With the aid of Actualtests 156-215.77 dumps, you can get a great result simply that make you pass Check Point check. Moreover, should you unsuccessful within the 156-215.77 exam for the first time of utilizing our products, just about all money you spend will be return. You only need to send the 156-215.77 record records since the pdf to us. After credit reporting your information, well return the cash as well as give it back in your consideration as quickly as possible.

2021 Aug 156-215.77 answers

Q261. - (Topic 3) 

What happens if the identity of a user is known? 

A. If the user credentials do not match an Access Role, the gateway moves onto the next rule. 

B. If the user credentials do not match an Access Role, the system displays the Captive Portal. 

C. If the user credentials do not match an Access Role, the traffic is automatically dropped. 

D. If the user credentials do not match an Access Role, the system displays a sandbox. 

Answer: A 


Q262. - (Topic 3) 

When using vpn tu, which option must you choose if you want to rebuild your VPN for a specific IP (gateway)? 

A. (6) Delete all IPsec SAs for a given User (Client) 

B. (7) Delete all IPsec+IKE SAs for a given peer (GW) 

C. (8) Delete all IPsec+IKE SAs for a given User (Client) 

D. (5) Delete all IPsec SAs for a given peer (GW) 

Answer: B 


Q263. - (Topic 3) 

Which port must be allowed to pass through enforcement points in order to allow packet logging to operate correctly? 

A. 256 

B. 514 

C. 258 

D. 257 

Answer: D 


Q264. - (Topic 2) 

A ___________ rule is used to prevent all traffic going to the R75 Security Gateway. 

A. Cleanup 

B. Stealth 

C. Reject 

D. IPS 

Answer: B 


Q265. - (Topic 1) 

Which of the following statements accurately describes the command snapshot? 

A. snapshot creates a Security Management Server full system-level backup on any OS. 

B. snapshot stores only the system-configuration settings on the Gateway. 

C. A Gateway snapshot includes configuration settings and Check Point product information from the remote Security Management Server. 

D. snapshot creates a full OS-level backup, including network-interface data, Check Point product information, and configuration settings during an upgrade of a SecurePlatform Security Gateway. 

Answer: D 


156-215.77 training

Leading 156-215.77 practice exam:

Q266. - (Topic 3) 

Which of the following actions take place in IKE Phase 2 with Perfect Forward Secrecy disabled? 

A. Peers authenticate using certificates or preshared secrets. 

B. The DH public keys are exchanged. 

C. Each Security Gateway generates a private Diffie-Hellman (DH) key from random pools. 

D. Symmetric IPsec keys are generated. 

Answer: D 


Q267. - (Topic 3) 

Which type of R77 Security Server does not provide User Authentication? 

A. FTP Security Server 

B. SMTP Security Server 

C. HTTPS Security Server 

D. HTTP Security Server 

Answer: B 


Q268. - (Topic 1) 

How do you recover communications between your Security Management Server and Security Gateway if you lock yourself out through a rule or policy mis-configuration? 

A. fw delete all.all@localhost 

B. fw unload policy 

C. fwm unloadlocal 

D. fw unloadlocal 

Answer: D 


Q269. - (Topic 3) 

Identify the correct step performed by SmartUpdate to upgrade a remote Security Gateway. After selecting Packages > Distribute and Install Selected Package and choosing the target Gateway, the: 

A. SmartUpdate wizard walks the Administrator through a distributed installation. 

B. selected package is copied from the Package Repository on the Security Management Server to the Security Gateway but the installation IS NOT performed. 

C. selected package is copied from the Package Repository on the Security Management Server to the Security Gateway and the installation IS performed. 

D. selected package is copied from the SmartUpdate PC CD-ROM directly to the Security Gateway and the installation IS performed. 

Answer: C 


Q270. - (Topic 3) 

Which do you configure to give remote access VPN users a local IP address? 

A. Office mode IP pool 

B. Encryption domain pool 

C. NAT pool 

D. Authentication pool 

Answer: A