Our pass rate is high to 98.9% and the similarity percentage between our 156 215.77 pdf study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Check Point checkpoint 156 215.77 exam in just one try? I am currently studying for the Check Point 156 215.77 pdf exam. Latest Check Point ccsa 156 215.77 Test exam practice questions and answers, Try Check Point checkpoint 156 215.77 Brain Dumps First.

Q129. - (Topic 3) 

How do you configure an alert in SmartView Monitor? 

A. By right-clicking on the Gateway, and selecting Properties. 

B. By choosing the Gateway, and Configure Thresholds. 

C. An alert cannot be configured in SmartView Monitor. 

D. By right-clicking on the Gateway, and selecting System Information. 

Answer:


Q130. - (Topic 3) 

You find a suspicious connection from a problematic host. You decide that you want to block everything from that whole network, not just the problematic host. You want to block this for an hour while you investigate further, but you do not want to add any rules to the Rule Base. How do you achieve this? 

A. Create a Suspicious Activity Rule in SmartView Monitor. 

B. Select Block intruder from the Tools menu in SmartView Tracker. 

C. Use dbedit to script the addition of a rule directly into the Rule Bases_5_0.fws configuration file. 

D. Add a temporary rule using SmartDashboard and select hide rule. 

Answer:


Q131. - (Topic 1) 

What is the officially accepted diagnostic tool for IP Appliance Support? 

A. ipsoinfo 

B. cpinfo C. uag-diag 

D. CST 

Answer:


Q132. - (Topic 3) 

An Administrator without access to SmartDashboard installed a new IPSO-based R77 Security Gateway over the weekend. He e-mailed you the SIC activation key. You want to confirm communication between the Security Gateway and the Management Server by installing the Policy. What might prevent you from installing the Policy? 

A. An intermediate local Security Gateway does not allow a policy install through it to the remote new Security Gateway appliance. Resolve by running the command fw unloadlocal on the local Security Gateway. 

B. You first need to run the command fw unloadlocal on the R77 Security Gateway appliance in order to remove the restrictive default policy. 

C. You first need to create a new Gateway object in SmartDashboard, establish SIC via the Communication button, and define the Gateway’s topology. 

D. You have not established Secure Internal Communications (SIC) between the Security Gateway and Management Server. You must initialize SIC on the Security Management Server. 

Answer:


Q133. - (Topic 3) 

What is the difference between Standard and Specific Sign On methods? 

A. Standard Sign On allows the user to be automatically authorized for all services that the rule allows. Specific Sign On requires that the user re-authenticate for each service and each host to which he is trying to connect. 

B. Standard Sign On allows the user to be automatically authorized for all services that the rule allows. Specific Sign On requires that the user re-authenticate for each service specifically defined in the window Specific Action Properties. 

C. Standard Sign On requires the user to re-authenticate for each service and each host to which he is trying to connect. Specific Sign On allows the user to sign on only to a specific IP address. 

D. Standard Sign On allows the user to be automatically authorized for all services that the rule allows, but re-authenticate for each host to which he is trying to connect. Specific Sign On requires that the user re-authenticate for each service. 

Answer:


Q134. - (Topic 1) 

When you use the Global Properties' default settings on R77, which type of traffic will be dropped if NO explicit rule allows the traffic? 

A. Firewall logging and ICA key-exchange information 

B. RIP traffic 

C. Outgoing traffic originating from the Security Gateway 

D. SmartUpdate connections 

Answer:


Q135. - (Topic 1) 

Chris has lost SIC communication with his Security Gateway and he needs to re-establish SIC. 

What would be the correct order of steps needed to perform this task? 

A. 3, 1, 4, 2 B. 2, 3, 1, 4 

C. 5, 1, 2, 4 

D. 5, 1, 4, 2 

Answer:


Q136. - (Topic 1) 

Which of the following methods will provide the most complete backup of an R75 configuration? 

A. Execute command upgrade_export 

B. Database Revision Control 

C. Policy Package Management 

D. Copying the directories $FWDIR\conf and $CPDIR\conf to another server 

Answer: