Never a provider can supply you a guarantee that you just will certainly get from the Check Point 156-915.77 exam. And in no way a provider can offer a person so many sorts of certification exam products. It is going to enable you not merely pass the exam nevertheless also enhance your ability as well as skills as well as enrich your understanding. These are very useful through the practical work. Download your free sample questions as well as check the idea by on your own before getting and then come up with a your determination. If you get no concept about each of our Check Point 156-915.77 exam products as well as dont know how to put together for your exam, each of our experts gives you some tips as well as advice. Along with the Check Point Check Point exam study information will also give you a systematic outline. They are presented in the form of chapter. Every single chapter conclude the main points at the first page. You need to master the key words as well as make entire use of your study information.

2021 Nov 156-915.77 free exam

Q31. - (Topic 2) 

Your organization’s disaster recovery plan needs an update to the backup and restore section to reap the new distributed R77 installation benefits. Your plan must meet the following required and desired objectives: 

Required Objective: The Security Policy repository must be backed up no less frequently than every 24 hours. 

Desired Objective: The R77 components that enforce the Security Policies should be backed up at least once a week. 

Desired Objective: Back up R77 logs at least once a week. 

Your disaster recovery plan is as follows: 

-Use the cron utility to run the command upgrade_export each night on the Security Management Servers. 

-

Configure the organization's routine back up software to back up the files created by the command upgrade_export. 

-

Configure the GAiA back up utility to back up the Security Gateways every Saturday night. 

-Use the cron utility to run the command upgrade_export each Saturday night on the log servers. 

-

Configure an automatic, nightly logswitch. 

-

Configure the organization's routine back up software to back up the switched logs every night. 

Upon evaluation, your plan: 

A. Meets the required objective and only one desired objective. 

B. Meets the required objective but does not meet either desired objective. 

C. Does not meet the required objective. 

D. Meets the required objective and both desired objectives. 

Answer:


Q32. - (Topic 1) 

A snapshot delivers a complete GAiA backup. The resulting file can be stored on servers or as a local file in /var/CPsnapshot/snapshots. How do you restore a local snapshot named MySnapshot.tgz? 

A. Reboot the system and call the start menu. Select the option Snapshot Management, provide the Expert password and select [L] for a restore from a local file. Then, provide the correct file name. 

B. As expert user, type the command snapshot -r MySnapshot.tgz. 

C. As expert user, type the command revert --file MySnapshot.tgz. 

D. As expert user, type the command snapshot - R to restore from a local file. Then, provide the correct file name. 

Answer:


Q33. - (Topic 9) 

Where do you verify that UserDirectory is enabled? 

A. Verify that Security Gateway > General Properties > Authentication > Use UserDirectory (LDAP) for Security Gateways is checked 

B. Verify that Global Properties > Authentication > Use UserDirectory (LDAP) for Security Gateways is checked 

C. Verify that Security Gateway > General Properties > UserDirectory (LDAP) > Use UserDirectory (LDAP) for Security Gateways is checked 

D. Verify that Global Properties > UserDirectory (LDAP) > Use UserDirectory (LDAP) for Security Gateways is checked 

Answer:


Q34. - (Topic 4) 

Because of pre-existing design constraints, you set up manual NAT rules for your HTTP server. However, your FTP server and SMTP server are both using automatic NAT rules. All traffic from your FTP and SMTP servers are passing through the Security Gateway without a problem, but traffic from the Web server is dropped on rule 0 because of anti-spoofing settings. What is causing this? 

A. Manual NAT rules are not configured correctly. 

B. Allow bi-directional NAT is not checked in Global Properties. 

C. Routing is not configured correctly. 

D. Translate destination on client side is not checked in Global Properties under Manual NAT Rules. 

Answer:


Q35. - (Topic 11) 

When a packet is flowing through the security gateway, which one of the following is a valid 

inspection path? 

A. Acceleration Path 

B. Small Path 

C. Firewall Path 

D. Medium Path 

Answer:


Avant-garde 156-915.77 rapidshare:

Q36. - (Topic 5) 

Security Gateway R77 supports User Authentication for which of the following services? Select the response below that contains the MOST correct list of supported services. 

A. SMTP, FTP, TELNET 

B. SMTP, FTP, HTTP, TELNET 

C. FTP, HTTP, TELNET 

D. FTP, TELNET 

Answer:


Q37. - (Topic 4) 

You have configured Automatic Static NAT on an internal host-node object. You clear the box Translate destination on client site from Global Properties > NAT. Assuming all other NAT settings in Global Properties are selected, what else must be configured so that a host on the Internet can initiate an inbound connection to this host? 

A. No extra configuration is needed. 

B. A proxy ARP entry, to ensure packets destined for the public IP address will reach the Security Gateway's external interface. 

C. The NAT IP address must be added to the external Gateway interface anti-spoofing group. 

D. A static route, to ensure packets destined for the public NAT IP address will reach the Gateway's internal interface. 

Answer:


Q38. CORRECT TEXT - (Topic 12) 

Fill in the blank. The command that typically generates the firewall application, operating system, and hardware specific drivers is _________ . 

Answer: snapshot 

134. - (Topic 12) 

How could you compare the Fingerprint shown to the Fingerprint on the server? Run cpconfig and select: 

Exhibit: 

A. the Certificate Authority option and view the fingerprint. 

B. the GUI Clients option and view the fingerprint. 

C. the Certificate's Fingerprint option and view the fingerprint. 

D. the Server Fingerprint option and view the fingerprint. 

Answer:


Q39. - (Topic 15) 

You are trying to configure Directional VPN Rule Match in the Rule Base. But the Match column does not have the option to see the Directional Match. You see the following window. 

What must you enable to see the Directional Match? 

A. directional_match(true) in the objects_5_0.C file on Security Management Server 

B. VPN Directional Match on the Gateway object’s VPN tab 

C. VPN Directional Match on the VPN advanced window, in Global Properties 

D. Advanced Routing on each Security Gateway 

Answer:


Q40. CORRECT TEXT - (Topic 12) 

In a zero downtime firewall cluster environment, what command syntax do you run to avoid switching problems around the cluster for command cphaconf? 

Answer: set_ccp broadcast