네트워크 전성기에 있는 지금 인터넷에서 CheckPoint Certification 156-915.77시험자료를 많이 검색할수 있습니다. 하지만 왜 Pass4Test덤프자료만을 믿어야 할가요? Pass4Test덤프자료는 실제시험문제의 모든 유형에 근거하여 예상문제를 묶어둔 문제은행입니다.시험적중율이 거의 100%에 달하여 CheckPoint Certification 156-915.77시험을 한방에 통과하도록 도와드립니다.
NO.1 John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR
servers to designated IP addresses to minimize malware infection and unauthorized access risks.
Thus, the gateway policy permits access only from John's desktop which is assigned a static IP address
10.0.0.19.
John received a laptop and wants to access the HR Web Server from anywhere in the organization.
The IT department gave the laptop a static IP address, but that limits him to operating it only from his
desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his
laptop with a static IP (10.0.0.19). He wants to move around the organization and continue to have
access to the HR Web Server.
To make this scenario work, the IT administrator:
1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs
the policy.
2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web
Server from any machine and from any location.
John plugged in his laptop to the network on a different network segment and he is not able to
connect. How does he solve this problem?
A. John should lock and unlock the computer
B. Investigate this as a network connectivity issue
C. John should install the Identity Awareness Agent
D. The firewall admin should install the Security Policy
Answer: D
NO.2 How does Check Point recommend that you secure the sync interface between gateways?
A. Configure the sync network to operate within the DMZ.
B. Secure each sync interface in a cluster with Endpoint.
C. Use a dedicated sync network.
D. Encrypt all sync traffic between cluster members.
Answer: C
NO.3 Reinstall the Security Policy on all three Security Gateways.
A. 1, 2, 5
B. 1, 3, 4, 5
C. 1, 2, 3, 5
D. 1, 2, 4, 5
E. 1, 2, 3, 4
Answer: A
NO.4 In Management High Availability, what is an Active SMS?
A. Active Security Master Server
B. Active Smart Management Server
C. Active Security Management Server
D. Active Smart Master Server
Answer: C
NO.5 Which is the BEST configuration option to protect internal users from malicious Java code,
without stripping Java scripts?
A. Use the URI resource to block Java code
B. Use CVP in the URI resource to block Java code
C. Use the URI resource to strip applet tags
D. Use the URI resource to strip ActiveX tags
Answer: A
NO.6 Which of the following commands shows full synchronization status?
A. cphaprob -a if
B. fw ctl iflist
C. fw hastat
D. fw ctl pstat
Answer: D
NO.7 You want to upgrade an NG with Application Intelligence R55 Security Gateway running on
Secure Platform to VPN-1 NGX R65 via Smart Update. Which package(s) is(are) needed in the
Repository prior to upgrade?
A. Secure Platform NGX R65 package
B. VPN-1 Power/UTM NGX R65 package
C. Secure Platform and VPN-1 Power/UTM NGX R65 packages
D. SVN Foundation and VPN-1 Power/UTM packages
Answer: A
NO.8 Which network port does PPTP use for communication?
A. 1723/tcp
B. 1723/udp
C. 25/udp
D. 25/tco
Answer: A