Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Note! Checkpoint has retired the 156-215.77 Exam Contact us through Live Chat or email us for more information.

156-215.77 Check Point Certified Security Administrator Questions and Answers

Questions 4

You want to establish a VPN, using certificates. Your VPN will exchange certificates with an external partner. Which of the following activities should you do first?

Options:

A.

Create a new logical-server object to represent your partner’s CA.

B.

Exchange exported CA keys and use them to create a new server object to represent your partner’s Certificate Authority (CA).

C.

Manually import your partner’s Certificate Revocation List.

D.

Manually import your partner’s Access Control List.

Buy Now
Questions 5

An internal router is sending UDP keep-alive packets that are being encapsulated with GRE and sent through your R77 Security Gateway to a partner site. A rule for GRE traffic is configured for ACCEPT/LOG. Although the keep-alive packets are being sent every minute, a search through the SmartView Tracker logs for GRE traffic only shows one entry for the whole day (early in the morning after a Policy install).

Your partner site indicates they are successfully receiving the GRE encapsulated keep-alive packets on the 1-minute interval.

If GRE encapsulation is turned off on the router, SmartView Tracker shows a log entry for the UDP keep-alive packet every minute.

Which of the following is the BEST explanation for this behavior?

Options:

A.

The setting Log does not capture this level of detail for GRE. Set the rule tracking action to Audit since certain types of traffic can only be tracked this way.

B.

The log unification process is using a LUUID (Log Unification Unique Identification) that has become corrupt. Because it is encrypted, the R77 Security Gateway cannot distinguish between GRE sessions. This is a known issue with GRE. Use IPSEC instead of the non-standard GRE protocol for encapsulation.

C.

The Log Server log unification process unifies all log entries from the Security Gateway on a specific connection into only one log entry in the SmartView Tracker. GRE traffic has a 10 minute session timeout, thus each keep-alive packet is considered part of the original logged connection at the beginning of the day.

D.

The Log Server is failing to log GRE traffic properly because it is VPN traffic. Disable all VPN configuration to the partner site to enable proper logging.

Buy Now
Questions 6

You are the Security Administrator for MegaCorp. In order to see how efficient your firewall Rule Base is, you would like to see how often the particular rules match. Where can you see it? Give the BEST answer.

Options:

A.

In the SmartView Tracker, if you activate the column Matching Rate.

B.

In SmartReporter, in the section Firewall Blade - Activity > Network Activity with information concerning Top Matched Logged Rules.

C.

SmartReporter provides this information in the section Firewall Blade - Security > Rule Base Analysis with information concerning Top Matched Logged Rules.

D.

It is not possible to see it directly. You can open SmartDashboard and select UserDefined in the Track column. Afterwards, you need to create your own program with an external counter.

Buy Now
Questions 7

True or False. SmartView Monitor can be used to create alerts on a specified Gateway.

Options:

A.

True, by right-clicking on the Gateway and selecting Configure Thresholds.

B.

True, by choosing the Gateway and selecting System Information.

C.

False, an alert cannot be created for a specified Gateway.

D.

False, alerts can only be set in SmartDashboard Global Properties.

Buy Now
Questions 8

Review the rules.

Assume domain UDP is enabled in the impled rules.

What happens when a user from the internal network tries to browse to the internet using HTTP? The user:

Options:

A.

can connect to the Internet successfully after being authenticated.

B.

is prompted three times before connecting to the Internet successfully.

C.

can go to the Internet after Telnetting to the client authentication daemon port 259.

D.

can go to the Internet, without being prompted for authentication.

Buy Now
Questions 9

Which R77 GUI would you use to see the number of packets accepted since the last policy install?

Options:

A.

SmartView Monitor

B.

SmartView Tracker

C.

SmartDashboard

D.

SmartView Status

Buy Now
Questions 10

In the Rule Base displayed for fwsingapore, user authentication in Rule 4 is configured as fully automatic. Eric is a member of the LDAP group, MSD_Group.

What happens when Eric tries to connect to a server on the Internet?

Options:

A.

None of these things will happen.

B.

Eric will be authenticated and get access to the requested server.

C.

Eric will be blocked because LDAP is not allowed in the Rule Base.

D.

Eric will be dropped by the Stealth Rule.

Buy Now
Questions 11

When configuring LDAP authentication, which of the following items should be configured for the Security Management Server?

Options:

A.

Login Distinguished Name and password

B.

Windows logon password

C.

Check Point Password

D.

WMI object

Buy Now
Questions 12

Jack has locked himself out of the Kirk Security Gateway with an incorrect policy and can no longer connect from the McCoy Management Server.

Jack still has access to an out of band console connection on the Kirk Security Gateway. He is logged into the Gaia CLI, what does he need to enter in order to be able to fix his mistake and push policy?

Options:

A.

Kirk> fw unload local

B.

Kirk> fw unloadlocal

C.

Kirk> fw unload policy

D.

Kirk> fw fetch policy

Buy Now
Questions 13

What does SmartUpdate allow you to do?

Options:

A.

SmartUpdate only allows you to update Check Point and OPSEC certified products.

B.

SmartUpdate only allows you to manage product licenses.

C.

SmartUpdate allows you to update Check Point and OPSEC certified products and to manage product licenses.

D.

SmartUpdate is not a Check Point product.

Buy Now
Questions 14

Which authentication type requires specifying a contact agent in the Rule Base?

Options:

A.

Client Authentication with Partially Automatic Sign On

B.

Client Authentication with Manual Sign On

C.

User Authentication

D.

Session Authentication

Buy Now
Questions 15

Lily has completed the initial setup of her Management Server with an IP address of 192.168.12.12. She must now run the First Time Configuration Wizard via the Gaia Portal to finish the setup. Lily knows she must use a browser to access the device, but it unsure of the correct URL to enter; which one below will she need to use?

Buy Now
Questions 16

What is one potential downside or drawback to choosing the Standalone deployment option instead of the Distributed deployment option?

Options:

A.

Degrades performance as the Security Policy grows in size.

B.

Requires additional Check Point Appliances

C.

Requires additional software subscription

D.

Increases cost

Buy Now
Questions 17

In SmartDashboard, you configure 45 MB as the required free hard-disk space to accommodate logs. What can you do to keep old log files, when free space falls below 45 MB?

Options:

A.

Do nothing. Old logs are deleted, until free space is restored.

B.

Use the command fwm logexport to export the old log files to another location.

C.

Configure a script to run fw logswitch and SCP the output file to a separate file server.

D.

Do nothing. The Security Management Server automatically copies old logs to a backup server before purging.

Buy Now
Questions 18

Central license management allows a Security Administrator to perform which of the following functions?

1. Check for expired licenses.

2. Sort licenses and view license properties.

3. Attach both R77 Central and Local licesnes to a remote module.

4. Delete both R77 Local Licenses and Central licenses from a remote module.

5. Add or remove a license to or from the license repository.

6. Attach and/or delete only R77 Central licenses to a remote module (not Local licenses).

Options:

A.

1, 2, 5, & 6

B.

2, 3, 4, & 5

C.

2, 5, & 6

D.

1, 2, 3, 4, & 5

Buy Now
Questions 19

An Administrator without access to SmartDashboard installed a new IPSO-based R77 Security Gateway over the weekend. He e-mailed you the SIC activation key and the IP address of the Security Gateway. You want to confirm communication between the Security Gateway and the Management Server by installing the Policy. What might prevent you from installing the Policy?

Options:

A.

An intermediate local Security Gateway does not allow a policy install through it to the remote new Security Gateway appliance. Resolve by running the command fw unloadlocal on the local Security Gateway.

B.

You first need to run the command fw unloadlocal on the R77 Security Gateway appliance in order to remove the restrictive default policy.

C.

You first need to create a new Gateway object in SmartDashboard, establish SIC via the Communication button, and define the Gateway’s topology.

D.

You have not established Secure Internal Communications (SIC) between the Security Gateway and Management Server. You must initialize SIC on the Security Management Server.

Buy Now
Questions 20

When translation occurs using automatic Hide NAT, what also happens?

Options:

A.

Nothing happens.

B.

The destination is modified.

C.

The destination port is modified.

D.

The source port is modified.

Buy Now
Questions 21

NAT can NOT be configured on which of the following objects?

Options:

A.

HTTP Logical Server

B.

Gateway

C.

Address Range

D.

Host

Buy Now
Questions 22

You have detected a possible intruder listed in SmartView Tracker’s active pane. What is the fastest method to block this intruder from accessing your network indefinitely?

Options:

A.

Modify the Rule Base to drop these connections from the network.

B.

In SmartView Tracker, select Tools > Block Intruder.

C.

In SmartView Monitor, select Tools > Suspicious Activity Rules.

D.

In SmartDashboard, select IPS > Network Security > Denial of Service.

Buy Now
Questions 23

Which SmartView Tracker mode allows you to read the SMTP e-mail body sent from the Chief Executive Officer (CEO) of a company?

Options:

A.

This is not a SmartView Tracker feature.

B.

Display Capture Action

C.

Network and Endpoint Tab

D.

Display Payload View

Buy Now
Questions 24

Which R77 feature or command allows Security Administrators to revert to earlier Security Policy versions without changing object configurations?

Options:

A.

upgrade_export/upgrade_import

B.

fwm dbexport/fwm dbimport

C.

Database Revision Control

D.

Policy Package management

Buy Now
Questions 25

Where can you find the Check Point’s SNMP MIB file?

Options:

A.

$CPDIR/lib/snmp/chkpt.mib

B.

$FWDIR/conf/snmp.mib

C.

It is obtained only by request from the TAC.

D.

There is no specific MIB file for Check Point products.

Buy Now
Questions 26

When launching SmartDashboard, what information is required to log into R77?

Options:

A.

User Name, Management Server IP, certificate fingerprint file

B.

User Name, Password, Management Server IP

C.

Password, Management Server IP

D.

Password, Management Server IP, LDAP Server IP

Buy Now
Questions 27

You have a diskless appliance platform. How do you keep swap file wear to a minimum?

Options:

A.

Issue FW-1 bases its package structure on the Security Management Server, dynamically loading when the firewall is booted.

B.

The external PCMCIA-based flash extension has the swap file mapped to it, allowing easy replacement.

C.

Use PRAM flash devices, eliminating the longevity.

D.

A RAM drive reduces the swap file thrashing which causes fast wear on the device.

Buy Now
Questions 28

You have configured Automatic Static NAT on an internal host-node object. You clear the box Translate destination on client site from Global Properties > NAT. Assuming all other NAT settings in Global Properties are selected, what else must be configured so that a host on the Internet can initiate an inbound connection to this host?

Options:

A.

No extra configuration is needed.

B.

A proxy ARP entry, to ensure packets destined for the public IP address will reach the Security Gateway's external interface.

C.

The NAT IP address must be added to the external Gateway interface anti-spoofing group.

D.

A static route, to ensure packets destined for the public NAT IP address will reach the Gateway's internal interface.

Buy Now
Questions 29

When restoring R77 using the command upgrade_import, which of the following items are NOT restored?

Options:

A.

SIC Certificates

B.

Licenses

C.

Route tables

D.

Global properties

Buy Now
Questions 30

Which rule is responsible for the client authentication failure?

Exhibit:

Options:

A.

Rule 4

B.

Rule 6

C.

Rule 3

D.

Rule 5

Buy Now
Questions 31

Your organization’s disaster recovery plan needs an update to the backup and restore section to reap the new distributed R77 installation benefits. Your plan must meet the following required and desired objectives:

Required ObjectivE. The Security Policy repository must be backed up no less frequently than every 24 hours.

Desired ObjectivE. The R77 components that enforce the Security Policies should be backed up at least once a week.

Desired ObjectivE. Back up R77 logs at least once a week.

Your disaster recovery plan is as follows:

- Use the cron utility to run the command upgrade_export each night on the Security Management Servers.

- Configure the organization's routine back up software to back up the files created by the command upgrade_export.

- Configure the GAiA back up utility to back up the Security Gateways every Saturday night.

- Use the cron utility to run the command upgrade_export each Saturday night on the log servers.

- Configure an automatic, nightly logswitch.

- Configure the organization's routine back up software to back up the switched logs every night.

Upon evaluation, your plan:

Options:

A.

Meets the required objective and only one desired objective.

B.

Meets the required objective but does not meet either desired objective.

C.

Does not meet the required objective.

D.

Meets the required objective and both desired objectives.

Buy Now
Questions 32

Where are custom queries stored in R77 SmartView Tracker?

Options:

A.

On the SmartView Tracker PC local file system under the user's profile.

B.

On the Security Management Server tied to the GUI client IP.

C.

On the Security Management Server tied to the Administrator User Database login name.

D.

On the SmartView Tracker PC local file system shared by all users of that local PC.

Buy Now
Questions 33

Because of pre-existing design constraints, you set up manual NAT rules for your HTTP server. However, your FTP server and SMTP server are both using automatic NAT rules. All traffic from your FTP and SMTP servers are passing through the Security Gateway without a problem, but traffic from the Web server is dropped on rule 0 because of anti-spoofing settings.

What is causing this?

Options:

A.

Manual NAT rules are not configured correctly.

B.

Allow bi-directional NAT is not checked in Global Properties.

C.

Routing is not configured correctly.

D.

Translate destination on client side is not checked in Global Properties under Manual NAT Rules.

Buy Now
Questions 34

Where can an administrator specify the notification action to be taken by the firewall in the event that available disk space drops below 15%?

Options:

A.

SmartView Monitor > Gateway Status > Threshold Settings

B.

SmartView Tracker > Audit Tab > Gateway Counters

C.

SmartView Monitor > Gateway Status > System Information > Thresholds

D.

This can only be monitored by a user-defined script.

Buy Now
Questions 35

How granular may an administrator filter an Access Role with identity awareness? Per:

Options:

A.

Specific ICA Certificate

B.

AD User

C.

Radius Group

D.

Windows Domain

Buy Now
Questions 36

In a distributed management environment, the administrator has removed all default check boxes from the Policy > Global Properties > Firewall tab. In order for the Security Gateway to send logs to the Security Management Server, an explicit rule must be created to allow the Security Gateway to communicate to the Security Management Server on port ______.

Options:

A.

259

B.

900

C.

256

D.

257

Buy Now
Questions 37

You have configured SNX on the Security Gateway. The client connects to the Security Gateway and the user enters the authentication credentials. What must happen after authentication that allows the client to connect to the Security Gateway’s VPN domain?

Options:

A.

SNX modifies the routing table to forward VPN traffic to the Security Gateway.

B.

An office mode address must be obtained by the client.

C.

The SNX client application must be installed on the client.

D.

Active-X must be allowed on the client.

Buy Now
Questions 38

How can you check whether IP forwarding is enabled on an IP Security Appliance?

Options:

A.

clish -c show routing active enable

B.

cat /proc/sys/net/ipv4/ip_forward

C.

echo 1 > /proc/sys/net/ipv4/ip_forward

D.

ipsofwd list

Buy Now
Questions 39

The Tokyo Security Management Server Administrator cannot connect from his workstation in Osaka.

Which of the following lists the BEST sequence of steps to troubleshoot this issue?

Options:

A.

Check for matching OS and product versions of the Security Management Server and the client. Then, ping the Gateways to verify connectivity. If successful, scan the log files for any denied management packets.

B.

Verify basic network connectivity to the local Gateway, service provider, remote Gateway, remote network and target machine. Then, test for firewall rules that deny management access to the target. If successful, verify that pcosaka is a valid client IP address.

C.

Check the allowed clients and users on the Security Management Server. If pcosaka and your user account are valid, check for network problems. If there are no network related issues, this is likely to be a problem with the server itself. Check for any patches and upgrades. If still unsuccessful, open a case with Technical Support.

D.

Call Tokyo to check if they can ping the Security Management Server locally. If so, login to sgtokyo, verify management connectivity and Rule Base. If this looks okay, ask your provider if they have some firewall rules that filters out your management traffic.

Buy Now
Questions 40

An Administrator without access to SmartDashboard installed a new IPSO-based R77 Security Gateway over the weekend. He e-mailed you the SIC activation key. You want to confirm communication between the Security Gateway and the Management Server by installing the Policy. What might prevent you from installing the Policy?

Options:

A.

An intermediate local Security Gateway does not allow a policy install through it to the remote new Security Gateway appliance. Resolve by running the command fw unloadlocal on the local Security Gateway.

B.

You first need to run the command fw unloadlocal on the R77 Security Gateway appliance in order to remove the restrictive default policy.

C.

You first need to create a new Gateway object in SmartDashboard, establish SIC via the Communication button, and define the Gateway’s topology.

D.

You have not established Secure Internal Communications (SIC) between the Security Gateway and Management Server. You must initialize SIC on the Security Management Server.

Buy Now
Questions 41

The London Security Gateway Administrator has just installed the Security Gateway and Management Server. He has not changed any default settings. As he tries to configure the Gateway, he is unable to connect.

Which troubleshooting suggestion will NOT help him?

Options:

A.

Check if some intermediate network device has a wrong routing table entry, VLAN assignment, duplex-mismatch, or trunk issue.

B.

Test the IP address assignment and routing settings of the Security Management Server, Gateway, and console client.

C.

Verify the SIC initialization.

D.

Verify that the Rule Base explicitly allows management connections.

Buy Now
Questions 42

What command syntax would you use to see accounts the gateway suspects are service accounts?

Options:

A.

pdp check_log

B.

pdp show service

C.

adlog check_accounts

D.

adlog a service_accounts

Buy Now
Questions 43

A Cleanup rule:

Options:

A.

logs connections that would otherwise be dropped without logging by default.

B.

drops packets without logging connections that would otherwise be dropped and logged by default.

C.

logs connections that would otherwise be accepted without logging by default.

D.

drops packets without logging connections that would otherwise be accepted and logged by default.

Buy Now
Questions 44

What gives administrators more flexibility when configuring Captive Portal instead of LDAP query for Identity Awareness authentication?

Options:

A.

Captive Portal is more secure than standard LDAP

B.

Nothing, LDAP query is required when configuring Captive Portal

C.

Captive Portal works with both configured users and guests

D.

Captive Portal is more transparent to the user

Buy Now
Questions 45

Which of these components does NOT require a Security Gateway R77 license?

Options:

A.

Security Management Server

B.

Check Point Gateway

C.

SmartConsole

D.

SmartUpdate upgrading/patching

Buy Now
Questions 46

Which command displays the installed Security Gateway version?

Options:

A.

fw ver

B.

fw stat

C.

fw printver

D.

cpstat –gw

Buy Now
Questions 47

How can you recreate the Security Administrator account, which was created during initial Management Server installation on GAiA?

Options:

A.

Export the user database into an ASCII file with fwm dbexport. Open this file with an editor, and delete the Administrator Account portion of the file. You will be prompted to create a new account.

B.

Type cpm -a, and provide the existing Administrator’s account name. Reset the Security Administrator’s password.

C.

Launch cpconfig and delete the Administrator's account. Recreate the account with the same name.

D.

Launch SmartDashboard in the User Management screen, and delete the cpconfig administrator.

Buy Now
Questions 48

How do you recover communications between your Security Management Server and Security Gateway if you lock yourself out through a rule or policy mis-configuration?

Options:

A.

fw unload policy

B.

fw unloadlocal

C.

fw delete all.all@localhost

D.

fwm unloadlocal

Buy Now
Questions 49

Which of the following firewall modes DOES NOT allow for Identity Awareness to be deployed?

Options:

A.

Bridge

B.

Load Sharing

C.

High Availability

D.

Fail Open

Buy Now
Questions 50

For which service is it NOT possible to configure user authentication?

Options:

A.

Telnet

B.

SSH

C.

FTP

D.

HTTPS

Buy Now
Questions 51

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned an IP address 10.0.0.19 via DHCP.

John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop. He wants to move around the organization and continue to have access to the HR Web Server.

To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the policy.

2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.

John plugged in his laptop to the network on a different network segment and he is not able to connect. How does he solve this problem?

Options:

A.

John should install the Identity Awareness Agent

B.

The firewall admin should install the Security Policy

C.

John should lock and unlock the computer

D.

Investigate this as a network connectivity issue

Buy Now
Questions 52

Your company’s Security Policy forces users to authenticate to the Gateway explicitly, before they can use any services. The Gateway does not allow the Telnet service to itself from any location. How would you configure authentication on the Gateway? With a:

Options:

A.

Client Authentication rule using the manual sign-on method, using HTTP on port 900

B.

Client Authentication rule, using partially automatic sign on

C.

Client Authentication for fully automatic sign on

D.

Session Authentication rule

Buy Now
Questions 53

Which of these attributes would be critical for a site-to-site VPN?

Options:

A.

Scalability to accommodate user groups

B.

Centralized management

C.

Strong authentication

D.

Strong data encryption

Buy Now
Questions 54

The Captive Portal tool:

Options:

A.

Acquires identities from unidentified users.

B.

Is only used for guest user authentication.

C.

Allows access to users already identified.

D.

Is deployed from the Identity Awareness page in the Global Properties settings.

Buy Now
Questions 55

Which authentication type permits five different sign-on methods in the authentication properties window?

Options:

A.

Client Authentication

B.

Manual Authentication

C.

User Authentication

D.

Session Authentication

Buy Now
Questions 56

If you are experiencing LDAP issues, which of the following should you check?

Options:

A.

Connectivity between the R77 Gateway and LDAP server

B.

Secure Internal Communications (SIC)

C.

Overlapping VPN Domains

D.

Domain name resolution

Buy Now
Questions 57

Which of the below is the MOST correct process to reset SIC from SmartDashboard?

Options:

A.

Run cpconfig, and click Reset.

B.

Click the Communication button for the firewall object, then click Reset. Run cpconfig and type a new activation key.

C.

Run cpconfig, and select Secure Internal Communication > Change One Time Password.

D.

Click Communication > Reset on the Gateway object, and type a new activation key.

Buy Now
Questions 58

When using AD Query to authenticate users for Identity Awareness, identity data is received seamlessly from the Microsoft Active Directory (AD). What is NOT a recommended usage of this method?

Options:

A.

Leveraging identity in the application control blade

B.

Basic identity enforcement in the internal network

C.

Identity-based auditing and logging

D.

Identity-based enforcement for non-AD users (non-Windows and guest users)

Buy Now
Exam Code: 156-215.77
Exam Name: Check Point Certified Security Administrator
Last Update: Nov 23, 2024
Questions: 388