156-315.77 Check Point Certified Security Expert Exam Set 5

What operating system (s) support (s), unnumbered VPN tunnel interfaces (VTIs) for route-based VPN?


Options are :

  • Red Hat Linux
  • None
  • .IPSO 3.9 and higher (Correct)
  • Secure Platform NGX and higher
  • Solaris 9 and higher

Answer : .IPSO 3.9 and higher

One profile can be updated SmartProvisioning:


Options are :

  • Profiles can not be used for updating, just reporting.
  • Special gateways.
  • None
  • Possibly hundreds and thousands of gateways. (Correct)
  • Only Clustered Gateways

Answer : Possibly hundreds and thousands of gateways.

156-215.77 Check Point Certified Security Administrator Exam Set 3

Which of the following does NOT support platforms SecureXL?


Options are :

  • IP Appliance
  • UTM-1 Appliance
  • Power-1 Appliance
  • None
  • UNIX (Correct)

Answer : UNIX

You are using the Snapshot feature to store Connector SSL VPN configuration.What you expect to find?


Options are :

  • Nothing; The snapshot is not supported Connector SSL VPN
  • Specified directories on the local file
  • .The management of the current composition of the product, is a management or as a stand-alone machine
  • The perfect image to the local file system (Correct)
  • None

Answer : The perfect image to the local file system

Which of the following does not support CoreXL?


Options are :

  • None
  • IPS
  • Route-based VPN (Correct)
  • Smart ViewTracker
  • IPV4

Answer : Route-based VPN

156-215.75 Check Point Certified Security Administrator Exam Set 6

Smart ProvisioningGateway could be a member of a VPN communities? (I) Center in star topology (ii) Satellite in star topology (iii) Carter Remote Access for Community, (iv) Meshed Community


Options are :

  • None
  • (Ii) only
  • (Ii) and (iii) (Correct)
  • (I), (ii) and (iii)
  • All

Answer : (Ii) and (iii)

Each checkpoint QoS function is used to dynamically allocate the relative portions of the available bandwidth?


Options are :

  • Differentiated Services
  • With a slight delay waiting
  • Weighted Fair Queuing (Correct)
  • guarantees
  • None

Answer : Weighted Fair Queuing

What is the lowest possible version of a security gateway may be running in order to use it for LSM use Gateway?


Options are :

  • NGX R71
  • NGX R60
  • NGXR65HFA_50
  • None
  • NG AI R55 HFAJ7 (Correct)

Answer : NG AI R55 HFAJ7

156-215.77 Check Point Certified Security Administrator Test Set 1

Event Correlation best performance, you should use:


Options are :

  • many objects
  • None
  • large groups
  • Nothing slows Event Correlation
  • IP address ranges (Correct)

Answer : IP address ranges

What is the command shell to get to the router?


Options are :

  • gated
  • clirouter
  • None
  • routerd
  • router (Correct)

Answer : router

There are times when you want to use the Link Selection manage a lot of traffic to the VPN connections.With Link dialog you can:


Options are :

  • None
  • Use the links based services. (Correct)
  • To deny the dynamic DNS.
  • Set up links to use dynamic DNS.
  • Set up VPN links communities.

Answer : Use the links based services.

Check Point Certified Security Expert Exam Set 4

How do I change approved for implementation Smart Workflow?


Options are :

  • The change has been submitted for approval and manually install the approver once clicked Accept.
  • The change has been submitted for approval and are automatically installed with the original sender next time he logs on after the adoption of the amendment.
  • The change has been submitted for approval and automatically install the approver once clicked Accept.
  • The change has been submitted for approval and manually install the original sender next time he logs on after the adoption of the amendment. (Correct)
  • None

Answer : The change has been submitted for approval and manually install the original sender next time he logs on after the adoption of the amendment.

You R71 and using the new IPS software Blade.To to maintain the highest level of security, you do upgrade the IPS regularly.What types of problems can be caused by automatic updates?


Options are :

  • Nothing; no updates to add new security checks lead to problematic behavior of systems.
  • None, all of the controls will be activated from the beginning, but detects only scenes that do not interfere with non-malicious traffic on the network.
  • None, all new update is carried out only Detect mode to avoid unwanted traffic interruptions. They must be activated manually later. (Correct)
  • None
  • All checks will be introduced from the beginning, and can cause unwanted traffic interruption due to false positive new checks and non-RFC compliant self-written applications.

Answer : None, all new update is carried out only Detect mode to avoid unwanted traffic interruptions. They must be activated manually later.

What could the following regular expression used in DLP rule? \ $ ([0-9] * [0-9] [0-9] [0-9]. [0-9] [0-9] Select the best answer.


Options are :

  • Because the data type to prevent workers by sending an email which contains the complete price list of nine products.
  • None
  • Because the data type to prevent programmers from leaking outside the company code
  • Because the data type to prevent the finance department from leaking salary details of employees (Correct)
  • As the data type of the compound represented

Answer : Because the data type to prevent the finance department from leaking salary details of employees

156-315.77 Check Point Certified Security Expert Exam Set 15

After Travis added new processing cores his server, CoreXL did not use them.What would be the most likely reason why? Travis does not:


Options are :

  • Run cpconfig added to the core cases. (Correct)
  • Gateway Real Estate customize and grow core cases.
  • Run cpconfig increase the number of cores
  • None
  • Gateway Real Estate customize and increase the number of cores.

Answer : Run cpconfig added to the core cases.

Which of the following statements is false to the DLP Software Blade and Active Directory (AD) or LDAP?


Options are :

  • None
  • .For SMTP traffic for each recipient e-mail address is translated using the AD / LDAP user name and a group that is selected destination column versus the DLP rule base.
  • Check the Check Point User authentication is based on the customer's AD
  • After the user verifies that the DLP portal to view all his untreated incidents portal authenticates the user using only the AD / LDAP. (Correct)
  • SMTP traffic, the sender's e-mail address is translated using the AD / LDAP user name and the group is selected source column versus the DLP rule base.

Answer : After the user verifies that the DLP portal to view all his untreated incidents portal authenticates the user using only the AD / LDAP.

Based on the following information which the statements below is true? DLP rule base has the following conditions: Data Type = Large file (> 500 kb) Source = My Organization Target = Free Web Message Protocol = any action = Ask user All other rules are observed. Check the user is enabled, and installed on all workstations.


Options are :

  • When the user sends the e-mail message with an attachment that is greater than 500KB, he is requested to check the user.
  • None
  • When a user sends an email message with an attachment is larger than 500 KB, she asked to check the user.
  • When the user sends the e-mail message with a small body and attachments 5, each of 200 MB, he will be asked to check the user.
  • When a user downloads a 600 KB file using his Yahoo account Web Mail (via his web browser), he asked for User Check (Correct)

Answer : When a user downloads a 600 KB file using his Yahoo account Web Mail (via his web browser), he asked for User Check

Check Point Certified Security Expert Exam Set 8

You have installed a secure platform than R76 Security Gateway OS. As business needs change, you need VTI features of the R76. What should you do?


Options are :

  • Smart Dashboard click on the OS drop-down menu, then click Secure Platform Pro. You will need to restart the security gateway for the change to take effect.
  • The type of pro enables your security gateway and start it again. (Correct)
  • .You need to re-install Security Gateway Secure Platform Pro R76, R76 as a secure platform does not support VTIs.
  • None
  • Only IPSO 3.9 will support VTI feature, so you need to change the Security Gateway Nokia devices.

Answer : The type of pro enables your security gateway and start it again.

Which of the following statements is incorrect regarding the OSPF configuration of Secure Platform Pro?


Options are :

  • OSPF router ID Router 1 creates a security gateway and it should be the same account for all Gateways.
  • OSPF router ID Router 1 creates a Security Gateway and would be different for everyone Gateways.
  • OSPF Router 1 will create an OSPF routing instance and this process ID should be different for each security gateway.
  • OSPF router creates one instance of OSPF routing process id, and this should be the same for all gateways. (Correct)
  • None

Answer : OSPF router creates one instance of OSPF routing process id, and this should be the same for all gateways.

Checkpoint specify the QoS rule base two rules: Rule H.323, the weight of which is 10, and the default rule with a weight of 10.The H.323 rule includes a per-connection guarantee of 384 kbps. and per-access limit 512 kbps. Per-interface warranty has four connections, and no additional connections are allowed Function features. If traffic moves on the QoS module is responsible for both rules, which of the following statements is true?


Options are :

  • H.323 rule consumes a maximum of 2048 kbps of available bandwidth. (Correct)
  • Neither of the rule are divided into more than 10% of the available bandwidth.
  • 50% of the available bandwidth is divided into default rule.
  • Each of the H.323 connection will receive at least 512 kbps of bandwidth.
  • None

Answer : H.323 rule consumes a maximum of 2048 kbps of available bandwidth.

156-315.71 Check Point Security Expert R71 Practice Exam Set 6

John is MegaCorp Security Administrator, and use the Check Point R71. Malcolm is responsible for the safety of the unit and the partner company to use a different vendor products and both have to build ventures between the VPN tunnel. Both use clusters Load sharing their firewalls and Jaakko use ClusterXL as Check Point clustering solution.While trying to create a VPN, they are constantly overlooked problems, and the tunnel is not stable and Malcolm discovers that seems to be in the same IP 2 SPI: Check Point site. How can they solve this problem and stabilize the tunnel?


Options are :

  • This can be solved when the clusters are used they have to use one of the fire walls.
  • This can be solved by executing the command Sticky VPN Checkpoint's CLI. This keeps the VPN Sticky one member, and the problem is solved.
  • None
  • This is certainly a problem with the Internet network and which are not related to VPN configuration.
  • This can be easily solved by using a function of the Sticky Decision ClusterXL. (Correct)

Answer : This can be easily solved by using a function of the Sticky Decision ClusterXL.

Which of the following is the default port for Management Portal?


Options are :

  • 4434
  • None
  • 444
  • 443
  • 4433 (Correct)

Answer : 4433

What is the router command to save the OSPF configuration?


Options are :

  • Save
  • write config
  • enter the mem (Correct)
  • None
  • to save memory

Answer : enter the mem

156-315.13 Check Point Security Expert R76(GAiA) Exam Set 3

What are the SmartProvisioning Provisioning Profile indicators?


Options are :

  • None
  • OK, attention must be paid, the agent is in local mode, Uninitialized, Unknown (Correct)
  • OK, the waiting, unknown, not installed, is not updated, may be out of date
  • OK, have to pay attention, Uninitialized, Unknown
  • OK, in use. Obsolete, not used

Answer : OK, attention must be paid, the agent is in local mode, Uninitialized, Unknown

Which technology is responsible for assembling the packets in streams and passing the provided data protocol parsers IPS?


Options are :

  • Package Streaming Layer (Correct)
  • .Pattern Matcher
  • accelerated INSPECT
  • Content Management Infrastructure
  • None

Answer : Package Streaming Layer

What support for the following operating systems numbered VTI?


Options are :

  • None
  • Windows Server 2008
  • Solaris
  • Secure PlatformPro (Correct)
  • IPSO 4.0 +

Answer : Secure PlatformPro

156-315.71 Check Point Security Expert R71 Practical Exam Set 2

When I first DLP running the wizard, which of the following is required composition?


Options are :

  • Active Directory
  • Email Domain Your organization (Correct)
  • mail Server
  • None
  • DLP Portal URL

Answer : Email Domain Your organization

Based on the following information which the statements below is false? DLP rule base has the following conditions: Data Type = password protected file Source = My Organization Target = Outside My Organization Protocol = any action = Ask User Exception: Data Type = Any source = Research and development (R & D) Destination = Pratner1. com Protocol = All All other rules are observed. Check the user is enabled, and installed on all workstations


Options are :

  • When a user product development, send an email to an encrypted ZIP file attachment, he will not be prompted User Check.
  • The second rule is added: Source = R & D, Destination = partner1.com, N = Protocol, Action = Inform. When the user product development, send an email to an encrypted ZIP file attachment, he will be asked to check the user.
  • None
  • When a user product development, send an e-mail attachment with a password-protected PDF file to an e-mail partner1 XYZ @ .com, he will be asked to check the user.
  • Finance .When the user to send e-mail message encrypted ZIP file attached to an email. He asked to check the user. (Correct)

Answer : Finance .When the user to send e-mail message encrypted ZIP file attached to an email. He asked to check the user.

When using the Terminal Endpoint Security Policies, this option is not available when configuring the implementation of the DAT?


Options are :

  • Maximum age of dat
  • The smallest version of the DAT file
  • Maximum DAT file version (Correct)
  • None
  • Oldest dat time stamp

Answer : Maximum DAT file version

Check Point Certified Security Expert Exam Set 11

Which of the following is a CLI command Security Gateway R77?


Options are :

  • FW tab -u (Correct)
  • FW shutdown
  • FWM policy_print
  • None
  • FW merge

Answer : FW tab -u

156-315.77 Check Point Certified Security Expert Exam Set 9

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions