Our pass rate is high to 98.9% and the similarity percentage between our checkpoint 156 215.77 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Check Point checkpoint 156 215.77 exam in just one try? I am currently studying for the Check Point exam 156 215.77 exam. Latest Check Point exam 156 215.77 Test exam practice questions and answers, Try Check Point checkpoint 156 215.77 Brain Dumps First.

Q21. - (Topic 2) 

You are about to test some rule and object changes suggested in an R77 news group. Which backup solution should you use to ensure the easiest restoration of your Security Policy to its previous configuration after testing the changes? 

A. Database Revision Control 

B. Manual copies of the directory $FWDIR/conf 

C. upgrade_export command 

D. SecurePlatform backup utilities 

Answer:


Q22. - (Topic 1) 

When restoring R77 using the command upgrade_import, which of the following items are NOT restored? 

A. Licenses 

B. SIC Certificates 

C. Global properties 

D. Route tables 

Answer:


Q23. - (Topic 1) 

You believe Phase 2 negotiations are failing while you are attempting to configure a site-to-site VPN with one of your firm's business partners. Which SmartConsole application should you use to confirm your suspicions? 

A. SmartDashboard 

B. SmartView Tracker 

C. SmartUpdate 

D. SmartView Status 

Answer:


Q24. - (Topic 3) 

You are about to integrate RSA SecurID users into the Check Point infrastructure. What kind of users are to be defined via SmartDashboard? 

A. All users 

B. Internal user Group 

C. A group with generic user 

D. LDAP Account Unit Group 

Answer:


Q25. - (Topic 2) 

Which R77 SmartConsole tool would you use to verify the installed Security Policy name on a Security Gateway? 

A. SmartView Server 

B. SmartView Tracker 

C. None, SmartConsole applications only communicate with the Security Management Server. 

D. SmartUpdate 

Answer:

123. - (Topic 2) 

You are reviewing the Security Administrator activity for a bank and comparing it to the change log. How do you view Security Administrator activity? 

A. SmartView Tracker in Network and Endpoint Mode 

B. SmartView Tracker in Management Mode 

C. SmartView Tracker cannot display Security Administrator activity; instead, view the system logs on the Security Management Server's Operating System. 

D. SmartView Tracker in Active Mode 

Answer:


Q26. - (Topic 3) 

When using an encryption algorithm, which is generally considered the best encryption method? 

A. DES 

B. CAST cipher 

C. AES-256 

D. Triple DES 

Answer:


Q27. - (Topic 2) 

Which statement below describes the most correct strategy for implementing a Rule Base? 

A. Place a network-traffic rule above the administrator access rule. 

B. Limit grouping to rules regarding specific access. 

C. Place the most frequently used rules at the top of the Policy and the ones that are not frequently used further down. 

D. Add the Stealth Rule before the last rule. 

Answer:


Q28. - (Topic 2) 

Which Check Point address translation method allows an administrator to use fewer ISP-assigned IP addresses than the number of internal hosts requiring Internet connectivity? 

A. Static Source 

B. Static Destination 

C. Dynamic Destination 

D. Hide 

Answer:


Q29. - (Topic 3) 

The customer has a small Check Point installation which includes one Windows 2008 server as the SmartConsole and a second server running GAiA as both Security Management Server and the Security Gateway. This is an example of a(n): 

A. Distributed Installation 

B. Unsupported configuration 

C. Hybrid Installation 

D. Stand-Alone Installation 

Answer:


Q30. - (Topic 2) 

Which Check Point address translation method is necessary if you want to connect from a host on the Internet via HTTP to a server with a reserved (RFC 1918) IP address on your DMZ? 

A. Hide Address Translation 

B. Static Destination Address Translation 

C. Port Address Translation 

D. Dynamic Source Address Translation 

Answer: