Top Best Quality 156-915.77 forum Tips!
Our pass rate is high to 98.9% and the similarity percentage between our 156-915.77 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Check Point 156-915.77 exam in just one try? I am currently studying for the Check Point 156-915.77 exam. Latest Check Point 156-915.77 Test exam practice questions and answers, Try Check Point 156-915.77 Brain Dumps First.
Q1. - (Topic 14)
Match the ClusterXL modes with their configurations. Exhibit:
A. A-2, B-3, C-4, D-1
B. A-2, B-3, C-1, D-5
C. A-3, B-5, C-1, D-4
D. A-5, B-2, C-4, D-1
Q2. - (Topic 15)
You want to establish a VPN, using certificates. Your VPN will exchange certificates with an external partner. Which of the following activities should you do first?
A. Exchange exported CA keys and use them to create a new server object to represent your partner’s Certificate Authority (CA).
B. Create a new logical-server object to represent your partner’s CA.
C. Manually import your partner’s Access Control List.
D. Manually import your partner’s Certificate Revocation List.
Q3. CORRECT TEXT - (Topic 15)
Fill in the blank. To remove site-to-site IKE and IPSEC keys you would enter command ____ ___ and select the option to delete all IKE and IPSec SA’s.
Answer: vpn tu
Q4. - (Topic 12)
MegaCorps' disaster recovery plan is past due for an update to the backup and restore section to enjoy the benefits of the new distributed R77 installation. You must propose a plan that meets the following required and desired objectives:
Required: Security Policy repository must be backed up no less frequently than every 24 hours.
Desired: Back up R77 components enforcing the Security Policies at least once a week.
Desired: Back up R77 logs at least once a week.
You develop a disaster recovery plan proposing the following:
Use the utility cron to run the command upgrade_export each night on the Security Management Servers.
Configure the organization's routine backup software to back up files created by the command upgrade_export.
Configure GAiA back up utility to back up Security Gateways every Saturday night.
Use the utility cron to run the command upgrade_export each Saturday night on the log servers.
Configure an automatic, nightly logswitch.
Configure the organization's routine back up software to back up the switched logs every night.
The corporate IT change review committee decides your plan:
A. meets the required objective and only one desired objective.
B. meets the required objective and both desired objectives.
C. meets the rquired objective but does not meet either deisred objective.
D. does not meet the required objective.
Q5. - (Topic 2)
The third-shift Administrator was updating Security Management Server access settings in Global Properties. He managed to lock all administrators out of their accounts. How should you unlock these accounts?
A. Delete the file admin.lock in the Security Management Server directory $FWDIR/tmp/.
B. Reinstall the Security Management Server and restore using upgrade_import.
C. Type fwm lock_admin -ua from the Security Management Server command line.
D. Login to SmartDashboard as the special cpconfig_admin user account; right-click on each administrator object and select unlock.
Q6. - (Topic 2)
Peter is your new Security Administrator. On his first working day, he is very nervous and enters the wrong password three times. His account is locked. What can be done to unlock Peter’s account? Give the BEST answer.
A. You can unlock Peter’s account by using the command fwm lock_admin -u Peter on the Security Management Server.
B. You can unlock Peter’s account by using the command fwm unlock_admin -u Peter on the Security Management Server
C. It is not possible to unlock Peter’s account. You have to install the firewall once again or abstain from Peter’s help.
D. You can unlock Peter’s account by using the command fwm unlock_admin -u Peter on the Security Gateway.
Q7. - (Topic 14)
Use the table to match the BEST Management High Availability synchronication-status descriptions for your Security Management Server (SMS).
A. A-5, B-3, C-1, D-2
B. A-3, B-1, C-4, D-2
C. A-3, B-5, C-2, D-4
D. A-3, B-1, C-5, D-4
Q8. - (Topic 3)
Which of the following tools is used to generate a Security Gateway R77 configuration report?
A. fw cpinfo
Q9. - (Topic 1)
Match the following commands to their correct function.
Each command has one function only listed.
A. C1>F6; C2>F4; C3>F2; C4>F5
B. C1>F2; C2>F1; C3>F6; C4>F4
C. C1>F2; C2>F4; C3>F1; C4>F5
D. C1>F4; C2>F6; C3>F3; C4>F2
Q10. CORRECT TEXT - (Topic 14)
Type the command and syntax you would use to verify that your Check Point cluster is functioning correctly.
Answer: cphaprob state