Want to know Examcollection 156 215.77 pdf Exam practice test features? Want to lear more about Check Point Check Point Certified Security Administrator – GAiA certification experience? Study Downloadable Check Point ccsa 156 215.77 answers to Refresh checkpoint 156 215.77 questions at Examcollection. Gat a success with an absolute guarantee to pass Check Point exam 156 215.77 (Check Point Certified Security Administrator – GAiA) test on your first attempt.

Q161. - (Topic 3) 

You find that Users are not prompted for authentication when they access their Web servers, even though you have created an HTTP rule via User Authentication. Choose the BEST reason why. 

A. Users must use the SecuRemote Client, to use the User Authentication Rule. 

B. You checked the cache password on desktop option in Global Properties. 

C. Another rule that accepts HTTP without authentication exists in the Rule Base. 

D. You have forgotten to place the User Authentication Rule before the Stealth Rule. 

Answer:


Q162. - (Topic 3) 

You install and deploy GAiA with default settings. You allow Visitor Mode in the Gateway object’s Remote Access properties and install policy. What additional steps are required for this to function correctly? 

A. You need to start SSL Network Extender first, then use Visitor Mode. 

B. Set Visitor Mode in Policy > Global Properties > Remote-Access > VPN - Advanced. 

C. Office mode is not configured. 

D. The WebUI on GAiA runs on port 443 (HTTPS). When you configure Visitor Mode it cannot bind to default port 443, because it's used by another program (WebUI). With multi-port no additional changes are necessary. 

Answer:


Q163. - (Topic 1) 

ALL of the following options are provided by the SecurePlatform sysconfig utility, EXCEPT: 

A. Export setup 

B. Time & Date 

C. DHCP Server configuration 

D. GUI Clients 

Answer:


Q164. - (Topic 3) 

To qualify as an Identity Awareness enabled rule, which column MAY include an Access Role? 

A. Track 

B. Action 

C. Source 

D. User 

Answer:


Q165. - (Topic 3) 

With deployment of SecureClient, you have defined in the policy that you allow traffic only to an encrypted domain. But when your mobile users move outside of your company, they often cannot use SecureClient because they have to register first (i.e. in Hotel or Conference rooms). How do you solve this problem? 

A. Allow traffic outside the encrypted domain 

B. Allow your users to turn off SecureClient 

C. Allow for unencrypted traffic 

D. Enable Hot Spot/Hotel Registration 

Answer:


Q166. - (Topic 1) 

The customer has a small Check Point installation, which includes one SecurePlatform server working as the SmartConsole, and a second server running Windows 2008 as both Security Management Server and Security Gateway. This is an example of a(n): 

A. Distributed Installation 

B. Stand-Alone Installation 

C. Hybrid Installation 

D. Unsupported configuration 

Answer:


Q167. - (Topic 3) 

You review this Security Policy because Rule 4 is inhibited. 

Which Rule is responsible? 

A. Rule 1 

B. Rule 2 

C. Rule 3 

D. No rule inhibits Rule 4. 

Answer:


Q168. - (Topic 3) 

What happens if the identity of a user is known? 

A. If the user credentials do not match an Access Role, the gateway moves onto the next rule. 

B. If the user credentials do not match an Access Role, the system displays the Captive Portal. 

C. If the user credentials do not match an Access Role, the traffic is automatically dropped. 

D. If the user credentials do not match an Access Role, the system displays a sandbox. 

Answer: