Valid 156-215.80 Dumps shared by ExamDiscuss.com for Helping Passing 156-215.80 Exam! ExamDiscuss.com now offer the newest 156-215.80 exam dumps, the ExamDiscuss.com 156-215.80 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com 156-215.80 dumps with Test Engine here:

Access 156-215.80 Dumps Premium Version
(527 Q&As Dumps, 35%OFF Special Discount Code: freecram)

<< Prev Question Next Question >>

Question 15/249

You installed Security Management Server on a computer using GAiA in the MegaCorp home office. You use IP address 10.1.1.1. You also installed the Security Gateway on a second GAiA computer, which you plan to ship to another Administrator at a MegaCorp hub office. What is the correct order for pushing SIC certificates to the Gateway before shipping it?
1. Run cpconfig on the Gateway, select Secure Internal Communication, enter the activation key, and reconfirm.
2. Initialize Internal Certificate Authority (ICA) on the Security Management Server.
3. Configure the Gateway object with the host name and IP addresses for the remote site.
4. Click the Communication button in the Gateway object's General screen, enter the activation key, and click Initialize and OK.
5. Install the Security Policy.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (249q)
Question 1: There are two R77.30 Security Gateways in the Firewall Clust...
Question 2: Your users are defined in a Windows 2008 R2 Active Directory...
Question 3: Which VPN routing option uses VPN routing for every connecti...
Question 4: Which of the following commands can be used to remove site-t...
Question 5: What is the appropriate default Gaia Portal address?...
Question 6: What are the two high availability modes?...
Question 7: An internal router is sending UDP keep-alive packets that ar...
Question 8: After the initial installation the First Time Configuration ...
Question 9: Fill in the blank: The command __________ provides the most ...
Question 10: Can a Check Point gateway translate both source IP address a...
Question 11: Fill in the blank: A new license should be generated and ins...
Question 12: Which of the following is NOT a SecureXL traffic flow?...
Question 13: Fill in the blanks: The Application Layer Firewalls inspect ...
Question 14: What happens if the identity of a user is known?...
Question 15: You installed Security Management Server on a computer using...
Question 16: Tina is a new administrator who is currently reviewing the n...
Question 17: Which policy type is used to enforce bandwidth and traffic c...
Question 18: Fill in the blank: The R80 utility fw monitoris used to trou...
Question 19: Which SmartConsole component can Administrators use to track...
Question 20: How do you configure the Security Policy to provide uses acc...
Question 21: A Cleanup rule:
Question 22: Fill in the blank: A(n) _____ rule is created by an administ...
Question 23: Ken wants to obtain a configuration lock from other administ...
Question 24: Provide very wide coverage for all products and protocols, w...
Question 25: Which component functions as the Internal Certificate Author...
Question 26: Fill in the blank: RADIUS Accounting gets ______ data from r...
Question 27: What are the three conflict resolution rules in the Threat P...
Question 28: Two administrators Dave and Jon both manage R80 Management a...
Question 29: As a Security Administrator, you must refresh the Client Aut...
Question 30: Which rule is responsible for the user authentication failur...
Question 31: View the rule below. What does the lock-symbol in the left c...
Question 32: Which one of the following is the preferred licensing model?...
Question 33: Which command is used to add users to or from existing roles...
Question 34: Office mode means that:
Question 35: On the following graphic, you will find layers of policies. ...
Question 36: Fill in the blanks: VPN gateways authenticate using ________...
Question 37: When using GAiA, it might be necessary to temporarily change...
Question 38: Fill in the blank: To build an effective Security Policy, us...
Question 39: AdminA and AdminB are both logged in on SmartConsole. What d...
Question 40: In which deployment is the security management server and Se...
Question 41: Review the following screenshot and select the BEST answer. ...
Question 42: Which product correlates logs and detects security threats, ...
Question 43: On the following picture an administrator configures Identit...
Question 44: Sally has a Hot Fix Accumulator (HFA) she wants to install o...
Question 45: Which utility allows you to configure the DHCP service on GA...
Question 46: Which authentication scheme requires a user to possess a tok...
Question 47: Which options are given on features, when editing a Role on ...
Question 48: Which of the following is NOT a VPN routing option available...
Question 49: You are the administrator for Alpha Corp. You have logged in...
Question 50: Which of the following are available SmartConsole clients wh...
Question 51: When launching SmartDashboard, what information is required ...
Question 52: VPN gateways must authenticate to each other prior to exchan...
Question 53: Kofi, the administrator of the ALPHA Corp network wishes to ...
Question 54: What happens if the identity of a user is known?...
Question 55: Fill in the blank: The IPS policy for pre-R80 gateways is in...
Question 56: What statement is true regarding Visitor Mode?...
Question 57: What CLI utility allows an administrator to capture traffic ...
Question 58: In R80, Unified Policy is a combination of...
Question 59: John Adams is an HR partner in the ACME organization. ACME I...
Question 60: Jack works for a managed service provider and he has been ta...
Question 61: You are about to integrate RSA SecurID users into the Check ...
1 commentQuestion 62: Choose the correct statement regarding Implicit Rules....
Question 63: You want to establish a VPN, using certificates. Your VPN wi...
Question 64: In the Check Point three-tiered architecture, which of the f...
Question 65: When using LDAP as an authentication method for Identity Awa...
Question 66: Which of these attributes would be critical for a site-to-si...
Question 67: You want to reset SIC between smberlin and sgosaka. (Exhibit...
Question 68: An administrator is creating an IPsec site-to-site VPN betwe...
Question 69: Which of the completed statements is NOT true? The WebUI can...
Question 70: Which Check Point feature enables application scanning and t...
Question 71: Which of the following are types of VPN communicates?...
Question 72: Vanessa is firewall administrator in her company; her compan...
Question 73: You are working with multiple Security Gateways enforcing an...
Question 74: Fill in the blank: The R80 SmartConsole, SmartEvent GUI clie...
Question 75: Where would an administrator enable Implied Rules logging?...
Question 76: Which of the following is NOT a back up method?...
Question 77: MyCorp has the following NAT rules. You need to disable the ...
Question 78: Which information is included in the "Full Log" tracking opt...
Question 79: To optimize Rule Base efficiency the most hit rules should b...
Question 80: You have two rules, ten users, and two user groups in a Secu...
Question 81: Which of the following is NOT an advantage to using multiple...
Question 82: With which command can view the running configuration of Gai...
Question 83: Fill in the blank: Browser-based Authentication sends users ...
Question 84: What are the three authentication methods for SIC?...
Question 85: Which set of objects have an Authentication tab?...
Question 86: Which of the following uses the same key to decrypt as it do...
Question 87: Which of the following is NOT a license activation method?...
Question 88: Which of the following is NOT an element of VPN Simplified M...
Question 89: Which utility shows the security gateway general system info...
Question 90: When doing a Stand-Alone Installation, you would install the...
Question 91: What port is used for communication to the User Center with ...
Question 92: The security Gateway is installed on GAiA R80 The default po...
Question 93: Which type of Check Point license is tied to the IP address ...
Question 94: Which type of Endpoint Identity Agent includes packet taggin...
Question 95: What is the order of NAT priorities?...
Question 96: Choose what BEST describes users on Gaia Platform....
Question 97: Your company enforces a strict change control policy. Which ...
Question 98: You are unable to login to SmartDashboard. You log into the ...
Question 99: Fill in the blank: Licenses can be added to the License and ...
1 commentQuestion 100: The following graphic shows: (Exhibit)...
Question 101: Where can you trigger a failover of the cluster members? Log...
Question 102: Which of the following licenses are considered temporary?...
Question 103: Alpha Corp., and have recently returned from a training cour...
Question 104: Which of the following is a hash algorithm?...
Question 105: Choose the BEST describes the Policy Layer Traffic Inspectio...
Question 106: You find that Users are not prompted for authentication when...
Question 107: You are about to test some rule and object changes suggested...
Question 108: Which R77 GUI would you use to see number of packets accepte...
Question 109: Which directory holds the SmartLog index files by default?...
Question 110: NAT can NOT be configured on which of the following objects?...
Question 111: You are the Security Administrator for MegaCorp. In order to...
Question 112: R80 Security Management Server can be installed on which of ...
Question 113: How many packets does the IKE exchange use for Phase 1 Main ...
Question 114: The Gaia operating system supports which routing protocols?...
Question 115: John Adams is an HR partner in the ACME organization. ACME I...
Question 116: In which VPN community is a satellite VPN gateway not allowe...
Question 117: What does ExternalZone represent in the presented rule? (Exh...
Question 118: Fill in the blank: The _________ software blade enables Appl...
Question 119: You want to define a selected administrator's permission to ...
Question 120: You believe Phase 2 negotiations are failing while you are a...
Question 121: Which of the following is NOT an integral part of VPN commun...
Question 122: Which feature in R77 permits blocking specific IP addresses ...
Question 123: Which of the following is NOT an option for internal network...
Question 124: You are conducting a security audit. While reviewing configu...
Question 125: Where can administrator edit a list of trusted SmartConsole ...
Question 126: When you upload a package or license to the appropriate repo...
Question 127: Which of the following technologies extracts detailed inform...
Question 128: Where does the security administrator activate Identity Awar...
Question 129: The most important part of a site-to-site VPN deployment is ...
Question 130: Bob and Joe both have Administrator Roles on their Gaia Plat...
Question 131: You have configured SNX on the Security Gateway. The client ...
Question 132: Choose what BEST describes a Session....
Question 133: Fill in the blank: A _______ is used by a VPN gateway to sen...
Question 134: Which Check Point software blade provides protection from ze...
Question 135: Why would an administrator see the message below? (Exhibit)...
Question 136: Joey is using the computer with IP address 192.168.20.13. He...
Question 137: You are going to upgrade from R77 to R80. Before the upgrade...
Question 138: Fill in the blank: The R80 feature ________ permits blocking...
Question 139: Which type of the Check Point license ties the package licen...
Question 140: Match the following commands to their correct function. Each...
Question 141: Which of the following is TRUE regarding Gaia command line?...
Question 142: Which of the following firewall modes DOES NOT allow for Ide...
Question 143: Which tool CANNOT be launched from SmartUpdate R77?...
Question 144: Fill in the blank: The _________ collects logs and sends the...
Question 145: What is the Manual Client Authentication TELNET port?...
Question 146: The Captive Portal tool:
Question 147: If there are two administrators logged in at the same time t...
Question 148: Which feature is NOT provided by all Check Point Mobile Acce...
Question 149: Your bank's distributed R77 installation has Security Gatewa...
Question 150: Your manager requires you to setup a VPN to a new business p...
Question 151: You work as a security administrator for a large company. CS...
Question 152: Message digests use which of the following?...
Question 153: Fill in the blank: RADIUS protocol uses ______ to communicat...
Question 154: Which pre-defined Permission Profile should be assigned to a...
Question 155: Which of the following actions do NOT take place in IKE Phas...
Question 156: When a packet arrives at the gateway, the gateway checks it ...
Question 157: Which Threat Prevention Software Blade provides comprehensiv...
Question 158: By default, which port does the WebUI listen on?...
Question 159: While enabling the Identity Awareness blade the Identity Awa...
Question 160: The IT Management team is interested in the new features of ...
Question 161: What are the two types of address translation rules?...
Question 162: What will be the effect of running the following command on ...
Question 163: What does it mean if Bob gets this result on an object searc...
Question 164: Which of the following authentication methods can be configu...
Question 165: Vanessa is a Firewall administrator. She wants to test a bac...
Question 166: What is the purpose of Captive Portal?...
Question 167: Fill in the blank: Each cluster has __________ interfaces....
Question 168: Packages and licenses are loaded from all of theses sources ...
Question 169: Fill in the blank: Once a license is activated, a ________ s...
Question 170: How do you configure an alert in SmartView Monitor?...
Question 171: Look at the screenshot below. What CLISH command provides th...
Question 172: What is the potential downside or drawback to choosing the S...
Question 173: Tom has been tasked to install Check Point R80 in a distribu...
Question 174: DLP and Geo Policy are examples of what type of Policy?...
Question 175: Which of the following is TRUE about the Check Point Host ob...
Question 176: Which of the following is NOT an alert option?...
Question 177: Fill in the blank: Gaia can be configured using the _______ ...
Question 178: Which of the following is NOT a valid option when configurin...
Question 179: Which policy type has its own Exceptions section?...
Question 180: Which of the following is NOT a component of a Distinguished...
Question 181: If there is an Accept Implied Policy set to "First", what is...
Question 182: Where do we need to reset the SIC on a gateway object?...
Question 183: What is the default shell of Gaia CLI?...
Question 184: Review the rules. Assume domain UDP is enabled in the implie...
Question 185: Your boss wants you to closely monitor an employee suspected...
Question 186: What is also referred to as Dynamic NAT?...
1 commentQuestion 187: What is the default time length that Hit Count Data is kept?...
Question 188: What is the default method for destination NAT?...
Question 189: Fill in the blank: The tool _______ generates a R80 Security...
Question 190: Which of the below is the MOST correct process to reset SIC ...
Question 191: The fw monitorutility is used to troubleshoot which of the f...
Question 192: How many users can have read/write access in Gaia at one tim...
Question 193: MegaCorp's security infrastructure separates Security Gatewa...
Question 194: Which of these components does NOT require a Security Gatewa...
Question 195: All R77 Security Servers can perform authentication with the...
Question 196: The technical-support department has a requirement to access...
Question 197: In SmartView Tracker, which rule shows when a packet is drop...
Question 198: You find a suspicious connection from a problematic host. Yo...
Question 199: Harriet wants to protect sensitive information from intentio...
Question 200: Examine the following Rule Base. (Exhibit) What can we infer...
Question 201: You have enabled "Full Log" as a tracking option to a securi...
Question 202: rd According to Check Point Best Practice, when adding a 3 p...
Question 203: Fill in the blank: With the User Directory Software Blade, y...
Question 204: Fill in the blanks: A Check Point software license consists ...
Question 205: What does the "unknown" SIC status shown on SmartConsole mea...
Question 206: At what point is the Internal Certificate Authority (ICA) cr...
Question 207: When attempting to start a VPN tunnel, in the logs the error...
Question 208: Which of the following is NOT defined by an Access Role obje...
Question 209: Web Control Layer has been set up using the settings in the ...
Question 210: What is the default shell for the command line interface?...
Question 211: Which of the following ClusterXL modes uses a non-unicast MA...
Question 212: A client has created a new Gateway object that will be manag...
Question 213: Which of the following statements accurately describes the c...
Question 214: You manage a global network extending from your base in Chic...
Question 215: Mesh and Star are two types of VPN topologies. Which stateme...
Question 216: Joey wants to configure NTP on R80 Security Management Serve...
Question 217: Choose the SmartLog property that is TRUE....
Question 218: Which of the following is NOT a set of Regulatory Requiremen...
Question 219: Which default user has full read/write access?...
Question 220: ALPHA Corp has a new administrator who logs into the Gaia Po...
Question 221: Katie has been asked to do a backup on the Blue Security Gat...
Question 222: What happens when you run the command: fw sam -J src [Source...
Question 223: As you review this Security Policy, what changes could you m...
Question 224: What port is used for delivering logs from the gateway to th...
Question 225: Fill in the blanks: In the Network policy layer, the default...
Question 226: According to Check Point Best Practice, when adding a non-ma...
Question 227: Fill in the blanks: A High Availability deployment is referr...
Question 228: The organization's security manager wishes to back up just t...
Question 229: Fill in the blank: When LDAP is integrated with Check Point ...
Question 230: While in SmartView Tracker, Brady has noticed some very odd ...
Question 231: You are using SmartView Tracker to troubleshoot NAT entries....
Question 232: Anti-Spoofing is typically set up on which object type?...
Question 233: In R80 spoofing is defined as a method of:...
Question 234: What action can be performed from SmartUpdate R77?...
Question 235: When Identity Awareness is enabled, which identity source(s)...
Question 236: Fill in the blank: The __________ is used to obtain identifi...
Question 237: Administrator wishes to update IPS from SmartConsole by clic...
Question 238: Choose the Best place to find a Security Management Server b...
Question 239: Administrator Kofi has just made some changes on his Managem...
Question 240: Jennifer McHanry is CEO of ACME. She recently bought her own...
Question 241: Which of the following statements is TRUE about R80 manageme...
Question 242: Which command is used to obtain the configuration lock in Ga...
Question 243: What is Consolidation Policy?
Question 244: In order to modify Security Policies the administrator can u...
Question 245: Which Check Point software blade prevents malicious files fr...
Question 246: Study the Rule base and Client Authentication Action propert...
Question 247: Which application should you use to install a contract file?...
Question 248: Which of the following is an identity acquisition method tha...
Question 249: Which of the following is NOT an authentication scheme used ...