IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

CheckPoint Certification 156-915.77 최신버전

네트워크 전성기에 있는 지금 인터넷에서 CheckPoint Certification 156-915.77시험자료를 많이 검색할수 있습니다. 하지만 왜 Pass4Test덤프자료만을 믿어야 할가요? Pass4Test덤프자료는 실제시험문제의 모든 유형에 근거하여 예상문제를 묶어둔 문제은행입니다.시험적중율이 거의 100%에 달하여 CheckPoint Certification 156-915.77시험을 한방에 통과하도록 도와드립니다.







NO.1 John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR

servers to designated IP addresses to minimize malware infection and unauthorized access risks.

Thus, the gateway policy permits access only from John's desktop which is assigned a static IP address

10.0.0.19.

John received a laptop and wants to access the HR Web Server from anywhere in the organization.

The IT department gave the laptop a static IP address, but that limits him to operating it only from his

desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his

laptop with a static IP (10.0.0.19). He wants to move around the organization and continue to have

access to the HR Web Server.

To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs

the policy.

2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web

Server from any machine and from any location.

John plugged in his laptop to the network on a different network segment and he is not able to

connect. How does he solve this problem?

A. John should lock and unlock the computer

B. Investigate this as a network connectivity issue

C. John should install the Identity Awareness Agent

D. The firewall admin should install the Security Policy

Answer: D




NO.2 How does Check Point recommend that you secure the sync interface between gateways?

A. Configure the sync network to operate within the DMZ.

B. Secure each sync interface in a cluster with Endpoint.

C. Use a dedicated sync network.

D. Encrypt all sync traffic between cluster members.

Answer: C




NO.3 Reinstall the Security Policy on all three Security Gateways.

A. 1, 2, 5

B. 1, 3, 4, 5

C. 1, 2, 3, 5

D. 1, 2, 4, 5

E. 1, 2, 3, 4

Answer: A




NO.4 In Management High Availability, what is an Active SMS?

A. Active Security Master Server

B. Active Smart Management Server

C. Active Security Management Server

D. Active Smart Master Server

Answer: C




NO.5 Which is the BEST configuration option to protect internal users from malicious Java code,

without stripping Java scripts?

A. Use the URI resource to block Java code

B. Use CVP in the URI resource to block Java code

C. Use the URI resource to strip applet tags

D. Use the URI resource to strip ActiveX tags

Answer: A




NO.6 Which of the following commands shows full synchronization status?

A. cphaprob -a if

B. fw ctl iflist

C. fw hastat

D. fw ctl pstat

Answer: D




NO.7 You want to upgrade an NG with Application Intelligence R55 Security Gateway running on

Secure Platform to VPN-1 NGX R65 via Smart Update. Which package(s) is(are) needed in the

Repository prior to upgrade?

A. Secure Platform NGX R65 package

B. VPN-1 Power/UTM NGX R65 package

C. Secure Platform and VPN-1 Power/UTM NGX R65 packages

D. SVN Foundation and VPN-1 Power/UTM packages

Answer: A




NO.8 Which network port does PPTP use for communication?

A. 1723/tcp

B. 1723/udp

C. 25/udp

D. 25/tco

Answer: A




Posted 2014/10/11 15:56:34  |  Category: CheckPoint  |  Tag: 156-915.77 최신버전