Certbus > CheckPoint > CCSA R77 > 156-215.77 > 156-215.77 Online Practice Questions and Answers

156-215.77 Online Practice Questions and Answers

Questions 4

A digital signature:

A. Guarantees the authenticity and integrity of a message.

B. Automatically exchanges shared keys.

C. Decrypts data to its original form.

D. Provides a secure key exchange mechanism over the Internet.

Browse 388 Q&As
Questions 5

When using GAiA, it might be necessary to temporarily change the MAC address of the interface eth 0 to 00:0C:29:12:34:56. After restarting the network the old MAC address should be active. How do you configure this change?

As expert user, issue these commands:

A. Edit the file /etc/sysconfig/netconf.C and put the new MAC address in the field

B. As expert user, issue the command:

C. # IP link set eth0 addr 00:0C:29:12:34:56

D. Open the WebUI, select Network > Connections > eth0. Place the new MAC address in the field Physical Address, and press Apply to save the settings.

Browse 388 Q&As
Questions 6

Message digests use which of the following?

A. DES and RC4

B. IDEA and RC4

C. SSL and MD4

D. SHA-1 and MD5

Browse 388 Q&As
Questions 7

How can you configure an application to automatically launch on the Security Management Server when traffic is dropped or accepted by a rule in the Security Policy?

A. SNMP trap alert script

B. Custom scripts cannot be executed through alert scripts.

C. User-defined alert script

D. Pop-up alert script

Browse 388 Q&As
Questions 8

Which of the following is NOT useful to verify whether or not a Security Policy is active on a Gateway?

A. fw ctl get string active_secpol

B. fw stat

C. cpstat fw -f policy

D. Check the Security Policy name of the appropriate Gateway in SmartView Monitor.

Browse 388 Q&As
Questions 9

You are MegaCorp's Security Administrator. There are various network objects which must be NATed. Some of them use the Automatic Hide NAT method, while others use the Automatic Static NAT method. What is the rule order if both methods are used together? Give the BEST answer.

A. The Administrator decides the rule order by shifting the corresponding rules up and down.

B. The Static NAT rules have priority over the Hide NAT rules and the NAT on a node has priority over the NAT on a network or an address range.

C. The Hide NAT rules have priority over the Static NAT rules and the NAT on a node has priority over the NAT on a network or an address range.

D. The rule position depends on the time of their creation. The rules created first are placed at the top; rules created later are placed successively below the others.

Browse 388 Q&As
Questions 10

Which rule is responsible for the installation failure? Exhibit:

A. Rule 5

B. Rule 4

C. Rule 3

D. Rule 6

Browse 388 Q&As
Questions 11

You are conducting a security audit. While reviewing configuration files and logs, you notice logs accepting POP3 traffic, but you do not see a rule allowing POP3 traffic in the Rule Base. Which of the following is the most likely cause?

A. The POP3 rule is disabled.

B. POP3 is accepted in Global Properties.

C. The POP3 rule is hidden.

D. POP3 is one of 3 services (POP3, IMAP, and SMTP) accepted by the default mail object in R77.

Browse 388 Q&As
Questions 12

UDP packets are delivered if they are ___________.

A. a stateful ACK to a valid SYN-SYN/ACK on the inverse UDP ports and IP

B. a valid response to an allowed request on the inverse UDP ports and IP

C. bypassing the kernel by the forwarding layer of ClusterXL

D. referenced in the SAM related dynamic tables

Browse 388 Q&As
Questions 13

Which rule is responsible for the installation failure? Exhibit:

A. Rule 3

B. Rule 4

C. Rule 6

D. Rule 5

Browse 388 Q&As
Questions 14

Which statement is TRUE about implicit rules?

A. You create them in SmartDashboard.

B. The Gateway enforces implicit rules that enable outgoing packets only.

C. Changes to the Security Gateway's default settings do not affect implicit rules.

D. They are derived from Global Properties and explicit object properties.

Browse 388 Q&As
Questions 15

Which of the following items should be configured for the Security Management Server to authenticate using LDAP?

A. Login Distinguished Name and password

B. Windows logon password

C. Check Point Password

D. WMI object

Browse 388 Q&As
Questions 16

Which command would provide the most comprehensive diagnostic information to Check Point Technical Support?

A. fw cpinfo

B. cpinfo -o date.cpinfo.txt

C. diag

D. cpstat - date.cpstat.txt

Browse 388 Q&As
Questions 17

A third-shift Security Administrator configured and installed a new Security Policy early this morning. When you arrive, he tells you that he has been receiving complaints that Internet access is very slow. You suspect the Security Gateway virtual memory might be the problem. Which SmartConsole component would you use to verify this?

A. Eventia Analyzer

B. SmartView Tracker

C. SmartView Monitor

D. This information can only be viewed with the command fw ctl pstat from the CLI.

Browse 388 Q&As
Questions 18

How can you activate the SNMP daemon on a Check Point Security Management Server?

A. B. From cpconfig, select SNMP extension.

B. C. Any of these options will work.

C. D. In SmartDashboard, right-click a Check Point object and select Activate SNMP.

Browse 388 Q&As
Exam Code: 156-215.77
Exam Name: Check Point Certified Security Administrator
Last Update: Mar 18, 2024
Questions: 388 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99