156-315.77 Check Point Certified Security Expert Exam Set 11

Which one LDAP, and Active Directory (AD) SSL VPN is true?


Options are :

  • SSL VPN does not support LDAP password repair.
  • SSL VPN Never store a record of the user's LDAP / AD groups.
  • By default. SSL VPN to send a user name and password, LDAP servers UTF8
  • None
  • SSL VPN is capable of giving or create users and groups in the LDAP server

Answer : SSL VPN is capable of giving or create users and groups in the LDAP server

For the system to work properly, the administrator must configure DLP portal and to define its DNS name, which of the following conditions?


Options are :

  • If there is one or more of the Report Rules.
  • If the action Identify all the rules and data owners have been determined.
  • None
  • If the DLP policy is applied to HTTP traffic.
  • If one or more rules to Ask User.

Answer : If one or more rules to Ask User.

In ClusterXL, which of the following is thus defined as a critical device?


Options are :

  • protect.exe
  • None
  • PROT_SRV.EXE
  • Filter
  • fw.d

Answer : Filter

Prior to updating the Secure Platform, you might want to create backup.To save time, many administrators backup.This command creates a backup copy of Check Point's configuration as well as configuration.An system administrator has installed the latest HFA system for attaching after creating a backup of traffic problems. It is a mistake very complex static routing configuration.The Check Point configuration is not changed.Can the administrator to use to restore correct errors in the static routing?


Options are :

  • The restore point is done by selecting a Snapshot from the Secure Management Platform in the Start menu.
  • The recovery process can be easily return the command to select the appropriate backup.
  • None
  • Back up can not be restored because the binary files are missing.
  • The return process is not possible, because the backup does not have the same build number (version).

Answer : The recovery process can be easily return the command to select the appropriate backup.

156-315.77 Check Point Certified Security Expert Exam Set 12

You are going to include OPSEC servers, such as Web wits and Trend Micro, to do content filtering. Every segment is the best place for these OPSEC server, when you consider the security server performance and security?


Options are :

  • There is a Security Gateway
  • The internal network, where users are located
  • Dedicated to segment the network
  • on the Internet
  • .DMZ network where application servers are located

Answer : Dedicated to segment the network

What is the function Smart Event Server?


Options are :

  • Displays received lately.
  • To set the severity level of the event.
  • None
  • Forward what is known as an event Smart Event Server.
  • Analyze each IPS log, when it comes to the log server.

Answer : To set the severity level of the event.

What is the function Smart Client Event?


Options are :

  • To set the severity level of the event
  • Analyze each IPS log when it reaches the server's log
  • More events events database.
  • Displays received lately.
  • None

Answer : Displays received lately.

156-315.77 Check Point Certified Security Expert Exam Set 13

Each command can be used to authenticate SecureXL statistics?


Options are :

  • fwaccel Statistics
  • cphaprob stat
  • fwaccel top
  • FW ctl Pstat
  • None

Answer : fwaccel Statistics

In the R71, how to define a rule to block all traffic sent to or from Germany?


Options are :

  • Create a policy rule destination being the dynamic object represents a custom in Germany and the policy. You also need to create a rule in the opposite direction.
  • None
  • Create a national policy IPS Geo Protections Germany as the country, block the action, and as well as the direction.
  • Go to the list of policy / Global Properties / Geographical enforcement issues and increase Germany's blocked countries.
  • This operation is not possible.

Answer : Create a national policy IPS Geo Protections Germany as the country, block the action, and as well as the direction.

Every DLP would describe the operation of the following actions: a data transfer event is logged in SmartView Tracker.Administrators permission can view information that has been sent. Traffic passes.


Options are :

  • Prevent
  • Ask Viewing
  • The user is told
  • detect
  • None

Answer : detect

156-315.77 Check Point Certified Security Expert Exam Set 14

In introducing its own DLP Gateway behind the perimeter firewall interface leads to the internal network (only one internal network):


Options are :

  • DLP Gateway can monitor the internal e-mails (e-mails of two users on the internal network), if an organization's internal e-mail server is located on the internal network and users are configured to send e-mail messages to this mail server using SMTP.
  • DLP Gateway can inspect the SMTP traffic if MS Exchange server is located on the internal network, and it will either send emails directly from the Internet using SMTP or send e-mails via the Internet SMTP e-mail link located on the perimeter firewall DMZ network.
  • DLP Gateway can check e-mails (e-mails of two internal users or external network), if an organization's internal mail server is located on another network (not internal network, such as a DMZ or a different internal network) and users have been configured to send e-mail messages to this mail server using SMTP.
  • User HTTPS, and FTP traffic can be inspected by the R71 DLP Gateway
  • None

Answer : DLP Gateway can inspect the SMTP traffic if MS Exchange server is located on the internal network, and it will either send emails directly from the Internet using SMTP or send e-mails via the Internet SMTP e-mail link located on the perimeter firewall DMZ network.

Which of the following is not true regarding HTTPS traffic through the gateway DLP?


Options are :

  • HTTPS traffic is scanned DLP
  • You need to edit $ FWDIR / conf / fwauthd.conf file so that HTTPS traffic passing through the Web Proxy DLP gateway.
  • None
  • Only one proxy server can be configured DLP
  • You must specify a gateway DLP allows HTTP / HTTPS traffic through a proxy server, if you have a web proxy gateway between the DLP and the internet.

Answer : You need to edit $ FWDIR / conf / fwauthd.conf file so that HTTPS traffic passing through the Web Proxy DLP gateway.

MultiCorp is located in Atlanta. It has a branch in Europe, Asia and Africa.Each location has its own AD controller, a local user login.How many ad queries is configured?


Options are :

  • 1
  • 2
  • 3
  • 4
  • None

Answer : 4

156-315.77 Check Point Certified Security Expert Exam Set 15

Which of these four Check Point QoS technologies to prevent transmission of redundant packets when multiple copies of the packet queue at the same time at the same flow?


Options are :

  • Intelligent queuing engine
  • Flow Weighted Random Early Drop (WFRED)
  • farm owner
  • Re-shipment Detection Early Drop (RDED)
  • None

Answer : Re-shipment Detection Early Drop (RDED)

You are going to upgrade to Check Point Gateway between R65 and R76.To avoid problems, you decide to back up Gateway.Which approach allows the Gateway's configuration to be completely backed up to a manageable size of the least amount of time?


Options are :

  • None
  • Checking the database
  • back up
  • picture
  • upgrade export

Answer : upgrade export

Every remote desktop protocols natively SSL VPN?


Options are :

  • Microsoft RDP only
  • AT & T VNC, Citrix ICA and Microsoft RDP
  • None
  • Citrix ICA and Microsoft RDP
  • AT & T VNC and Microsoft RDP

Answer : Citrix ICA and Microsoft RDP

156-315.77 Check Point Certified Security Expert Exam Set 16

If Victor wanted to edit a new Signature Protections, what tongue he is able to get into SmartDashboard?


Options are :

  • QoS Tab
  • None
  • SmartDefense Tab
  • IPSec VPN Tab
  • IPS Tab

Answer : IPS Tab

Which of the following components includes events in the database?


Options are :

  • Smart Client Event
  • Smart Event data server
  • Smart Event korrelointiyksikön
  • Smart Event Server
  • None

Answer : Smart Event Server

In Management High Availability (HA) configuration, you can configure synchronization to occur automatically when: 1. Security is installed. 2. Security will be saved. 3. The Security Administrator logs into the secondary SmartCenter Server and change the status to active. 4. The planned event. 5. The user database is installed. Choose the best response to the synchronization sequence. Choose one.


Options are :

  • 1,2,4
  • 1,2,3
  • 1,2,5
  • 1,3,4
  • 1,2,3,4

Answer : 1,2,4

156-315.77 Check Point Certified Security Expert Exam Set 17

With encryption for the domain SmartLSM Security Gateway R71 defined?


Options are :

  • Within SmartLSM Security Gateway GUI object SmartProvisioning
  • Within SmartLSM Security Gateway GUI profile SmartProvisioning
  • .Inside SmartLSM Security Gateway GUI object SmartDashboard
  • Within SmartLSM Security Gateway GUI profile SmartDashboard
  • None

Answer : Within SmartLSM Security Gateway GUI profile SmartProvisioning

156-315.77 Check Point Certified Security Expert Exam Set 18

How ClusterXL unicast mode to handle the new traffic?


Options are :

  • Pivot device receives and reviews all new packages are then sync your contacts with other members of the
  • None
  • Pivot the machine receives all packets and passes through an algorithm to determine which member should be treated with packages
  • All members of all the packages and the process of cluster members synchronize with each other. Pivot is responsible for synchronizing the master catalog
  • All members receive all of the packages. Security Management Server to decide which member of the handles packages. Other members remove packages from the memory.

Answer : Pivot the machine receives all packets and passes through an algorithm to determine which member should be treated with packages

If the traffic requires special treatment in addition to other routers network QoS module that Check Point QoS feature should be used?


Options are :

  • With a slight delay waiting
  • guarantees
  • Differentiated Services
  • None
  • Weighted Fair Queuing

Answer : Differentiated Services

What kind of package is VPN-1 SecureClient sends it to the Policy Server, to report to the Secure Configuration Verification Status?


Options are :

  • IKE Key Exchange
  • UDP keep alive
  • ICMP Destination unreachable
  • ICMP Port unreachable
  • TCP keep alive

Answer : UDP keep alive

156-315.77 Check Point Certified Security Expert Exam Set 19

The user can not authenticate the SSL VPN. You have verified the user is assigned a user group, and reproduce the problem, confirmed the failed session. You do not see proof of this company's traffic log. The user does not use the client certificate login.To debug this error in the authentication process could be the solution can be found?


Options are :

  • cpauth
  • Apache
  • None
  • cvpnd
  • by admin

Answer : cvpnd

You just want to RAS signals travel H.323 Gatekeeper H.323 and other protocols that runs directly from the end of points.Which routing mode Voip Domain Gatekeeper you choose?


Options are :

  • None
  • Call setup and call control
  • call setup
  • Directly
  • Direct and call set-up

Answer : Directly

Every Protection Mode does not exist IPS?


Options are :

  • inactive
  • detect
  • None
  • Prevent
  • Allow

Answer : Allow

156-315.77 Check Point Certified Security Expert Exam Set 2

Wayne configure the HTTP Security Server to work with content vectoring protocol to screen for forbidden sites. He has created the URI of the resource object CVP with the following settings: Use the CVP Allow CVP server to modify the contents of Return data when the content is approved, he adds two rules in his rule base: one to inspect HTTP traffic going to known forbidden sites, the other to all other HTTP traffic. Wayne sees HTTP traffic going to these problematic sites is not prohibited. What could be causing this problem?


Options are :

  • Security server is connected to the CVP server, but no restrictions are defined CVP server.
  • The protection server is not communicating with CVP server.
  • Security Server rule is, when the HTTP Accept the general rule.
  • None
  • Security server is not configured correctly.

Answer : Security Server rule is, when the HTTP Accept the general rule.

Which of the following explains the role of Segregation?


Options are :

  • None
  • Smart Workflow can be configured in such a way that managers can only view the assigned sessions
  • Changes made by the administrator Smart Workflow session must have managerial competency certification before making a commitment.
  • Different tasks are broken down SmartDashboard firewall administrator rights
  • Administrators have different abilities than the Smart Workflow leaders.

Answer : Changes made by the administrator Smart Workflow session must have managerial competency certification before making a commitment.

Which of the following is most likely to improve the performance of Check Point QoS?


Options are :

  • Put the rules most often used at the bottom of the QoS rule base.
  • Define the Check Point QoS only the external interfaces QoS module
  • Turn towards the rule limits per connection limits
  • Turn towards the rule of bail will be contacted towards the bail.
  • None

Answer : Define the Check Point QoS only the external interfaces QoS module

156-315.77 Check Point Certified Security Expert Exam Set 20

Every Name Resolution protocols are supported SSL VPN?


Options are :

  • None
  • DNS, hosts, Imhosts, WINS
  • DNS, hosts
  • DNS, hosts, WINS
  • DNS, hosts, Imhosts

Answer : DNS, hosts

Smart Work Flow has been introduced in the following configuration: If the security administrator opens a new session and changes to the policy will be submitted for approval session will be displayed:


Options are :

  • None
  • Abandoned
  • In progress
  • Waiting for approval
  • admitted

Answer : In progress

Which Check Point QoS feature means TOS byte in the IP header?


Options are :

  • Differentiated Services
  • None
  • Weighted Fair Queuing
  • guarantees
  • With a slight delay waiting

Answer : Differentiated Services

156-315.77 Check Point Certified Security Expert Exam Set 21

Every Security Servers can perform content security tasks, but can not perform authentication tasks?


Options are :

  • Telnet
  • FTP
  • HTTP
  • None
  • SMTP

Answer : SMTP

Jerry is concerned that denial-of-service (DoS) may impact his VPN Communities. He decides to take IKE DoS protection. Jerry is a need to minimize the performance impact of this new protection.Which of the following configurations is the most appropriate Jerry?


Options are :

  • Set the "Support IKE DoS protection" of the identified source, and "Support IKE DoS protection" unknown source "Stateless".
  • Place the support IKE DoS protection to identify the source of "Stateless" and support for IKE DoS protection unidentified source "puzzles".
  • Place the support IKE Dos Protective identified sources, and support for IKE DoS protection unidentified source "puzzles".
  • Place the support IKE DoS protection to identify the source of "Stateless", and support for IKE DoS protection unidentified source "None".
  • Place the support IKE DoS protection to identify the source "puzzles", and support for IKE DoS protection unidentified source "Stateless".

Answer : Set the "Support IKE DoS protection" of the identified source, and "Support IKE DoS protection" unknown source "Stateless".

You have a production implementation of the Management High Availability clock version of VPN-1 NG with Application Intelligence R55.You need to upgrade two SmartCenter servers VPN-1 NGX. What is the correct procedure?


Options are :

  • 1. Perform an advanced upgrade the primary SmartCenter Server. 2. Determine the primary Smart Center Server object version of the VPN-1 NGX. 3. The synchronization of the primary secondary SmartCenter Server. 4. Update your secondary SmartCenter Server. 5. Set a secondary SmartCenter Server object version of VPN-1 NGX. 6. servers to synchronize again.
  • 1. synchronize the two SmartCenter servers. 2. Update your secondary SmartCenter Server. 3. Update the primary SmartCenter Server. 4. Specify both SmartCenter Server resist version of VPN-1 NGX. 5. servers to synchronize again.
  • 1. synchronize the two SmartCenter servers. 2. Perform an advanced upgrade the primary SmartCenter Server. 3. Update your secondary SmartCenter Server. 4. Determine both smart objects Center server version of the VPN-1 NGX. 5. servers to synchronize again.
  • 1. synchronize the two SmartCenter servers. 2. Perform an advanced upgrade the primary SmartCenter Server. 3. Determine the primary Smart Center Server object version of the VPN-1 NGX. 4. The synchronize data between two servers again. 5. Update your secondary SmartCenter Server. 6. Determine the secondary smart center server object version of the VPN-1 NGX. 7. synchronize servers again.
  • None

Answer : 1. synchronize the two SmartCenter servers. 2. Perform an advanced upgrade the primary SmartCenter Server. 3. Update your secondary SmartCenter Server. 4. Determine both smart objects Center server version of the VPN-1 NGX. 5. servers to synchronize again.

156-315.77 Check Point Certified Security Expert Exam Set 22

Every network port is used for communication PPTP?


Options are :

  • None
  • 1723 / udp
  • 25 / udp
  • 25 / TCO
  • 1723 / tcp

Answer : 1723 / tcp

156-315.77 Check Point Certified Security Expert Exam Set 23

To identify the correct Smart Update step is carried out to update the remote security gateway.


Options are :

  • Once you have selected the "Packages: More ... CD", the entire contents of the CD-ROM is copied Package storage place SmartCenter Server.
  • Once you have selected the "Packages: More ... CD" selected package is copied to the packages directory in the selected remote security gateway.
  • Once you have selected the "Packages: Add ... CD" selected package file is copied Package storage place SmartCenter Server.
  • None
  • Once you have selected the "Packages: More ... CD", the entire contents of the CD are copied to the packages directory in the selected remote security gateway.

Answer : Once you have selected the "Packages: Add ... CD" selected package file is copied Package storage place SmartCenter Server.

Which of the following is a true statement to the strengthening of the agreement is?


Options are :

  • The contract between a file stored in the Smart Console and uploaded to SmartCenter Server.
  • None
  • The contract between you file is saved to the user's Center and Gateway fetched necessary.
  • The contract between a file stored in the SmartCenter server and downloaded Security Gateway.
  • The contract between a file stored in the Smart Console and Gateway is loaded.

Answer : The contract between a file stored in the SmartCenter server and downloaded Security Gateway.

What physical machine must have access to the User Center public IP checking for new packages Smart Update?


Options are :

  • Smart Update Repository Library SQL Server Database
  • None
  • Smart Update installed SmartCenter Server PC
  • VPN-1 security gateway of getting the new update package
  • Smart Update GUI PC

Answer : Smart Update GUI PC

156-315.77 Check Point Certified Security Expert Exam Set 24

The following output cphaprob State, which ClusterXL state this?


Options are :

  • unicast mode
  • multicast mode
  • the old
  • Load balancing mode
  • the new state

Answer : unicast mode

What are your Check Point protocol is the basis module Checkpoint ClusterXL between the functionality of communication?


Options are :

  • CCP
  • HA OPCODE
  • IPSec
  • RDP
  • CKPP

Answer : CCP

You have Security Administrator prepares to send the new HFA (Hot fix the battery) security gateways five to ten geographically separated locations.What is the best way to implement this HFA?


Options are :

  • Use scp SSH connection to each HFA Security Gateway.Once copied locally, start remote installation command and follow the installation with the progress of the SmartView Monitor.
  • Send Certified Security Engineer for each site to perform the update
  • Use the Smart Update to install the packages to each security gateways remotely
  • None
  • Send a CD-ROM with HFA each place and have local staff to install

Answer : Use the Smart Update to install the packages to each security gateways remotely

156-315.77 Check Point Certified Security Expert Exam Set 3

When upgrading NGX R65, Check Point products which do not require permission to upgrade up to date?


Options are :

  • None
  • VPN-1 NG Application Intelligence (R54) and later,
  • None, all versions of the update are subject to authorization
  • VPN-1 NGX (R60), and subsequently
  • VPN-1 NGX (R64), and subsequently

Answer : VPN-1 NGX (R60), and subsequently

Which of the following is part of a PKI? Select all that apply.


Options are :

  • Certificate Revocation Lists
  • The public key certificate
  • user certificate
  • the attribute

Answer : Certificate Revocation Lists The public key certificate user certificate

What is the biggest benefit is derived from the Frame Relay VPNs in comparison, other types of leased line dedicated networks?


Options are :

  • lower cost
  • stronger authentication
  • None
  • Less failure / downtime
  • more performance

Answer : lower cost

156-315.77 Check Point Certified Security Expert Exam Set 4

The public keys and digital certificates to provide which of the following? Choose three.


Options are :

  • non-repudiation
  • Availability
  • data integrity
  • Authentication

Answer : non-repudiation data integrity Authentication

Which of the following SSL Network Extender server-side conditions are correct? Select all that apply.


Options are :

  • Uses Integrity Clientless Security (ICS), you must install the ICS server or configuration tool.
  • Specific VPN-1 security gateway must be set as a member of the VPN-1 Remote Access Community.
  • There is a distinct access rules are needed to Secure Client users vs. SSL Network Extender users.
  • VPN1-gateway must be configured to work Visitor mode

Answer : Uses Integrity Clientless Security (ICS), you must install the ICS server or configuration tool. Specific VPN-1 security gateway must be set as a member of the VPN-1 Remote Access Community. VPN1-gateway must be configured to work Visitor mode

Which of these components does not require a VPN-1 NGX R65 license?


Options are :

  • Smart Update upgrade / patch
  • Smart Console
  • SmartCenter Server
  • None
  • Check Point Gateway

Answer : Smart Console

156-315.77 Check Point Certified Security Expert Exam Set 5

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions