156-215.77 Check Point Certified Security Administrator Exam Set 2

Which of the following is not an alternative definition of the internal network anti-spoofing?


Options are :

  • A specific object selected from
  • Network interface defined in the IP and Net Mask
  • None
  • Not specified
  • Route-based gateway from the routing table

Answer : Route-based gateway from the routing table

SmartView Monitor is mainly what kind of work 1.Monitoring Performance and traffic 2.Provision Package 3.Managing licensed 4.Managing VPN


Options are :

  • 2, 3
  • None
  • 1, 3
  • 2, 4
  • 1, 4

Answer : 1, 4

Choose the correct statement Indirect Policy:


Options are :

  • Customizable implicit rules go to: Launch Button> Policy> Global Properties> Firewall
  • Implicit rules are fixed rules that can not be changed
  • You can edit the implicit rules, but only if requested by Check Point's support personnel.
  • You can directly edit the implicit rules by double-clicking a specific rule Indirectly
  • None

Answer : Customizable implicit rules go to: Launch Button> Policy> Global Properties> Firewall

Is it possible to keep track of the number of connections for each rule matches rule base?


Options are :

  • No, because the architecture of limitation is not possible to monitor the number of connections for each rule matches.
  • None
  • Yes, but you have to SPLAT operating system to enable the feature Hits count SmartDashboard customer.
  • Yes, but you have to Gala operating system to enable the feature Hits count SmartDashboard customer.
  • Yes, because R75 40, you can use the feature Hits count SmartDashboard customer.

Answer : Yes, because R75 40, you can use the feature Hits count SmartDashboard customer.

156-215.77 Check Point Certified Security Administrator Exam Set 3

What is one possible drawback instead of separate deployments selecting Restore Distributed deployment option?


Options are :

  • Requires additional software subscription
  • A decrease in performance as a whole will increase security
  • Requires more Check Point Appliances
  • None
  • .Increases costs

Answer : A decrease in performance as a whole will increase security

Which of the following premises firewall does not allow Identity Awareness can be introduced?


Options are :

  • Bridge
  • None
  • high availability
  • Fail Open
  • load sharing

Answer : Bridge

_______ rule is used to block all traffic goes R77 Security Gateway.


Options are :

  • IPS
  • Clean up
  • None
  • Reject
  • Stealth

Answer : Stealth

John Adams is a HR partner ACME organization. ACME it wants to restrict access to the HR servers designated IP addresses to minimize infection from malware and unauthorized access risks. Thus, the gateway policy allows access to John's desktop, which is assigned a fixed IP address 10.0.0.19. John received a laptop and wants to get to the HR Web Server from anywhere in the organization. IT department gave the laptop a static IP address, but that limits him to use only his desk. Base current rule is a rule that allows John Adams to use the HR Web Server on her laptop a static IP (10.0.0.19). He wants to move the organization and continue to get HR Web Server. To make this scenario work, the system administrator: 1) Enables Identity awareness of the gateway selects the AD questionnaire as a single Identity Sources install the policy. 2) more access to the object's role in the firewall rule base, which allows John Adams PC access to HR Web Server from any computer and from any location. 3) Changes in the fixed IP address of the DHCP client. What will John do when he can not use a web server to a different personal computer?


Options are :

  • John should lock and unlock his computer
  • The load-bearing access should be amended instead of user authentication for PC
  • To explore this connection the question
  • None
  • John should install Identity Awareness Agent

Answer : The load-bearing access should be amended instead of user authentication for PC

You have worked with a number of security gateways that strengthen the extensive set of rules. To simplify security administration, which of the following would you choose to do?


Options are :

  • Create a separate package for each security remote security gateway.
  • Remove any possible conflicting such as stealth or cleanup rules
  • Create a network of objects that restrict any valid only for certain networks.
  • None
  • Smart Console to run separate instances of each log and configure the security gateway directly

Answer : Create a separate package for each security remote security gateway.

156-215.77 Check Point Certified Security Administrator Exam Set 4

Several security policies can be used in various installation targets. The firewall protecting Human Resources Director servers should be unique in Policy Package. These rules may only be installed on this machine and not by accident on the internet firewall. How can this be configured?


Options are :

  • Base rule can always be installed on any Check Point firewall object. It is necessary to choose the appropriate item immediately, select Policy> Install.
  • In choosing the right firewall for each row line to install the rule base, only this firewall displays a list of possible installation sites after selecting Policy> Install
  • In SmartDashboard policy, select the correct firewall to Specific target rule.
  • None
  • Base rule is always installed on all potential targets. Install the firewall rules defined by the row selection to install the rule base.

Answer : In SmartDashboard policy, select the correct firewall to Specific target rule.

What rule rule base station should keep Cleanup rule? Why?


Options are :

  • First. It specifically approves otherwise fallen into traffic.
  • Take. It is served by a logging function before the implicit drop.
  • Take. It specifically accepted by other traffic drops
  • None
  • Stealth currencies follow the rule.

Answer : Take. It is served by a logging function before the implicit drop.

Those rules are not applied in the first match?


Options are :

  • session authentication
  • user authentication
  • None
  • Clean up
  • client authentication

Answer : user authentication

John Adams is a HR partner ACME organization. ACME it wants to restrict access to the HR servers named set of IP addresses to minimize infection from malware and unauthorized access risks. Thus, the gateway policy allows access to John's desktop, which is assigned a fixed IP address 10.0.0.19. He has got a new laptop and want to use the HR Web Server from anywhere in the organization. IT department gave the laptop a static IP address, but that limits him to use only his desk. Base current rule is a rule that allows John Adams to use the HR Web Server on her laptop a static IP (10.0.0.19). He wants to move the organization and continue to get HR Web Server. To make this scenario work, the system administrator: 1) Enables Identity awareness of the gateway selects the AD questionnaire as a single Identity Sources and install the policy. 2) more access to the object's role in the firewall rule base, which allows John Adams to use the HR Web Server from any computer and from any location and install the policy. John turned his laptop to the network on a different network segment, and could not establish a HR Web server. What is the next best step in troubleshooting?


Options are :

  • .Investigate this network connectivity issue
  • None
  • Set a static DHCP IP
  • Since the introduction of Identity Awareness, restart the gateway
  • Identity Awareness leads to .install Agent

Answer : Set a static DHCP IP

Which of them is true about implicit rules?


Options are :

  • You create them SmartDashboard.
  • They come from the Global Real Estate and explicit object properties.
  • None
  • Changes in Security Gateway default settings do not affect the implicit rules.
  • Gateway monitors the implicit rules that allow outgoing packets only.

Answer : They come from the Global Real Estate and explicit object properties.

Identity Awareness has been implemented to control access to protected resources based on user _____________.


Options are :

  • time connection
  • identity
  • application requirement
  • The computer's MAC address
  • None

Answer : identity

156-215.77 Check Point Certified Security Administrator Exam Set 5

You run cpconfig reset SIC on Security Gateway. After the SIC reset is complete, a policy that has been installed:


Options are :

  • None
  • the first political
  • .Last policy that was installed.
  • .Standard policy
  • The default filter.

Answer : the first political

Jennifer McHanry is the CEO of Marimekko. He recently bought his own personal iPad. He wants to use his iPad uses internal Finance Web server. Because the iPad is not a member of Active Directory, he can not recognize seamlessly AD query. However, he may come to his AD credentials of a captive portal and then get the same opportunities as her office computer. His resources is based on the rules R77 firewall rule base. To make this scenario work, the system administrator must: 1) Take the Identity awareness port and select a captive portal as a single Identity sources. 2) in the portal settings section of the window User Access, make sure that the login name and password is selected. 3) Create a new rule to a firewall rule base to let Jennifer McHanry access network destinations. Click to approve the action plan. 4) Install a policy. Ms. McHanry trying to access the resource, but can not. What should he do?


Options are :

  • .Have responsible for the safety of the unit is selected activities in the field of firewall rule to redirect HTTP connections authentication (captive) Portal?
  • Is the security administrator select Any Machines tab of the appropriate task
  • None
  • Install Identity Awareness her agent on your iPad
  • Is the security administrator to start the firewall

Answer : .Have responsible for the safety of the unit is selected activities in the field of firewall rule to redirect HTTP connections authentication (captive) Portal?

Check the rule base, some rules can be hidden so that they do not interfere with the administrator is unhidden rules. Assume that the only rules are accepted as HTTP or SSH will be displayed. How to implement?


Options are :

  • Ask the dealer to get a ticket checkpoint SMARTUS and supplied to him by Security Management Server cpinfo file.
  • In SmartDashboard menu Search> rule base queries. In the window that opens, create a new query, give it a name (for example, € œHTTP_SSHâ €?) and to define the clause regarding two services HTTP and SSH. When it is applied that determines the operation of the second expression to accept and combine them with Boolean operator AND.
  • This can not be set because the two choices (Service, Action) are not possible.
  • None
  • In SmartDashboard right-click the column in the field of services> Query column. Then put the services HTTP and SSH on the list. Do the same for the field to accept the Action, and then click here.

Answer : In SmartDashboard menu Search> rule base queries. In the window that opens, create a new query, give it a name (for example, € œHTTP_SSHâ €?) and to define the clause regarding two services HTTP and SSH. When it is applied that determines the operation of the second expression to accept and combine them with Boolean operator AND.

John Adams is a HR partner ACME organization. ACME it wants to restrict access to the HR servers designated IP addresses to minimize infection from malware and unauthorized access risks. Thus, the gateway policy allows access to John's desktop, which is assigned the IP address 10.0.0.19 DHCP. John received a laptop and wants to get to the HR Web Server from anywhere in the organization. IT department gave the laptop a static IP address, but that limits him to use only his desk. Base current rule is a rule that allows John Adams to use the HR Web Server on her laptop. He wants to move the organization and continue to get HR Web Server. To make this scenario work, the system administrator: 1) Enables Identity awareness of the gateway selects the AD questionnaire as a single Identity Sources install the policy. 2) more access to the object's role in the firewall rule base, which allows John Adams PC access to HR Web Server from any computer and from any location. John turned his laptop to the network on a different network segment, and he can not be connected. How does he solve this problem?


Options are :

  • John should lock and unlock your computer
  • John should install Identity Awareness Agent
  • Firewall Admin should be installed Security
  • To explore this connection the question
  • None

Answer : Firewall Admin should be installed Security

In the decentralized management of the environment, the administrator has removed the check from the default Accept Control connections below Policy> Global Properties> Firewall tab. To Security Management Server installs an explicit policy firewall rule must be created to allow the server to notify the Security Gateway ports ______.


Options are :

  • 259
  • None
  • 900
  • 256
  • 80

Answer : 256

When used as an authentication method for an LDAP Identity Awareness Question:


Options are :

  • Requires a client and server side software
  • Prompts the user to enter credentials.
  • None
  • You need root specifically to enable LDAP traffic and the LDAP server, and Security Gateway.
  • It is transparent, does not require any client or server side software, or customer intervention.

Answer : It is transparent, does not require any client or server side software, or customer intervention.

156-215.77 Check Point Certified Security Administrator Exam Set 6

below what the item would be enforced security first?


Options are :

  • The first security rule
  • address conversion
  • IP spoofing / IP options
  • Administrator defined in the rule base
  • None

Answer : IP spoofing / IP options

What happens if the user identifier is known?


Options are :

  • .If the user information corresponding to an Access Role, the rule is applied and the traffic is accepted or dropped based on the action specified
  • If the user does not correspond Access Role, the system displays a captive portal.
  • None
  • .If the user information does not match the Access Role, the traffic is automatically dropped.
  • If the user does not correspond Access Role, the system displays a sandbox.

Answer : .If the user information corresponding to an Access Role, the rule is applied and the traffic is accepted or dropped based on the action specified

Which of the following allows administrators to allow or deny traffic based on a specific network or the user's credentials?


Options are :

  • mission-
  • None
  • Access rule
  • access certificate
  • Access Policy

Answer : mission-

All of the following are security gateway controller connections as defined in the quiet rules, except:


Options are :

  • None
  • Specific traffic that facilitates functions such as logging, management and exchange of keys.
  • Exclusion of special reporting
  • The adoption of the RDP and IKE traffic encryption for communication, and.
  • Communication with server types, such as RADIUS, CVP, UFP, LDAP and TACACS.

Answer : Exclusion of special reporting

Cleanup rule:


Options are :

  • drops packets without logging connections that would otherwise be accepted and recorded by default.
  • logs for connections that would otherwise be acceptable without being logged in by default.
  • logs for connections that would otherwise be dropped without logging by default
  • None
  • drops packets without logging connections that would otherwise be dropped and logged by default.

Answer : logs for connections that would otherwise be dropped without logging by default

In the decentralized management of the environment, the administrator has deleted all the default check boxes Model Policy> Global Properties> Firewall tab. To send logs Security Gateway Security Management Server, an explicit rule must be created in order to inform the Security Gateway Security Management Server on port ______.


Options are :

  • None
  • 900
  • 257
  • 256
  • 259

Answer : 257

156-215.77 Check Point Certified Security Administrator Test Set 1

MegaCorp security infrastructure to separate security gateways geographically. You need to request a license key with one remote security gateway. How do I apply for permission?


Options are :

  • The remote gateway IP address, and the application of the license locally with the command cplic put.
  • None
  • Using the Security Management Server IP address, and connecting the remote gateway license through the Smart Update.
  • The remote gateway IP address, and connecting via the remote gateway smart license update.
  • Using each gateway IP addresses, and applying licensing Security Management Server command.

Answer : Using the Security Management Server IP address, and connecting the remote gateway license through the Smart Update.

When you hide a rule in the rule base, how can you then delete the rule?


Options are :

  • Right-click on a hidden rule the place holder list and uncheck Hide, then right-click and select Delete Rule (s); re-hide the rule.
  • Right-click on a hidden rule the place holder list and click Delete rule (s).
  • Use our search utility SmartDashboard view all hidden rules. Select the appropriate rule, and then click Disable rule (s).
  • None
  • Hidden rules are already effectively disable the security gateway implementation.

Answer : Right-click on a hidden rule the place holder list and uncheck Hide, then right-click and select Delete Rule (s); re-hide the rule.

Installing the policy does not usually affect the currently existing connections. Which statements are true?


Options are :

  • Users are authenticated Client Authentication need to re-authenticate.
  • None
  • All connections are reset, so it is recommended to install the policy will be announced during the downtime only.
  • Site-to-site VPN networks need to re-authenticate, so step 1 is conducted after the installation security policy.
  • All FTP downloads will be reset; users have to start the download again.

Answer : Users are authenticated Client Authentication need to re-authenticate.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions