aiotestking uk

156-215.77 Exam Questions - Online Test


156-215.77 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 3) 

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned a static IP address 10.0.0.19. 

John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop with a static IP (10.0.0.19). He wants to move around the organization and continue to have access to the HR Web Server. 

To make this scenario work, the IT administrator: 

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the policy. 

2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location. 

What should John do when he cannot access the web server from a different personal computer? 

A. John should lock and unlock his computer 

B. John should install the Identity Awareness Agent 

C. Investigate this as a network connectivity issue 

D. The access should be changed to authenticate the user instead of the PC 

Answer:

Q2. - (Topic 1) 

Anti-Spoofing is typically set up on which object type? 

A. Network 

B. Security Management object 

C. Host 

D. Security Gateway 

Answer:

Q3. - (Topic 3) 

How granular may an administrator filter an Access Role with identity awareness? Per: 

A. Specific ICA Certificate 

B. AD User 

C. Radius Group 

D. Windows Domain 

Answer:

Q4. - (Topic 2) 

To reduce the information given to you in SmartView Tracker, what can you do to find information about data being sent between pcosaka and pctokyo? 

A. Apply a source filter by adding both endpoint IP addresses with the equal option set. 

B. Use a regular expression to filter out relevant logging entries. 

C. Double-click an entry representing a connection between both endpoints. 

D. Press CTRL+F in order to open the find dialog, and then search the corresponding IP addresses. 

Answer:

Q5. - (Topic 2) 

Which of these Security Policy changes optimize Security Gateway performance? 

A. Use Automatic NAT rules instead of Manual NAT rules whenever possible. 

B. Using domain objects in rules when possible. 

C. Using groups within groups in the manual NAT Rule Base. 

D. Putting the least-used rule at the top of the Rule Base. 

Answer:

Q6. - (Topic 1) 

You are the Security Administrator for MegaCorp. A Check Point firewall is installed and in use on a platform using GAiA. You have trouble configuring the speed and duplex settings of your Ethernet interfaces. Which of the following commands can be used in Expert Mode to configure the speed and duplex settings of an Ethernet interface and will survive a reboot? Give the BEST answer. 

A. eth_set 

B. mii_tool 

C. ifconfig -a 

D. ethtool 

Answer:

Q7. - (Topic 1) 

Which utility allows you to configure the DHCP service on SecurePlatform from the command line? 

A. cpconfig 

B. ifconfig 

C. dhcp_cfg 

D. sysconfig 

Answer:

Q8. - (Topic 3) 

Review the rules. Assume domain UDP is enabled in the impled rules. 

What happens when a user from the internal network tries to browse to the internet using HTTP? The user: 

A. is prompted three times before connecting to the Internet successfully. 

B. can connect to the Internet successfully after being authenticated. 

C. can go to the Internet, without being prompted for authentication. 

D. can go to the Internet after Telnetting to the client authentication daemon port 259. 

Answer:

Q9. - (Topic 3) 

What port is used for communication to the User Center with SmartUpdate? 

A. TCP 8080 

B. HTTPS 443 

C. HTTP 80 

D. CPMI 200 

Answer:

Q10. - (Topic 1) 

The Tokyo Security Management Server Administrator cannot connect from his workstation in Osaka. 

Which of the following lists the BEST sequence of steps to troubleshoot this issue? 

A. Call Tokyo to check if they can ping the Security Management Server locally. If so, login to sgtokyo, verify management connectivity and Rule Base. If this looks okay, ask your provider if they have some firewall rules that filters out your management traffic. 

B. Verify basic network connectivity to the local Gateway, service provider, remote Gateway, remote network and target machine. Then, test for firewall rules that deny management access to the target. If successful, verify that pcosaka is a valid client IP address. 

C. Check for matching OS and product versions of the Security Management Server and the client. Then, ping the Gateways to verify connectivity. If successful, scan the log files for any denied management packets. 

D. Check the allowed clients and users on the Security Management Server. If pcosaka and your user account are valid, check for network problems. If there are no network related issues, this is likely to be a problem with the server itself. Check for any patches and upgrades. If still unsuccessful, open a case with Technical Support. 

Answer: