156-315.77 Check Point Certified Security Expert Exam Set 2

For a dedicated DLP Gateway that runs in inline bridge mode, why is it important to properly define the topology?


Options are :

  • Topology definition is necessary for correct anti-spoofing.
  • Topology definition is used for VPN communities definition.
  • Topology is used for Hide NAT.
  • By default. My Organization is defined by the internal interfaces of a DLP Gateway.

Answer : By default. My Organization is defined by the internal interfaces of a DLP Gateway.

156-315.77 Check Point Certified Security Expert Exam Set 3

How many events are shown by default in the Event preview pane?


Options are :

  • $1,000
  • $30,000
  • $15,000
  • $5,000

Answer : $5,000

What command will stop all (and only) Management Portal services?


Options are :

  • spstop
  • smartportalstop
  • sportalstop
  • cpstop

Answer : smartportalstop

The Management Portal allows all of the following EXCEPT:


Options are :

  • Manage firewall logs
  • Schedule policy installation
  • View administrator activity
  • View the status of Check Point products

Answer : Schedule policy installation

156-315.77 Check Point Certified Security Expert Exam Set 4

Which application is used to create a File-Share Application?


Options are :

  • SmartPortal WebUI (File-Share Tab)
  • SSL VPN Portal WebUI (File-Share Tab)
  • SmartDashboard (SSL VPN Tab)
  • Provider-1 MDG (Global VPNs Tab)

Answer : SmartDashboard (SSL VPN Tab)

What happens when an Administrator activates the DLP Portal for Self Incident Handling and enters its fully qualified domain name (DNS name)?


Options are :

  • The daemon running DLP Portal starts to run and can cater requests from users' browsers (following links from e-mail notifications) and from Check Point User Check.
  • User Check is activated.
  • Connections created between the user and the DLP Gateway when clicking links within e-mail notifications to send or discard quarantined e-mails (matched for an Ask User rule) are encrypted.
  • The DLP Gateway can now notify Data Owners about DLP incidents.

Answer : The daemon running DLP Portal starts to run and can cater requests from users' browsers (following links from e-mail notifications) and from Check Point User Check.

A Security Administrator opens a new session, makes changes to the policy and submits the session for approval. The Security Manager may approve the session or request repair. If a manager opens a new session and submits it for approval, can he approve his session as a Security Manager?


Options are :

  • No, he can never approve his own session.
  • It depends on the type of changes made in the session.
  • It depends on the SmartWorkflow settings in Global Properties.
  • Yes, he can always approve his own session

Answer : It depends on the SmartWorkflow settings in Global Properties.

156-315.77 Check Point Certified Security Expert Exam Set 5

When selecting a backup target using SmartProvisioning, which target is NOT available?


Options are :

  • FTP
  • Locally on device
  • SCP
  • TFTP

Answer : FTP

Which Check Point QoS feature allows a Security Administrator to define special classes of service for delay-sensitive applications?


Options are :

  • Weighted Fair Queuing
  • Low Latency Queuing
  • .Differentiated Services
  • Guarantees

Answer : Low Latency Queuing

The relay mail server configured under Email Notifications is used by the DLP Gateway to:(Choose the BEST answer.)


Options are :

  • Synchronize with other mail servers in the network
  • Define My Organization / DLP Gateway and scan only e-mails that originate from this relay server.
  • If User Check is configured, there is no need to configure this relay server if there are no Ask User rules and there is no need to notify any Data Owners.
  • Send e-mail notifications to users and Data Owners.

Answer : Send e-mail notifications to users and Data Owners.

156-315.77 Check Point Certified Security Expert Exam Set 6

Every Security Servers can perform content security tasks, but can not perform authentication tasks?


Options are :

  • Telnet
  • FTP
  • HTTP
  • SMTP
  • None

Answer : SMTP

156-315.77 Check Point Certified Security Expert Exam Set 7

Every Protection Mode does not exist IPS?


Options are :

  • Allow
  • detect
  • inactive
  • Prevent
  • None

Answer : Allow

You just want to RAS signals travel H.323 Gatekeeper H.323 and other protocols that runs directly from the end of points.Which routing mode Voip Domain Gatekeeper you choose?


Options are :

  • call setup
  • Directly
  • Direct and call set-up
  • None
  • Call setup and call control

Answer : Directly

How ClusterXL unicast mode to handle the new traffic?


Options are :

  • All members of all the packages and the process of cluster members synchronize with each other. Pivot is responsible for synchronizing the master catalog
  • None
  • Pivot the machine receives all packets and passes through an algorithm to determine which member should be treated with packages
  • Pivot device receives and reviews all new packages are then sync your contacts with other members of the
  • All members receive all of the packages. Security Management Server to decide which member of the handles packages. Other members remove packages from the memory.

Answer : Pivot the machine receives all packets and passes through an algorithm to determine which member should be treated with packages

156-315.77 Check Point Certified Security Expert Exam Set 8

Which one LDAP, and Active Directory (AD) SSL VPN is true?


Options are :

  • SSL VPN Never store a record of the user's LDAP / AD groups.
  • SSL VPN is capable of giving or create users and groups in the LDAP server
  • By default. SSL VPN to send a user name and password, LDAP servers UTF8
  • None
  • SSL VPN does not support LDAP password repair.

Answer : SSL VPN is capable of giving or create users and groups in the LDAP server

Every Name Resolution protocols are supported SSL VPN?


Options are :

  • DNS, hosts, Imhosts, WINS
  • DNS, hosts, WINS
  • DNS, hosts, Imhosts
  • DNS, hosts
  • None

Answer : DNS, hosts

Rachel is a Security Administrator University. University of FTP servers have old hardware and software. Certain FTP commands to FTP servers cause a malfunction. Update FTP servers is not an option in this time.Which following options allow Rachel to control which FTP commands through the Security Gateway to protect FTP servers?


Options are :

  • SmartDefense> Application Intelligence> FTP Security Server
  • FTP Service object> Advanced Settings> Blocked FTP commands
  • Global Properties> Security Server> Enable FTP commands
  • Web Intelligence> Application Layer> FTP settings
  • Carries Rule> Function Field> Features

Answer : SmartDefense> Application Intelligence> FTP Security Server

156-315.77 Check Point Certified Security Expert Exam Set 9

What is the command to update the Secure Platform NG with Application Intelligence (AI) R55 SmartCenter Server, VPN-1 NGX using a CD?


Options are :

  • FWM upgrade_tool
  • add patch
  • CD patch to add
  • cppkg more
  • add patch CD

Answer : add patch CD

What component acts as an internal Certificate Authority VPN-1 NGX?


Options are :

  • Security Gateway
  • policy Server
  • SmartLSM
  • VPN-1 Certificate Management
  • SmartCenter Server

Answer : SmartCenter Server

You are preparing to send the VPN-1 Pro Gateway VPN-1 NGX.You has five systems to select a new Gateway, and you must meet the following requirements: Operating system vendor license agreement with Check Point License Agreement lowest operating temperature of the system hardware configuration Minimum Gateway hardware configuration Gateway installed on a supported operating system (OS), which the machine meets all of the following requirements?


Options are :

  • Processor: 1.67 GHz RAM: 128 MB Hard Drive: 5 GB OS: FreeBSD
  • Processor: 1.5 GHz RAM: 256 MB Hard Drive: 20 GB OS: Red Hat Linux 8.0
  • Processor: 2.2 GHz RAM: 256 MB Hard Drive: 20 GB Operating System: Windows 2000 Server
  • Processor: 1.1 GHz RAM: 512MB Hard Drive: 10 GB Operating System: Windows 2000 Workstation
  • Processor: 2.0 GHz RAM: 512MB Hard Drive: 10 GB OS: Windows ME

Answer : Processor: 2.2 GHz RAM: 256 MB Hard Drive: 20 GB Operating System: Windows 2000 Server

156-315.77 Check Point Certified Security Specialist Exam Set 1

You can change the default port Management Portal:


Options are :

  • Edit Masters. conf file Portal Server.
  • Run the sysconfig and change management interface
  • Reformat SIC
  • Edit the file cp_httpd_admin Conf.
  • None

Answer : Run the sysconfig and change management interface

How do you prevent delay-sensitive applications such as video and voice traffic, due to the long queue busting using Check Point QoS solution?


Options are :

  • The weighted fair queuing
  • With a little delay class
  • Guaranteed towards the rule of VoIP
  • None
  • guaranteed per connection

Answer : With a little delay class

Sometimes there are problems in distributing IPSec packets a few machines to be load-sharing mode Multicast cluster, even if the machines have the same source and destination IP addresses. What is the best way to prevent Load sharing this kind of problem?


Options are :

  • Load sharing based on IP addresses and ports
  • Load sharing is based on the SPI ports and only
  • Load sharing is based on IP addresses, ports, and serial peripheral interfaces (SPI)
  • .Load sharing is based on the SPI only
  • Load sharing is based only on IP addresses

Answer : Load sharing based on IP addresses and ports

156-315.77 Check Point Certified Security Specialist Exam Set 2

In the XYZ Company, DLP administrator defined a new data type keywords, which contains a list of the names of the secret project; that is, Ayalon Yarkon, Yarden. The threshold is set to a minimum of 2 keywords or phrases. Based on this information, which of the following scenarios will match the rule base?


Options are :

  • Password-protected MS Excel file that contains the following text Ayalon Yarkon Yarden
  • Word file that contains the following text to match: Ayalon Ayalon Ayalon
  • MS-Excel file that contains the following text Mort resources Yarkon project..Are you certain this is about Yarden
  • PDF file, containing the following text Yarkon1 may be a code name for the new product.Yardens list of protected sites
  • None

Answer : MS-Excel file that contains the following text Mort resources Yarkon project..Are you certain this is about Yarden

You are configuring a VoIP Domain object skinny Client Control Protocol (SCCP) environment-protected VPN-1 NGX. Which type of VoIP Domain object can be used?


Options are :

  • Transmission router
  • Call Manager
  • Gatekeeper
  • power of attorney
  • port

Answer : Call Manager

How standby mode SmartCenter Server to receive logs of all Security Gateway, when the active SmartCenter Server fails over?


Options are :

  • The secondary server's host name and IP address must be added to the Masters file, remote gateways.
  • Select a Log Servers screen (from the Logs and Masters tree gateway object General properties of the display), add additional log server to a secondary SmartCenter Server object. Install security.
  • To set up a secure communication between the internal (SIC), the primary and secondary Servers.The the secondary server may then receive logs gateway, when an active server fails over.
  • Remote Gateway was founded SIC secondary SmartCenter Server, for logging.
  • Create Checkpoint host object to represent the standby SmartCenter Server. Then select the "Secondary SmartCenter Server" and the log server "on the list of Check Point products General Properties screen.

Answer : Select a Log Servers screen (from the Logs and Masters tree gateway object General properties of the display), add additional log server to a secondary SmartCenter Server object. Install security.

156-315.77 Check Point Certified Security Specialist Exam Set 3

Which of the following is most likely to improve the performance of Check Point QoS?


Options are :

  • Turn towards the rule limits per connection limits
  • Put the rules most often used at the bottom of the QoS rule base.
  • Turn towards the rule of bail will be contacted towards the bail.
  • Define the Check Point QoS only the external interfaces QoS module
  • None

Answer : Define the Check Point QoS only the external interfaces QoS module

If the traffic requires special treatment in addition to other routers network QoS module that Check Point QoS feature should be used?


Options are :

  • With a slight delay waiting
  • Weighted Fair Queuing
  • None
  • guarantees
  • Differentiated Services

Answer : Differentiated Services

The management portal should be installed: (i) the management server (ii) a Security Gateway (iii) Dedicated Server


Options are :

  • . (I) or (II) a
  • All solutions are possible
  • . (Ii) only
  • None
  • (Iii) only

Answer : . (I) or (II) a

156-315.77 Check Point Certified Security Specialist Exam Set 4

The user can not authenticate the SSL VPN. You have verified the user is assigned a user group, and reproduce the problem, confirmed the failed session. You do not see proof of this company's traffic log. The user does not use the client certificate login.To debug this error in the authentication process could be the solution can be found?


Options are :

  • None
  • Apache
  • cvpnd
  • cpauth
  • by admin

Answer : cvpnd

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions