Exam Details

  • Exam Code
    :156-215.77
  • Exam Name
    :Check Point Certified Security Administrator
  • Certification
    :Checkpoint Certifications
  • Vendor
    :CheckPoint
  • Total Questions
    :60 Q&As
  • Last Updated
    :Dec 13, 2024

CheckPoint Checkpoint Certifications 156-215.77 Questions & Answers

  • Question 81:

    What is the purpose of a Stealth Rule?

    A. To prevent users from connecting directly to the gateway.

    B. To permit management traffic.

    C. To drop all traffic to the management server that is not explicitly permitted.

    D. To permit implied rules.

  • Question 82:

    To qualify as an Identity Awareness enabled rule, which column MAY include an Access Role?

    A. Action

    B. Source

    C. User

    D. Track

  • Question 83:

    Which command enables IP forwarding on IPSO?

    A. ipsofwd on admin

    B. echo 0 > /proc/sys/net/ipv4/ip_forward

    C. clish -c set routing active enable

    D. echo 1 > /proc/sys/net/ipv4/ip_forward

  • Question 84:

    An advantage of using central instead of local licensing is:

    A. A license can be taken from one Security Management Server and given to another Security Management Server.

    B. Only one IP address is used for all licenses.

    C. The license must be renewed when changing the IP address of a Security Gateway. Each module's license has a unique IP address.

    D. Licenses are automatically attached to their respective Security Gateways.

  • Question 85:

    You are the Security Administrator for MegaCorp. A Check Point firewall is installed and in use on a platform using GAiA. You have trouble configuring the speed and duplex settings of your Ethernet interfaces. Which of the following commands can be used in CLISH to configure the speed and duplex settings of an Ethernet interface and will survive a reboot? Give the BEST answer.

    A. ethtool

    B. set interface

    C. mii_tool

    D. ifconfig -a

  • Question 86:

    Suppose the Security Gateway hard drive fails and you are forced to rebuild it. You have a snapshot file stored to a TFTP server and backups of your Security Management Server. What is the correct procedure for rebuilding the Gateway quickly?

    A. Reinstall the base operating system (i.e., GAiA). Configure the Gateway interface so that the Gateway can communicate with the TFTP server. Revert to the stored snapshot image, and install the Security Policy.

    B. Run the command revert to restore the snapshot, establish SIC, and install the Policy.

    C. Run the command revert to restore the snapshot. Reinstall any necessary Check Point products. Establish SIC and install the Policy.

    D. Reinstall the base operating system (i.e., GAia). Configure the Gateway interface so that the Gateway can communicate with the TFTP server. Reinstall any necessary Check Point products and previously applied hotfixes. Revert to the stored snapshot image, and install the Policy.

  • Question 87:

    What command syntax would you use to turn on PDP logging in a distributed environment?

    A. pdp track=1

    B. pdp tracker on

    C. pdp logging on

    D. pdp log=1

  • Question 88:

    A snapshot delivers a complete GAiA backup. The resulting file can be stored on servers or as a local file in /var/CPsnapshot/snapshots. How do you restore a local snapshot named MySnapshot.tgz?

    A. Reboot the system and call the start menu. Select the option Snapshot Management, provide the Expert password and select [L] for a restore from a local file. Then, provide the correct file name.

    B. As expert user, type the command snapshot -r MySnapshot.tgz.

    C. As expert user, type the command revert --file MySnapshot.tgz.

    D. As expert user, type the command snapshot - R to restore from a local file. Then, provide the correct file name.

  • Question 89:

    What happens if the identity of a user is known?

    A. If the user credentials do not match an Access Role, the system displays the Captive Portal.

    B. If the user credentials do not match an Access Role, the system displays a sandbox.

    C. If the user credentials do not match an Access Role, the traffic is automatically dropped.

    D. If the user credentials match an Access Role, the rule is applied and traffic is accepted or dropped based on the defined action.

  • Question 90:

    Several Security Policies can be used for different installation targets. The firewall protecting Human Resources' servers should have a unique Policy Package. These rules may only be installed on this machine and not accidentally on the Internet firewall. How can this be configured?

    A. When selecting the correct firewall in each line of the row Install On of the Rule Base, only this firewall is shown in the list of possible installation targets after selecting Policy > Install.

    B. A Rule Base can always be installed on any Check Point firewall object. It is necessary to select the appropriate target directly after selecting Policy > Install.

    C. In the SmartDashboard policy, select the correct firewall to be the Specific Target of the rule.

    D. A Rule Base is always installed on all possible targets. The rules to be installed on a firewall are defined by the selection in the row Install On of the Rule Base.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CheckPoint exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 156-215.77 exam preparations and CheckPoint certification application, do not hesitate to visit our Vcedump.com to find your solutions here.