IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

CheckPoint 156-215.75 (Check Point Certified Security Administrator)덤프

Pass4Test의 CheckPoint 156-215.75 (Check Point Certified Security Administrator) 덤프는 다른 덤프판매 사이트보다 저렴한 가격으로 여러분들께 가볍게 다가갑니다.CheckPoint 156-215.75 (Check Point Certified Security Administrator)덤프는 기출문제와 예상문제로 되어있어 시험패스는 시간문제뿐입니다.

 

 

NO.1 R75's INSPECT Engine inserts itself into the kernel between which two layers of the OSI model?
A. Presentation and Application
B. Physical and Data
C. Session and Transport
D. Data and Network
Answer: D

NO.2 The customer has a small Check Point installation which includes one Windows XP workstation as the
SmartConsole, one Solaris server working as Security Management Server, and a third server running
SecurePlatform as Security Gateway. This is an example of a(n):
A. Stand-Alone Installation.
B. Unsupported configuration
C. Distributed Installation.
D. Hybrid Installation.
Answer: C

NO.3 Of the three mechanisms Check Point uses for controlling traffic, which enables firewalls to incorporate
layer 4 awareness in packet inspection?
A. IPS
B. Packet filtering
C. Stateful Inspection
D. Application Intelligence
Answer: C

NO.4 The customer has a small Check Point installation which includes one Windows 2003 server as the
SmartConsole and a second server running SecurePlatform as both Security Management Server and
the Security Gateway. This is an example of a(n):
A. Unsupported configuration.
B. Hybrid Installation.
C. Distributed Installation.
D. Stand-Alone Installation.
Answer: D

NO.5 Which SmartConsole component can Administrators use to track remote administrative activities?
A. WebUI
B. Eventia Reporter
C. SmartView Monitor
D. SmartView Tracker
Answer: D

NO.6 How can you most quickly reset Secure Internal Communications (SIC) between a Security
Management Server and Security Gateway?
A. Run the command fwm sic-reset to initialize the Internal Certificate Authority (ICA) of the Security
Management Server. Then retype the activation key on the Security Gateway from SmartDashboard.
B. Use SmartDashboard to retype the activation key on the Security Gateway. This will automatically
Sync SIC to both the Security Management Server and Gateway.
C. From cpconfig on the Gateway, choose the Secure Internal Communication option and retype the
activation key. Next, retype the same key in the Gateway object in SmartDashboard and reinitialize
Secure Internal Communications (SIC).
D. From the Security Management Server s command line, Type fw putkey p <shared key> < IP Address
of security Gateway>.
Answer: C

NO.7 The customer has a small Check Point installation which includes one Windows 2003 server as
SmartConsole and Security Management Server with a second server running SecurePlatform as
Security Gateway. This is an example of a(n):
A. Hybrid Installation.
B. Unsupported configuration.
C. Distributed Installation.
D. Stand-Alone Installation.
Answer: C

NO.8 How can you recreate the account of the Security Administrator, which was created during initial
installation of the Management Server on SecurePlatform?
A. Launch cpconfig and delete the Administrator's account. Recreate the account with the same name.
B. Export the user database into an ASCII file with fwm dbexport. Open this file with an editor, and delete
the Administrator Account portion of the file. You will be prompted to create a new account.
C. Type cpm -a, and provide the existing Administrator's account name. Reset the Security
Administrator's password.
D. Launch SmartDashboard in the User Management screen, and delete the cpconfig administrator.
Answer: A

NO.9 Which of the following statements is TRUE about management plug-ins?
A. The plug-in is a package installed on the Security Gateway.
B. A management plug-in interacts with a Security Management Server to provide new features and
support for new products.
C. Using a plug-in offers full central management only if special licensing is applied to specific features of
the plug-in.
D. Installing a management plug-in is just like an upgrade process. (It overwrites existing components.)
Answer: B

NO.10 You are running the Security Gateway on SecurePlatform and configure SNX with default settings. The
client fails to connect to the Security Gateway. What is wrong?
A. The routing table on the client does not get modified.
B. The client has Active-X blocked.
C. The client is configured incorrectly.
D. The SecurePlatform Web User Interface is listening on port 443.
Answer: D

NO.11 Which of the following statements about Bridge mode is TRUE.?
A. When managing a Security Gateway in Bridge mode, it is possible to use a bridge interface for Network
Address Translation.
B. Assuming a new installation, bridge mode requires changing the existing IP routing of the network.
C. All ClusterXL modes are supported.
D. A bridge must be configured with a pair of interfaces.
Answer: D

NO.12 When Jon first installed the system, he forgot to configure DNS servers on his Security Gateway.
How could Jon configure DNS servers now that his Security Gateway is in production?
A. Login to the firewall using SSH and run cpconfig, then select Domain Name Servers.
B. Login to the firewall using SSH and run fwm, then select System Configuration and Domain Name
Servers.
C. Login to the SmartDashboard, edit the firewall Gateway object, select the tab Interfaces, then Domain
Name Servers.
D. Login to the firewall using SSH and run sysconfig, then select Domain Name Servers.
Answer: D

NO.13 When doing a Stand-Alone Installation, you would install the Security Management Server with which
other Check Point architecture component?
A. SecureClient
B. Security Gateway
C. SmartConsole
D. None, Security Management Server would be installed by itself
Answer: B

NO.14 You are a security architect and need to design a secure firewall, VPN and IPS solution. Where would
be the best place to install IPS in the topology if the internal network is already protected?
A. On the firewall itself to protect all connected networks centrally.
B. On each network segment separately.
C. On the LAN is enough, the DMZ does not need to be protected.
D. In front of the firewall is enough.
Answer: A

NO.15 During which step in the installation process is it necessary to note the fingerprint for first-time
verification?
A. When establishing SIC between the Security Management Server and the Gateway
B. When configuring the Security Management Server using cpconfig
C. When configuring the Security Gateway object in SmartDashboard
D. When configuring the Gateway in the WebUl
Answer: B

NO.16 Once installed, the R75 kernel resides directly below which layer of the OSI model? Note: Application
is the top and Physical is the bottom of the IP stack.
A. Network
B. Transport
C. Data Link
D. Session
Answer: A

NO.17 You are installing a Security Management Server. Your security plan calls for three administrators for
this particular server. How many can you create during installation?
A. Depends on the license installed on the Security Management Server
B. Only one with full access and one with read-only access
C. One
D. As many as you want
Answer: C

NO.18 UDP packets are delivered if they are _________.
A. A legal response to an allowed request on the inverse UDP ports and IP
B. A Stateful ACK to a valid SYN-SYN-/ACK on the inverse UDP ports and IP
C. Reference in the SAM related Dynamic tables
D. Bypassing the Kernel by the forwarding layer
of clusterXL
Answer: A

NO.19 The customer has a small Check Point installation, which includes one Linux Enterprise 3.0 server
working as the SmartConsole, and a second server running Windows 2003 as both Security Management
Server running Windows 2003 as both Security Management Server and Security Gateway. This is an
example of a(n).
A. Stand-Alone Installation
B. Distributed Installation
C. Hybrid Installation
D. Unsupported configuration
Answer: D

NO.20 The Check Point Security Gateway's virtual machine (kernel) exists between which two layers of the
OSI model?
A. Session and Network layers
B. Application and Presentation layers
C. Physical and Datalink layers
D. Network and Datalink layers
Answer: D
 
Posted 2013/7/15 5:55:49  |  Category: 미분류  |  Tag: