Testking checkpoint 156 215.77 Questions are updated and all ccsa 156 215.77 answers are verified by experts. Once you have completely prepared with our 156 215.77 pdf exam prep kits you will be ready for the real checkpoint 156 215.77 exam without a problem. We have Latest Check Point 156 215.77 pdf dumps study guide. PASSED exam 156 215.77 First attempt! Here What I Did.

Q121. - (Topic 2) 

Your shipping company uses a custom application to update the shipping distribution database. The custom application includes a service used only to notify remote sites that the distribution database is malfunctioning. The perimeter Security Gateway's Rule Base includes a rule to accept this traffic. Since you are responsible for multiple sites, you want notification by a text message to your cellular phone, whenever traffic is accepted on this 

rule. Which of the following would work BEST for your purpose? 

A. SmartView Monitor Threshold 

B. SNMP trap 

C. Logging implied rules 

D. User-defined alert script 

Answer:


Q122. - (Topic 1) 

UDP packets are delivered if they are ___________. 

A. referenced in the SAM related dynamic tables 

B. a valid response to an allowed request on the inverse UDP ports and IP 

C. a stateful ACK to a valid SYN-SYN/ACK on the inverse UDP ports and IP 

D. bypassing the kernel by the forwarding layer of ClusterXL 

Answer:


Q123. - (Topic 1) 

Which component functions as the Internal Certificate Authority for R77? 

A. Security Gateway 

B. Management Server 

C. Policy Server 

D. SmartLSM 

Answer:

69. - (Topic 1) 

Which command allows you to view the contents of an R77 table? 

A. fw tab -s <tablename> 

B. fw tab -t <tablename> 

C. fw tab -x <tablename> 

D. fw tab -a <tablename> 

Answer:


Q124. - (Topic 2) 

One of your remote Security Gateway's suddenly stops sending logs, and you cannot install the Security Policy on the Gateway. All other remote Security Gateways are logging normally to the Security Management Server, and Policy installation is not affected. When you click the Test SIC status button in the problematic Gateway object, you receive an error message. What is the problem? 

A. There is no connection between the Security Management Server and the remote Gateway. Rules or routing may block the connection. 

B. The time on the Security Management Server's clock has changed, which invalidates the remote Gateway's Certificate. 

C. The Internal Certificate Authority for the Security Management Server object has been removed from objects_5_0.C. 

D. The remote Gateway's IP address has changed, which invalidates the SIC Certificate. 

Answer:

152. - (Topic 2) 

You have two rules, ten users, and two user groups in a Security Policy. You create database version 1 for this configuration. You then delete two existing users and add a new user group. You modify one rule and add two new rules to the Rule Base. You save the Security Policy and create database version 2. After awhile, you decide to roll back to version 1 to use the Rule Base, but you want to keep your user database. How can you do this? 

A. Restore the entire database, except the user database, and then create the new user and user group. 

B. Run fwm_dbexport to export the user database. Select restore the entire database in the Database Revision screen. Then, run fwm_dbimport. 

C. Run fwm dbexport -l filename. Restore the database. Then, run fwm dbimport -l filename to import the users. 

D. Restore the entire database, except the user database. 

Answer:


Q125. - (Topic 2) 

In a distributed management environment, the administrator has removed the default check from Accept Control Connections under the Policy > Global Properties > FireWall tab. In order for the Security Management Server to install a policy to the Firewall, an explicit rule must be created to allow the server to communicate to the Security Gateway on port __________. 

A. 259 

B. 256 

C. 80 

D. 900 

Answer:


Q126. - (Topic 1) 

A digital signature: 

A. Provides a secure key exchange mechanism over the Internet. 

B. Automatically exchanges shared keys. 

C. Guarantees the authenticity and integrity of a message. 

D. Decrypts data to its original form. 

Answer:


Q127. - (Topic 3) 

Which of the following items should be configured for the Security Management Server to authenticate using LDAP? 

A. WMI object 

B. Check Point Password 

C. Domain Admin username 

D. Windows logon password 

Answer:


Q128. - (Topic 3) 

You are running the license_upgrade tool on your SecurePlatform Gateway. Which of the following can you NOT do with the upgrade tool? 

A. Perform the actual license-upgrade process 

B. View the status of currently installed licenses 

C. Simulate the license-upgrade process 

D. View the licenses in the SmartUpdate License Repository 

Answer: