Finding Renewal 156-915.77 free samples

Want to know Pass4sure 156-915.77 Exam practice test features? Want to lear more about Check Point Check Point Certified Security Expert Update Blade certification experience? Study Exact Check Point 156-915.77 answers to Improve 156-915.77 questions at Pass4sure. Gat a success with an absolute guarantee to pass Check Point 156-915.77 (Check Point Certified Security Expert Update Blade) test on your first attempt.

Q51. - (Topic 7) 

What happens if the identity of a user is known? 

A. If the user credentials do not match an Access Role, the traffic is automatically dropped. 

B. If the user credentials do not match an Access Role, the system displays a sandbox. 

C. If the user credentials do not match an Access Role, the gateway moves onto the next rule. 

D. If the user credentials do not match an Access Role, the system displays the Captive Portal. 

Answer:


Q52. - (Topic 14) 

Your expanding network currently includes ClusterXL running Multicast mode on two 

members, as shown in this topology: Exhibit: 

You need to add interfaces: 10.10.10.1/24 on Member A, and 10.10.10.2/24 on Member B. The virtual IP address for these interfaces is 10.10.10.3/24. Both cluster gateways have a Quad card with an available eth3 interface. What is the correct procedure to add these interfaces? 

A. 1. Disable "Cluster membership" from one Gateway via cpconfig. 

2.

 Configure the new interface via sysconfig from the "non-member" Gateway. 

3.

 Re-enable "Cluster membership" on the Gateway. 

4.

 Perform the same steps on the other Gateway. 

5.

 Update the topology in the cluster object. 

6.

 Install the Security Policy. 

B. 1. Configure the new interface on both members using WebUI. 

2.

 Update the new topology in the cluster object from SmartDashboard. 

3.

 Define virtual IP in the Dashboard 

4.

 Install the Security Policy. 

C. 1. Use WebUI to configure the new interfaces on both member. 

2.

 Update the topology in the cluster object. 

3.

 Reboot both gateways. 

4.

 Install the Security Policy. 

D. 1. Use the command ifconfig to configure and enable the new interface on both members. 

2.

 Update the topology in the cluster object for the cluster and both members. 

3.

 Install the Security Policy. 

4.

 Reboot the gateway. 

Answer:


Q53. - (Topic 10) 

To qualify as an Identity Awareness enabled rule, which column MAY include an Access Role? 

A. Source 

B. Track 

C. User 

D. Action 

Answer:


Q54. - (Topic 8) 

Captive Portal is a __________ that allows the gateway to request login information from the user. 

A. Pre-configured and customizable web-based tool 

B. Transparent network inspection tool 

C. LDAP server add-on 

D. Separately licensed feature 

Answer:


Q55. - (Topic 4) 

You enable Hide NAT on the network object, 10.1.1.0 behind the Security Gateway’s external interface. You browse to the Google Website from host, 10.1.1.10 successfully. You enable a log on the rule that allows 10.1.1.0 to exit the network. How many log entries do you see for that connection in SmartView Tracker? 

A. Two, one for outbound, one for inbound 

B. Only one, outbound 

C. Two, both outbound, one for the real IP connection and one for the NAT IP connection 

D. Only one, inbound 

Answer:


Q56. - (Topic 5) 

All R77 Security Servers can perform authentication with the exception of one. Which of the Security Servers can NOT perform authentication? 

A. FTP 

B. SMTP 

C. HTTP 

D. RLOGIN 

Answer:

74. - (Topic 5) 

Which of the following are authentication methods that Security Gateway R77 uses to validate connection attempts? Select the response below that includes the MOST complete list of valid authentication methods. 

A. Proxied, User, Dynamic, Session 

B. Connection, User, Client 

C. User, Client, Session 

D. User, Proxied, Session 

Answer:


Q57. - (Topic 6) 

You find that Users are not prompted for authentication when they access their Web servers, even though you have created an HTTP rule via User Authentication. Choose the BEST reason why. 

A. You checked the cache password on desktop option in Global Properties. 

B. Another rule that accepts HTTP without authentication exists in the Rule Base. 

C. You have forgotten to place the User Authentication Rule before the Stealth Rule. 

D. Users must use the SecuRemote Client, to use the User Authentication Rule. 

Answer:


Q58. - (Topic 5) 

In the Rule Base displayed, user authentication in Rule 4 is configured as fully automatic. Eric is a member of the LDAP group, MSD_Group. 

What happens when Eric tries to connect to a server on the Internet? 

A. None of these things will happen. 

B. Eric will be authenticated and get access to the requested server. 

C. Eric will be blocked because LDAP is not allowed in the Rule Base. 

D. Eric will be dropped by the Stealth Rule. 

Answer:

Topic 6, User Managment and Authentication Obj 2 


Q59. - (Topic 16) 

Your company has the requirement that SmartEvent reports should show a detailed and accurate view of network activity but also performance should be guaranteed. Which actions should be taken to achieve that? 

1) Use same hard drive for database directory, log files, and temporary directory. 

2) Use Consolidation Rules. 

3) Limit logging to blocked traffic only. 

4) Use Multiple Database Tables. 

A. 2, 4 

B. 1, 3, 4 

C. 1, 2, 4 

D. 1, 2 

Answer:


Q60. - (Topic 12) 

MultiCorp is running Smartcenter R71 on an IPSO platform and wants to upgrade to a new Appliance with R77. Which migration tool is recommended? 

A. Download Migration Tool R77 for IPSO and Splat/Linux from Check Point website. 

B. Use already installed Migration Tool. 

C. Use Migration Tool from CD/ISO Checkpoint 156-915.77 : Practice Test 

D. Fetch Migration Tool R71 for IPSO and Migration Tool R77 for Splat/Linux from CheckPoint website 

Answer: