We provide real 156-315.77 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Check Point 156-315.77 Exam quickly & easily. The 156-315.77 PDF type is available for reading and printing. You can print more and practice many times. With the help of our Check Point 156-315.77 dumps pdf and vce product and material, you can easily pass the 156-315.77 exam.

Q337. - (Topic 1) 

John is upgrading a cluster from NGX R65 toR76. John knows that you can verify the upgrade process using the pre-upgrade verifier tool. When John is running Pre-Upgrade Verification, he sees the warning message: 

Title: Incompatible pattern. 

What is happening? 

A. R76uses a new pattern matching engine. Incompatible patterns should be deleted before upgrade process to complete it successfully. 

B. Pre-Upgrade Verification process detected a problem with actual configuration and upgrade will be aborted. 

C. Pre-Upgrade Verification tool only shows that message but it is only informational. 

D. The actual configuration contains user defined patterns in IPS that are not supported inR76. If the patterns are not fixed after upgrade, they will not be used withR76Security Gateways. 

Answer:


Q338. - (Topic 3) 

Review the following list of actions that Security GatewayR76can take when it controls packets. The Policy Package has been configured for Simplified Mode VPN. Select the response below that includes the available actions: 

A. Accept, Drop, Encrypt, Session Auth 

B. Accept, Drop, Reject, Client Auth 

C. Accept, Hold, Reject, Proxy 

D. Accept, Reject, Encrypt, Drop 

Answer:


Q339. - (Topic 6) 

Smart Provisioninguses different types of profiles to manage and provision the gateways. These types are: 

A. SmartLSM Security Profiles and Provisioning Profiles 

B. Provisioning Profiles and Gateways Profiles 

C. SmartLSM Security Profiles and SmartDashboard Profiles 

D. SmartConsole Profiles and SmartFilter Profiles 

Answer:


Q340. CORRECT TEXT - (Topic 7) 

Fill in the blank. In Load Sharing Unicast mode, the internal cluster IP address is 10.4.8.3. The internal interfaces on two members are 10.4.8.1 and 10.4.8.2. Internal host 10.4.8.108 Pings 10.4.8.3, and receives replies. The following is the ARP table from the internal Windows host 10.4.8.108. 

Review the exhibit and type the IP address of the member serving as the pivot machine in the space below. 

Answer: 10.4.8.2 


Q341. - (Topic 3) 

If you need strong protection for the encryption of user data, what option would be the BEST choice? 

A. When you need strong encryption, IPsec is not the best choice. SSL VPN's are a better choice. 

B. UseDaffier-Hellman for key construction and pre-shared keys for Quick Mode. Choose SHA in Quick Mode and encrypt with AES. Use AH protocol. Switch to Aggressive Mode. 

C. DisableDiffer-Hellman by using stronger certificate based key-derivation. Use AES-256 bit on all encrypted channels and add PFS toQuick Mode. Use double encryption by implementing AH and ESP as protocols. 

D. Use certificates for Phase 1, SHA for all hashes, AES for all encryption and PFS, and use ESP protocol. 

Answer:


Q342. - (Topic 5) 

Central License management allows a Security Administrator to perform which of the following? Select all that apply. 

A. Attach and/or delete only NGX Central licenses to a remote module (not Local licenses) 

B. Check for expired licenses 

C. Add or remove a license to or from the license repository 

D. Sort licenses and view license properties 

E. Delete both NGX Local licenses and Central licenses from a remote module 

F. Attach both NGX Central and Local licenses to a remote module 

Answer: A,B,C,D 


Q343. - (Topic 6) 

You have to uninstall the Check PointSmart WorkflowSoftware Blade on aSecure Platformsystem. How can you perform this procedure? 

A. To uninstall theSmart WorkflowSoftware Blade you can connect to theSecure PlatformWebUI ( <IP of the Security Management Server>) and select: Device > Upgrade. You will be asked if you want uninstall theSmart WorkflowSoftware Blade. 

B. To uninstall theSmart WorkflowSoftware Blade you must first connect to your Security Management System on command line level. Then in the directory /opt/CPUninstall/Check_Point_Workflow, run the command ./UnixInstallScript -u. Afterwards, follow the screen instructions and change to the directory /opt/CPUninstall/R70_HFA_10 and repeat the previous command. 

C. To uninstall theSmart WorkflowSoftware Blade, you useSmart Update. Click on the symbol of the Security Management Server, right-click, select Get Gateway Data, selectSmart Workflow, right -click uninstall Smart Workflow. You will see the progress in theOpera rationStatus windows. 

D. To uninstall theSmart WorkflowSoftware Blade, you must first connect to your Security Checkpoint 156-315.77 : Practice Test 

Management System on the command line level. Then in the directory /opt/CPuninstall/Check_Point_Workflow, run the command ./UnixInstallScript -u. 

Answer:


Q344. - (Topic 5) 

What is the behavior of ClusterXL in a High Availability environment? 

A. Both members respond to the virtual IP address, and both members pass traffic when using their physical addresses. 

B. Both members respond to the virtual IP address, but only the active member is able to pass traffic. 

C. The active member responds to the virtual IP address.nd both members pass traffic when using their physical addresses. 

D. The active member responds to the virtual IP address.nd is the only member that passes traffic 

E. The passive member responds to the virtual IP address, and both members route traffic when using their physical addresses. 

Answer: