You plan to install a VPN-1 Pro Gateway for VPN-1 NGX at your company's headquarters. You have a single Sun SPARC Solaris 9 machine for VPN-1 Pro enterprise implementation. You need this machine to inspect traffic and keep configuration files. Which Check Point software package do you install?
A. VPN-1 Pro Gateway and primary SmartCenter Server
B. Policy Server and primary SmartCenter Server
C. ClusterXL and SmartCenter Server
D. VPN-1 Pro Gateway
E. SmartCenter Server
Which operating system is NOT supported by VPN-1 Secure Client?
A. IPSO 3.9
B. Windows XP SP2
C. Windows 2000 Professional
D. RedHat Linux 8.0
E. MacOSX
What is the maximum number of cores supported by CoreXL?
A. 4
B. 8
C. 12
D. 6
Cody is notified by blacklist.org that his site has been reported as a spam relay, due to his SMTP Server being unprotected. Cody decides to implement an SMTP Security Server, to prevent the server from being a spam relay. Which of the following is the most efficient configuration method?
A. Configure the SMTP Security Server to perform MX resolving.
B. Configure the SMTP Security Server to perform filtering, based on IP address and SMTP protocols.
C. Configure the SMTP Security Server to work with an OPSEC based product, for content checking.
D. Configure the SMTP Security Server to apply a generic "from" address to all outgoing mail.
E. Configure the SMTP Security Server to allow only mail to or from names, within Cody's corporate domain.
Which of the following uses the same key to decrypt as it does to encrypt?
A. dynamic encryption
B. Certificate-based encryption
C. static encryption
D. Symmetric encryption
E. Asymmetric encryption
You want to upgrade an NG with Application Intelligence R55 Security Gateway running on SecurePlatform to VPN-1 NGX R65 via SmartUpdate. Which package(s) is(are) needed in the Repository prior to upgrade?
A. SecurePlatform NGX R65 package
B. VPN-1 Power/UTM NGX R65 package
C. SecurePlatform and VPN-1 Power/UTM NGX R65 packages
D. SVN Foundation and VPN-1 Power/UTM packages
In cryptography, the Rivest, Shamir, Adelman (RSA) scheme has which of the following? Select all that apply.
A. A symmetric-cipher system
B. A secret-key encryption-algorithm system
C. A public-key encryption-algorithm system
D. An asymmetric-cipher system
Which VPN Community object is used to configure VPN routing within the SmartDashboard?
A. Star
B. Mesh
C. Remote Access
D. Map
VPN traffic control would fall under which VPN component?
A. Performance
B. Management
C. Security
D. QoS
If a digital signature is used to achieve both data-integrity checking and verification of sender, digital signatures are only used when implementing:
A. A symmetric-encryption algorithm
B. CBL-DES
C. Triple DES
D. An asymmetric-encryption algorithm
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CheckPoint exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 156-315.77 exam preparations and CheckPoint certification application, do not hesitate to visit our Vcedump.com to find your solutions here.