♥♥ 2018 NEW RECOMMEND ♥♥

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 156-215.77 Exam Dumps (PDF & VCE):
Available on: https://www.exambible.com/156-215.77-exam/

Master the exam 156 215.77 Check Point Certified Security Administrator – GAiA content and be ready for exam day success quickly with this Testking exam 156 215.77 exam price. We guarantee it!We make it a reality and give you real 156 215.77 pdf questions in our Check Point checkpoint 156 215.77 braindumps.Latest 100% VALID Check Point 156 215.77 pdf Exam Questions Dumps at below page. You can use our Check Point checkpoint 156 215.77 braindumps and pass your exam.

Q177. - (Topic 3) 

What is a Consolidation Policy? 

A. A global Policy used to share a common enforcement policy for multiple Security Gateways. 

B. The collective name of the logs generated by SmartReporter. 

C. The collective name of the Security Policy, Address Translation, and IPS Policies. 

D. The specific Policy written in SmartDashboard to configure which log data is stored in the SmartReporter database. 

Answer:


Q178. - (Topic 3) 

Match the terms with their definitions: 

A. A-3, B-4, C-1, D-2 

B. A-2, B-3, C-4, D-1 

C. A-3, B-2, C-1, D-4 

D. A-3, B-2, C-4, D-1 

Answer:


Q179. - (Topic 1) 

Which of the following commands can provide the most complete restoration of a R77 configuration? 

A. cpinfo -recover 

B. fwm dbimport -p <export file> 

C. upgrade_import 

D. cpconfig 

Answer:


Q180. - (Topic 1) 

Message digests use which of the following? 

A. SHA-1 and MD5 

B. IDEA and RC4 

C. SSL and MD4 

D. DES and RC4 

Answer:


Q181. - (Topic 3) 

You find a suspicious FTP site trying to connect to one of your internal hosts. How do you block it in real time and verify it is successfully blocked? Highlight the suspicious connection in SmartView Tracker: 

A. Log mode. Block it using Tools > Block Intruder menu. Observe in the Log mode that the suspicious connection does not appear again in this SmartView Tracker view. 

B. Active mode. Block it using Tools > Block Intruder menu. Observe in the Active mode that the suspicious connection is listed in this SmartView Tracker view as "dropped". 

C. Log mode. Block it using Tools > Block Intruder menu. Observe in the Log mode that the suspicious connection is listed in this SmartView Tracker view as "dropped". 

D. Active mode. Block it using Tools > Block Intruder menu. Observe in the Active mode that the suspicious connection does not appear again in this SmartView Tracker view. 

Answer:


Q182. - (Topic 3) 

What happens if the identity of a user is known? 

A. If the user credentials do not match an Access Role, the system displays the Captive Portal. 

B. If the user credentials do not match an Access Role, the system displays a sandbox. 

C. If the user credentials do not match an Access Role, the traffic is automatically dropped. 

D. If the user credentials match an Access Role, the rule is applied and traffic is accepted or dropped based on the defined action. 

Answer:


Q183. - (Topic 1) 

Match the following commands to their correct function. 

Each command has one function only listed. 

A. C1>F2; C2>F1; C3>F6; C4>F4 

B. C1>F4; C2>F6; C3>F3; C4>F2 

C. C1>F2; C2>F4; C3>F1; C4>F5 

D. C1>F6; C2>F4; C3>F2; C4>F5 

Answer:


Q184. - (Topic 3) 

Central license management allows a Security Administrator to perform which of the following functions? 

1.

 Check for expired licenses. 

2.

 Sort licenses and view license properties. 

3.

 Attach both R77 Central and Local licesnes to a remote module. 

4.

 Delete both R77 Local Licenses and Central licenses from a remote module. 

5.

 Add or remove a license to or from the license repository. 

6.

 Attach and/or delete only R77 Central licenses to a remote module (not Local licenses). 

A. 1, 2, 3, 4, & 5 

B. 2, 3, 4, & 5 

C. 2, 5, & 6 

D. 1, 2, 5, & 6 

Answer: