♥♥ 2018 NEW RECOMMEND ♥♥

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 156-215.77 Exam Dumps (PDF & VCE):
Available on: https://www.exambible.com/156-215.77-exam/

Proper study guides for Most recent Check Point Check Point Certified Security Administrator – GAiA certified begins with Check Point checkpoint 156 215.77 preparation products which designed to deliver the Validated exam 156 215.77 questions by making you pass the ccsa 156 215.77 test at your first time. Try the free exam 156 215.77 demo right now.

Q169. - (Topic 2) 

All of the following are Security Gateway control connections defined by default implied rules, EXCEPT: 

A. Exclusion of specific services for reporting purposes. 

B. Specific traffic that facilitates functionality, such as logging, management, and key exchange. 

C. Acceptance of IKE and RDP traffic for communication and encryption purposes. 

D. Communication with server types, such as RADIUS, CVP, UFP, TACACS, and LDAP. 


Q170. - (Topic 3) 

Which of the following items should be configured for the Security Management Server to authenticate using LDAP? 

A. Check Point Password 

B. WMI object 

C. Domain Admin username 

D. Windows logon password 


Q171. - (Topic 1) 

Where can you find the Check Point's SNMP MIB file? 

A. $CPDIR/lib/snmp/chkpt.mib 

B. There is no specific MIB file for Check Point products. 

C. $FWDIR/conf/snmp.mib 

D. It is obtained only by request from the TAC. 


Q172. - (Topic 3) 

If you are experiencing LDAP issues, which of the following should you check? 

A. Domain name resolution 

B. Overlapping VPN Domains C. Connectivity between the R77 Gateway and LDAP server 

D. Secure Internal Communications (SIC) 


Q173. - (Topic 2) 

Which of the following R77 SmartView Tracker views will display a popup warning about performance implications on the Security Gateway? 

A. Audit Tab 

B. All Records Query 

C. Active Tab 

D. Account Query 


Q174. - (Topic 3) 

Your boss wants you to closely monitor an employee suspected of transferring company secrets to the competition. The IT department discovered the suspect installed a WinSCP client in order to use encrypted communication. Which of the following methods is BEST to accomplish this task? 

A. Use SmartView Tracker to follow his actions by filtering log entries that feature the WinSCP destination port. Then, export the corresponding entries to a separate log file for documentation. 

B. Watch his IP in SmartView Monitor by setting an alert action to any packet that matches your Rule Base and his IP address for inbound and outbound traffic. 

C. Send the suspect an email with a keylogging Trojan attached, to get direct information about his wrongdoings. 

D. Use SmartDashboard to add a rule in the firewall Rule Base that matches his IP address, and those of potential targets and suspicious protocols. Apply the alert action or customized messaging. 


Q175. - (Topic 1) 

Spoofing is a method of: 

A. Disguising an illegal IP address behind an authorized IP address through Port Address Translation. 

B. Making packets appear as if they come from an authorized IP address. 

C. Detecting people using false or wrong authentication logins. 

D. Hiding your firewall from unauthorized users. 


Q176. - (Topic 3) 

What action CANNOT be run from SmartUpdate R77? 

A. Reboot Gateway 

B. Fetch sync status 

C. Get all Gateway Data 

D. Preinstall verifier