The Secret of 156-315.77 exam cram
Your success in Check Point 156-315.77 is our sole target and we develop all our 156-315.77 braindumps in a way that facilitates the attainment of this target. Not only is our 156-315.77 study material the best you can find, it is also the most detailed and the most updated. 156-315.77 Practice Exams for Check Point 156-315.77 are written to the highest standards of technical accuracy.
Q381. - (Topic 6)
Which command can be used to verify SecureXL statistics?
A. fwaccel top
B. fwaccel stats
C. fw ctl pstat
D. cphaprob stat
Q382. CORRECT TEXT - (Topic 7)
Fill in the blank. The command that typically generates the firewall application, operating system, and hardware specific drivers is _________ .
Q383. - (Topic 7)
In R76, My Organization e-mail addresses or domains are used for:
A. Scanning e-mails only if its sender e-mail address is part of this definition, by default.
B. Defining the e-mail address of the SMTP relay server.
C. FTP traffic sent from a user where his e-mail is part of this definition scanned by DLP, by default.
D. HTTP traffic sent from a user where his e-mail is part of this definition scanned by DLP, by default.
Q384. - (Topic 4)
You are preparing to deploy a VPN-1 Pro Gateway for VPN-1 NGX. You have five systems to choose from for the new Gateway, and you must conform to the following requirements:
Operating-system vendor's license agreement
Check Point's license agreement
Minimum operating-system hardware specification
Minimum Gateway hardware specification
Gateway installed on a supported operating system (OS)
Which machine meets ALL of the following requirements?
A. Processor: 1.1 GHz RAM: 512MB Hard disk: 10 GB OS: Windows 2000 Workstation
B. Processor: 2.0 GHz RAM: 512MB Hard disk: 10 GB OS: Windows ME
C. Processor: 1.5 GHz RAM: 256 MB Hard disk: 20 GB OS: Red Hat Linux 8.0
D. Processor: 1.67 GHz RAM: 128 MB Hard disk: 5 GB OS: FreeBSD
E. Processor: 2.2 GHz RAM: 256 MB Hard disk: 20 GB OS: Windows 2000 Server
Q385. - (Topic 6)
Your customer wishes to useSmart WorkflowSoftware Blade, but he also wishes to install a policy during an emergency without an approval. Is it possible?
A. Yes, it is possible but the administrator must receive special administrator permission, i.e., Can install in emergency. You can use the new GUI to set the administration security setting.
B. Yes, it is possible, but this feature must be configured in the Global Properties. The administrator must provide a special password and the reason for this emergency installation.
C. Yes, it is possible, but this feature must be configured in Global Properties and the administrator must provide a special password.
D. No, if a customer uses theSmart WorkflowSoftware Blade, a policy must be approved.
Q386. - (Topic 7)
The connection to the ClusterXL member ‘A’ breaks. The ClusterXL member ‘A’ status is now ‘down’. Afterwards the switch admin set a port to ClusterXL member ‘B’ to ‘down’. What will happen?
A. ClusterXL member ‘B’ also left the cluster.
B. ClusterXL member ‘B’ stays active as last member.
C. Both ClusterXL members share load equally.
D. ClusterXL member ‘A’ is asked to come back to cluster.
Q387. - (Topic 8)
MegaCorps' disaster recovery plan is past due for an update to the backup and restore section to enjoy the benefits of the new distributed R77 installation. You must propose a plan that meets the following required and desired objectives:
Required. Security Policy repository must be backed up no less frequently than every 24
Desired. Back up R77 components enforcing the Security Policies at least once a week.
Desired. Back up R77 logs at least once a week.
You develop a disaster recovery plan proposing the following:
Use the utility cron to run the command upgrade_export each night on the Security Management Servers.
Configure the organization's routine backup software to back up files created by the
Configure GAiA back up utility to back up Security Gateways every Saturday night.
Use the utility cron to run the command upgrade_export each Saturday night on the log servers.
Configure an automatic, nightly logswitch.
Configure the organization's routine back up software to back up the switched logs every night.
The corporate IT change review committee decides your plan:
A. meets the required objective and only one desired objective.
B. meets the required objective and both desired objectives.
C. meets therequiredobjective but does not meet eitherdesiredobjective.
D. does not meet the required objective.
Q388. - (Topic 8)
When configuring an LDAP Group object, select option _______________ if you want the gateway to reference a specific group defined on the LDAP server for authentication purposes.
A. Group Agnostic
B. All Account-Unit's Users
C. Only Sub Tree
D. Only Group in Branch
Q389. - (Topic 8)
You have pushed a policy to your firewall and you are not able to access the firewall. What command will allow you to remove the current policy from the machine?
A. fw purge active
B. fw purge policy
C. fw fetch policy
D. fw unloadlocal
Q390. - (Topic 7)
To backup all events stored in the SmartEvent Server, you should back up the contents of which folder(s)?
A. $RTDIR/distrib_db and $FWDIR/events
C. $RTDIR/distrib and $FWDIR/events_db