Act now and download your Check Point 156-215.77 test today! Do not waste time for the worthless Check Point 156-215.77 tutorials. Download Rebirth Check Point Check Point Certified Security Administrator – GAiA exam with real questions and answers and begin to learn Check Point 156-215.77 with a classic professional.

2021 Oct 156-215.77 exam prep

Q91. - (Topic 3) 

Which authentication type requires specifying a contact agent in the Rule Base? 

A. Session Authentication 

B. User Authentication 

C. Client Authentication with Partially Automatic Sign On 

D. Client Authentication with Manual Sign On 


Q92. - (Topic 1) 

UDP packets are delivered if they are ___________. 

A. referenced in the SAM related dynamic tables 

B. a valid response to an allowed request on the inverse UDP ports and IP 

C. a stateful ACK to a valid SYN-SYN/ACK on the inverse UDP ports and IP 

D. bypassing the kernel by the forwarding layer of ClusterXL 


Q93. - (Topic 2) 

Which of the following statements BEST describes Check Point's Hide Network Address Translation method? 

A. Translates many source IP addresses into one source IP address 

B. Many-to-one NAT which implements PAT (Port Address Translation) for accomplishing both Source and Destination IP address translation 

C. Translates many destination IP addresses into one destination IP address 

D. One-to-one NAT which implements PAT (Port Address Translation) for accomplishing both Source and Destination IP address translation 


Q94. - (Topic 3) 

Which rule is responsible for the installation failure? 

A. Rule 3 

B. Rule 4 

C. Rule 5 

D. Rule 6 


Q95. - (Topic 1) 

Chris has lost SIC communication with his Security Gateway and he needs to re-establish SIC. 

What would be the correct order of steps needed to perform this task? 

A. 3, 1, 4, 2 B. 2, 3, 1, 4 

C. 5, 1, 2, 4 

D. 5, 1, 4, 2 


Updated 156-215.77 free practice questions:

Q96. - (Topic 3) 

Captive Portal is a __________ that allows the gateway to request login information from the user. 

A. LDAP server add-on 

B. Transparent network inspection tool 

C. Separately licensed feature 

D. Pre-configured and customizable web-based tool 


Q97. - (Topic 3) 

What is the purpose of an Identity Agent? 

A. Manual entry of user credentials for LDAP authentication 

B. Audit a user's access, and send that data to a log server 

C. Disable Single Sign On 

D. Provide user and machine identity to a gateway 


Q98. - (Topic 3) 

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to a set of designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned a static IP address 

He has received a new laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop with a static IP ( 

He wants to move around the organization and continue to have access to the HR Web Server. To make this scenario work, the IT administrator: 

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources, and installs the policy. 

2) Adds an access role object to the Firewall Rule Base that lets John Adams access the HR Web Server from any machine and from any location and installs policy. 

John plugged in his laptop to the network on a different network segment and was not able to connect to the HR Web server. What is the next BEST troubleshooting step? 

A. John should install the Identity Awareness Agent 

B. Investigate this as a network connectivity issue 

C. After enabling Identity Awareness, reboot the gateway 

D. He should lock and unlock the computer 


Q99. - (Topic 3) 

How can you recreate the Security Administrator account, which was created during initial Management Server installation on GAiA? 

A. Export the user database into an ASCII file with fwm dbexport. Open this file with an editor, and delete the Administrator Account portion of the file. You will be prompted to create a new account. 

B. Type cpm -a, and provide the existing Administrator’s account name. Reset the Security Administrator’s password. 

C. Launch cpconfig and delete the Administrator's account. Recreate the account with the same name. 

D. Launch SmartDashboard in the User Management screen, and delete the cpconfig administrator. 


Q100. - (Topic 3) 

What command syntax would you use to see accounts the gateway suspects are service accounts? 

A. pdp check_log 

B. adlog check_accounts 

C. pdp show service 

D. adlog a service_accounts