Valid 156-315.77 Dumps shared by ExamDiscuss.com for Helping Passing 156-315.77 Exam! ExamDiscuss.com now offer the newest 156-315.77 exam dumps, the ExamDiscuss.com 156-315.77 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com 156-315.77 dumps with Test Engine here:

Access 156-315.77 Dumps Premium Version
(755 Q&As Dumps, 35%OFF Special Discount Code: freecram)

Online Access Free 156-315.77 Exam Questions

Exam Code:156-315.77
Exam Name:Check Point Certified Security Expert
Certification Provider:CheckPoint
Free Question Number:467
Version:v2018-06-24
Rating:
# of views:1330
# of Questions views:187650
Go To 156-315.77 Questions

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Other Version
1380 viewsCheckPoint.156-315.77.v2018-06-06.q343
1439 viewsCheckPoint.156-315.77.v2018-05-24.q730
Exam Question List
Question 1: What firewall kernel table stores information about port all...
Question 2: If you need strong protection for the encryption of user dat...
Question 3: You are preparing computers for a new ClusterXL deployment. ...
Question 4: A Security Administrator opens a new session, makes changes ...
Question 5: Which file defines the fields for each object used in the fi...
Question 6: If you are experiencing LDAP issues, which of the following ...
Question 7: MultiCorp has bought company OmniCorp and now has two active...
Question 8: UserA is able to create a SmartLSM Security Cluster Profile ...
Question 9: What command will stop all (and only) Management Portal serv...
Question 10: Which of the following is a supported Sticky Decision Functi...
Question 11: Which command would you use to save the IP address and routi...
Question 12: Use the table to match the BEST Management High Availability...
Question 13: Fill in the blank. To save your OSPF configuration in GAiA, ...
Question 14: Your organization has many VPN-1 Edge gateways at various br...
Question 15: The following configuration is for VPN-1 NGX:1s this configu...
Question 16: What is a Sticky Connection?
Question 17: Your customer wishes to install SmartWorkflow on top of R70 ...
Question 18: The following graphic illustrates which command being issued...
Question 19: Which OPSEC server is used to prevent users from accessing c...
Question 20: What type of object may be explicitly defined as a MEP VPN?...
Question 21: Check Point Clustering protocol, works on:...
Question 22: Assuming all connections that are allocated bandwidth in you...
Question 23: The process _____ is responsible for GUIClient communication...
Question 24: What is a requirement for setting up Management High Availab...
Question 25: In cryptography, the Rivest, Shamir, Adelman (RSA) scheme ha...
Question 26: Your company has two headquarters, one in London, one in New...
Question 27: John is the MultiCorp Security Administrator. If he suggests...
Question 28: _____ is NOT a ClusterXL mode.
Question 29: Identity Agent is a lightweight endpoint agent that authenti...
Question 30: When you add a resource service to a rule, which ONE of the ...
Question 31: A connection is said to be Sticky when:...
Question 32: The process that performs the authentication for legacy sess...
Question 33: Which Check Point QoS feature marks the ToS byte in the IP h...
Question 34: The following diagram illustrates how a VPN-1 SecureClient u...
Question 35: Fill in the blank. Type the command and syntax to configure ...
Question 36: Which of the following QoS rule action properties is an Adva...
Question 37: Which of the following is a valid Active Directory designati...
Question 38: An administrator has installed the latest HFA on the system ...
Question 39: What is the lowest possible version a Security Gateway may b...
Question 40: DShield is a Check Point feature used to block which of the ...
Question 41: VPN access control would fall under which VPN component?...
Question 42: To back up all events stored in the SmartEvent Server, you s...
Question 43: Where is the encryption domain for a SmartLSM Security Gatew...
Question 44: Which three of the following components are required to get ...
Question 45: When configuring a Web Application for SSL VPN remote access...
Question 46: Which of the following are valid PKI architectures?...
Question 47: Where multiple SmartDirectory servers exist in an organizati...
Question 48: How can you completely tear down a specific VPN tunnel in an...
Question 49: Which two processes are responsible on handling Identity Awa...
Question 50: If Jack was concerned about the number of log entries he wou...
Question 51: Which of the following files is used to allow only specific ...
Question 52: The set of rules that governs the types of objects in the di...
Question 53: Which describes the function of the account unit?...
Question 54: You want only RAS signals to pass through H.323 Gatekeeper a...
Question 55: You are running a R77 Security Gateway on GAiA. In case of a...
Question 56: John is upgrading a cluster from NGX R65 to R77. John knows ...
Question 57: MegaCorps' disaster recovery plan is past due for an update ...
Question 58: You are a Security Administrator preparing to deploy a new H...
Question 59: You want to block corporate internal-net and localnet from a...
Question 60: Jacob is using a mesh VPN Community to create a site-to-site...
Question 61: Review the Rule Base displayed. (Exhibit) For which rules wi...
Question 62: What is a possible reason for the grayed out Restore Version...
Question 63: During a Security Management Server migrate export, the syst...
Question 64: Which of the following are valid reasons for beginning with ...
Question 65: Fill in the blank. Type the full fw command and syntax that ...
Question 66: With is the SmartEvent Correlation Unit's function?...
Question 67: Which of the following statements accurately describes the m...
Question 68: When synchronizing clusters, which of the following statemen...
Question 69: Wayne configures an HTTP Security Server to work with the co...
Question 70: What is the command to upgrade a SecurePlatform NG with Appl...
Question 71: By default, what happens to the existing connections on a fi...
Question 72: You want to create an IKE VPN between two VPN-1 NGX Security...
Question 73: You need to back up the routing, interface, and DNS configur...
Question 74: There are times when you want to use Link Selection to manag...
Question 75: Which of the following explains Role Segregation?...
Question 76: What is the command to upgrade an NG with Application Intell...
Question 77: David is the MultiCorp Security Manager and approves the pro...
Question 78: What port is used for Administrator access for your SSL VPN?...
Question 79: Damon enables an SMTP resource for content protection. He no...
Question 80: Which three of the following are ClusterXL member requiremen...
Question 81: When restoring a Security Management Server from a backup fi...
Question 82: How does ClusterXL Unicast mode handle new traffic?...
Question 83: If a SmartUpdate upgrade or distribution operation fails on ...
Question 84: Central License management allows a Security Administrator t...
Question 85: You want VPN traffic to match packets from internal interfac...
Question 86: Your VPN Community includes three Security Gateways. Each Ga...
Question 87: Which of the following does IPSec use during IPSec key negot...
Question 88: How do you verify a VPN Tunnel Interface (VTI) is configured...
Question 89: Which SmartReporter report type is generated from the SmartV...
Question 90: Fill in the blank. To verify the SecureXL status, you would ...
Question 91: Review the cphaprob state command output from a New Mode Hig...
Question 92: When synchronizing clusters, which of the following statemen...
Question 93: When using Captive Portal to send unidentified users to a We...
Question 94: If ClusterXL Load Sharing is enabled with state synchronizat...
Question 95: Which Check Point product is used to create and save changes...
Question 96: Which Security Server can perform authentication tasks, but ...
Question 97: How does a standby SmartCenter Server receive logs from all ...
Question 98: You have just upgraded your Load Sharing gateway cluster (bo...
Question 99: Why should the upgrade_export configuration file (.tgz) be d...
Question 100: Using the Backup Target functionality in SmartProvisioning, ...
Question 101: Which is NOT a method through which Identity Awareness recei...
Question 102: A snapshot delivers a complete backup of GAiA. How do you re...
Question 103: MultiCorp is running Smartcenter R71 on an IPSO platform and...
Question 104: There are several SmartDirectory (LDAP) features that can be...
Question 105: Your current VPN-1 NG with Application Intelligence (Al) R55...
Question 106: Your users are defined in a Windows 2008 Active Directory se...
Question 107: Typically, when you upgrade the Security Management Server, ...
Question 108: Assume an intruder has compromised your current IKE Phase 1 ...
Question 109: If traffic requires preferential treatment by other routers ...
Question 110: Which process is responsible for full synchronization in Clu...
Question 111: Which of the following statements is TRUE concerning MEP VPN...
Question 112: For Management High Availability, if an Active SMS goes down...
Question 113: How do you control the maximum mail messages in a spool dire...
Question 114: Check Point recommends that you back up systems running Chec...
Question 115: Identify the correct step performed by SmartUpdate to upgrad...
Question 116: If both domain-based and route-based VPN's are configured, w...
Question 117: From the following output of cphaprob state, (Exhibit) Which...
Question 118: The process _____ complies $FWDIR/CONF/*.W files into machin...
Question 119: Which protocol can be used to provide logs to third-party re...
Question 120: Which statement is TRUE for route-based VPN's?...
Question 121: What tool exports the Management Configuration into a single...
Question 122: Identify the correct step performed by SmartUpdate to upgrad...
Question 123: Match the SmartDashboard session status icons with the appro...
Question 124: When migrating the SmartEvent data base from one server to a...
Question 125: Which Check Point QoS feature is used to dynamically allocat...
Question 126: Check Point recommends that you back up systems running Chec...
Question 127: What happens when an Administrator activates the DLP Portal ...
Question 128: An Account Unit is the interface between the _____ and the _...
Question 129: Which version is the minimum requirement for SmartProvisioni...
Question 130: Fill in the blank. Complete this statement. To save interfac...
Question 131: When using SmartDashboard to manage existing users in SmartD...
Question 132: In SmartDirectory, what is each LDAP server called?...
Question 133: Restoring a snapshot-created file on one machine that was cr...
Question 134: When using ClusterXL in Load Sharing, what is the default sh...
Question 135: To help organize events, SmartReporter uses filtered queries...
Question 136: Which of the following is NOT part of the policy installatio...
Question 137: What is the consequence of clearing the "Log VoIP Connection...
Question 138: Where do you define NAT properties so that NAT is performed ...
Question 139: When synchronizing clusters, which of the following statemen...
Question 140: Which of the following can NOT be modified by editing the cp...
Question 141: For a dedicated DLP Gateway that runs in inline bridge mode,...
Question 142: You have an internal FTP server, and you allow downloading, ...
Question 143: Review the following list of actions that Security Gateway R...
Question 144: When configuring site-to-site VPN High Availability (HA) wit...
Question 145: What action CANNOT be run from SmartUpdate NGX R65?...
Question 146: In a Windows environment, SmartReporter Data Base settings c...
Question 147: In SmartWorkflow, what is NOT a valid possibility?...
Question 148: A user cannot authenticate to SSL VPN. You have verified the...
Question 149: How many pre-defined exclusions are included by default in S...
Question 150: Typically, when you upgrade the Security Management Server, ...
Question 151: What is the maximum number of cores supported by CoreXL?...
Question 152: Fill in the blank. Type the command and syntax you would use...
Question 153: With the User Directory Software Blade, you can create R77 u...
Question 154: Which of the following is TRUE concerning unnumbered VPN Tun...
Question 155: Which of the following commands do you run on the AD server ...
Question 156: The file snapshot generates is very large, and can only be r...
Question 157: If Bob wanted to create a Management High Availability confi...
Question 158: In a Check Point gateway cluster, are VRRP and ClusterXL mut...
Question 159: How would you configure a rule in a Security Policy to allow...
Question 160: In a Cluster, some features such as VPN only function proper...
Question 161: Fill in the blank. What is the correct command and syntax us...
Question 162: What SmartConsole application allows you to change the Smart...
Question 163: When, during policy installation, does the atomic load task ...
Question 164: When restoring R77 using the command upgrade_import, which o...
Question 165: What is the purpose of the pre-defined exclusions included w...
Question 166: Which command would you use to save the routing information ...
Question 167: To clean the system of all SmartEvent events, you should del...
Question 168: SmartProvisioning uses different types of profiles to manage...
Question 169: When a security administrator logs in to SmartDashboard and ...
Question 170: What is used to validate a digital certificate?...
Question 171: What is the greatest benefit derived from VPNs compared to f...
Question 172: When configuring an LDAP Group object, select the option ___...
Question 173: Fill in the blank. To bind a NIC to a single processor when ...
Question 174: If Jack was concerned about the number of log entries he wou...
Question 175: You are reviewing SmartView Tracker entries, and see a Conne...
Question 176: Greg is creating rules and objects to control VoIP traffic i...
Question 177: Jerry is concerned that a denial-of-service (DoS) attack may...
Question 178: Which Protection Mode does not exist in IPS?...
Question 179: Laura notices the Microsoft Visual Basic Bits Protection is ...
Question 180: What action can be run from SmartUpdate NGX R65?...
Question 181: Your current stands alone VPN-1 NG with Application Intellig...
Question 182: How is change approved for implementation in SmartWorkflow?...
Question 183: By default, the Cluster Control Protocol (CCP) uses this to ...
Question 184: What is the benefit to running SmartEvent in Learning Mode?...
Question 185: What happens in relation to the CRL cache after a cpstop;sps...
Question 186: MegaCorp is using SmartCenter Server with several gateways. ...
Question 187: Which encryption scheme provides in-place encryption?...
Question 188: Which of the following items can be provisioned via a Profil...
Question 189: When upgrading a cluster in Full Connectivity Mode, the firs...
Question 190: A Minimal Effort Upgrade of a cluster:...
Question 191: Concerning these products: SecurePlatform, VPN-1 Pro Gateway...
Question 192: In a UNIX environment, SmartReporter Data Base settings coul...
Question 193: David wants to manage hundreds of gateways using a central m...
Question 194: When do modifications to the Event Policy take effect?...
Question 195: Review the cphaprob state command output from one New Mode H...
Question 196: What is the advantage for deploying SSL VPN in a DMZ, versus...
Question 197: You receive an alert indicating a suspicious FTP connection ...
Question 198: For object-based VPN routing to succeed, what must be config...
Question 199: In the following cluster configuration; if you reboot sglond...
Question 200: Where do you verify that SmartDirectory is enabled?...
Question 201: An organization may be distributed across several SmartDirec...
Question 202: Which of the following is a valid Active Directory designati...
Question 203: What does it mean when a Security Gateway is labeled Untrust...
Question 204: Your customer wishes to install the SmartWorkflow Software B...
Question 205: Where is the ideal place to deploy your SSL VPN?...
Question 206: A cluster contains two members, with external interfaces 172...
Question 207: Regarding QoS guarantees and limits, which of the following ...
Question 208: A customer called to report one cluster member's status as D...
Question 209: How would you set the debug buffer size to 1024?...
Question 210: Which of the following is TRUE concerning numbered VPN Tunne...
Question 211: What happens to the session information after they are appro...
Question 212: _____ generates a SmartEvent Report from its SQL database....
Question 213: What physical machine must have access to the UserCenter pub...
Question 214: You are responsible for the IPS configuration of your Check ...
Question 215: How does a cluster member take over the VIP after a failover...
Question 216: You want to establish a VPN, using certificates. Your VPN wi...
Question 217: Fill in the blank. To view the number of concurrent connecti...
Question 218: To change the default port of the Management Portal:...
Question 219: Which of the following is a TRUE statement concerning contra...
Question 220: Which is the BEST configuration option to protect internal u...
Question 221: The _____ Check Point ClusterXL mode must synchronize the vi...
Question 222: Which of the following is NOT a valid way to view interface'...
Question 223: Which type of service should a Security Administrator use in...
Question 224: Check Point recommends that you back up systems running Chec...
Question 225: Each entry in SmartDirectory has a unique _____....
Question 226: If no flags are defined during a back up on the Security Man...
Question 227: What is NOT true about Management Portal?...
Question 228: MegaCorp has two different types of hardware with Check Poin...
Question 229: When configuring an LDAP Group object, select option _____ i...
Question 230: Which VPN Community object is used to configure VPN routing ...
Question 231: When configuring numbered VPN Tunnel Interfaces (VTIs) in a ...
Question 232: You are preparing computers for a new ClusterXL deployment. ...
Question 233: What is the bit size of DES?
Question 234: Fill in the blank. To verify SecureXL statistics, you would ...
Question 235: Management Portal should be installed on: (i) Management Ser...
Question 236: What is the significance of the depicted icon in the SmartWo...
Question 237: Which file can you modify to change settings of the Manageme...
Question 238: Which network port does PPTP use for communication?...
Question 239: Your expanding network currently includes ClusterXL running ...
Question 240: When migrating the SmartEvent data base from one server to a...
Question 241: Your customer wishes to use SmartWorkflow Software Blade, bu...
Question 242: Match the ClusterXL modes with their configurations. Exhibit...
Question 243: SmartProvisioning can provision the Operating System and net...
Question 244: MEP VPN's use the Proprietary Probing Protocol to send speci...
Question 245: The Management Portal Software Blade allows users to...
Question 246: Does Check Point recommend generating an upgrade_export on s...
Question 247: When using a template to define a user in SmartDirectory, th...
Question 248: Where is it necessary to configure historical records in Sma...
Question 249: Which of the following methods will provide the most complet...
Question 250: The process that performs the authentication for SSL VPN Use...
Question 251: There are times when you want to use Link Selection to manag...
Question 252: Fill in the blank. To provide full connectivity upgrade stat...
Question 253: Which of the following is part of the PKI? Select all that a...
Question 254: Robert has configured a Common Internet File System (CIFS) r...
Question 255: Problems sometimes occur when distributing IPSec packets to ...
Question 256: The process _____ executes the authentication for logging in...
Question 257: What process manages the dynamic routing protocols (OSPF, RI...
Question 258: You can NOT use SmartDashboard's SmartDirectory features to ...
Question 259: Which procedure will create an Internal User?...
Question 260: After installing VPN-1 Pro NGQ R65, you discover that one po...
Question 261: In Company XYZ, the DLP Administrator defined a new Keywords...
Question 262: _____ is NOT an SmartEvent event-triggered Automatic Reactio...
Question 263: When distributing IPSec packets to gateways in a Load Sharin...
Question 264: One profile in SmartProvisioning can update:...
Question 265: Select the right answer to export IPS profiles to copy to an...
Question 266: Fill in the blank. Type the full cphaprob command and syntax...
Question 267: What can be said about RSA algorithms? Select all that apply...
Question 268: What is the correct policy installation process order? 1) Ve...
Question 269: Review the R77 configuration. Is it correct for Management H...
Question 270: Which of the following access options would you NOT use when...
Question 271: Cody is notified by blacklist.org that his site has been rep...
Question 272: You are configuring the VoIP Domain object for a Skinny Clie...
Question 273: You are the MegaCorp Security Administrator. This company us...
Question 274: Which of the following is NOT a LDAP server option in SmartD...
Question 275: You set up a mesh VPN Community, so your internal networks c...
Question 276: The connection to the ClusterXL member 'A' breaks. The Clust...
Question 277: Fill in the blank. Write the full fw command and syntax that...
Question 278: Which of these components does NOT require a VPN-1 NGX R65 l...
Question 279: In ClusterXL, which of the following processes are defined b...
Question 280: What GUI client would you use to view an IPS packet capture?...
Question 281: Which of the following is TRUE concerning unnumbered VPN Tun...
Question 282: Which of the following is supported with Office Mode?...
Question 283: You just upgraded to R71 and are using the IPS Software Blad...
Question 284: While authorization for users managed by SmartDirectory is p...
Question 285: Which of the following statements is TRUE concerning MEP VPN...
Question 286: Yoav is a Security Administrator preparing to implement a VP...
Question 287: You are running the license_upgrade tool on your SecurePlatf...
Question 288: By default, a standby Security Management Server is automati...
Question 289: Where do you verify that SmartDirectory is enabled?...
Question 290: Fill in the blank. To enter the router shell, use command __...
Question 291: Public keys and digital certificates provide which of the fo...
Question 292: VPN traffic control would fall under which VPN component?...
Question 293: You run cphaprob -a if. When you review the output, you find...
Question 294: Using SmartProvisioning Profiles, which of the following cou...
Question 295: Choose the BEST sequence for configuring user management in ...
Question 296: By default Check Point High Availability components send upd...
Question 297: In ClusterXL, _____ is defined by default as a critical devi...
Question 298: How can you prevent delay-sensitive applications, such as vi...
Question 299: You are troubleshooting a HTTP connection problem. You've st...
Question 300: When upgrading to NGX R65, which Check Point products do not...
Question 301: Which of the following SSL Network Extender server-side prer...
Question 302: Which of the following can NOT approve a change in a SmartWo...
Question 303: Mark the configuration options that are available for Data L...
Question 304: For Management High Availability synchronization, what does ...
Question 305: Which of the following is TRUE concerning unnumbered VPN Tun...
Question 306: How could you compare the Fingerprint shown to the Fingerpri...
Question 307: Jon is explaining how the inspection module works to a colle...
Question 308: When does the SmartWorkflow Policy Installation window appea...
Question 309: When Load Sharing Multicast mode is defined in a ClusterXL c...
Question 310: Which of the following are supported with the office mode? S...
Question 311: You plan to install a VPN-1 Pro Gateway for VPN-1 NGX at you...
Question 312: Which statement about LDAP and Active Directory (AD) with SS...
Question 313: Which Check Point tool allows you to open a debug file and s...
Question 314: Which component functions as the Internal Certificate Author...
Question 315: When an Endpoint user is able to authenticate but receives a...
Question 316: If a digital signature is used to achieve both data-integrit...
Question 317: What can you do to see the current number of kernel instance...
Question 318: A Full Connectivity Upgrade of a cluster:...
Question 319: Rachel is the Security Administrator for a university. The u...
Question 320: Control connections between the Security Management Server a...
Question 321: John is configuring a new R77 Gateway cluster but he can not...
Question 322: The process _____ provides service to access the GAIA config...
Question 323: Which of the following would be a result of having more than...
Question 324: When troubleshooting user authentication, you may see the fo...
Question 325: Which of the following does NOT happen when using Pivot Mode...
Question 326: The following rule contains an FTP resource object in the Se...
Question 327: Fill in the blank. MultiCorp is located in Atlanta. It has a...
Question 328: Which of the following CLISH commands would you use to set t...
Question 329: Which Security Servers can perform Content Security tasks, b...
Question 330: _____ is a proprietary Check Point protocol. It is the basis...
Question 331: If SmartWorkflow is configured to work without Sessions or R...
Question 332: What access level cannot be assigned to an Administrator in ...
Question 333: Anytime a client initiates a connection to a server, the fir...
Question 334: In a distributed VPN-1 Pro NGX environment, where is the Int...
Question 335: Stephanie wants to reduce the encryption overhead and improv...
Question 336: The Management Portal allows all of the following EXCEPT:...
Question 337: Which of the following can NOT be done on the Management Por...
Question 338: A customer calls saying that a Load Sharing cluster shows dr...
Question 339: Fill in the blank. In New Mode HA, the internal cluster IP V...
Question 340: The process _____ is responsible for Policy compilation....
Question 341: Which process is responsible for kernel table information sh...
Question 342: You have a production implementation of Management High Avai...
Question 343: The process _____ is responsible for the authentication for ...
Question 344: Check Point New Mode HA is a(n) _____ solution....
Question 345: Fill in the blank. Type the command and syntax that you woul...
Question 346: What is the proper CLISH syntax to configure a default route...
Question 347: When a failed cluster member recovers, which of the followin...
Question 348: MegaCorp is running Smartcenter R70, some Gateways at R65 an...
Question 349: User definitions are stored in _____....
Question 350: What's true about Troubleshooting option in the IPS profile ...
Question 351: You have a High Availability ClusterXL configuration. Machin...
Question 352: Your R7x-series Enterprise Security Management Server is run...
Question 353: Which command would you use to save the interface informatio...
Question 354: How do you check the version of "CPSIZEME" on GAiA?...
Question 355: Which process is responsible for delta synchronization in Cl...
Question 356: Check Point support has asked Tony for a firewall capture of...
Question 357: Check Point recommends deploying SSL VPN:...
Question 358: Which operating system is NOT supported by VPN-1 Secure Clie...
Question 359: Fill in the blanks. To view the number of concurrent connect...
Question 360: You need to determine if your company's Web servers are acce...
Question 361: You are using SmartUpdate to fetch data and perform a remote...
Question 362: Which Check Point product implements a Consolidation Policy?...
Question 363: Which of the following is an example of the hash function?...
Question 364: Which of the following load-balancing methods is not valid?...
Question 365: Which specific R77 GUI would you use to view the length of t...
Question 366: Paul has just joined the MegaCorp security administration te...
Question 367: VPN-1 NGX supports VoIP traffic in all of the following envi...
Question 368: To run GAiA in 64bit mode, which of the following is true? 1...
Question 369: The "MAC Magic" value must be modified under the following c...
Question 370: Provisioning Profiles can NOT be applied to:...
Question 371: Which is NOT a valid option when upgrading Cluster Deploymen...
Question 372: Fill in the blank with a numeric value. The default port num...
Question 373: Your organization maintains several IKE VPN's. Executives in...
Question 374: You want to upgrade an NG with Application Intelligence R55 ...
Question 375: You enable Sweep Scan Protection and Host port scan in IPS t...
Question 376: When using migrate to upgrade a Secure Management Server, wh...
Question 377: What process is responsible for transferring the policy file...
Question 378: What proprietary Check Point protocol is the basis of the fu...
Question 379: Fill in the blank. To stop acceleration on a GAiA Security G...
Question 380: The process _____ is responsible for Management High Availab...
Question 381: Check Point New Mode HA is a(n) _____ solution....
Question 382: What is the primary benefit of using upgrade_export over eit...
Question 383: Fill in the blank. Type the full fw command and syntax that ...
Question 384: Which of the following uses the same key to decrypt as it do...
Question 385: Your primary Security Management Server runs on GAiA. What i...
Question 386: _____ manages Standard Reports and allows the administrator ...
Question 387: When two or more DLP rules are matched, the action taken is ...
Question 388: Organizations are sometimes faced with the need to locate cl...
Question 389: You need to verify the effectiveness of your IPS configurati...
Question 390: SmartWorkflow has been enabled with the following configurat...
Question 391: Select the command set best used to verify proper failover f...
Question 392: In Management High Availability, what is an Active SMS?...
Question 393: Which protocol is not supported for DLP?...
Question 394: The User Directory Software Blade is used to integrate which...
Question 395: Fred is troubleshooting a NAT issue and wants to check to se...
Question 396: John is the MegaCorp Security Administrator, and is using Ch...
Question 397: How do you enable SecureXL (command line) on GAiA?...
Question 398: Fill in the blank. The command useful for debugging by captu...
Question 399: Fill in the blank. In Load Sharing Unicast mode, the interna...
Question 400: VPN-1 NGX includes a resource mechanism for working with the...
Question 401: There are times when you want to use Link Selection to manag...
Question 402: You have to uninstall the Check Point SmartWorkflow Software...
Question 403: What is the most typical type of configuration for VPNs with...
Question 404: Which of the following TCP port numbers is used to connect t...
Question 405: Your current VPN-1 NG with Application Intelligence (AI) R55...
Question 406: You are preparing to deploy a VPN-1 Pro Gateway for VPN-1 NG...
Question 407: Your customer asks you about Check Point SmartWorkflow. His ...
Question 408: What process manages the dynamic routing protocols (OSPF, RI...
Question 409: How many events are shown by default in the Event preview pa...
Question 410: What port is used for communication to the UserCenter with S...
Question 411: You are running a VPN-1 NG with Application Intelligence R54...
Question 412: What tools CANNOT be launched from SmartUpdate NGX R65?...
Question 413: How are cached usernames and passwords cleared from the memo...
Question 414: When using IPS, what does Geo protection do?...
Question 415: Steve is troubleshooting a connection problem with an intern...
Question 416: _____ is the called process that starts when opening SmartVi...
Question 417: Included in the customer's network are some firewall systems...
Question 418: What is the supported ClusterXL configuration when configuri...
Question 419: The We-Make-Widgets company has purchased twenty UTM-1 Edge ...
Question 420: Can you implement a complete R77 IPv6 deployment without IPv...
Question 421: Which of the following is NOT a supported browser for Manage...
Question 422: Fill in the blank. In a zero downtime scenario, which comman...
Question 423: You are preparing to configure your VoIP Domain Gatekeeper o...
Question 424: Fill in the blank. Type the command and syntax to view criti...
Question 425: You want to upgrade a SecurePlatform NG with Application Int...
Question 426: Your network traffic requires preferential treatment by othe...
Question 427: What could the following regular expression be used for in a...
Question 428: If you check the box "Use Aggressive Mode", in the IKE Prope...
Question 429: Which Name Resolution protocols are supported in SSL VPN?...
Question 430: When defining SmartDirectory for High Availability (HA), whi...
Question 431: A Zero Downtime Upgrade of a cluster:...
Question 432: What is the best tool to produce a report which represents h...
Question 433: You start the configuration of SmartWorkflow. SmartWorkflow ...
Question 434: Which of the following is TRUE concerning numbered VPN Tunne...
Question 435: You have selected the event Port Scan from Internal Network ...
Question 436: Consider the following actions that VPN-1 NGX can take when ...
Question 437: Fill in the blank. In New Mode HA, the internal cluster IP V...
Question 438: How should Check Point packages be uninstalled?...
Question 439: Fill in the blank. In a zero downtime firewall cluster envir...
Question 440: After you add new interfaces to a cluster, how can you check...
Question 441: Security server configuration settings are stored in _____....
Question 442: Which statement defines Public Key Infrastructure? Security ...
Question 443: Barak is a Security Administrator for an organization that h...
Question 444: Which service type does NOT invoke a Security Server?...
Question 445: A Threat Prevention profile is a set of configurations based...
Question 446: What is the proper command for importing users into the R77 ...
Question 447: What is the best method for scheduling backup's on multiple ...
Question 448: What type of packet does a VPN-1 SecureClient send to its Po...
Question 449: VPN routing can also be configured by editing which file?...
Question 450: If using AD Query for seamless identity data reception from ...
Question 451: A tracked SmartEvent Candidate in a Candidate Pool becomes a...
Question 452: Which application is used to create a File-Share Application...
Question 453: What step should you take before running migrate_export?...
Question 454: Which of the following is the preferred method for adding st...
Question 455: Public-key cryptography is considered which of the following...
Question 456: SmartReporter reports can be used to analyze data from a pen...
Question 457: The relay mail server configured under Email Notifications i...
Question 458: What is the behavior of ClusterXL in a High Availability env...
Question 459: Which command would you use to save the interface informatio...
Question 460: MegaCorp plans to upgrade all of its firewalls. Currently th...
Question 461: Which process should you debug if SmartDashboard login fails...
Question 462: Where can a Security Administrator adjust the unit of measur...
Question 463: Which CLI tool helps on verifying proper ClusterXL sync?...
Question 464: The process _____ is responsible for all other security serv...
Question 465: Which command will only show the number of entries in the co...
Question 466: Refer to the to the network topology below. (Exhibit) You ha...
Question 467: When selecting a backup target using SmartProvisioning, whic...