Exam Code: 156-915.77 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Check Point Certified Security Expert Update Blade
Certification Provider: Check Point
Free Today! Guaranteed Training- Pass 156-915.77 Exam.

2021 Nov 156-915.77 exam

Q81. CORRECT TEXT - (Topic 14) 

Fill in the blank. You can set Acceleration to ON or OFF using command syntax ___________ . 

Answer: fwaccel off/on 


Q82. - (Topic 12) 

MultiCorp is running Smartcenter R71 on an IPSO platform and wants to upgrade to a new Appliance with R77. Which migration tool is recommended? 

A. Download Migration Tool R77 for IPSO and Splat/Linux from Check Point website. 

B. Use already installed Migration Tool. 

C. Use Migration Tool from CD/ISO Checkpoint 156-915.77 : Practice Test 

D. Fetch Migration Tool R71 for IPSO and Migration Tool R77 for Splat/Linux from CheckPoint website 

Answer:


Q83. - (Topic 16) 

You have selected the event Port Scan from Internal Network in SmartEvent, to detect an event when 30 port scans have occurred within 60 seconds. You also want to detect two port scans from a host within 10 seconds of each other. How would you accomplish this? 

A. Define the two port-scan detections as an exception. 

B. You cannot set SmartEvent to detect two port scans from a host within 10 seconds of each other. 

C. Select the two port-scan detections as a sub-event. 

D. Select the two port-scan detections as a new event. 

Answer:


Q84. - (Topic 4) 

A Web server behind the Security Gateway is set to Automatic Static NAT. Client side NAT is not checked in the Global Properties. A client on the Internet initiates a session to the Web Server. Assuming there is a rule allowing this traffic, what other configuration must be done to allow the traffic to reach the Web server? 

A. Automatic ARP must be unchecked in the Global Properties. 

B. Nothing else must be configured. 

C. A static route must be added on the Security Gateway to the internal host. 

D. A static route for the NAT IP must be added to the Gateway’s upstream router. 

Answer:


Q85. - (Topic 1) 

You are running a R77 Security Gateway on GAiA. In case of a hardware failure, you have a server with the exact same hardware and firewall version installed. What back up method could be used to quickly put the secondary firewall into production? 

A. manual backup 

B. upgrade_export 

C. backup 

D. snapshot 

Answer:

Topic 2, Deployment Platforms Obj 2 


Updated 156-915.77 download:

Q86. - (Topic 8) 

Users with Identity Awareness Agent installed on their machines login with __________, so that when the user logs into the domain, that information is also used to meet Identity Awareness credential requests. 

A. Key-logging 

B. ICA Certificates 

C. SecureClient 

D. Single Sign-On 

Answer:


Q87. - (Topic 14) 

Match the ClusterXL modes with their configurations. Exhibit: 

A. A-2, B-3, C-4, D-1 

B. A-2, B-3, C-1, D-5 

C. A-3, B-5, C-1, D-4 

D. A-5, B-2, C-4, D-1 

Answer:


Q88. - (Topic 6) 

Assume you are a Security Administrator for ABCTech. You have allowed authenticated access to users from Mkting_net to Finance_net. But in the user’s properties, connections are only permitted within Mkting_net. What is the BEST way to resolve this conflict? 

A. Select Ignore Database in the Action Properties window. 

B. Permit access to Finance_net. 

C. Select Intersect with user database in the Action Properties window. 

D. Select Intersect with user database or Ignore Database in the Action Properties window. 

Answer:

Topic 7, Identity Awareness Obj 1 


Q89. - (Topic 16) 

When do modifications to the Event Policy take effect? 

A. As soon as the Policy Tab window is closed. 

B. When saved on the SmartEvent Server and installed to the Correlation Units. 

C. When saved on the Correlation Units, and pushed as a policy. 

D. When saved on the SmartEvent Client, and installed on the SmartEvent Server. 

Answer:


Q90. - (Topic 8) 

When using AD Query to authenticate users for Identity Awareness, identity data is received seamlessly from the Microsoft Active Directory (AD). What is NOT a recommended usage of this method? 

A. Leveraging identity in the application control blade 

B. Basic identity enforcement in the internal network 

C. Identity-based auditing and logging 

D. Identity-based enforcement for non-AD users (non-Windows and guest users) 

Answer: