Valid 156-215.77 Dumps shared by ExamDiscuss.com for Helping Passing 156-215.77 Exam! ExamDiscuss.com now offer the newest 156-215.77 exam dumps, the ExamDiscuss.com 156-215.77 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com 156-215.77 dumps with Test Engine here:

Access 156-215.77 Dumps Premium Version
(390 Q&As Dumps, 35%OFF Special Discount Code: freecram)

Online Access Free 156-215.77 Exam Questions

Exam Code:156-215.77
Exam Name:Check Point Certified Security Administrator
Certification Provider:CheckPoint
Free Question Number:365
Version:v2018-03-20
Rating:
# of views:1068
# of Questions views:135393
Go To 156-215.77 Questions

Recent Comments (The most recent comments are at the top.)

Armstrong - Nov 01, 2021

i was using 156-215.77 practice test for about 2 weeks before exam. And i passed. I feel so joyful because all my efforts were worthywhile. Thanks a lot for help!

Reza - Aug 09, 2018

No.# This question is wrong! There is no command "idle" in Gaia. This command exists only in SecurePlatform OS.

Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk95447

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Other Version
1398 viewsCheckPoint.156-215.77.v2018-05-05.q350
Exam Question List
Question 1: Where can you find the Check Point's SNMP MIB file?...
Question 2: What CLI utility allows an administrator to capture traffic ...
Question 3: An advantage of using central instead of local licensing is:...
Question 4: Which of the following actions take place in IKE Phase 2 wit...
Question 5: You manage a global network extending from your base in Chic...
Question 6: In SmartView Tracker, which rule shows when a packet is drop...
Question 7: When doing a Stand-Alone Installation, you would install the...
Question 8: Installing a policy usually has no impact on currently exist...
Question 9: Your organization's disaster recovery plan needs an update t...
Question 10: What happens when you select File > Export from the Smart...
Question 11: Which of the following statements is TRUE about management p...
Question 12: You receive a notification that long-lasting Telnet connecti...
Question 13: An internal host initiates a session to the Google.com websi...
Question 14: Exhibit: (Exhibit) You installed Security Management Server ...
Question 15: Which of the following is a hash algorithm?...
Question 16: Choose the correct statement regarding Stealth Rules:...
Question 17: SmartView Tracker logs the following Security Administrator ...
Question 18: John Adams is an HR partner in the ACME organization. ACME I...
Question 19: Your company is still using traditional mode VPN configurati...
Question 20: Match the following commands to their correct function. Each...
Question 21: Your users are defined in a Windows 2008 R2 Active Directory...
Question 22: Which of the following is true of a Stealth Rule?...
Question 23: With deployment of SecureClient, you have defined in the pol...
Question 24: What are you required to do before running the command upgra...
Question 25: Your Security Management Server fails and does not reboot. O...
Question 26: A host on the Internet initiates traffic to the Static NAT I...
Question 27: Complete this statement from the options provided. Using Cap...
Question 28: The Captive Portal tool:
Question 29: Which of these attributes would be critical for a site-to-si...
Question 30: What information is found in the SmartView Tracker Managemen...
Question 31: You have configured Automatic Static NAT on an internal host...
Question 32: Your main internal network 10.10.10.0/24 allows all traffic ...
Question 33: What is the syntax for uninstalling a package using newpkg?...
Question 34: Your primary Security Gateway runs on GAiA. What is the easi...
Question 35: SmartView Monitor is mainly for which kind of work - 1. Moni...
Question 36: Your company has two headquarters, one in London, one in New...
Question 37: The third-shift Administrator was updating Security Manageme...
Question 38: The Security Gateway is installed on GAiA R77 The default po...
Question 39: A _______ rule is used to prevent all traffic going to the R...
Question 40: Which SmartConsole tool would you use to see the last policy...
Question 41: In a distributed management environment, the administrator h...
Question 42: Sally has a Hot Fix Accumulator (HFA) she wants to install o...
Question 43: Which command enables IP forwarding on IPSO?...
Question 44: Which of the following is an authentication method used by I...
Question 45: Which of these components does NOT require a Security Gatewa...
Question 46: Which of the following statements BEST describes Check Point...
Question 47: Choose the BEST sequence for configuring user management in ...
Question 48: Why should the upgrade_export configuration file (.tgz) be d...
Question 49: Identity Awareness is implemented to manage access to protec...
Question 50: Which of the following items should be configured for the Se...
Question 51: After implementing Static Address Translation to allow Inter...
Question 52: How can you activate the SNMP daemon on a Check Point Securi...
Question 53: What is the primary benefit of using the command upgrade_exp...
Question 54: When using LDAP as an authentication method for Identity Awa...
Question 55: Certificates for Security Gateways are created during a simp...
Question 56: SmartUpdate is mainly for which kind of work - 1. Monitoring...
Question 57: Which R77 SmartConsole tool would you use to verify the inst...
Question 58: SmartView Tracker R77 consists of three different modes. The...
Question 59: You are about to integrate RSA SecurID users into the Check ...
Question 60: Which feature in R77 permits blocking specific IP addresses ...
Question 61: Where can an administrator configure the notification action...
Question 62: The INSPECT engine inserts itself into the kernel between wh...
Question 63: Looking at the SYN packets in the Wireshark output, select t...
Question 64: Which of the following is NOT a valid option when configurin...
Question 65: How does the button Get Address, found on the Host Node Obje...
Question 66: As you review this Security Policy, what changes could you m...
Question 67: Which of the following allows administrators to allow or den...
Question 68: If a SmartUpdate upgrade or distribution operation fails on ...
Question 69: Which of the following describes the default behavior of an ...
Question 70: When using vpn tu, which option must you choose if you want ...
Question 71: During which step in the installation process is it necessar...
Question 72: How do you recover communications between your Security Mana...
Question 73: When translation occurs using automatic Hide NAT, what also ...
Question 74: How granular may an administrator filter an Access Role with...
Question 75: What is the Manual Client Authentication TELNET port?...
Question 76: Which of the following items should be configured for the Se...
Question 77: Which of the following statements accurately describes the c...
Question 78: A marketing firm's networking team is trying to troubleshoot...
Question 79: What is the difference between Standard and Specific Sign On...
Question 80: To qualify as an Identity Awareness enabled rule, which colu...
Question 81: You are using SmartView Tracker to troubleshoot NAT entries....
Question 82: John Adams is an HR partner in the ACME organization. ACME I...
Question 83: Which rule is responsible for the installation failure? Exhi...
Question 84: Which SmartView Tracker mode allows you to read the SMTP e-m...
Question 85: When using an encryption algorithm, which is generally consi...
Question 86: You want to configure a mail alert for every time the policy...
Question 87: Where is the easiest and BEST place to find information abou...
Question 88: What is the officially accepted diagnostic tool for IP Appli...
Question 89: When you change an implicit rule's order from Last to First ...
Question 90: VPN gateways must authenticate to each other prior to exchan...
Question 91: What CANNOT be configured for existing connections during a ...
1 commentQuestion 92: You want to generate a cpinfo file via CLI on a system runni...
Question 93: Can you use Captive Portal with HTTPS?...
Question 94: Which port must be allowed to pass through enforcement point...
Question 95: Which type of R77 Security Server does not provide User Auth...
Question 96: Which R77 GUI would you use to see the number of packets acc...
Question 97: You have installed a R77 Security Gateway on GAiA. To manage...
Question 98: Which of these Security Policy changes optimize Security Gat...
Question 99: How can you configure an application to automatically launch...
Question 100: An Administrator without access to SmartDashboard installed ...
Question 101: Because of pre-existing design constraints, you set up manua...
Question 102: Identify the correct step performed by SmartUpdate to upgrad...
Question 103: Your R77 primary Security Management Server is installed on ...
Question 104: You find a suspicious FTP site trying to connect to one of y...
Question 105: Choose the SmartLog property that is TRUE....
Question 106: Anti-Spoofing is typically set up on which object type?...
Question 107: You intend to upgrade a Check Point Gateway from R71 to R77....
Question 108: How do you configure an alert in SmartView Monitor?...
Question 109: What command syntax would you use to see accounts the gatewa...
Question 110: You need to back up the routing, interface, and DNS configur...
Question 111: Which of the following R77 SmartView Tracker views will disp...
Question 112: When configuring LDAP authentication, which of the following...
Question 113: You have a diskless appliance platform. How do you keep swap...
Question 114: Your shipping company uses a custom application to update th...
Question 115: Central license management allows a Security Administrator t...
Question 116: Which of the following are authentication methods that Secur...
Question 117: Which of the following actions do NOT take place in IKE Phas...
Question 118: Although SIC was already established and running, Joe reset ...
Question 119: Spoofing is a method of:
Question 120: A Cleanup rule:
Question 121: True or FalsE. SmartView Monitor can be used to create alert...
Question 122: Your internal network is configured to be 10.1.1.0/24. This ...
Question 123: Which command allows you to view the contents of an R77 tabl...
Question 124: Where are SmartEvent licenses installed?...
Question 125: Your manager requires you to setup a VPN to a new business p...
Question 126: You have detected a possible intruder listed in SmartView Tr...
Question 127: Where do we need to reset the SIC on a gateway object?...
Question 128: Which of the following commands can provide the most complet...
Question 129: Which component functions as the Internal Certificate Author...
Question 130: You can include External commands in SmartView Tracker by th...
Question 131: What is a Consolidation Policy?...
Question 132: Many companies have defined more than one administrator. To ...
Question 133: How many packets does the IKE exchange use for Phase 1 Aggre...
Question 134: Lily has completed the initial setup of her Management Serve...
Question 135: In the Rule Base displayed for fwsingapore, user authenticat...
Question 136: The technical-support department has a requirement to access...
Question 137: In SmartDashboard, you configure 45 MB as the required free ...
Question 138: A client has created a new Gateway object that will be manag...
Question 139: You enable Hide NAT on the network object, 10.1.1.0 behind t...
Question 140: Which of the below is the MOST correct process to reset SIC ...
Question 141: You are a Security Administrator who has installed Security ...
Question 142: Which of the following is NOT defined by an Access Role obje...
Question 143: All of the following are Security Gateway control connection...
Question 144: Where can an administrator specify the notification action t...
Question 145: Assume you are a Security Administrator for ABCTech. You hav...
Question 146: You find a suspicious connection from a problematic host. Yo...
Question 147: The London Security Gateway Administrator has just installed...
Question 148: When you use the Global Properties' default settings on R77,...
Question 149: Your Security Gateways are running near performance capacity...
Question 150: Which authentication type permits five different sign-on met...
Question 151: Packages and licenses are loaded into the SmartUpdate reposi...
Question 152: Which operating systems are supported by a Check Point Secur...
Question 153: In the Rule Base displayed, user authentication in Rule 4 is...
Question 154: You are conducting a security audit. While reviewing configu...
Question 155: A company has disabled logging for some of the most commonly...
Question 156: What gives administrators more flexibility when configuring ...
Question 157: What port is used for communication to the User Center with ...
Question 158: Which of the following methods will provide the most complet...
Question 159: ______________ is an R77 component that displays the number ...
Question 160: Which rule position in the Rule Base should hold the Cleanup...
Question 161: While in SmartView Tracker, Brady has noticed some very odd ...
Question 162: Katie has been asked to setup a rule to allow the new webser...
Question 163: When you hide a rule in a Rule Base, how can you then disabl...
Question 164: Which command would provide the most comprehensive diagnosti...
Question 165: Jack has locked himself out of the Kirk Security Gateway wit...
Question 166: What information is found in the SmartView Tracker Managemen...
Question 167: How can you recreate the Security Administrator account, whi...
Question 168: Which SmartView Tracker selection would most effectively sho...
Question 169: To check the Rule Base, some rules can be hidden so they do ...
Question 170: A snapshot delivers a complete GAiA backup. The resulting fi...
Question 171: Where would an administrator enable Implied Rules logging?...
Question 172: What is a possible reason for the IKE failure shown in this ...
Question 173: ALL of the following options are provided by the GAiA syscon...
Question 174: The R77 fw monitor utility is used to troubleshoot which of ...
Question 175: A Security Policy installed by another Security Administrato...
Question 176: Which command allows Security Policy name and install date v...
Question 177: You are running the license_upgrade tool on your GAiA Gatewa...
Question 178: You have two rules, ten users, and two user groups in a Secu...
Question 179: Which rules are not applied on a first-match basis?...
Question 180: The third-shift Administrator was updating Security Manageme...
Question 181: Which of the following is NOT useful to verify whether or no...
Question 182: Which command line interface utility allows the administrato...
Question 183: Can a Check Point gateway translate both source IP address a...
Question 184: Which R77 feature or command allows Security Administrators ...
Question 185: Which NAT option applicable for Automatic NAT applies to Man...
Question 186: Where does the security administrator activate Identity Awar...
Question 187: You are the Security Administrator for MegaCorp. A Check Poi...
Question 188: Your company is running Security Management Server R77 on GA...
Question 189: You want to implement Static Destination NAT in order to pro...
Question 190: The customer has a small Check Point installation which incl...
Question 191: In which Rule Base can you implement an Access Role?...
Question 192: An Administrator without access to SmartDashboard installed ...
Question 193: What is the default setting when you use NAT?...
Question 194: If you were NOT using IKE aggressive mode for your IPsec tun...
Question 195: Over the weekend, an Administrator without access to SmartDa...
Question 196: You are MegaCorp's Security Administrator. There are various...
Question 197: Which set of objects have an Authentication tab?...
Question 198: Reviewing the Rule Base, you see that ________ is responsibl...
Question 199: You install and deploy GAiA with default settings. You allow...
Question 200: Which Security Gateway R77 configuration setting forces the ...
Question 201: Your company has two headquarters, one in London, and one in...
Question 202: You are the Security Administrator for ABC-Corp. A Check Poi...
Question 203: Suppose the Security Gateway hard drive fails and you are fo...
Question 204: MegaCorp's security infrastructure separates Security Gatewa...
Question 205: Several Security Policies can be used for different installa...
Question 206: When configuring anti-spoofing on the Security Gateway objec...
Question 207: Study the Rule base and Client Authentication Action propert...
Question 208: Where is the fingerprint generated, based on the output disp...
Question 209: Which of the following authentication methods can be configu...
Question 210: In a distributed management environment, the administrator h...
Question 211: What is also referred to as Dynamic NAT?...
Question 212: Choose the correct statement regarding Implied Rules:...
Question 213: Which of the following is a viable consideration when determ...
Question 214: You have included the Cleanup Rule in your Rule Base. Where ...
Question 215: One of your remote Security Gateways suddenly stops sending ...
Question 216: What happens when you run the command. fw sam -J src [Source...
Question 217: What command syntax would you use to turn on PDP logging in ...
Question 218: Which utility allows you to configure the DHCP service on GA...
Question 219: Which of the following is true of the Cleanup rule?...
Question 220: In SmartDashboard, Translate destination on client side is c...
Question 221: How are cached usernames and passwords cleared from the memo...
Question 222: You are reviewing the Security Administrator activity for a ...
Question 223: Which rule is responsible for the installation failure? Exhi...
Question 224: You would use the Hide Rule feature to:...
Question 225: What happens if you select Web Server in the dialog box? Exh...
Question 226: Which of the following is NOT true for Clientless VPN?...
Question 227: You are trying to save a custom log query in R77 SmartView T...
Question 228: Identify the correct step performed by SmartUpdate to upgrad...
Question 229: You have just installed your Gateway and want to analyze the...
Question 230: The customer has a small Check Point installation which incl...
Question 231: Exhibit: (Exhibit) You plan to create a backup of the rules,...
Question 232: What happens if the identity of a user is known?...
Question 233: When using AD Query to authenticate users for Identity Aware...
Question 234: What statement is true regarding Visitor Mode?...
Question 235: How many packets does the IKE exchange use for Phase 1 Main ...
Question 236: The customer has a small Check Point installation which incl...
Question 237: If a Security Gateway enforces three protections, LDAP Injec...
Question 238: You believe Phase 2 negotiations are failing while you are a...
Question 239: Which command displays the installed Security Gateway versio...
Question 240: Exhibit: (Exhibit) Chris has lost SIC communication with his...
Question 241: What happens when you open the Gateway object window Trusted...
Question 242: An internal router is sending UDP keep-alive packets that ar...
Question 243: What does SmartUpdate allow you to do?...
Question 244: You are the Security Administrator for MegaCorp. In order to...
Question 245: Complete this statement. The block Intruder option in the Ac...
Question 246: When attempting to connect with SecureClient Mobile you get ...
Question 247: By default, when you click File > Switch Active File in S...
Question 248: Your company's Security Policy forces users to authenticate ...
Question 249: One of your remote Security Gateway's suddenly stops sending...
Question 250: You are working with multiple Security Gateways that enforce...
Question 251: Your company enforces a strict change control policy. Which ...
Question 252: Users with Identity Awareness Agent installed on their machi...
Question 253: Which Check Point address translation method allows an admin...
Question 254: Security Gateway R77 supports User Authentication for which ...
Question 255: UDP packets are delivered if they are ___________....
Question 256: Why are certificates preferred over pre-shared keys in an IP...
Question 257: How can you reset the Security Administrator password that w...
Question 258: Which command displays the installed Security Gateway kernel...
Question 259: You need to completely reboot the Operating System after mak...
Question 260: You cannot use SmartDashboard's User Directory features to c...
Question 261: Several Security Policies can be used for different installa...
Question 262: Which of the following uses the same key to decrypt as it do...
Question 263: Is it possible to track the number of connections each rule ...
Question 264: What mechanism does a gateway configured with Identity Aware...
Question 265: Exhibit: (Exhibit) Of the following, what parameters will no...
Question 266: You just installed a new Web server in the DMZ that must be ...
Question 267: You are a Security Administrator preparing to deploy a new H...
Question 268: Identify the ports to which the Client Authentication daemon...
Question 269: When launching SmartDashboard, what information is required ...
Question 270: A digital signature:
Question 271: You have configured SNX on the Security Gateway. The client ...
Question 272: After filtering a fw monitor trace by port and IP, a packet ...
Question 273: How do you use SmartView Monitor to compile traffic statisti...
Question 274: Which of the following objects is a valid source in an authe...
Question 275: Static NAT connections, by default, translate on which firew...
Question 276: Charles requests a Website while using a computer not in the...
Question 277: Lilly needs to review VPN History counters for the last week...
Question 278: Which SmartConsole component can Administrators use to track...
Question 279: You have three servers located in a DMZ, using private IP ad...
Question 280: John is the Security Administrator in his company. He instal...
Question 281: You run cpconfig to reset SIC on the Security Gateway. After...
Question 282: Select the TRUE statements about the Rule Base shown? Exhibi...
Question 283: What command with appropriate switches would you use to test...
Question 284: Which of the following options is available with the GAiA cp...
Question 285: You are working with three other Security Administrators. Wh...
Question 286: Which answers are TRUE? Automatic Static NAT CANNOT be used ...
Question 287: Which command gives an overview of your installed licenses?...
Question 288: A Security Policy has several database versions. What config...
Question 289: The Tokyo Security Management Server Administrator cannot co...
Question 290: Which Client Authentication sign-on method requires the user...
Question 291: Which feature or command provides the easiest path for Secur...
Question 292: When restoring R77 using the command upgrade_import, which o...
Question 293: You find that Users are not prompted for authentication when...
Question 294: The Identity Agent is a lightweight endpoint agent that auth...
Question 295: You want to establish a VPN, using certificates. Your VPN wi...
Question 296: Which item below in a Security Policy would be enforced firs...
Question 297: Which of the following tools is used to generate a Security ...
Question 298: For which service is it NOT possible to configure user authe...
Question 299: Before upgrading SecurePlatform to GAiA, you should create a...
Question 300: How many packets are required for IKE Phase 2?...
Question 301: Which of the following items should be configured for the Se...
Question 302: What action can be performed from SmartUpdate R77?...
Question 303: For remote user authentication, which authentication scheme ...
Question 304: Which statement is TRUE about implicit rules?...
Question 305: As a Security Administrator, you must refresh the Client Aut...
Question 306: When configuring the Check Point Gateway network interfaces,...
Question 307: What action CANNOT be run from SmartUpdate R77?...
Question 308: John Adams is an HR partner in the ACME organization. ACME I...
Question 309: You have created a Rule Base for firewall, websydney. Now yo...
Question 310: Which rule is responsible for the client authentication fail...
Question 311: You enable Automatic Static NAT on an internal host node obj...
Question 312: Review the rules. (Exhibit) Assume domain UDP is enabled in ...
Question 313: Your bank's distributed R77 installation has Security Gatewa...
Question 314: Your boss wants you to closely monitor an employee suspected...
Question 315: If you are experiencing LDAP issues, which of the following ...
Question 316: Your perimeter Security Gateway's external IP is 200.200.200...
Question 317: All R77 Security Servers can perform authentication with the...
Question 318: How can you check whether IP forwarding is enabled on an IP ...
Question 319: How do you configure the Security Policy to provide user acc...
Question 320: Which answer below best describes the Administrator Auditing...
Question 321: Where do you verify that UserDirectory is enabled?...
Question 322: You are the Security Administrator for MegaCorp and would li...
Question 323: Tom has been tasked to install Check Point R77 in a distribu...
Question 324: You want to reset SIC between smberlin and sgosaka. (Exhibit...
Question 325: Which authentication type requires specifying a contact agen...
Question 326: What is the purpose of an Identity Agent?...
Question 327: What happens if the identity of a user is known?...
Question 328: Which of the following methods is NOT used by Identity Aware...
Question 329: What type of traffic can be re-directed to the Captive Porta...
Question 330: What must a Security Administrator do to comply with a manag...
Question 331: NAT can NOT be configured on which of the following objects?...
Question 332: Which of the following is a viable consideration when determ...
Question 333: You have a mesh VPN Community configured to create a site-to...
Question 334: Which of the following is a CLI command for Security Gateway...
Question 335: Which of the following are available SmartConsole clients wh...
Question 336: What physical machine must have access to the User Center pu...
Question 337: Which of the following is a viable consideration when determ...
Question 338: You are responsible for the configuration of MegaCorp's Chec...
Question 339: Which of the following authentication methods can be configu...
Question 340: Jack has been asked do enable Identify Awareness. What are t...
Question 341: Which NAT option is available for Manual NAT as well as Auto...
Question 342: The SIC certificate is stored in the directory _____________...
Question 343: Peter is your new Security Administrator. On his first worki...
Question 344: The fw monitor utility is used to troubleshoot which of the ...
Question 345: Which of the following can be found in cpinfo from an enforc...
Question 346: You are installing a Security Management Server. Your securi...
Question 347: You are running a R77 Security Gateway on GAiA. In case of a...
Question 348: The User Directory Software Blade is used to integrate which...
Question 349: Which Check Point address translation method is necessary if...
Question 350: You are about to test some rule and object changes suggested...
Question 351: Which of the following firewall modes DOES NOT allow for Ide...
Question 352: Match the terms with their definitions: Exhibit: (Exhibit)...
Question 353: Jennifer McHanry is CEO of ACME. She recently bought her own...
Question 354: Which of the following commands can be used to remove site-t...
Question 355: A Web server behind the Security Gateway is set to Automatic...
Question 356: Central license management allows a Security Administrator t...
Question 357: Which tool CANNOT be launched from SmartUpdate R77?...
Question 358: How can you activate the SNMP daemon on a Check Point Securi...
Question 359: Which directory holds the SmartLog index files by default?...
Question 360: Message digests use which of the following?...
Question 361: When using vpn tu, which option must you choose if you only ...
Question 362: When using GAiA, it might be necessary to temporarily change...
Question 363: Secure Internal Communications (SIC) is completely NAT-toler...
Question 364: You review this Security Policy because Rule 4 is inhibited....
Question 365: You are a Security Administrator using one Security Manageme...