. She asks her manager for approval and stated she can turn theses on. But he wants Laura to make sure no high Performance Impacted Protections are turned on while changing this setting.
Using the out below, how would Laura change the Default_Protection on Performance Impact Protections classified as low from inactive to prevent until meeting her other criteria?
A. Go to Profiles / Default_Protection and uncheck Do not activate protections with performance impact to medium or above
B. Go to Profiles / Default_Protection and select Do not activate protections with performance impact to low or above
C. Go to Profiles / Default_Protection and select Do not activate protections with performance impact to medium or above
D. Go to Profiles / Default_Protection and uncheck Do not activate protections with performance impact to high or above
Q325. - (Topic 5)
What tools CANNOT be launched from SmartUpdate NGX R65?
B. SecurePlatform Web UI
C. Nokia Voyager
Q326. - (Topic 2)
In a R76ClusterXL Load Sharing configuration, which type of ARP related problem can force the use of Unicast Mode (Pivot) configuration due to incompatibility on some adjacent routers and switches?
A. Multicast MAC address response to a Unicast IP request
B. Unicast MAC address response to a Multicast IP request
C. Multicast MAC address response to a RARP request
D. MGCP MAC address response to a Multicast IP request
Q327. - (Topic 5)
You are preparing to configure your VoIP Domain Gatekeeper object. Which two other objects should you have created first?
A. An object to represent the IP phone network, AND an object to represent the host on which the proxy is installed
B. An object to represent the PSTN phone network, AND an object to represent the IP phone network
C. An object to represent the IP phone network, AND an object to represent the host on which the gatekeeper is installed
D. An object to represent the Q.931 service origination host, AND an object to represent the H.245 termination host
E. An object to represent the call manager, AND an object to represent the host on which the transmission router is installed
Q328. - (Topic 1)
You need to back up the routing, interface, and DNS configuration information from your
R76Secure PlatformSecurity Gateway. Which backup-and-restore solution do you use?
A. Secure Platformback up utilities
B. Manual copies of the directory $FWDIR/conf
C. Database Revision Control
D. Commandsupgrade exportandupgrade import
Q329. - (Topic 5)
Consider the following actions that VPN-1 NGX can take when it control packets. The Policy Package has been configured for Traditional Mode VPN. Identify the options that includes the available actions. Select four.
C. Client auth
Q330. - (Topic 6)
Please review the following QoS policy:
Assume you have 200 Kbps bandwidth available at all times. Which statement would describe this policy?
A. The un-named rule has a total Guarantee of 5 Kbps, which should be 50 and lower the other Guarantees.
B. Guarantee values are set too high, you have no bandwidth available for anything else besides traffic describe in first rules.
C. All traffic matching the default rule will have priority
D. All traffic will receive sufficient bandwidth because the default rule has a low weight value.