멋진 IT전문가로 거듭나는 것이 꿈이라구요? 국제적으로 승인받는 IT인증시험에 도전하여 자격증을 취득해보세요. IT전문가로 되는 꿈에 더 가까이 갈수 있습니다. CheckPoint Certification 156-915.77시험이 어렵다고 알려져있는건 사실입니다. 하지만 Pass4Test의 CheckPoint Certification 156-915.77덤프로 시험준비공부를 하시면 어려운 시험도 간단하게 패스할수 있는것도 부정할수 없는 사실입니다. Pass4Test의 CheckPoint Certification 156-915.77덤프는 실제시험문제의 출제방형을 철저하게 연구해낸 말 그대로 시험대비공부자료입니다. 덤프에 있는 내용만 마스터하시면 시험패스는 물론 멋진 IT전문가로 거듭날수 있습니다.
NO.1 What is a "sticky" connection?
A. A Sticky Connection is one in which a
reply packet returns through the same gateway as the
original packet.
B. A
Sticky Connection is a VPN connection that remains up until you manually bring
it down.
C. A Sticky Connection is a connection that remains the same.
D.
A Sticky Connection is a connection that always chooses the same gateway to set
up the initial
connection.
Answer: A
NO.2 Review the following list
of actions that Security Gateway R76 can take when it controls
packets. The
Policy Package has been configured for Simplified Mode VPN. Select the response
below
that includes the available actions:
A. Accept, Drop, Encrypt,
Session Auth
B. Accept, Drop, Reject, Client Auth
C. Accept, Hold, Reject,
Proxy
D. Accept, Reject, Encrypt, Drop
Answer: B
NO.3 To change the
default port of the Management Portal:
A. Edit the masters. conf file on the
Portal server.
B. Modify the file cp_httpd_admin .conf.
C. Run sysconfig
and change the management interface
D. Re-initialize SIC
Answer:
B
NO.4 Which of the following commands shows full synchronization
status?
A. cphaprob -a if
B. fw ctl iflist
C. fw hastat
D. fw ctl
pstat
Answer: D
NO.5 CORRECT TEXT
Fill in the blanks. To view the
number of concurrent connections going through core 0 on the firewall,
you
would use the command and syntax __ __ _ ___ __ ___________ __ .
Answer: fw
-i 0 tab -t connections -s
NO.6 Which operating system is NOT supported
by VPN-1 Secure Client?
A. IPSO 3.9
B. Windows XP SP2
C. Windows 2000
Professional
D. RedHat Linux 8.0
E. MacOSX
Answer: A
NO.7 John
Adams is an HR partner in the ACME organization. ACME IT wants to limit access
to HR
servers to designated IP addresses to minimize malware infection and
unauthorized access risks.
Thus, the gateway policy permits access only from
John's desktop which is assigned a static IP address
10.0.0.19.
John
received a laptop and wants to access the HR Web Server from anywhere in the
organization.
The IT department gave the laptop a static IP address, but that
limits him to operating it only from his
desk. The current Rule Base contains
a rule that lets John Adams access the HR Web Server from his
laptop with a
static IP (10.0.0.19). He wants to move around the organization and continue to
have
access to the HR Web Server.
To make this scenario work, the IT
administrator:
1) Enables Identity Awareness on a gateway, selects AD Query
as one of the Identity Sources installs
the policy.
2) Adds an access role
object to the Firewall Rule Base that lets John Adams PC access the HR
Web
Server from any machine and from any location.
John plugged in his
laptop to the network on a different network segment and he is not able
to
connect. How does he solve this problem?
A. John should lock and unlock
the computer
B. Investigate this as a network connectivity issue
C. John
should install the Identity Awareness Agent
D. The firewall admin should
install the Security Policy
Answer: D
NO.8 In Management High
Availability, what is an Active SMS?
A. Active Security Master Server
B.
Active Smart Management Server
C. Active Security Management Server
D.
Active Smart Master Server
Answer: C
A. A Sticky Connection is one in which a
reply packet returns through the same gateway as the
original packet.
B. A
Sticky Connection is a VPN connection that remains up until you manually bring
it down.
C. A Sticky Connection is a connection that remains the same.
D.
A Sticky Connection is a connection that always chooses the same gateway to set
up the initial
connection.
Answer: A
NO.2 Review the following list
of actions that Security Gateway R76 can take when it controls
packets. The
Policy Package has been configured for Simplified Mode VPN. Select the response
below
that includes the available actions:
A. Accept, Drop, Encrypt,
Session Auth
B. Accept, Drop, Reject, Client Auth
C. Accept, Hold, Reject,
Proxy
D. Accept, Reject, Encrypt, Drop
Answer: B
NO.3 To change the
default port of the Management Portal:
A. Edit the masters. conf file on the
Portal server.
B. Modify the file cp_httpd_admin .conf.
C. Run sysconfig
and change the management interface
D. Re-initialize SIC
Answer:
B
NO.4 Which of the following commands shows full synchronization
status?
A. cphaprob -a if
B. fw ctl iflist
C. fw hastat
D. fw ctl
pstat
Answer: D
NO.5 CORRECT TEXT
Fill in the blanks. To view the
number of concurrent connections going through core 0 on the firewall,
you
would use the command and syntax __ __ _ ___ __ ___________ __ .
Answer: fw
-i 0 tab -t connections -s
NO.6 Which operating system is NOT supported
by VPN-1 Secure Client?
A. IPSO 3.9
B. Windows XP SP2
C. Windows 2000
Professional
D. RedHat Linux 8.0
E. MacOSX
Answer: A
NO.7 John
Adams is an HR partner in the ACME organization. ACME IT wants to limit access
to HR
servers to designated IP addresses to minimize malware infection and
unauthorized access risks.
Thus, the gateway policy permits access only from
John's desktop which is assigned a static IP address
10.0.0.19.
John
received a laptop and wants to access the HR Web Server from anywhere in the
organization.
The IT department gave the laptop a static IP address, but that
limits him to operating it only from his
desk. The current Rule Base contains
a rule that lets John Adams access the HR Web Server from his
laptop with a
static IP (10.0.0.19). He wants to move around the organization and continue to
have
access to the HR Web Server.
To make this scenario work, the IT
administrator:
1) Enables Identity Awareness on a gateway, selects AD Query
as one of the Identity Sources installs
the policy.
2) Adds an access role
object to the Firewall Rule Base that lets John Adams PC access the HR
Web
Server from any machine and from any location.
John plugged in his
laptop to the network on a different network segment and he is not able
to
connect. How does he solve this problem?
A. John should lock and unlock
the computer
B. Investigate this as a network connectivity issue
C. John
should install the Identity Awareness Agent
D. The firewall admin should
install the Security Policy
Answer: D
NO.8 In Management High
Availability, what is an Active SMS?
A. Active Security Master Server
B.
Active Smart Management Server
C. Active Security Management Server
D.
Active Smart Master Server
Answer: C