Moving Check Point 156-215.77 test is difficult. 156-215.77 results can just always be likely along with training. There are several assets to passing in Examcollection.Any Check Point 156-215.77 review products which Examcollection offers derived from a wide-ranging homework together with real-world experiences from your on line instructors. 156-215.77 review products, 156-215.77, including 156-215.77 questions and answers provide for directly into each of our larger sized merchandise base.
2021 Oct 156-215.77 test question
Q151. - (Topic 3)
You find that Users are not prompted for authentication when they access their Web servers, even though you have created an HTTP rule via User Authentication. Choose the BEST reason why.
A. Users must use the SecuRemote Client, to use the User Authentication Rule.
B. You checked the cache password on desktop option in Global Properties.
C. Another rule that accepts HTTP without authentication exists in the Rule Base.
D. You have forgotten to place the User Authentication Rule before the Stealth Rule.
Answer: C
Q152. - (Topic 2)
You can include External commands in SmartView Tracker by the menu Tools > Custom Commands.
The Security Management Server is running under SecurePlatform, and the GUI is on a system running Microsoft Windows. How do you run the command traceroute on an IP address?
A. There is no possibility to expand the three pre-defined options Ping, Whois, and Nslookup.
B. Go to the menu Tools > Custom Commands and configure the Windows command tracert.exe to the list.
C. Use the program GUIdbedit to add the command traceroute to the Security Management Server properties.
D. Go to the menu, Tools > Custom Commands and configure the Linux command traceroute to the list.
Answer: B
Q153. - (Topic 3)
In SmartDashboard, you configure 45 MB as the required free hard-disk space to accommodate logs. What can you do to keep old log files, when free space falls below 45 MB?
A. Do nothing. The Security Management Server automatically copies old logs to a backup server before purging.
B. Use the command fwm logexport to export the old log files to another location.
C. Configure a script to run fw logswitch and SCP the output file to a separate file server.
D. Do nothing. Old logs are deleted, until free space is restored.
Answer: C
Q154. - (Topic 2)
Your shipping company uses a custom application to update the shipping distribution database. The custom application includes a service used only to notify remote sites that the distribution database is malfunctioning. The perimeter Security Gateway's Rule Base includes a rule to accept this traffic. Since you are responsible for multiple sites, you want notification by a text message to your cellular phone, whenever traffic is accepted on this
rule. Which of the following would work BEST for your purpose?
A. SmartView Monitor Threshold
B. SNMP trap
C. Logging implied rules
D. User-defined alert script
Answer: D
Q155. - (Topic 1)
The Security Gateway is installed on SecurePlatform R77. The default port for the Web User Interface is ____________.
A. TCP 443
B. TCP 4433
C. TCP 18211
D. TCP 257
Answer: A
Topic 2, Volume B
Renovate 156-215.77 practice test:
Q156. - (Topic 2)
What information is found in the SmartView Tracker Management log?
A. Administrator SmartDashboard logout event
B. SecurePlatform expert login event
C. Creation of an administrator using cpconfig
D. FTP username authentication failure
Answer: A
Q157. - (Topic 3)
Which of the following is NOT true for Clientless VPN?
A. User Authentication is supported.
B. Secure communication is provided between clients and servers that support HTTP.
C. The Gateway accepts any encryption method that is proposed by the client and supported in the VPN.
D. The Gateway can enforce the use of strong encryption.
Answer: B
Q158. - (Topic 1)
Your network is experiencing connectivity problems and you want to verify if routing problems are present. You need to disable the firewall process but still allow routing to pass through the Gateway running on an IP Appliance running IPSO. What command do you need to run after stopping the firewall service?
A. ipsofwd on admin
B. ipsofwd slowpath
C. fw fwd routing
D. fw load routed
Answer: A
Q159. - (Topic 1)
Spoofing is a method of:
A. Disguising an illegal IP address behind an authorized IP address through Port Address Translation.
B. Making packets appear as if they come from an authorized IP address.
C. Detecting people using false or wrong authentication logins.
D. Hiding your firewall from unauthorized users.
Answer: B
Q160. - (Topic 1)
ALL of the following options are provided by the SecurePlatform sysconfig utility, EXCEPT:
A. Export setup
B. Time & Date
C. DHCP Server configuration
D. GUI Clients
Answer: D