It is impossible to pass Check Point 156-215.77 exam without any help in the short term. Come to Actualtests soon and find the most advanced, correct and guaranteed Check Point 156-215.77 practice questions. You will get a surprising result by our Up to the minute Check Point Certified Security Administrator – GAiA practice guides.
2021 Jul 156-215.77 test question
Q31. - (Topic 1)
The London Security Gateway Administrator has just installed the Security Gateway and Management Server. He has not changed any default settings. As he tries to configure the Gateway, he is unable to connect. Which troubleshooting suggestion will NOT help him?
A. Check if some intermediate network device has a wrong routing table entry, VLAN
assignment, duplex-mismatch, or trunk issue.
B. Verify that the Rule Base explicitly allows management connections.
C. Test the IP address assignment and routing settings of the Security Management Server, Gateway, and console client.
D. Verify the SIC initialization.
Q32. - (Topic 2)
Which rules are not applied on a first-match basis?
A. Client Authentication
B. Session Authentication
C. User Authentication
Q33. - (Topic 3)
You review this Security Policy because Rule 4 is inhibited.
Which Rule is responsible?
A. Rule 1
B. Rule 2
C. Rule 3
D. No rule inhibits Rule 4.
Q34. - (Topic 1)
Your R77 primary Security Management Server is installed on GAiA. You plan to schedule the Security Management Server to run fw logswitch automatically every 48 hours. How do you create this schedule?
A. Create a time object, and add 48 hours as the interval. Select that time object's Global Properties > Logs and Masters window, to schedule a logswitch.
B. Create a time object, and add 48 hours as the interval. Open the primary Security Management Server object's Logs and Masters window, enable Schedule log switch, and select the Time object.
C. On a SecurePlatform Security Management Server, this can only be accomplished by configuring the command fw logswitch via the cron utility.
D. Create a time object, and add 48 hours as the interval. Open the Security Gateway object's Logs and Masters window, enable Schedule log switch, and select the Time object.
Q35. - (Topic 3)
What is a Consolidation Policy?
A. A global Policy used to share a common enforcement policy for multiple Security Gateways.
B. The collective name of the logs generated by SmartReporter.
C. The collective name of the Security Policy, Address Translation, and IPS Policies.
D. The specific Policy written in SmartDashboard to configure which log data is stored in the SmartReporter database.
Improve 156-215.77 practice test:
Q36. - (Topic 1)
When you hide a rule in a Rule Base, how can you then disable the rule?
A. Right-click on the hidden rule place-holder bar and uncheck Hide, then right-click and select Disable Rule(s); re-hide the rule.
B. Right-click on the hidden rule place-holder bar and select Disable Rule(s).
C. Use the search utility in SmartDashboard to view all hidden rules. Select the relevant rule and click Disable Rule(s).
D. Hidden rules are already effectively disabled from Security Gateway enforcement.
Q37. - (Topic 3)
How granular may an administrator filter an Access Role with identity awareness? Per:
A. Specific ICA Certificate
B. AD User
C. Radius Group
D. Windows Domain
Q38. - (Topic 1)
You are installing a Security Management Server. Your security plan calls for three administrators for this particular server. How many can you create during installation?
A. Depends on the license installed on the Security Management Server
C. As many as you want
D. Only one with full access and one with read-only access
Q39. - (Topic 3)
How many packets does the IKE exchange use for Phase 1 Main Mode?
Q40. - (Topic 3)
Your Security Gateways are running near performance capacity and will get upgraded hardware next week. Which of the following would be MOST effective for quickly dropping all connections from a specific attacker's IP at a peak time of day?
A. Change the Rule Base and install the Policy to all Security Gateways
B. SAM - Suspicious Activity Rules feature of SmartView Monitor
C. SAM - Block Intruder feature of SmartView Tracker
D. Intrusion Detection System (IDS) Policy install