Check Point Certified Security Administrator – GAiA 156-215.77 Braindumps

Want to know ccsa 156 215.77 features? Want to lear more about exam 156 215.77 experience? Study 156 215.77 pdf. Gat a success with an absolute guarantee to pass Check-Point 156-215.77 (Check Point Certified Security Administrator – GAiA) test on your first attempt.

Free demo questions for Check-Point 156-215.77 Exam Dumps Below:

Page: 1 / 32
Total 388 questions Full Exam Access
Question 1
Which Client Authentication sign-on method requires the user to first authenticate via the User Authentication mechanism, when logging in to a remote server with Telnet?
My answer: -
Reference answer: C
Reference analysis:

None

Question 2
Select the TRUE statements about the Rule Base shown? Exhibit:
156-215.77 dumps exhibit
1) HTTP traffic from webrome to websingapore will be encrypted.
2) HTTP traffic from websingapore to webrome will be encrypted.
3) HTTP traffic from webrome to websingapore will be authenticated.
4) HTTP traffic from websingapore to webrome will be blocked.
My answer: -
Reference answer: D
Reference analysis:

None

Question 3
Which rule position in the Rule Base should hold the Cleanup Rule? Why?
My answer: -
Reference answer: C
Reference analysis:

None

Question 4
You plan to create a backup of the rules, objects, policies, and global properties from an R77 Security Management Server. Which of the following backup and restore solutions can you use?
156-215.77 dumps exhibit
My answer: -
Reference answer: C
Reference analysis:

None

Question 5
Static NAT connections, by default, translate on which firewall kernel inspection point?
My answer: -
Reference answer: A
Reference analysis:

None

Question 6
What happens when you select File
My answer: -
Reference answer: C
Reference analysis:

None

Question 7
How can you configure an application to automatically launch on the Security Management Server when traffic is dropped or accepted by a rule in the Security Policy?
My answer: -
Reference answer: C
Reference analysis:

None

Question 8
Which of these Security Policy changes optimize Security Gateway performance?
My answer: -
Reference answer: B
Reference analysis:

None

Question 9
Which of the following is true of the Cleanup rule?
My answer: -
Reference answer: C
Reference analysis:

None

Question 10
What CANNOT be configured for existing connections during a policy install?
My answer: -
Reference answer: D
Reference analysis:

None

Question 11
Your perimeter Security Gateway’s external IP is 200.200.200.3. Your network diagram shows:
156-215.77 dumps exhibit
Required. Allow only network 192.168.10.0 and 192.168.20.0 to go out to the Internet, using 200.200.200.5.
The local network 192.168.1.0/24 needs to use 200.200.200.3 to go out to the Internet. Assuming you enable all the settings in the NAT page of Global Properties, how could you
achieve these requirements?
My answer: -
Reference answer: B
Reference analysis:

None

Question 12
Which SmartView Tracker selection would most effectively show who installed a Security Policy blocking all traffic from the corporate network?
My answer: -
Reference answer: A
Reference analysis:

None

Question 13
Which command line interface utility allows the administrator to verify the Security Policy name and timestamp currently installed on a firewall module?
My answer: -
Reference answer: C
Reference analysis:

None

Question 14
A rule is used to prevent all traffic going to the R77 Security Gateway.
My answer: -
Reference answer: D
Reference analysis:

None

Question 15
What command syntax would you use to turn on PDP logging in a distributed environment?
My answer: -
Reference answer: B
Reference analysis:

None

Question 16
SmartView Tracker R77 consists of three different modes. They are:
My answer: -
Reference answer: C
Reference analysis:

None

Question 17
What happens if the identity of a user is known?
My answer: -
Reference answer: C
Reference analysis:

None

Question 18
An internal host initiates a session to the Google.com website and is set for Hide NAT behind the Security Gateway. The initiating traffic is an example of .
My answer: -
Reference answer: B
Reference analysis:

None

Question 19
Which of the following is an authentication method used by Identity Awareness?
My answer: -
Reference answer: B
Reference analysis:

None

Question 20
Which of the following is NOT a valid option when configuring access for Captive Portal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 21
When configuring LDAP authentication, which of the following items should be configured for the Security Management Server?
My answer: -
Reference answer: A
Reference analysis:

None

Question 22
Match the following commands to their correct function. Each command has one function only listed.
Exhibit:
156-215.77 dumps exhibit
My answer: -
Reference answer: A
Reference analysis:

None

Question 23
Which SmartConsole component can Administrators use to track changes to the Rule Base?
My answer: -
Reference answer: B
Reference analysis:

None

Question 24
Which command enables IP forwarding on IPSO?
My answer: -
Reference answer: A
Reference analysis:

None

Question 25
Which statement is TRUE about implicit rules?
My answer: -
Reference answer: D
Reference analysis:

None

Question 26
One of your remote Security Gateways suddenly stops sending logs, and you cannot install the Security Policy on the Gateway. All other remote Security Gateways are logging normally to the Security Management Server, and Policy installation is not affected. When you click the Test SIC status button in the problematic Gateway object, you receive an error message. What is the problem?
My answer: -
Reference answer: D
Reference analysis:

None

Question 27
How can you most quickly reset Secure Internal Communications (SIC) between a Security Management Server and Security Gateway?
My answer: -
Reference answer: A
Reference analysis:

None

Question 28
Which of the following items should be configured for the Security Management Server to authenticate via LDAP?
My answer: -
Reference answer: B
Reference analysis:

None

Question 29
You want to establish a VPN, using certificates. Your VPN will exchange certificates with an external partner. Which of the following activities should you do first?
My answer: -
Reference answer: B
Reference analysis:

None

Page: 1 / 32
Total 388 questions Full Exam Access