IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

CheckPoint 156-215.75 시험덤프

Pass4Test는 저희 제품을 구매한 분들이 100%통과율을 보장해드리도록 최선을 다하고 있습니다. Pass4Test를 선택한것은 시험패스와 자격증취득을 예약한것과 같습니다. Pass4Test의 믿음직한 CheckPoint 156-215.75 덤프를 공부해보세요.

 

 

 

NO.1 How can you most quickly reset Secure Internal Communications (SIC) between a Security
Management Server and Security Gateway?
A. Run the command fwm sic-reset to initialize the Internal Certificate Authority (ICA) of the Security
Management Server. Then retype the activation key on the Security Gateway from SmartDashboard.
B. Use SmartDashboard to retype the activation key on the Security Gateway. This will automatically
Sync SIC to both the Security Management Server and Gateway.
C. From cpconfig on the Gateway, choose the Secure Internal Communication option and retype the
activation key. Next, retype the same key in the Gateway object in SmartDashboard and reinitialize
Secure Internal Communications (SIC).
D. From the Security Management Server s command line, Type fw putkey p <shared key> < IP Address
of security Gateway>.
Answer: C

NO.2 Of the three mechanisms Check Point uses for controlling traffic, which enables firewalls to incorporate
layer 4 awareness in packet inspection?
A. IPS
B. Packet filtering
C. Stateful Inspection
D. Application Intelligence
Answer: C

NO.3 Which of the following statements about Bridge mode is TRUE.?
A. When managing a Security Gateway in Bridge mode, it is possible to use a bridge interface for Network
Address Translation.
B. Assuming a new installation, bridge mode requires changing the existing IP routing of the network.
C. All ClusterXL modes are supported.
D. A bridge must be configured with a pair of interfaces.
Answer: D

NO.4 You are a security architect and need to design a secure firewall, VPN and IPS solution. Where would
be the best place to install IPS in the topology if the internal network is already protected?
A. On the firewall itself to protect all connected networks centrally.
B. On each network segment separately.
C. On the LAN is enough, the DMZ does not need to be protected.
D. In front of the firewall is enough.
Answer: A

NO.5 When doing a Stand-Alone Installation, you would install the Security Management Server with which
other Check Point architecture component?
A. SecureClient
B. Security Gateway
C. SmartConsole
D. None, Security Management Server would be installed by itself
Answer: B

NO.6 How can you recreate the account of the Security Administrator, which was created during initial
installation of the Management Server on SecurePlatform?
A. Launch cpconfig and delete the Administrator's account. Recreate the account with the same name.
B. Export the user database into an ASCII file with fwm dbexport. Open this file with an editor, and delete
the Administrator Account portion of the file. You will be prompted to create a new account.
C. Type cpm -a, and provide the existing Administrator's account name. Reset the Security
Administrator's password.
D. Launch SmartDashboard in the User Management screen, and delete the cpconfig administrator.
Answer: A

NO.7 R75's INSPECT Engine inserts itself into the kernel between which two layers of the OSI model?
A. Presentation and Application
B. Physical and Data
C. Session and Transport
D. Data and Network
Answer: D

NO.8 The customer has a small Check Point installation which includes one Windows XP workstation as the
SmartConsole, one Solaris server working as Security Management Server, and a third server running
SecurePlatform as Security Gateway. This is an example of a(n):
A. Stand-Alone Installation.
B. Unsupported configuration
C. Distributed Installation.
D. Hybrid Installation.
Answer: C

NO.9 The customer has a small Check Point installation which includes one Windows 2003 server as the
SmartConsole and a second server running SecurePlatform as both Security Management Server and
the Security Gateway. This is an example of a(n):
A. Unsupported configuration.
B. Hybrid Installation.
C. Distributed Installation.
D. Stand-Alone Installation.
Answer: D

NO.10 Which of the following statements is TRUE about management plug-ins?
A. The plug-in is a package installed on the Security Gateway.
B. A management plug-in interacts with a Security Management Server to provide new features and
support for new products.
C. Using a plug-in offers full central management only if special licensing is applied to specific features of
the plug-in.
D. Installing a management plug-in is just like an upgrade process. (It overwrites existing components.)
Answer: B

NO.11 When Jon first installed the system, he forgot to configure DNS servers on his Security Gateway.
How could Jon configure DNS servers now that his Security Gateway is in production?
A. Login to the firewall using SSH and run cpconfig, then select Domain Name Servers.
B. Login to the firewall using SSH and run fwm, then select System Configuration and Domain Name
Servers.
C. Login to the SmartDashboard, edit the firewall Gateway object, select the tab Interfaces, then Domain
Name Servers.
D. Login to the firewall using SSH and run sysconfig, then select Domain Name Servers.
Answer: D

NO.12 Once installed, the R75 kernel resides directly below which layer of the OSI model? Note: Application
is the top and Physical is the bottom of the IP stack.
A. Network
B. Transport
C. Data Link
D. Session
Answer: A

NO.13 The customer has a small Check Point installation which includes one Windows 2003 server as
SmartConsole and Security Management Server with a second server running SecurePlatform as
Security Gateway. This is an example of a(n):
A. Hybrid Installation.
B. Unsupported configuration.
C. Distributed Installation.
D. Stand-Alone Installation.
Answer: C

NO.14 UDP packets are delivered if they are _________.
A. A legal response to an allowed request on the inverse UDP ports and IP
B. A Stateful ACK to a valid SYN-SYN-/ACK on the inverse UDP ports and IP
C. Reference in the SAM related Dynamic tables
D. Bypassing the Kernel by the forwarding layer
of clusterXL
Answer: A

NO.15 The Check Point Security Gateway's virtual machine (kernel) exists between which two layers of the
OSI model?
A. Session and Network layers
B. Application and Presentation layers
C. Physical and Datalink layers
D. Network and Datalink layers
Answer: D

NO.16 Which SmartConsole component can Administrators use to track remote administrative activities?
A. WebUI
B. Eventia Reporter
C. SmartView Monitor
D. SmartView Tracker
Answer: D

NO.17 You are installing a Security Management Server. Your security plan calls for three administrators for
this particular server. How many can you create during installation?
A. Depends on the license installed on the Security Management Server
B. Only one with full access and one with read-only access
C. One
D. As many as you want
Answer: C

NO.18 The customer has a small Check Point installation, which includes one Linux Enterprise 3.0 server
working as the SmartConsole, and a second server running Windows 2003 as both Security Management
Server running Windows 2003 as both Security Management Server and Security Gateway. This is an
example of a(n).
A. Stand-Alone Installation
B. Distributed Installation
C. Hybrid Installation
D. Unsupported configuration
Answer: D

NO.19 During which step in the installation process is it necessary to note the fingerprint for first-time
verification?
A. When establishing SIC between the Security Management Server and the Gateway
B. When configuring the Security Management Server using cpconfig
C. When configuring the Security Gateway object in SmartDashboard
D. When configuring the Gateway in the WebUl
Answer: B

NO.20 You are running the Security Gateway on SecurePlatform and configure SNX with default settings. The
client fails to connect to the Security Gateway. What is wrong?
A. The routing table on the client does not get modified.
B. The client has Active-X blocked.
C. The client is configured incorrectly.
D. The SecurePlatform Web User Interface is listening on port 443.
Answer: D
Posted 2013/7/15 5:59:39  |  Category: 미분류  |  Tag: