Category: Checkpoint
Flydumps provides you with the most reliable practice exams to master CheckPoint 156-110 Certification. Our Microsoft questions and answers are certified by the senior lecturer and experienced technical experts in the Microsoft field. These CheckPoint 156-110 test questions provide you with the experience of taking the actual test.
QUESTION 82
Which of the following is likely in a small-business environment?
A. Most small businesses employ a full-time information-technology staff.
B. Resources are available as needed.
C. Small businesses have security personnel on staff.
D. Most employees have experience with information security.
E. Security budgets are very small.
Correct Answer: E
QUESTION 83
ABC Corporation’s network is configured such that a user must log in individually at each server and access control. Which type of authentication is in use?
A. Role-based access control
B. Three-factor authentication
C. Single sign-on
D. Hybrid access control
E. Mandatory sign-on
Correct Answer: E
QUESTION 84
Which type of Business Continuity Plan (BCP) test involves shutting down a primary site, bringing an alternate site on-line, and moving all operations to the alternate site?
A. Parallel
B. Full interruption
C. Checklist
D. Structured walkthrough
E. Simulation
Correct Answer: B
QUESTION 85
A(n) _______ is the first step for determining which technical information assets should be protected.
A. Network diagram
B. Business Impact Analysis
C. Office floor plan
D. Firewall
E. Intrusion detection system
Correct Answer: A
QUESTION 86
Which of the following is an example of a simple, physical-access control?
A. Lock
B. Access control list
C. Background check
D. Token
E. Firewall
Correct Answer: A
QUESTION 87
Which of the following best describes an external intrusion attempt on a local-area network (LAN)?
A. Internal users try to gain unauthorized access to information assets outside the organizational perimeter.
B. External-intrusion attempts from sources outside the LAN are not granted permissions or rights to an organization’s information assets.
C. External users attempt to access public resources.
D. External intruders attempt exploitation of vulnerabilities, to remove their own access.
E. Internal users perform inappropriate acts on assets to which they have been given rights or permissions.
Correct Answer: B
QUESTION 88
Maintenance of the Business Continuity Plan (BCP) must be integrated with an organization’s _______________ process.
A. Change-control
B. Disaster-recovery
C. Inventory-maintenance
D. Discretionary-budget
E. Compensation-review
Correct Answer: A
QUESTION 89
Which types of security solutions should a home user deploy? (Choose TWO.)
A. Managed Security Gateway
B. Access control lists on a router
C. Personal firewall
D. Network intrusion-detection system
E. Anti-virus software
Correct Answer: CE QUESTION 90
You are a system administrator for a pool of Web servers. The vendor who sells your Web server posts a patch and sample exploit for a newly discovered vulnerability. You will take all of the actions listed below. Which of the following actions should you take first?
A. Run the sample exploit against a test server.
B. Run the sample exploit against a production server.
C. Apply the patch to all production servers.
D. Test the patch on a production server.
E. Test the patch on a non-production server.
Correct Answer: A
QUESTION 91
_______ is a method of tricking users into revealing passwords, or other sensitive information.
A. Dumpster diving
B. Means testing
C. Social engineering
D. Risk
E. Exposure
Correct Answer: C
QUESTION 92
Which of the following equations results in the Single Loss Expectancy for an asset?
A. Asset Value x % Of Loss From Realized Exposure
B. Asset Value x % Of Loss From Realized Threat
C. Annualized Rate of Occurrence / Annualized Loss Expectancy
D. Asset Value x % Of Loss From Realized Vulnerability
E. Annualized Rate of Occurrence x Annualized Loss Expectancy
Correct Answer: B
QUESTION 93
Which encryption algorithm has the highest bit strength?
A. AES
B. Blowfish
C. DES
D. CAST
E. Triple DES
Correct Answer: A
QUESTION 94
_________________ is a type of cryptography, where letters of an original message are systematically rearranged into another sequence.
A. Symmetric-key exchange
B. Steganography
C. Transposition cipher
D. Asymmetric-key encryption
E. Simple substitution cipher
Correct Answer: C QUESTION 95
Which of the following are appropriate uses of asymmetric encryption? (Choose THREE.)
A. Authentication
B. Secure key-exchange mechanisms
C. Public Web site access
D. Data-integrity checking
E. Sneaker net
Correct Answer: ABD
Free practice questions for CheckPoint 156-110 exam.These questions are aimed at giving you an idea of the type of questions you can expect on the actual exam.You will get an idea of the level of knowledge each topic goes into but because these are simple web pages you will not see the interactive and performance based questions – those are available in the CheckPoint 156-110.
Flydumps CheckPoint 156-510 exam questions which contain almost 100% correct answers are tested and approved by senior Microsoft lecturers and experts.They have been devoting themselves to providing candidates with the best study materials to make sure what they get are valuable.Get a complete hold on CheckPoint 156-510 exam dumps on Flydumps, you will pass the exam absolutely.
QUESTION 63
Which three files can be generated by a Unix core dump?
A. vmunix.
B. vmcore.
C. unixdump
D. core
Correct Answer: ABD QUESTION 64
What is NOT true when using MEP encryption topologies?
A. Gateways must use the same FW-1 build level
B. Gateways must use the same management module
C. You must use a distributed installation of VPN-1/FW-1
D. Gateways must run identical policies
Correct Answer: D QUESTION 65
What is another name for an LDAP server?
A. Account server
B. DN Unit
C. User server
D. Account unit
Correct Answer: D QUESTION 66
Exhibit missing.
Please look at the exhibit, which is a sample output from a “fw ctl pstat” command. How many NAT
operations have there been in an outgoing direction?
A. 20760405
B. 340
C. 312
D. 523
Correct Answer: C QUESTION 67
Which file would you modify in order to enable and configure CPMAD?
A. $FWDIR/bin/cpmad_config.conf
B. $FWDIR/conf/cpmad.conf
C. $FWDIR/conf/cpmad_config.conf
D. $FWDIR//cpmad/config.conf
Correct Answer: C QUESTION 68
For most efficient rulebase operation, which of the following objects would it be preferable to use if you have many contiguous addresses to translate using static NAT? Assume you could validly use any of them.
A. Network
B. Workstation
C. Range
Correct Answer: A QUESTION 69
Where would it be best to locate a CVP server?
A. On an internal user lan network
B. On a firewalled gateway
C. On a separate isolated segment or DMZ
D. On a remote network
Correct Answer: C QUESTION 70
What is the result of not configuring CPMAD with enough memory?
A. Some attacks will not be detected
B. It will automatically grab more memory
C. It will automatically flush out old events to create more memory
D. It will exit
Correct Answer: D QUESTION 71
In a SEP HA environment not using load sharing, the external interfaces of each cluster member must have the same IP address. True or false?
A. False
B. True
Correct Answer: B QUESTION 72
Which command would you use to copy a user database file into VPN-1/FW-1?
A. dbimport <filename>
B. fwm dbimport -s “o=city,c=country”
C. fwm dbexport <filename>
D. fwm dbimport -f <filename>
Correct Answer: D QUESTION 73
When would you need to import the Checkpoint schema into an LDAP server?
A. If you use the severs management interface to update the LDAP database
B. Never, the LDAP standard caters for it
C. If you use Policy Editor to update the LDAP database
D. Always, when you use an LDAP server
Correct Answer: C QUESTION 74
Which is designated the primary management module?
A. It is selected by priority numbers (1 is the highest priority)
B. The last management module installed
C. The first management module installed
D. It is chosen at random
Correct Answer: C QUESTION 75
You do not need LDAP schema checking enabled if you want to use policy editor user manager to add a new LDAP user. True or false?
A. False
B. True
Correct Answer: A QUESTION 76
On a Windows NT FW-1 system, how would you increase the amount of memory allocated to the kernel to 5MBytes?
A. Set the value of HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Service\FW1\Parameters\Memory to 5000000
B. Type “# zap -s _fwhmem $FWDIR/modules/fwmod.o 5000000”
C. Type “set fw:fwhmem=5000000”
D. Type”# echo “fwhmem?W500000″ | adb -w /stand/vmnt”
Correct Answer: A QUESTION 77
A collection of gateways that are synchronized in a VPN topology are called a ___________?
A. MEP
B. Gateway group
C. Gateway cluster
D. Gateway pool
Correct Answer: C QUESTION 78
When using LDAP what may be a reason for a users password to be rejected?
A. The password does not contain a numeric character
B. The user is defined differently in the VPN-1/FW-1 user database
C. than in the LDAP server
D. The user is defined in both VPN-1/FW-1 and the LDAP server
E. The password is also used by someone else
Correct Answer: B QUESTION 79
Which API is used by applications to write to the VPN-1/FW-1 log database?
A. ELA
B. EAL
C. LEA
D. LAA
Correct Answer: A QUESTION 80
When are the statistics provided by the fw ctl pstat command reset?
A. After restarting FW-1
B. Whenever you purge the log file
C. On a reboot
D. On entering the command “fw ctl clear”
Correct Answer: AC QUESTION 81
You need to set the environment variable $FWDIR before running cpifno. True or false?
A. True
B. False
Correct Answer: A QUESTION 82
FW-1 does not support multi level proper subset encryption domains. True or false?
A. False
B. True
Correct Answer: A QUESTION 83
What is true about conflicting configuration parameters between a gateway cluster and a gateway defined as a member of that cluster?
A. Some gateway parameters override cluster parameters
B. Some cluster parameters override gateway parameters
C. The cluster configuration is overridden by the primary gateway parameters
D. All the gateway parameters remain intact
Correct Answer: B QUESTION 84
If you are troubleshooting a SMTP security server problem, which file could be useful?
A. smtp.dmp
B. smtpd.log
C. asmtpd.log
D. cvp.conf
Correct Answer: C QUESTION 85
Please look at the exhibit, which is a sample output from a “fw ctl pstat” command. There is a memory utilization problem here. True or false?
A. False
B. True
Correct Answer: A QUESTION 86
Which is NOT a group of files that can be synchronized in a HA management environment?
A. Configuration database files
B. Install files
C. Fetch files
D. log files
Correct Answer: D QUESTION 87
When SEP gateways are said to be synchronized, what exactly is synchronized between them?
A. Rulebase
B. User database
C. Objects database
D. State tables
Correct Answer: D QUESTION 88
On which module(s) does CPMAD run?
A. An external server
B. The management module
C. The Checkpoint GUI
D. The enforcement module
Correct Answer: B QUESTION 89
How many LDAP servers are supported by VPN-1/FW-1?
A. 1
B. 2, one primary and one backup
C. Unlimited
D. Up to 4
Correct Answer: C QUESTION 90
When debugging a Unix based management server you could use the fwd -d command. True or false?
A. False
B. True
Correct Answer: A
QUESTION 91
Asymmetric routing can be a problem in which type of encryption domain topology?
A. Partial overlapping
B. Fully overlapping domains in gateways using hide mode NAT for all connections
C. none overlapped backup domains with internal links between the two
D. Proper subset
Correct Answer: C
QUESTION 92
What is the function of the “fw hastat <target>” command?
A. It forces failover of high availability gateways
B. It starts HA on high availability capable gateways
C. It provides operational status of high availability gateways
D. It is an invalid command, you should use cphaprob instead
Correct Answer: C
QUESTION 93
When you are logged into the active management server and viewing the high availability management screen, what icon is displayed if there is a recommendation or error that FW-1 wishes to bring to your attention?
A. A lightbulb
B. A red question mark
C. A red hash
D. A green tick
Correct Answer: A
QUESTION 94
Which of the following platforms cannot support CPMAD?
A. Win2000
B. None of these
C. Nokia IP530
D. Solaris
E. Win NT
F. Linux
Correct Answer: B
QUESTION 95
How would you perform a manual synchronization in a HA management module environment?
A. On the primary login and click on the “synchronize me” button of the HA management manager window
B. Perform the “fw hamansync” command
C. On the secondary login and click on the “synchronize me” button of the HA management manager window
D. On the primary use Policy editor > Policy > Management high availability > click on the “synchronize”
button Correct Answer: CD QUESTION 96 When starting FW-1 debugging, you may want to send all the output to a buffer, what command(s) would you use to do this?
A. fw ctl buffer -debug
B. fw ctl buf fw ctl debug
C. fw ctl -b debug
D. fw ctl debug -buf
Correct Answer: D QUESTION 97
On a Windows NT platform, the specified state of the OS memory strategy can impact the performance of FW-1. What is the default state for this?
A. Maximize throughput for network applications
B. Maximize throughput for file sharing
C. Maximize throughput for video applications
D. Maximize throughput for disk access
Correct Answer: B QUESTION 98
In an LDAP database two entries cannot have the same common name (CN). True or false?
A. False
B. True
Correct Answer: A QUESTION 99
If you want to receive debug information for HTTP or FTP security servers when debugging the firewall daemon, you must use the “fw debug fwd on” command. True or false?
A. True
B. False
Correct Answer: B QUESTION 100
What are the three types of overlapping encryption domains?
A. Partial overlap
B. Proper subset
C. Partial subset
D. Full overlap
Correct Answer: ABD
This volume is part of the Exam Certification Guide Series from CheckPoint 156-510 exam. CheckPoint 156-510 exam in this series provide officially developed exam preparation materials that offer assessment, review, and practice to help CheckPoint 156-510 Certification candidates identify weaknesses,concentrate their study efforts,and enhance their confidence as CheckPoint 156-510 exam day nears.
Flydumps Cisco Certification CheckPoint 156-315 exam questions which contain almost 100% correct answers are tested and approved by senior Cisco lecturers and experts. They have been devoting themselves to providing candidates with the best study materials to make sure what they get are valuable.
QUESTION 77
In NGX, what happens if a Distinguished Name (ON) is NOT found in LADP?
A. NGX takes the common-name value from the Certificate subject, and searches the LADP account unit for a matching user id
B. NGX searches the internal database for the username
C. If the first request fails or if branches do not match, NGX tries to map the identity to the user id attribute
D. When users authenticate with valid Certificates, the Security Gateway tries to map the identities with users registered in the extemal LADP user database
E. The Security Gateway uses the subject of the Certificate as the ON for the initial lookup
Correct Answer: C
QUESTION 78
Which command allows you to view the contents of an NGX table?
A. fw tab -s <tablename>-
B. fw tab -t <tablename>-
C. fw tab -u <tablename>-
D. fw tab -a <tablename>-
E. fw tab -x <tablename>-
Correct Answer: C
QUESTION 79
Jack’s project is to define the backup and restore section of his organization’s disaster recovery plan for his organization’s distributed NGX installation. Jack must meet the following required and desired objectives.
*
Required Objective The security policy repository must be backed up no less frequent~ than every 24 hours
*
Desired Objective The NGX components that enforce the Security Policies should be backed up no less frequently than once a week
*
Desired Objective Back up NGX logs no less frequently than once a week Jack’s disaster recovery plan is as follows. See exhibit.
Jack’s plan:
A. Meets the required objective but does not meet either desired objective
B. Does not meet the required objective
C. Meets the required objective and only one desired objective
D. Meets the required objective and both desired objectives
Correct Answer: D QUESTION 80
The following is cphaprobstate command output from a New Mode High Availability cluster member:
Which machine has the highest priority?
A. 192.168.1.2,since its number is 2
B. 192.168.1.1,because its number is 1
C. This output does not indicate which machine has the highest priority
D. 192.168.1.2, because its state is active
Correct Answer: B
QUESTION 81
What do you use to view an NGX Security Gateway’s status, including CPU use, amount of virtual memory, percent of free hard-disk space, and version?
A. SmartLSM
B. SmartViewTracker
C. SmartUpdate
D. SmartViewMonitor
E. SmartViewStatus
Correct Answer: D
QUESTION 82
Which of the following commands is used to restore NGX configuration information?
A. cpcontig
B. cpinfo-i
C. restore
D. fwm dbimport
E. upgrade_import
Correct Answer: E
QUESTION 83
Eric wants to see all URLs’ ful destination path in the SmartView Tracker logs, not just the fully qualified domain name of the web servers. For Example, the information field of a log entry displays the URL http://hp.msn.com/css/home/hpcl1012.css. How can Eric best customize SmartView Tracker to see the logs he wants? Configure the URl resource, and select
A. “transparent” asthe connection method
B. “tunneling”as the connection method
C. “optimize URL logging”; use the URI resource in the rule, with action “accept”
D. “Enforce URI capability”; use the URI resource in the rule,with action “accept”
Correct Answer: C
QUESTION 84
Which of the following commands shows full synchronizalion status?
A. cphaprob -i list
B. cphastop
C. fw ctl pstat
D. cphaprob -a if
E. fw hastat
Correct Answer: C
QUESTION 85
Which VPN Community object is used to configure VPN routing within the SmartDashboard?
A. Star
B. Mesh
C. Remote Access
D. Map
Correct Answer: A
QUESTION 86
If you are experiencing LDAP issues, which of the following should you check?
A. Secure lnternal Cornrnunicalions(SIC)
B. VPN tunneling
C. Overlapping VPN Domains
D. NGX connectivity
E. VPN Load Balancing
Correct Answer: E
QUESTION 87
How can you reset the password of the Security Administrator, which was created during initial installation of the SmartCenter Server on SecurePlattform?
A. Launch cpcontig and select “Administrators”
B. Launch SmartDashboard, click the admin user account, and overwrite the existing Check Point Password
C. Type cpm -a, and provide the existing administration account name. Reset the Security Administrator’s password
D. Export the user database into an ASCII file with fwm dbexport. Open this file with an editor, and delete the “Password” portion of the file Then log in to the account withthout password. You will be prompted to assign a new password
E. Launch cpconfig and delete the Administrator’s account. Recreate the account with the same name
Correct Answer: E
QUESTION 88
Which operating system is not supported byVPN-1 SecureClient?
A. IPS0 3.9
B. Windows XP SP2
C. Windows 2000 Professional
D. RedHat Linux 7 0
E. MacOS X
Correct Answer: A QUESTION 89
Which Check Point QoS feature issued to dynamically allocate relative portions of available bandwidth?
A. Guarantees
B. Differentiated Services
C. Limits
D. Weighted Fair Queueing
E. Low Latency Queueinq
Correct Answer: D
QUESTION 90
You are running a VPN-1 NG with Application Intelligence R54 SecurePlatform VPN-1 Pro Gateway. The Gateway also serves as a Policy Server. When you run patch add cd from the NGX CD, what does this command allow you to upgrade?
A. Only VPN-1 Pro Security Gateway
B. Both the operating system (OS) and all Check Point products
C. All products, except the Policy Server
D. On~ the patch utility is upgraded using this command
E. Only the OS
Correct Answer: B
QUESTION 91
Amanda is compiling traffic statistics for Certkiller.com’s Internet activity during production hours. How could she use SmartView Monitor to find this information? By
A. Using the “Traffic Counters” settings and SmartView Monitor to generate a graph showing the total HTTP traffic for the day
B. Monitoring each specific user’s Web traffic use.
C. Viewing total packets passed through the Security Gateway
D. Selecting the “Tunnels” view, and generating a report on the statistics
E. Configuring a Suspicious Activity Rule which triggers an alert when HTTP traffic passes through the Gateway
Correct Answer: A
QUESTION 92
ASecurity Administrator is notified that some long-lasting Telnet connections to a mainframe are dropped every time after an hour. The Administrator suspect that the the Security Gateway might be blocking these connections. As she reviews the Smart Tracker the Administrator sees the packet is dropped with the error “Unknown established connection”. How can she resolve this problem without causing other security issues? Choose the BEST answer. She can:
A. Increase the session time-out in the mainframe’s Object Properties
B. Create a new TCP service object on port 23, and increase the session time-out for this object She only uses this new object in the rule that allows the Telnet connections to the mainframe
C. Increase the session time-out in the Service Properties of the Telnet service
D. Increase the session time-out in the Global Properties
E. Ask the mainframe users to reconnect every time this error occurs
Correct Answer: B QUESTION 93
Certkiller is the Security Administrator for a software-development company. To isolate the corporate network from the developer’s network, Certkiller installs an internal Security Gateway. Jack wants to optimize the performance of this Gateway. Which of the following actions is most likely to improve the Gateway’s performance?
A. Remove unused Security Policies from Policy Packages
B. Clear all Global Properties check boxes, and use explicit rules
C. Use groups within groups in the manual NAT Rule Base
D. Put the least-used rules at the top of the Rule Base
E. Use domain objects in rules, where possible
Correct Answer: A
QUESTION 94
Certkiller is the Security Administrator for a chain of grocery stores. Each grocery store is protected by a Security Gateway. Certkiller is generating a report for the information-technology audit department. The report must include the name of the Security Policy installed on each remote Security Gateway, the date and time the Security Policy was installed, and general performance statistics (CPU Use, average CPU time, active real memory, etc.). Which SmartConsole application should Certkiller use to gather this information?
A. SmartUpdate
B. SmartView Status
C. SmartView Tracker
D. SmartLSM
E. SmartView Monitor
Correct Answer:
QUESTION 95
How can you reset Secure Internal Communications (SIC) between a SmartCenter Server and Security Gateway?
A. Run the command fwm sicreset to reinitialize the Internal Certificate Authority (ICA) of the SmartCenter Server. Then retype the activation key on the Security-Gateway from SmartDashboard
B. From cpconfig on the SmartCenter Server, choose the Secure Internal Communication option and retype the actrvation key Next, retype the same key in the gateway object in SmartDashboard and reinitialize Secure Internal Communications (SIC)
C. From the SmartCenter Server’s command line type fw putkey -p <shared key>- <IP Address of SmartCenter Server>-.
D. From the SmartCenter Server’s command line type fw putkey -p <shared key>- <IP Address of security Gateway>-.
E. Re-install the Security Gateway
Correct Answer: B
QUESTION 96
Which NGX feature or command allows Security Administrators to revert to earlier versions of the Security Policy without changing object configurations?
A. upgrade_export/upgrade_import
B. Policy Package management
C. fwm dbexport/fwm dbimport
D. cpconfig
E. Database Revision Control
Correct Answer: B QUESTION 97
CheckPoint 156-315 Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques.“Do I Know This Already?”quizzes open each chapter and allow you to decide how much time you need to spend on each section.CheckPoint 156-315 lists and Foundation Summary tables make referencing easy and give you a quick refresher whenever you need it.Challenging CheckPoint 156-315 review questions help you assess your knowledge and reinforce key concepts.CheckPoint 156-315 exercises help you think about exam objectives in real-world situations,thus increasing recall during exam time.
Do not worry about your Checkpoint 156-215 exam, Flydumps now has published the new veriosn Checkpoint 156-215 exam exam dumps with more new added questions and answers,also you can free download Checkpoint 156-215 exam vce test software and pdf dumps on Flydumps.com.
QUESTION 50
Jordan’s company is streaming training videos provided by a third party on the Internet. Jordan configures VPN-1 NGX, so that each department ONLY views webcasts specific to its department. Jordan created and configured the multicast groups for all interfaces, and configures them to “Drop all multicast packets except those whose destination is in the list”. But no multicast transmissions are coming from the Internet. What is possible causes fro the connection problem?
A. Multicast groups are configured improperly on the external interface properties of the Security Gateway object.
B. Anti-spoofing is enabled. VPN-1 NGX cannot pass multicast traffic, if anti-spoofing is enabled.
C. Jordan did not create the necessary “to and through” rules, defining how VPN-1 NGX will handle the multicast traffic.
D. VPN-1 NGX does not support multicast routing protocols and streaming media through the Security Gateway.
E. The Multicast Rule is below the Stealth Rule. VPN-1 NGX can only pass multicast traffic, if the Multicast Rule is above the Stealth Rule.
Correct Answer: A
QUESTION 51
Your SmartCenter Server fails and does not reboot. One of your remote Security Gateways, managed by the SmartCenter Server, reboots. What happens to that remote Gateway after reboot?
A. Since the SmartCenter Server is not available, the remote Gateway cannot fetch the Security Policy. Therefore, all traffic is allowed through the Gateway.
B. Since the SmartCenter Server is not available, the remote Gateway uses the local Security Policy, but does not log traffic.
C. Since the SmartCenter Server is not available, the remote Gateway cannot fetch the Security Policy. Therefore, no traffic is allowed through the Gateway.
D. Since the SmartCenter Server is not available to the remote Gateway, fetching the Security Policy and logging will both fail.
E. The remote Gateway fetches the last installed Security Policy locally, and passes traffic normally. The Gateway will log locally, since the SmartCenter Server is not available.
Correct Answer: E
QUESTION 52
Which component functions as the Internal Certificate Authority for VPN-1 NGX?
A. SmartConsole
B. SmartCenter Server
C. Policy Server
D. SmartLSM
E. Security Gateway
Correct Answer: B
QUESTION 53
Robert has configured a CIFS resource to allow access to the public partition of his company’s file server,
on \\erisco\goldenapple\files\public. Robert receives reports that users are unable to access the share,
unless they use the file server’s IP address.
Which of the following is a possible cause?
A. the CIFS resource is not configured to use Windows name resolution
B. Mapped shares are not configured to log.
C. Null CIFS sessions are configured to be blocked
D. Remote registry access is configured to be blocked.
E. Access violations are not configured to log.
Correct Answer: A
QUESTION 54
Barak is a Security Administrator for an organization that has two sites using pre-shared secrets in its VPN. The two sites are Oslo and London. Barak has just been informed that a new office is opening in Madrid, and he must enable all three sites to connect via the VPN to each other. Three Security Gateways are managed by the same SmartCenter Server, behind the Oslo Security Gateway. Barak decides to switch from pre-shared secrets to Certificates issued by the Internal Certificate Authority (ICA). After creating the Madrid gateway object with the proper VPN Domain, what are Barak’s remaining steps?
A. 1, 2, 3, 4
B. 1, 2, 5
C. 1, 2, 3, 5
D. 1, 3, 4, 5
E. 1, 2, 3, 4, 5
Correct Answer: E
QUESTION 55
You want to establish a VPN, using Certificates. Your VPN will exchange Certificates with an external partner. Which of the following activities should you do first?
A. Exchange a shared secret, before importing Certificates.
B. Create a new logical-server object, to represent your partner’s CA.
C. Create a new server object, to represent your partner’s Certificate Authority (CA)
D. Manually import your partner’s Certificate Revocation List.
E. Manually import your partner’s Access Control list.
Correct Answer: C
QUESTION 56
There is a Web server behind your perimeter Security Gateway. You need to protect the server from network attackers, who creates scripts that force your Web server to send user credentials or identities to other Web servers. Which box do you check in the Web Intelligence tab in SmartDashboard?
A. Command Injection protection
B. SQL Injection protection
C. HTTP header format checking
D. HTTP protocol inspection protection
E. Cross Site Scripting protection
Correct Answer: E
QUESTION 57
How do you control the maximum mail messages in a spool directory?
A. In the SMTP resource object
B. In the smtp.conf file on the SmartCenter Server
C. In the gateway object’s SMTP settings in the Advanced window
D. In SmartDefense SMTP settings
E. In the Security Server window in Global Properties
Correct Answer: C
QUESTION 58
Quinton is the Security Administrator for a chain of retail stores. In a recent security newsletter, Quinton read about an attack where a client fools a server into sending large amount of data, using small packets. Quinton is concerned that this company’s servers might be vulnerable to this type of attack. Which smartDefense option should Quinton use to protect the servers?
A. Application Intelligence > DNS > Cache poisoning
B. Network Security > Successive events > DoS
C. Network Security > TCP > Small PMTU
D. Application Intelligence > Microsoft Networks > File and Print Sharing
E. Network Security > Denial of Service > LAND
Correct Answer: C QUESTION 59
In SmartView Tracker, which rule shows when a packet is dropped due to anti-spoofing?
A. Rule 999
B. Rule 0
C. Rule 1
D. Cleanup Rule
E. Stealth Rule
Correct Answer: B
QUESTION 60
Sonny is the Security Administrator for a company with a large call center. The management team in the center is concerned that employees may be installing and attempting to use peer-to-peer file-sharing utilities, during their lunch breaks. The call center’s network is protected by an internal Security Gateway, configured to drop peer-to-peer file-sharing traffic. The call-center management team wants to know if the Security Gateway protecting the call center drops more packets than other internal Security Gateways in the corporate network. Which application should Sonny use, determine the number of packets dropped by each Gateway?
A. SmartView Status
B. SmartView Monitor
C. SmartDashboad
D. SmartView Tracker
E. SmartUpdate
Correct Answer: B
QUESTION 61
Katie is the Security Administrator for an insurance company. Her manager gives Katie the following requirements for controlling DNS traffic:
*
Required Result #1: Accept domain name-over-TCP traffic (zone-transfer traffic).
*
Required Result #2: Log domain name-over-TCP traffic (zone-transfer traffic).
*
Desired Result #1: Accept domain name-over-UDP traffic (queries traffic)
*
Desired Result #2: Do not log domain name-over-UDP traffic (queries traffic)
*
Desired Result #3: Do not clutter the Rule Base, by creating explicit rules for traffic that can be controlled using Global Properties. Katie makes the following configuration changes, and installs the Security Policy:
1.
She selects the box “Accept Domain Name over TCP (Zone transfer)” in Global Properties.
2.
She selects the box “Accept Domain Name over UDP (Queries)” in Global Properties.
3.
She selects the box “Log Implied Rules” in Global Properties Does Katie’s solution meet the required and desired results?
A. The solution meets all required results, and none of the desired results.
B. The solution does not meet the required results.
C. The solution meets all required and desired results.
D. The solution meets the required results, and one of the desired results.
E. The solution meets the required results, and two of the desired results.
Correct Answer: E
QUESTION 62
David is a consultant for a software-deployment company. David is working at a customer’s site this week. David’s ask is to create a map of the customer’s VPN tunnels, including down and destroyed tunnels. Which SmartConsole application will provide David with the information needed to create this map?
A. SmartView Tracker
B. SmartLSM
C. SmartView Monitor
D. SmartView Status
E. SmartUpdate
Correct Answer: C
QUESTION 63
Gail is the Security Administrator for a marketing firm. Gail is working with the networking team, to troubleshoot user complaints regarding access to audio-streaming material from the Internet. The networking team asks Gail to check he configuration settings for the perimeter Security Gateway. Which SmartConsole application should Gail use to check the configuration settings?
A. SmartView Tracker
B. SmartView Monitor
C. SmartUpdate
D. SmartDashboard
E. SmartView Status
Correct Answer: D
QUESTION 64
One of your remote Security Gateways suddenly stops sending logs, and you cannot install the Security Policy on the Gateway. All other remote Security Gateways are logging normally to the SmartCenter Server, and Policy installation is not affected. When you click the Test SIC status button in the problematic gateway object, you receive an error message “unknown”. What is the problem?
A. The time on the SmartCenter Server’s clock has changed, which invalidates the remote Gateway’s Certificate.
B. The remote Gateway’s IP address has changed, which invalidates the SIC Certificate.
C. The Security Gateway is NG with Application Intelligence, and the SmartCenter Server is NGX.
D. The Internal Certificate Authority for the SmartCenter object has been removed from objects_5_0.c.
E. There is no connection between the SmartCenter Server and the remote Gateway. Rules or routing may block the connection.
Correct Answer: E
QUESTION 65
Frank wants to know why users on the corporate network cannot receive multicast transmissions from the Internet. A VPN-1 NGX Security Gateway protects the corporate network from the Internet. Which of the following is a possible cause for the connection problem?
A. VPN-1 NGX does not support multicast routing protocols and streaming media through the Security Gateway.
B. The Multicast Rule is below the Stealth Rule. VPN-1 NGX can only pass multicast traffic, it the Multicast Rule is above the Stealth Rule.
C. Multicast restrictions are configured improperly on the external interface properties of the Security Gateway object.
D. Anti-spoofing is enabled. VPN-1 NGX cannot pass multicast traffic, if anti-spoofing is enabled.
E. Frank did not install the necessary multicast license with SmartUpdate, when upgrading the VPN-1 NGX.
Correct Answer: C
QUESTION 66
You are concerned that a message may have been intercepted and retransmitted, thus compromising the security of the communications. You attach a code to the electronically transmitted message that uniquely identifies the sender. This code is known as a:
A. Digital signature
B. Tag
C. Private key
D. AES flag
E. Diffie-Helman verification
Correct Answer: A
QUESTION 67
A user attempts authentication using SecureClient. The user’s password is rejected, even though it is
correctly defined in the LDAP directory.
Which of the following is a valid cause?
A. The LDAP server has insufficient memory
B. The LDAP and Security Gateway databases are not synchronized.
C. The SmartCenter Server cannot communicate with the LDAP server.
D. The user has defined the wrong encryption scheme.
E. The user is defined in both the NGX user database and the LDAP directory
Correct Answer: B
QUESTION 68
Select the correct statement about Secure Internal Communications (SIC) Certificates? SIC Certificates:
A. for NGX Security Gateways are created during the SmartCenter Server installation.
B. For the SmartCenter Server are created during the SmartCenter Server installation.
C. Are used for securing internal network communications between the SmartView Tracker and an OPSEC device
D. Decrease network security by securing administrative communication among the SmartCenter Servers and the Security Gateway
E. Uniquely identify Check Point enabled machines; they have the same function as Authentication Certificates
Correct Answer: E
QUESTION 69
Exhibit: *** MISSING ***
Review the following rules and note the Client Authentication Action properties screen as displayed in the
exhibit,
After being authenticated by the Security Gateway, when a user starts an HPPT connection to a Web site,
the user tries to FTP antother site using the command line.
What happens to the user?
The…
A. FTP session is dropped by the implicit Cleanup Rule.
B. User is prompted from that FTP site only, and does not need to enter username and password for Client Authentication.
C. FTP connection is dropped by rule 2.
D. FTP data connection is dropped, after the user is authenticated successfully.
E. User is prompted for authentication bye the Security Gateway again.
Correct Answer:
QUESTION 70
Diffie-Hellman uses which type of key exchange?
A. Adaptive
B. Asymmetric
C. Symmetric
D. Static
E. Dynamic
Correct Answer: B
QUESTION 71
Certkiller’s main internal network 10.10.10.0/24 allows all traffic to the Internet using Hide NAT. Certkiller
also has a small network 10.10-.20.0/24 behind the internal router. Jack wants to configure the kernel to
translate the source address only when network 10.10.20.0 tries to access the Internet for HTTP, SMTP,
and FTP services.
Which of the following configurations will allow this network to access Internet?
A. Automatic Static NAT on network 10.10.20.0/24
B. Manual Hide NAT rules for HTTP, FTP, and SMTP services for network 10.10.20.0/24.
C. Manual Static NAT rules for network 10.10.20.0/24,
D. Automatic Hide NAT for network 10.10.20.0/24.
E. No change is necessarey.
Correct Answer: A
QUESTION 72
With SmartDashboard′s Smart Directory, you can create NGX user definitions on a(n) _____________ Server.
A. NT Domain
B. LDAP
C. Provider-1
D. SecureID
E. Radius
Correct Answer: B
QUESTION 73
Jens notices a large amount of traffic from a specific internal IP address. He needs to verify if it is a network attack, or a user’s system infected with a worm. He has enabled Sweep Scan Protection and Host port scan in SmartDefense. Will Jens get all the information he needs from these actions?
A. No. SmartDefense will only block the traffic, but it will not provide a detailed analysis of the traffic.
B. No. SmartDefense will not block the traffic. The logs and alert can provide a further level information, but determining whether the attack is intentional or a worm requires further research by Jens.
C. No. Jens also should set SmartDefense to quarantine the traffic from the suspicious IP address.
D. Yes. SmartDefense will limit the traffic impact from the scans, and identify if the pattern of the traffic matches any known worms.
E. No. To verify if this is a worm or an active attack, Jens should also enable TCP attack defenses.
Correct Answer: B
QUESTION 74
Which NGX feature or command provides the easiest path for Security Administrators to revert to earlier versions of the same Security Policy and objects configuration?
A. cpconfig
B. upgrade_export/upgrade_import
C. Database Revision Control
D. Dbexport/dbimport
E. Policy Package management
Correct Answer: C
QUESTION 75
How do you configure an NGX Security Gateway’s kernel memory settings, without manually modifying the configuration files in $FWDIR\lib? By configuring:
A. the settings on the Gateway object’s Capacity Optimization screen
B. the settings on the Global Properties Capacity Optimization screen
C. the Settings on the Gateway object’s Advanced screen
D. the settings on the SmartCenter Server object’s Advanced screen
E. SmartDefense Kernel Defender options
Correct Answer: A
QUESTION 76
Which of the following is NOT a feature or quality of a hash function?
A. Encrypted with the sender’s RSA private key, the hash function forms the digital signature.
B. It is mathematically infeasible to derive the original message from the message digest.
C. The hash function forms a two-way, secure communication.
D. The hash function is irreversible.
E. It is mathematically infeasible for two different messages to produce the same message digest.
Correct Answer: C
QUESTION 77
You are a Security Administrator configuring Static NAT on an internal host-node object. You clear the box “Translate destination on client side”, accessed from Global Properties > NAT settings > Automatic NAT. Assuming all other Global Properties NAT settings are selected, what else must be configured for automatic Static NAT to work?
A. The NAT IP address must be added to the anti-spoofing group of the external Gateway interface
B. Two address-translation rules in the Rule Base
C. No extra configuring needed
D. A proxy ARP entry, to ensure packets destined for the public IP address will reach the Security Gateway’s external interface
E. A static route, to ensure packets destined for the public NAT IP address will reach the Gateway’s internal interface
Correct Answer: E
QUESTION 78
Which encryption scheme provides “In-place” encryption?
A. IKE
B. Manual IPSec
C. DES
D. SKIP
E. AES
Correct Answer: C
QUESTION 79
After importing the NGX schema into an LDAP server, what should you enable?
A. Schema checking
B. Encryption
C. UserAuthority
D. ConnectControl
E. Secure Internal Communications
Correct Answer: A
QUESTION 80
Which ldif file must you modify to extend the schema of a Windows 2000 domain?
A. In NGX you do not need to modify any .ldif file
B. The appropriate .ldif file is located in the Security Gateway: $FWDIR/conf/ldif/Microsoft_ad_schema.ldif
C. The appropriate .ldif file is located in the SmartCenter Server: $FWDIR/lib/ldap/schema_microsoft_ad.ldif
D. The appropriate .ldif file is located in the Security Gateway: $FWDIR/lib/ldif/Microsoft_ad_schema.ldif
E. The appropriate .ldif file is located in the SmartCenter Server: $FWDIR/conf/ldif/Microsoft_ad_schema.ldif
Correct Answer: C
QUESTION 81
What is the reason for the Critical Problem notification in this SmartView Monitor example?
A. Active real memory shortage on the Gateway
B. No Security Policy installed on the Security Gateway
C. Version mismatch between the SmartCenter Server and Security Gateway
D. Time not synchronized between the SmartCenter Server and Security Gateway
E. No Secure Internal Communications established between the SmartCenter Server and Security
Gateway
Correct Answer: B
QUESTION 82
Your standby SmartCenter Server’s status is collision. What does that mean, and how do you synchronize the Server and its peer?
A. The standby and active Servers have two Internal Certificate Authority (ICA) Certificates. Uninstall and reinstall the standby Server.
B. The active Server detected a keep-alive packet from the standby Server.
C. The peer Server has not been properly synchronized. Manually synchronize both Servers again.
D. The peer Server is more up-to-date. Manually synchronize both Servers again.
E. The active SmartCenter Server and its peer have different Security Policies and databases. Manually synchronize the Servers, and decide which Server’s configuration to overwrite.
Correct Answer: E
QUESTION 83
Sarah is the Security Administrator for Certkiller . Sarah has configured SmartDefense to block the CWD and FIND commands. Sarah installs the Security Policy, but the Security Gateway continues to pass the commands. Which of the following could be the cause of the problem?
A. The Rule Base includes a rule accepting FTP to any source, from any destination.
B. The SmartDefense > Application Intelligence > FTP Security Server screen does not have the radio button set to “Configurations apply to all connections”.
C. The FTP Service Object > Advanced > Blocked FTP Commands list does not include CWD and FIND.
D. The Web Intelligence > Application Layer > FTP Settings list is configured to allow, rather than exlude, CW and FIND commands.
E. The Global Properties > Security Server > “Control FTP Commands” box is not checked.
Correct Answer: B
QUESTION 84
Your NGX enterprise SmartCenter Server is working normally. However, you must reinstall the SmartCenter Server, but keep the SmartCenter Server configuration (for example, all Security Policies, databases, etc.) How would you reinstall the Server and keep its configuration?
A. 1. Run the latest upgrade_export utility to export the configuration.
2.
Keep the exported file in the same location.
3.
Use SmartUpdate to reinstall the SmartCenter Server.
4.
Run upgrade_import to import the configuration.
B. 1. Run the latest upgrade_export utility to export the configuration.
2.
Leave the exported .tgz file in $FWDIR.
3.
Install the primary SmartCenter Server on top of the current installation.
4.
Run upgrade_import to import the configuration.
C. 1. Insert the NGX CD-ROM, and select the option to export the configuration into a .tgz file.
2.
Transfer the .tgz file to another networked machine.
3.
Uninstall all NGX packages, and reboot.
4.
Use the NGX CD-ROM to select the upgrade_import option to import the configuration.
D. 1. Download the latest upgrade_export utility, and run it from $FWDIR\bin to export the configuration into a .tgz file.
2.
Transfer the .tgz file to another networked machine.
3.
Uninstall all NGX packages, and reboot.
4.
Install a new primary SmartCenter Server.
5.
Run upgrade_import to import the configuration.
Correct Answer: D QUESTION 85
How can you reset Secure Internal Communications (SIC) between a SmartCenter and Security Gateway?
A. Run the command fwm sic_reset to reinitialize the Internal Certificate Authority (ICA) of the SmartCenter Server. Then retype the activation key on the Security Gateway from SmartDashboard.
B. From cpconfig on the SmartCenter Server, choose the Secure Internal Communication option and retype the activation key. Next, retype the same key in the gateway object in SmartDashboard and reinitialize Secure Internal Communications (SIC).
C. From the SmartCenter Server’s command line type fw putkey -p <IP Address of SmartCenter Server>.
D. From the SmartCenter Server’s command line type fw putkey -p <IP Address of Security Gateway>.
E. Reinstall the Security Gateway.
Correct Answer: B
QUESTION 86
You have locked yourself out of SmartDashoard with the rules you just installed on your stand alone Security Gateway. Now you cannot access the SmartCenter Server or any SmartConsole tools via SmartDashboard. How can you reconnect to SmartDashboard?
A. Run cpstop on the SmartCenter Server.
B. Run fw unlocklocal on the SmartCenter Server.
C. Run fw unloadlocal on the Security Gatewawy.
D. Delete the $fwdir/database/manage.lock file and run cprestart.
E. Run fw uninstall localhost on the Security Gateway.
Correct Answer: C
QUESTION 87
Ellen is performing penetration tests against SmartDefense for her Web server farm. She needs to verify that the Web servers are secure against traffic hijacks. She has activated the Cross-Site Scripting property. What other settings would be appropriate? Ellen:
A. should also enable the Web intelligence > SQL injection setting.
B. must select the “Products > Web Server” box on each of the node objects.
C. should enable all settings in Web Intelligence.
D. needs to configure TCP defenses such as “Small PMTU” size.
E. needs to create resource objects for the web farm servers and configure rules for the web farm.
Correct Answer: B
QUESTION 88
William is a Security Administrator who has added address translation for his internal Web server to be accessible by external clients. Due to poor network design by his predecessor, William sets up manual NAT rules for this server, while his FTP server and SMTP server are both using automatic NAT rules. All traffic from his FTP and SMTP servers are passing through the Security Gateway without a problem, but traffic from the Web server is dropped because of anti-spoofing settings. What is causing this?
A. “Allow bi-directional NAT” is not checked in Global Properties.
B. “Translate destination on client side” is not checked in Global Properties under “Manual NAT Rules”.
C. “Translate destination on client side” is not checked in Global Properties > Automatic NAT Rules.
D. Routing is not configured correctly.
E. Manual NAT rules are not configured correctly.
Correct Answer: B
QUESTION 89
You are a security consultant for a hospital. You are asked to create some type of authentication rule on the NGX Security Gateway, to allow doctors to update patients’ records via HTTP from various workstations. Which authentication method should you use?
A. Client Authentication
B. LDAP Authentication
C. SecureID Authentication
D. TACAS Authentication
E. User Authentication
Correct Answer: E
The Cisco contains more than 400 practice questions for the Checkpoint 156-215 exams,including simulation-based questions.Also contains hands-on exercises and a customized copy of the Checkpoint 156-215 exam network simulation software.
Important Info: These new valid CheckPoint 156-915 exam questions were updated in recent days by CheckPoint 156-915 ,please visit our website to get the full version of new CheckPoint 156-915 exam dumps with free version of new VCE Player, you can pass the exam easily by training it!
QUESTION 87
Which feature in VPN-1 permits blocking specific IP addresses for a specified time period?
A. HTTP Methods
B. Local Interface Spoofing
C. Block Port Overflow
D. Suspicious Activity Monitoring
Correct Answer: D
QUESTION 88
Match the ClusterXL Modes with their configurations: Exhibit:
A. A2,B3,C1,D4
B. A2,B3,C4,D1
C. A3,B2,C4,D1
D. A3,B2,C1,D4
Correct Answer: D
QUESTION 89
By default Check Point High Availability components send updates about their state every:
A. 1 Second
B. 0.1 Second
C. 5 Seconds
D. 0.5 seconds
Correct Answer: B
QUESTION 90
Which operating system is not supported by SecureClient?
A. IPSO 3.9
B. MacOS X
C. Windows 2003 Professional
D. Windows XP SP2
Correct Answer: A
QUESTION 91
Which of the following is the most critical step in a SmartCenter Server NGX R65 backup strategy?
A. Move the *.tgz upgrade_export file to an offsite location via ftp
B. Perform a full system tape backup of both the SmartCenter and Security Gateway machines
C. Using the upgrade_import command, attempt to restore the SmartCenter server to a non-production system
D. Run the cpstop command prior to running the upgrade_export command
Correct Answer: C
QUESTION 92
What happens when you select File > Export from the SmartView Tracker Menu?
A. Logs in fw.log are exported to a file that can be opened by Microsoft Excel
B. Exported log entries are deleted from fw.log
C. Current logs are exported to a new *.log file
D. Exported log entries are still viewable in SmartView Tracker
Correct Answer: A QUESTION 93
Which of these components does NOT require a VPN-1 NGX R65 license?
A. SmartUpdate Upgrading/Patching
B. SmartCenter Server
C. Check Point Gateway
D. SmartConsole
Correct Answer: D QUESTION 94
How do you use SmartView Monitor to compile traffic statistics for your company’s Internet activity during production hours?
A. Use the “Traffic Counters” settings and SmartView Monitor to generate a graph showing the total HTTP traffic for the day
B. Configure Suspicious Activity Rule which triggers an alert when HTTP traffic passes through the Gateway
C. Select the “Tunnels” view and generating a report on the statistics
Correct Answer: A QUESTION 95
Which Check Point product is used to create and save changes to a Log Consolidation Policy?
A. Eventia Reporter Server
B. SmartDashboard Log Consolidator
C. SmartCenter Server
D. Eventia Reporter Client
Correct Answer: B QUESTION 96
When configuring site-to-site VPN High Availability (HA) with MEP, which of the following is correct?
A. MEP Gateways must be managed by the same SmartCenter Server
B. If one MEP Security Gateway fails, the connection is lost and the backup Gateway picks up the next connection
C. MEP Gateways cannot be geographically separated machines
D. The decision on which MEP Gateway to use is made on the MEP Gateway’s side of the tunnel
Correct Answer: B QUESTION 97
You have blocked an IP address via the Block intruder feature of Smartview Tracker. How can you see the addresses you have blocked?
A. In Smartview monitor, select Blocked Intruder option from the query tree view
B. Run fwm blocked_view
C. In Smartview monitor, select Suspicious activity rules from the tools menu and select the relevant security gateway from the list
D. In SmartView Tracker,Click the Active Tab, and the actively blocked connection display
Correct Answer: C
QUESTION 98
You are administering your company’s clientless VPN connections. How many Security Servers should you be running to support 750 active users?
A. 1
B. 7
C. 5
D. 3
Correct Answer: C
QUESTION 99
What is the most typical type of configuration for VPNs with several externally managed Gateways?
A. Star Community
B. Hybrid community
C. Mesh Community
D. Domain Community
Correct Answer: A
QUESTION 100
Which of the following is TRUE concerning unnumbered VPN Tunnel Interfaces (VTIs)?
A. VTIs are only supported on SecurePlatform
B. VTI specific additional local and remote IP addresses are not configured
C. VTIs cannot be assigned a proxy interface
D. Local IP addresses are not configured, remote IP addresses are configured
Correct Answer: B
QUESTION 101
When configuring VPN High Availability (HA) with MEP, which of the following is correct?
A. If one gateway fails, the synchronized connection fails over to another Gateway and the connection continues
B. The decision on which MEP Security Gateway to use is made on the remote gateway’s side (non-MEP side)
C. MEP VPN Gateways cannot be geographically separated machines
D. MEP Gateways must be managed by the same SmartCenter Server
Correct Answer: B
QUESTION 102
___________ is a proprietary check point protocol. It is the basis of the functionality of Check Point ClusterXL inter-module communication.
A. HA OPCODE
B. CKPP
C. RDP
D. CCP
Correct Answer: D QUESTION 103
Which of the following command is a CLI command for VPN-1 NGX R65?
A. fw shutdown
B. fwprint
C. fw tab -u
D. fw merge
Correct Answer: C QUESTION 104
Match each of the following commands to their correct function. Each command only has one function
listed:
Exhibit:
A. C1>F2;C2>F1;C3>F6;C4>F4
B. C1>F4;C2>F6;C3>F3;C4>F2
C. C1>F2;C2>F4;C3>F1;C4>F5
D. C1>F6;C2>F4;C3>F2;C4>F5
Correct Answer: D
QUESTION 105
Which security servers can perform authentication tasks, but CANNOT perform content security tasks?
A. HTTP
B. FTP
C. RLOGIN
D. SMTP
Correct Answer: C
QUESTION 106
You are running the License_upgrade tool on you SecurePlatform Gateway. Which of the following can you NOT do with the upgrade tool?
A. Perform the actual license-upgrade process
B. View the status of currently installed licenses
C. Simulate the license-upgrade process
D. View the licenses in the SmartUpdate License Repository
Correct Answer: D QUESTION 107
A marketing firm’s networking team is trying to troubleshoot user complaints regarding access to audio-streaming material from the Internet. The networking team asks you to check the object and rule configuration settings for the perimeter security gateway. Which SmartConsole application should you use to check these objects and rules?
A. SmartView Statuus
B. SmartView Monitor
C. SmartView Tracker
D. SmartDashboard
Correct Answer: A QUESTION 108
Which is the BEST configuration option to protect internal users from malicious java code, without stripping Java Scripts?
A. Use the URI resource to strip ActiveX tags
B. Use the URI resource to strip applet tags
C. Use CVP in the URI resource to block Java code
D. Use the URI resource to block Java Code
Correct Answer: D QUESTION 109
You organization has many VPN-1 Edge Gateways at various branch offices, to allow users to access company resources. For security reasons, your organization’s security policy requires all internet traffic initiated behind the VPN-1 Edge Gateways first be inspected by your headquarters VPN-1 Pro Security Gateway. How do you configure VPN routing in this star VPN community?
A. To the Internet and other targets only
B. To the center and other satellites, through the center
C. To the center or through the center to other satellites, then to the Internet and other VPN targets
D. To the center only
Correct Answer: C QUESTION 110
Users are not prompted for authentication when they access their web servers, even though you have created an HTTP rule via User Authentication. Why?
A. Another rule that accepts HTTP without authentication exists in the Rule Base
B. You have forgotten to place the User Authentication Rule before the Stealth Rule
C. Users must use the SecuRemote Client, to use the User Authentication Rule
D. You checked the “Cache password on desktop” option in Global Properties
Correct Answer: B QUESTION 111
Flydumps is now offering CheckPoint 156-915 dumps PDF and Test Engine with 100% passing guarantee. Buy CheckPoint 156-915 pdf and pass your exam easily. If you want real exam simulation then buy test engine and install on your pc for preparation. Download CheckPoint 156-915 CCIE Data Center questions answers study material and prepare for exam.