156-215.75

211
Checkpoint 156-215.75 Check Point Certified Security Administrator R75 Version: 4.2

Transcript of 156-215.75

Page 1: 156-215.75

Checkpoint 156-215.75

Check Point Certified Security Administrator R75Version: 4.2

Page 2: 156-215.75

Topic 1, Volume A

QUESTION NO: 1 Of the three mechanisms Check Point uses for controlling traffic, which enables firewalls toincorporate layer 4 awareness in packet inspection? A. IPS B. Packet filtering C. Stateful Inspection D. Application Intelligence

Answer: C

Explanation:

QUESTION NO: 2 Which of the following statements about Bridge mode is TRUE? A. When managing a Security Gateway in Bridge mode, it is possible to use a bridge interface forNetwork Address Translation. B. Assuming a new installation, bridge mode requires changing the existing IP routing of thenetwork. C. All ClusterXL modes are supported. D. A bridge must be configured with a pair of interfaces.

Answer: D

Explanation:

QUESTION NO: 3 Which SmartConsole component can Administrators use to track remote administrative activities? A. WebUI B. Eventia Reporter C. SmartView Monitor D. SmartView Tracker

Answer: D

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 2

Page 3: 156-215.75

QUESTION NO: 4 Which of the following statements is TRUE about management plug-ins? A. The plug-in is a package installed on the Security Gateway. B. A management plug-in interacts with a Security Management Server to provide new featuresand support for new products. C. Using a plug-in offers full central management only if special licensing is applied to specificfeatures of the plug-in. D. Installing a management plug-in is just like an upgrade process. (It overwrites existingcomponents.)

Answer: B

Explanation:

QUESTION NO: 5 UDP packets are delivered if they are _________. A. A legal response to an allowed request on the inverse UDP ports and IP B. A Stateful ACK to a valid SYN-SYN-/ACK on the inverse UDP ports and IP C. Reference in the SAM related Dynamic tables D. Bypassing the Kernel by the “forwarding layer” of clusterXL

Answer: A

Explanation:

QUESTION NO: 6 The Check Point Security Gateway's virtual machine (kernel) exists between which two layers ofthe OSI model? A. Session and Network layers B. Application and Presentation layers C. Physical and Datalink layers D. Network and Datalink layers

Answer: D

Explanation:

QUESTION NO: 7

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 3

Page 4: 156-215.75

The customer has a small Check Point installation, which includes one Linux Enterprise 3.0 serverworking as the SmartConsole, and a second server running Windows 2003 as both SecurityManagement Server running Windows 2003 as both Security Management Server and SecurityGateway. This is an example of a(n). A. Stand-Alone Installation B. Distributed Installation C. Hybrid Installation D. Unsupported configuration

Answer: D

Explanation:

QUESTION NO: 8 The customer has a small Check Point installation which includes one Windows 2003 server asthe SmartConsole and a second server running SecurePlatform as both Security ManagementServer and the Security Gateway. This is an example of a(n): A. Unsupported configuration. B. Hybrid Installation. C. Distributed Installation. D. Stand-Alone Installation.

Answer: D

Explanation:

QUESTION NO: 9 The customer has a small Check Point installation which includes one Windows XP workstation asthe SmartConsole, one Solaris server working as Security Management Server, and a third serverrunning SecurePlatform as Security Gateway. This is an example of a(n): A. Stand-Alone Installation. B. Unsupported configuration C. Distributed Installation. D. Hybrid Installation.

Answer: C

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 4

Page 5: 156-215.75

QUESTION NO: 10 The customer has a small Check Point installation which includes one Windows 2003 server asSmartConsole and Security Management Server with a second server running SecurePlatform asSecurity Gateway. This is an example of a(n): A. Hybrid Installation. B. Unsupported configuration. C. Distributed Installation. D. Stand-Alone Installation.

Answer: C

Explanation:

QUESTION NO: 11 When doing a Stand-Alone Installation, you would install the Security Management Server withwhich other Check Point architecture component? A. SecureClient B. Security Gateway C. SmartConsole D. None, Security Management Server would be installed by itself

Answer: B

Explanation:

QUESTION NO: 12 You are a security architect and need to design a secure firewall, VPN and IPS solution. Wherewould be the best place to install IPS in the topology if the internal network is already protected? A. On the firewall itself to protect all connected networks centrally. B. On each network segment separately. C. On the LAN is enough, the DMZ does not need to be protected. D. In front of the firewall is enough.

Answer: A

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 5

Page 6: 156-215.75

QUESTION NO: 13 You are installing a Security Management Server. Your security plan calls for three administratorsfor this particular server. How many can you create during installation? A. Depends on the license installed on the Security Management Server B. Only one with full access and one with read-only access C. One D. As many as you want

Answer: C

Explanation:

QUESTION NO: 14 During which step in the installation process is it necessary to note the fingerprint for first-timeverification? A. When establishing SIC between the Security Management Server and the Gateway B. When configuring the Security Management Server using cpconfig C. When configuring the Security Gateway object in SmartDashboard D. When configuring the Gateway in the WebUl

Answer: B

Explanation:

QUESTION NO: 15 How can you most quickly reset Secure Internal Communications (SIC) between a SecurityManagement Server and Security Gateway? A. Run the command fwm sic-reset to initialize the Internal Certificate Authority (ICA) of theSecurity Management Server. Then retype the activation key on the Security Gateway fromSmartDashboard. B. Use SmartDashboard to retype the activation key on the Security Gateway. This willautomatically Sync SIC to both the Security Management Server and Gateway. C. From cpconfig on the Gateway, choose the Secure Internal Communication option and retypethe activation key. Next, retype the same key in the Gateway object in SmartDashboard andreinitialize Secure Internal Communications (SIC).

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 6

Page 7: 156-215.75

D. From the Security Management Server’s command line, Type fw putkey –p <shared key> < IPAddress of security Gateway>.

Answer: C

Explanation:

QUESTION NO: 16 How can you recreate the account of the Security Administrator, which was created during initialinstallation of the Management Server on SecurePlatform? A. Launch cpconfig and delete the Administrator's account. Recreate the account with the samename. B. Export the user database into an ASCII file with fwm dbexport. Open this file with an editor, anddelete the Administrator Account portion of the file. You will be prompted to create a new account. C. Type cpm -a, and provide the existing Administrator's account name. Reset the SecurityAdministrator's password. D. Launch SmartDashboard in the User Management screen, and delete the cpconfigadministrator.

Answer: A

Explanation:

QUESTION NO: 17 You are running the Security Gateway on SecurePlatform and configure SNX with default settings.The client fails to connect to the Security Gateway. What is wrong? A. The routing table on the client does not get modified. B. The client has Active-X blocked. C. The client is configured incorrectly. D. The SecurePlatform Web User Interface is listening on port 443.

Answer: D

Explanation:

QUESTION NO: 18 When Jon first installed the system, he forgot to configure DNS servers on his Security Gateway.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 7

Page 8: 156-215.75

How could Jon configure DNS servers now that his Security Gateway is in production? A. Login to the firewall using SSH and run cpconfig, then select Domain Name Servers. B. Login to the firewall using SSH and run fwm, then select System Configuration and DomainName Servers. C. Login to the SmartDashboard, edit the firewall Gateway object, select the tab Interfaces, thenDomain Name Servers. D. Login to the firewall using SSH and run sysconfig, then select Domain Name Servers.

Answer: D

Explanation:

QUESTION NO: 19 Once installed, the R75 kernel resides directly below which layer of the OSI model? Note:Application is the top and Physical is the bottom of the IP stack. A. Network B. Transport C. Data Link D. Session

Answer: A

Explanation:

QUESTION NO: 20 R75's INSPECT Engine inserts itself into the kernel between which two layers of the OSI model? A. Presentation and Application B. Physical and Data C. Session and Transport D. Data and Network

Answer: D

Explanation:

QUESTION NO: 21

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 8

Page 9: 156-215.75

What would be the benefit of upgrading from SmartDefense to IPS R75? A. The SmartDefense is replaced by the technology of IPS-1. B. The SmartDefense technology expands IPS-1 to IPS R75. C. Completely rewritten engine provides improved security performance and reporting. D. There is no difference - IPS R75 is the new name.

Answer: C

Explanation:

QUESTION NO: 22 You need to completely reboot the Operating System after making which of the following changeson the Security Gateway? i.e. the command cprestart is not sufficient. 1. Adding a hot-swappable NIC to the Operating System for the first time. 2. Uninstalling the R75 Power/UTM package. 3. Installing the R75 Power/UTM package. 4. Re-establishing SIC to the Security Management Server. 5. Doubling the maximum number of connections accepted by the Security Gateway. A. 3 only B. 1, 2, 3, 4, and 5 C. 2, 3 only D. 3, 4, and 5 only

Answer: C

Explanation:

QUESTION NO: 23 The Security Gateway is installed on SecurePlatform R75. The default port for the Web UserInterface is _______. A. TCP 18211

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 9

Page 10: 156-215.75

B. TCP 257 C. TCP 4433 D. TCP 443

Answer: D

Explanation:

QUESTION NO: 24 Your customer wishes to install the SmartConsole on a Windows system. What are the minimumhardware requirements for R75? Give the BEST answer. A. 500 MB Free disk space and 512 MB RAM B. 1 GB Free disk space and 512 MB RAM C. 1 GB Free disk space and 1 GB RAM D. 512 MB Free disk space and 1 GB RAM

Answer: A

Explanation:

QUESTION NO: 25 From the output below, where is this fingerprint generated?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 10

Page 11: 156-215.75

A. SmartUpdate B. Security Management Server C. SmartDashboard D. SmartConsole

Answer: B

Explanation:

QUESTION NO: 26 Tom has been tasked to install Check Point R75 in a distributed deployment. Before Tom installsthe systems this way, how many machines will he need if he does not include a SmartConsolemachine in his calculations? A. One machine B. One machine, but it needs to be installed using SecurePlatform for compatibility purposes C. Three machines D. Two machines

Answer: D

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 11

Page 12: 156-215.75

QUESTION NO: 27 Over the weekend, an Administrator without access to SmartDashboard installed a new R75Security Gateway using SecurePlatform. You want to confirm communication between the Gateway and the Management Server by installing the Security Policy. What might prevent youfrom installing the Policy? A. You first need to initialize SIC in SmartUpdate. B. You have not established Secure Internal Communications (SIC) between the SecurityGateway and Management Server. You must initialize SIC on the Security Management Server. C. You have not established Secure Internal Communications (SIC) between the SecurityGateway and Management Server. You must initialize SIC on both the Security Gateway and theManagement Server. D. You first need to run the fw unloadlocal command on the new Security Gateway.

Answer: B

Explanation:

QUESTION NO: 28 An Administrator without access to SmartDashboard installed a new IPSO-based R75 SecurityGateway over the weekend. He e-mailed you the SIC activation key. You want to confirmcommunication between the Security Gateway and the Management Server by installing thePolicy. What might prevent you from installing the Policy? A. You first need to create a new Gateway object in SmartDashboard, establish SIC via theCommunication button, and define the Gateway's topology. B. You have not established Secure Internal Communications (SIC) between the SecurityGateway and Management Server You must initialize SIC on the Security Management Server. C. An intermediate local Security Gateway does not allow a policy install through it to the remotenew Security Gateway appliance Resolve by running the tw unloadlocal command on the localSecurity Gateway. D. You first need to run the fw unloadlocal command on the R75 Security Gateway appliance inorder to remove the restrictive default policy.

Answer: A

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 12

Page 13: 156-215.75

QUESTION NO: 29 How can you reset the password of the Security Administrator that was created during initialinstallation of the Security Management Server on SecurePlatform? A. Type cpm -a, and provide the existing administrator's account name. Reset the SecurityAdministrator's password. B. Export the user database into an ASCII file with fwm dbexport. Open this file with an editor, anddelete the "Password" portion of the file. Then log in to the account without a password. You willbe prompted to assign a new password. C. Launch SmartDashboard in the User Management screen, and edit the cpconfig administrator. D. Type fwm -a, and provide the existing administrator's account name. Reset the SecurityAdministrator's password

Answer: D

Explanation:

QUESTION NO: 30 You have configured SNX on the Security Gateway. The client connects to the Security Gatewayand the user enters the authentication credentials. What must happen after authentication thatallows the client to connect to the Security Gateway's VPN domain? A. Active-X must be allowed on the client. B. An office mode address must be obtained by the client. C. SNX modifies the routing table to forward VPN traffic to the Security Gateway. D. The SNX client application must be installed on the client.

Answer: C

Explanation:

QUESTION NO: 31 The Administrator of the Tokyo Security Management Server cannot connect from his workstationin Osaka. Which of the following lists the BEST sequence of steps to troubleshoot this issue?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 13

Page 14: 156-215.75

A. Check for matching OS and product versions of the Security Management Server and theclient. Then, ping the Gateways to verify connectivity. If successful, scan the log files for anydenied management packets. B. Call Tokyo to check if they can ping the Security Management Server locally. If so, login tosgtokyo, verify management connectivity and Rule Base. If this looks okay, ask your provider ifthey have some firewall rules that filters out your management traffic. C. Verify basic network connectivity to the local Gateway, service provider, remote Gateway,remote network and target machine. Then, test for firewall rules that deny management access tothe target. If successful, verify that pcosaka is a valid client IP address. D. Check the allowed clients and users on the Security Management Server. If pcosaka and youruser account are valid, check for network problems. If there are no network related issues, this islikely to be a problem with the server itself. Check for any patches and upgrades. If stillunsuccessful, open a case with Technical Support.

Answer: C

Explanation:

QUESTION NO: 32 The Internal Certificate Authority (ICA) CANNOT be used for: A. Virtual Private Network (VPN) Certificates for gateways B. NAT rules C. Remote-access users D. SIC connections

Answer: B

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 14

Page 15: 156-215.75

QUESTION NO: 33 Match each of the following command to their correct function. Each command has one functiononly listed.

A. C1>F2; C2>F1; C3>F6; C4>F4 B. C1>F6; C2>F4; C3>F2; C4>F5 C. C1>F2; C4>F4; C3>F1; C4>F5 D. C1>F4; C2>F6, C3>F3; C4>F2

Answer: B

Explanation:

QUESTION NO: 34 Which command displays the installed Security Gateway version? A. fw stat B. cpstat -gw C. fw ver D. tw printver

Answer: C

Explanation:

QUESTION NO: 35 Which command line interface utility allows the administrator to verify the Security Policy nameand timestamp currently installed on a firewall module?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 15

Page 16: 156-215.75

A. fw stat B. fw ctl pstat C. fw ver D. cpstat fwd

Answer: A

Explanation:

QUESTION NO: 36 The command fw fetch causes the: A. Security Management Server to retrieve the IP addresses of the target Security Gateway. B. Security Gateway to retrieve the compiled policy and inspect code from the SecurityManagement Server and install it to the kernel. C. Security Gateway to retrieve the user database information from the tables on the SecurityManagement Server D. Security Management Server to retrieve the debug logs of the target Security Gateway

Answer: B

Explanation:

QUESTION NO: 37 Which command is used to uninstall the Security Policy directly from the Security Gateway? A. fwm unload.local B. cpstop C. fwm load <gtwynames-IP> NULL D. fw unloadlocal

Answer: D

Explanation:

QUESTION NO: 38 Suppose the Security Gateway hard drive fails and you are forced to rebuild it. You have asnapshot file stored to a TFTP server and backups of your Security Management Server. What is

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 16

Page 17: 156-215.75

the correct procedure for rebuilding the Gateway quickly? A. Run the revert command to restore the snapshot. Reinstall any necessary Check Pointproducts. Establish SIC and install the Policy. B. Run the revert command to restore the snapshot, establish SIC, and install the Policy. C. Reinstall the base operating system (i.e., SecurePlatform). Configure the Gateway interface sothat the Gateway can communicate with the TFTP server. Reinstall any necessary Check Pointproducts and previously applied hotfixes. Revert to the stored snapshot image, and install thePolicy. D. Reinstall the base operating system (i.e., SecurePlatform). Configure the Gateway interface sothat the Gateway can communicate with the TFTP server. Revert to the stored snapshot image,and install the Security Policy.

Answer: D

Explanation:

QUESTION NO: 39 Which of the following statements accurately describes the upgrade_export command? A. Upgrade_export is used when upgrading the Security Gateway, and allows certain files to beincluded before exporting. B. Used when upgrading the Security Gateway, upgrade_export includes modified files directory. C. Upgrade_export stores network-configuration data, objects, global properties, and the database revisions prior to upgrading the security Management Server. D. Used primarily when upgrading the Security Management Server, upgrade_export stores allobject databases and the conf directories for importing to a newer version of the SecurityGateway.

Answer: D

Explanation:

QUESTION NO: 40 What are you required to do before running upgrade__ export? A. Run cpconfig and set yourself up as a GUI client. B. Run a cpstop on the Security Management Server C. Run a cpstop on the Security Gateway. D. Close all GUI clients

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 17

Page 18: 156-215.75

Answer: D

Explanation:

QUESTION NO: 41 A snapshot delivers a complete backup of SecurePlatform. The resulting file can be stored onservers or as a local file in /var/cpsnapshot/snapshots. How do you restore a local snapshotnamed MySnapshot.tgz? A. As expert user, type the command snapshot – r MySnapshot.tgz. B. As expert user, type the command snapshot – R to restore from a local file. Then, provide thecorrect name. C. As expert user, type the command revert --file MySnapshot.tgz. D. Reboot the system and call the start menu. Select the option Snapshot Management, providethe Expert password and select [L] for a restore from a local file. Then, provide the correct filename.

Answer: C

Explanation:

QUESTION NO: 42 What is the primary benefit of using upgrade_export over either backup of snapshot? A. The backup and snapshot commands can take long time to run whereas upgrade_export willtake a much shorter amount of time. B. upgrade_export will back up routing tables, hosts files, and manual ARP configurations, wherebackup and snapshot will not. C. upgrade_export is operating system independent and can be used when backup or snapshot isnot available. D. upgrade_export has an option to backup the system and SmartView tracker logs while backand snapshot will not.

Answer: C

Explanation:

QUESTION NO: 43

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 18

Page 19: 156-215.75

Amy is unsure that her nightly backup configured from the Check Point backup tool is working. Ifshe logged into her Gateway using SSH, in which directory would she find her nightly backups? A. /opt/backups B. /var/CPbackup/backups C. /backups D. /var/backups

Answer: B

Explanation:

QUESTION NO: 44 What is the syntax for uninstalling a package using newpkg? A. –s (pathname of package) B. –u (pathname of package) C. newpkg CANNOT be used to uninstall D. –i (full pathname of package)

Answer: C

Explanation:

QUESTION NO: 45 Which utility allows you to configure the DHCP service on SecurePlatform from the command line? A. sysconfig B. dhcp_cfg C. cpconfig D. ifconfig

Answer: A

Explanation:

QUESTION NO: 46 Which utility is necessary for reestablishing SIC?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 19

Page 20: 156-215.75

A. fwm sic_reset B. cpconfig C. cplic D. sysconfig

Answer: B

Explanation:

QUESTION NO: 47 You are consulting with an Administrator who has locked himself out of SmartDashboard installedon a standalone SecurePlatform Security Gateway. Now, he cannot access the SecurityManagement Server via SmartDashboard or any other SmartConsole tools. How can you get himreconnected to SmartDashboard? A. Run fw uninstall localhost on the Security Gateway. B. Run fw unloadlocal on the Security Gateway. C. Run fw unlocklocal on the Security Management Server. D. Delete the $fwdir/database/manage.lock file and run cprestart.

Answer: B

Explanation:

QUESTION NO: 48 The third-shift Administrator was updating Security Management Server access settings in GlobalProperties. He managed to lock all administrators out of their accounts. How should you unlockthese accounts? A. Reinstall the Security Management Server and restore using upgrade_import. B. Delete the file admin.lock in the Security Management Server directory $FWDIR/tmp/. C. Type fwm lock_admin -ua from the Security Management Server command line. D. Login to SmartDashboard as the special cpconfig_admin user account; right-click on eachadministrator object and select unlock.

Answer: C

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 20

Page 21: 156-215.75

QUESTION NO: 49 The third shift administrator was updating security management server access setting in globalproperties. He managed to lock the entire Administrator out of their accounts. How should youunlock these accounts? A. Logging to smart dash board as special cpconfig_admin account. Right click on eachadministrator object and select Unlock. B. Type fwm lock_admin –ua from the command line of the security management server C. Reinstall the security management Server and restore using upgrade _imort D. Delete the file admin .lock in the sfwdir/ tmp/directory of the security managem,ent server.

Answer: B

Explanation:

QUESTION NO: 50 You are the Security Administrator in a large company called ABC. A Check Point Firewall isinstalled and in use on SecurePlatform. You are concerned that the system might not be retainingyour entries for the interfaces and routing configuration. You would like to verify your entries in thecorresponding file(s) on SecurePlatform. Where can you view them? Give the BEST answer. A. /etc/conf/route.C B. /etc/sysconfig/netconf.C C. /etc/sysconfig/network-scripts/ifcfg-ethx D. /etc/sysconfig/network

Answer: B

Explanation:

QUESTION NO: 51 When using SecurePlatform, it might be necessary to temporarily change the MAC address of theinterface eth 0 to 00:0C:29:12:34:56. After restarting the network the old MAC address should beactive. How do you configure this change? A. Open the WebUI, select Network > Connections > eth0. Place the new MAC address in thefield Physical Address, and press Apply to save the settings. B. As expert user, issue these commands: # IP link set eth0 down # IP link set eth0 addr 00:0C:29:12:34:56

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 21

Page 22: 156-215.75

# IP link set eth0 up C. As expert user, issue the command: # IP link set eth0 addr 00:0C:29:12:34:56 D. Edit the file /etc/sysconfig/netconf.c and put the new MAC address in the field (conf : (conns :( conn :hwaddr (“00:0C:29:12:34:56”)

Answer: B

Explanation:

QUESTION NO: 52 Several Security Policies can be used for different installation targets. The Firewall protectingHuman Resources' servers should have its own Policy Package. These rules must be installed onthis machine and not on the Internet Firewall. How can this be accomplished? A. A Rule Base can always be installed on any Check Point Firewall object. It is necessary toselect the appropriate target directly after selecting Policy / Install on Target. B. A Rule Base is always installed on all possible targets. The rules to be installed on a Firewallare defined by the selection in the row Install On of the Rule Base. C. In the menu of SmartDashboard, go to Policy / Policy Installation Targets and select the correctfirewall via Specific Targets. D. When selecting the correct Firewall in each line of the row Install On of the Rule Base, only thisFirewall is shown in the list of possible installation targets after selecting Policy / Install on Target.

Answer: C

Explanation:

QUESTION NO: 53 Where is the IPSO Boot Manager physically located on an IP Appliance? A. In the / nvram directory B. On an external jump drive C. On the platform’s BIOS D. On built-in compact Flash memory

Answer: D

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 22

Page 23: 156-215.75

QUESTION NO: 54 ALL of the following options are provided by the SecurePlatform sysconfig utility, EXCEPT: A. DHCP Server configuration B. GUI Clients C. Time & Date D. Export setup

Answer: B

Explanation:

QUESTION NO: 55 Which of the following options is available with the SecurePlatform cpconfig utility? A. GUI Clients B. Time & Date C. Export setup D. DHCP Server configuration

Answer: A

Explanation:

QUESTION NO: 56 Which command would provide the most comprehensive diagnostic information to Check PointTechnical Support? A. diag B. cpinfo -o date.cpinfo.txt C. netstat > date.netstat.txt D. cpstat > date.cpatat.txt

Answer: B

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 23

Page 24: 156-215.75

QUESTION NO: 57 Which of the following statements accurately describes the snapshot command? A. snapshot creates a full OS-level backup, including network-interface data, Check Point productinformation, and configuration settings during an upgrade of a SecurePlatform Security Gateway. B. A Gateway snapshot includes configuration settings and Check Point product information fromthe remote Security Management Server. C. snapshot creates a full system-level backup of the Security Management Server on any OS D. snapshot stores only the system-configuration settings on the Gateway.

Answer: A

Explanation:

QUESTION NO: 58 How do you recover communications between your Security Management Server and SecurityGateway if you lock yourself out via a rule or policy mis-configuration? A. fw delete all.all@localhost B. cpstop C. fw unloadlocal D. fw unload policy

Answer: C

Explanation:

QUESTION NO: 59 How can you check whether IP forwarding is enabled on an IP Security Appliance? A. clish –c show routing active enable B. echo 1 > /proc/sys/net/ipv4/ip_forwarding C. ipsofwd list D. cat/proc/sys/net/ipv4/ip_forward

Answer: C

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 24

Page 25: 156-215.75

QUESTION NO: 60 For normal packet transmission of an accepted communication to a host protected by a SecurityGateway, how many lines per packet are recorded on a packet analyzer like Wireshark using fwmonitor? A. 2 B. 4 C. 3 D. None

Answer: B

Explanation:

QUESTION NO: 61 How can I verify the policy version locally installed on the Firewall? A. fw ver B. fw ctl iflist C. fw ver -k D. fw stat

Answer: D

Explanation:

QUESTION NO: 62 If you run fw monitor without any parameters, what does the output display? A. In /var/adm/monitor. Out B. On the console C. In /tmp/log/monitor – out D. In / var/log/monitor. out

Answer: B

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 25

Page 26: 156-215.75

Explanation:

From user guide:

ExampleThe easiest way to usefw monitoris to invoke it without any parameter. This will output

every packet from every interface that passes (or at least reaches) the Check Point gateway.

Please note that the same packet is appearing several times (two times in the example below).

This is caused byfw monitorcapturing the packets at different capture points.

Output

cpmodule]# fw monitor

monitor: getting filter (from command line)

monitor: compiling

monitorfilter:

Compiled OK.

monitor: loading

monitor: monitoring (control-C to stop)

eth0:i[285]: 172.16.1.133 -> 172.16.1.2 (TCP) len=285 id=1075

TCP: 1050 -> 18190 ...PA. seq=bf8bc98e ack=941b05bc

eth0:I[285]: 172.16.1.133 -> 172.16.1.2 (TCP) len=285 id=1075

TCP: 1050 -> 18190 ...PA. seq=bf8bc98e ack=941b05bc

eth0:o[197]: 172.16.1.2 -> 172.16.1.133 (TCP) len=197 id=44599

TCP: 18190 -> 1050 ...PA. seq=941b05bc ack=bf8bca83

eth0:O[197]: 172.16.1.2 -> 172.16.1.133 (TCP) len=197 id=44599

TCP: 18190 -> 1050 ...PA. seq=941b05bc ack=bf8bca83

eth0:o[1500]: 172.16.1.2 -> 172.16.1.133 (TCP) len=1500 id=44600

TCP

^C

18190 -> 1050 ....A. seq=941b0659 ack=bf8bca83

monitor: caught sig 2

monitor: unloading

QUESTION NO: 63 What is the desired outcome when running the command cpinfo -z -o cpinfo.out? A. Send output to a file called cpinfo.out in compressed format. B. Send output to a file called cpinfo.out in usable format for the CP InfoView utility. C. Send output to a file called cpinfo.out without address resolution. D. Send output to a file called cpinfo.out and provide a screen print at the same time.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 26

Page 27: 156-215.75

Answer: A

Explanation:

QUESTION NO: 64 Another administrator accidentally installed a Security Policy on the wrong firewall. Having donethis, you are both locked out of the firewall that is called myfw1. What command would youexecute on your system console on myfw1 in order for you to push out a new Security Policy? A. fw dbloadlocal B. fw unloadlocal C. cpstop D. fw ctl filter

Answer: B

Explanation:

QUESTION NO: 65 Which of the following commands will completely remove the Security Policy from being enforcedon a Security Gateway? A. fw unload B. fw unloadlocal C. cpstop D. fw unload local

Answer: B

Explanation:

QUESTION NO: 66 Which of the following commands identifies whether or not a Security Policy is installed or theSecurity Gateway is operating with the initial policy? A. fw monitor B. fw ctl pstat C. cp stat

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 27

Page 28: 156-215.75

D. fw stat

Answer: D

Explanation:

QUESTION NO: 67 A Web server behind the Security Gateway is set to Automatic Static NAT. Client side NAT isenabled in the Global Properties. A client on the Internet initiates a session to the Web Server. Onthe initiating packet, NAT occurs on which inspection point? A. I B. O C. o D. i

Answer: A

Explanation:

QUESTION NO: 68 To monitor all traffic between a network and the Internet on a SecurePlatform Gateway, what isthe BEST utility to use? A. snoop B. cpinfo C. infoview D. tcpdump

Answer: D

Explanation:

QUESTION NO: 69 You are creating an output file with the following command: fw monitor -e "accept (src=10.20.30.40 or dst=10.20.30.40);" -o ~/output

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 28

Page 29: 156-215.75

Which tool do you use to analyze this file? A. You can analyze it with Wireshark or Ethereal. B. You can analyze the output file with any ASCI editor. C. The output file format is CSV, so you can use MS Excel to analyze it. D. You cannot analyze it with any tool as the syntax should be:fw monitor -e accept([12,b]=10.20.30.40 or [16,b]=10.20.30.40); -o ~/output.

Answer: A

Explanation:

QUESTION NO: 70 You issue the fw monitor command with no arguments. Which of the following inspection pointswill be displayed? A. Before the virtual machine, in the inbound direction B. After the virtual machine, in the outbound direction C. All inspection points D. Before the virtual machine, in the outbound direction

Answer: C

Explanation:

QUESTION NO: 71 What is the command used to view which policy is installed? A. fw ctl install B. fwm stat C. fw ctl pstat D. fw stat

Answer: D

Explanation:

QUESTION NO: 72

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 29

Page 30: 156-215.75

How can you view cpinfo on a SecurePlatform machine? A. tcpdump B. snoop – i C. infotab D. Text editor, such as vi

Answer: D

Explanation:

QUESTION NO: 73 How is wear on the flash storage device mitigated on appliance diskless platforms? A. A RAM drive reduces the swap file thrashing which causes fast wear on the device. B. The external PCMCIA-based flash extension has the swap file mapped to it, allowing easyreplacement. C. Issue FW-1 bases its package structure on the Security Management Server, dynamicallyloading when the firewall is booted. D. PRAM flash devices are used, eliminating the longevity.

Answer: A

Explanation:

QUESTION NO: 74 In previous versions, the full TCP three-way handshake was sent to the firewall kernel forinspection. How is this improved in the current version of IPSO Flows/SecureXL? A. Only the initial SYN packet is inspected. The rest are handled by IPSO. B. Packets are offloaded to a third-party hardware card for near-line inspection. C. Packets are virtualized to a RAM drive-based FW VM. D. Resources are proactively assigned using predictive algorithmic techniques.

Answer: A

Explanation:

QUESTION NO: 75

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 30

Page 31: 156-215.75

Select the correct statement about Secure Internal Communications (SIC) Certificates. SICCertificates are created: A. And used for securing internal network communications between SmartView Tracker and anOPSEC device. B. For the Security Management Server during the Security Management Server installation. C. For Security Gateways during the Security Gateway installation. D. To decrease network security by securing administrative communication among the SecurityManagement Servers and the Security Gateway.

Answer: B

Explanation:

QUESTION NO: 76 Select the correct statement about Secure Internal Communications (SIC) Certificates. SICCertificates: A. Increase network security by securing administrative communication with a two-factor challengeresponse authentication. B. Uniquely identify machines installed with Check Point software only. They have the samefunction as RSA Authentication Certificates. C. Are for Security Gateways created during the Security Management Server installation. D. Can be used for securing internal network communications between the Security Gateway andan OPSEC device.

Answer: D

Explanation:

QUESTION NO: 77 Which of the following statements regarding SecureXL and CoreXL is TRUE? A. SecureXL is an application for accelerating connections. B. CoreXL enables multi-core processing for program interfaces. C. SecureXL is only available in R75. D. CoreXL is included in SecureXL.

Answer: A

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 31

Page 32: 156-215.75

QUESTION NO: 78 Beginning with R75, Software Blades were introduced. One of the Software Blades is the IPSSoftware Blade as a replacement for SmartDefense. When buying or upgrading to a bundle, someblades are included, e.g. FW, VPN, IPS in SG103. Which statement is NOT true? A. The license price includes IPS Updates for the first year. B. The IPS Software Blade can be used for an unlimited time. C. There is no need to renew the service contract after one year. D. After one year, it is mandatory to renew the service contract for the IPS Software Bladebecause it has been bundled with the license when purchased.

Answer: D

Explanation:

QUESTION NO: 79 You need to plan the company's new security system. The company needs a very high level ofsecurity and also high performance and high throughput for their applications. You need to turn onmost of the integrated IPS checks while maintaining high throughput. What would be the BESTsolution for this scenario? A. You need to buy a strong multi-core machine and run R70 or later on SecurePlatform withCoreXL technology enabled. B. Bad luck, both together can not be achieved. C. The IPS does not run when CoreXL is enabled. D. The IPS system does not affect the firewall performance and CoreXL is not needed in thisscenario.

Answer: A

Explanation:

QUESTION NO: 80 John is the Security Administrator in his company. He needs to maintain the highest level ofsecurity on the firewalls he manages. He is using Check Point R75. Does he need the IPSSoftware Blade for achieving this goal?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 32

Page 33: 156-215.75

A. No, all IPS protections are active, but can’t be uploaded without the license like SmartDefense. B. Yes, otherwise no protections can be enabled. C. Yes, otherwise the firewall will pass all traffic unfiltered and unchecked. D. No, the Gateway will always be protected and the IPS checks can’t be managed without alicense.

Answer: B

Explanation:

QUESTION NO: 81 Which command allows you to view the contents of an R75 table? A. fw tab -x <tablename> B. fw tab -a <tablename> C. fw tab -s <tablename> D. fw tab -t <tablename>

Answer: D

Explanation:

QUESTION NO: 82 Your R75 enterprise Security Management Server is running abnormally on Windows 2003Server. You decide to try reinstalling the Security Management Server, but you want to try keepingthe critical Security Management Server configuration settings intact (i.e., all Security Policies,databases, SIC, licensing etc.) What is the BEST method to reinstall the Server and keep itscritical configuration? A. 1) Run the latest upgrade_export utility to export the configuration 2) Leave the exported - tgz file in %FWDIR\bin. 3) Install the primary security Management Server on top of the current installation 4) Run upgrade_import to Import the configuration. B. 1) Insert the R75 CD-ROM. and select the option to export the configuration into a . tgz file 2) Skip any upgrade verification warnings since you are not upgrading. 3) Transfer the. tgz file to another networked machine. 4) Download and run the cpclean utility and reboot. 5) Use the R75 CD_ROM to select the upgrade__import option to import the c C. 1) Download the latest upgrade_export utility and run it from a \ temp directory to export the Configuration. 2) Perform any requested upgrade verification suggested steps.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 33

Page 34: 156-215.75

3) Uninstall all R75 packages via Add/Remove Programs and reboot 4) Use smartUpdate to reinstall the Security Management server and reboot 5) Transfer the .tgz file back to the local \ temp. 6) Run upgrade_import to import the configuration. D. 1) Download the latest upgrade_export utility and run it from a \ temp directory to export the Configuration. 2) Transferee .tgz file to another network machine 3) Uninstall all R75 packages via Add/Remove Programs and reboot 4) Install again using the R75 CD ROM as a primary security management server 5) Reboot and than transfer the .tgz file back to the local\ tem p 6) Run upgcade_import to import the configuration.

Answer: C

Explanation:

QUESTION NO: 83 Your primary Security Management Server runs on SecurePlatform. What is the easiest way toback up your Security Gateway R75 configuration, including routing and network configurationfiles? A. Using the upgrade_export command. B. Copying the $FWDIR/conf and $FWDIR/lib directory to another location. C. Run the pre_upgrade_verifier and save the .tgz file to the /temp directory. D. Using the native SecurePlatform backup utility from command line or in the Web based userinterface.

Answer: D

Explanation:

QUESTION NO: 84 You need to back up the routing, interface, and DNS configuration information from your R75SecurePlatform Security Gateway. Which backup-and-restore solution do you use? A. SecurePlatform backup utilities B. upgrade_export and upgrade_import commands C. Database Revision Control D. Manual copies of the $FWDIR/conf directory

Answer: A

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 34

Page 35: 156-215.75

Explanation:

QUESTION NO: 85 Your R75 primary Security Management Server is installed on SecurePlatform. You plan toschedule the Security Management Server to run fw logswitch automatically every 48 hours. How do you create this schedule? A. Create a time object, and add 48 hours as the interval. Open the primary Security ManagementServer object's Logs and Masters window, enable Schedule log switch, and select the Timeobject. B. Create a time object, and add 48 hours as the interval. Open the Security Gateway object'sLogs and Masters window, enable Schedule log switch, and select the Time object. C. Create a time object, and add 48 hours as the interval. Select that time object's GlobalProperties > Logs and Masters window, to schedule a logswitch. D. On a SecurePlatform Security Management Server, this can only be accomplished byconfiguring the fw logswitch command via the cron utility.

Answer: A

Explanation:

QUESTION NO: 86 Which of the following methods will provide the most complete backup of an R75 configuration? A. Policy Package Management B. Copying the $PWDIR\conf and $CPDIR\conf directories to another server C. upgrade_export command D. Database Revision Control

Answer: C

Explanation:

QUESTION NO: 87 Which of the following commands can provide the most complete restoration of an R75configuration?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 35

Page 36: 156-215.75

A. Cpconfig B. Upgrade_import C. fwm dbimport -p D. cpinfo -recover

Answer: B

Explanation:

QUESTION NO: 88 When restoring R75 using the command upgrade > Port. Which of the following items is NOTrestored? A. Licenses B. Global properties C. SIC Certificates D. Route tables

Answer: D

Explanation:

QUESTION NO: 89 Your organization’s disaster recovery plan needs an update to the backup and restore section toreap the benefits of the new distributed R75 installation. Your plan must meet the followingrequired and desired objectives: Required Objective: The Security Policy repository must be backed up no less frequently thanevery 24 hours. Desired Objective: The R75 components that enforce the Security Polices should be blocked up atleast once a week. Desired Objective: Back up R75 logs at least once a week Your disaster recovery plan is as follows: Use the cron utility to run the upgrade_ export command each night on the Security ManagementServers. Configure the organization's routine backup software to back up the files created by the upgrade_

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 36

Page 37: 156-215.75

export command. Configure the SecurePlatform backup utility to back up the Security Gateways every Saturdaynight Use the cron utility to run the upgrade export: command each Saturday niqht on the log servers Configure an automatic, nightly loqswitch Configure the organization's routine backup software to back up the switched logs every night Upon evaluation, your plan: A. Meets the required objective but does not meet either desired objective. B. Does not meet the required objective. C. Meets the required objective and only one desired objective. D. Meets the required objective and both desired objectives.

Answer: D

Explanation:

QUESTION NO: 90 Your company is running Security Management Server R75 on SecurePlatform, which has beenmigrated through each version starting from Check Point 4.1. How do you add a new administratoraccount? A. Using SmartDashboard, under Users, select Add New Administrator B. Using the Web console on SecurePlatform under Product configuration, select Administrators C. Using SmartDashboard or cpconf ig D. Using cpconftg on the Security Management Server, choose Administrators

Answer: A

Explanation:

QUESTION NO: 91 Which of the following tools is used to generate a Security Gateway R75 configuration report? A. ethereal B. cpinfo

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 37

Page 38: 156-215.75

C. licview D. infoview

Answer: B

Explanation:

QUESTION NO: 92 Which of the following is a CLI command for Security Gateway R75? A. fwm policy_print <policyname> B. fw shutdown C. fw merge D. fw tab -u

Answer: D

Explanation:

QUESTION NO: 93 What information is provided from the options in this screenshot?

(i)Whether a SIC certificate was generated for the Gateway (ii)Whether the operating system is SecurePlatform or SecurePlatform Pro

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 38

Page 39: 156-215.75

(iii)Whether this is a standalone or distributed installation A. (i), (ii) and (iii) B. (i) and (iii) C. (i) and (ii) D. (ii) and (iii)

Answer: D

Explanation:

QUESTION NO: 94 Peter is your new Security Administrator. On his first working day, he is very nervous and sets thewrong password three times. His account is locked. What can be done to unlock Peter's account?Give the BEST answer. A. You can unlock Peter's account by using the command fwm unlock_admin -u Peter on theSecurity Gateway. B. It is not possible to unlock Peter's account. You have to install the firewall once again or abstainfrom Peter's help. C. You can unlock Peter's account by using the command fwm lock_admin -u Peter on theSecurity Management Server. D. You can unlock Peter's account by using the command fwm unlock_admin -u Peter on theSecurity Management Server.

Answer: C

Explanation:

QUESTION NO: 95 Which CLI command verifies the number of cores on your firewall machine? A. fw ctl pstat B. fw ctl core stat C. fw ctl multik stat D. cpstat fw -f core

Answer: C

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 39

Page 40: 156-215.75

QUESTION NO: 96 John currently administers a network using NGX R65.4 on the Security Management Server andNGX R65.2.100 (the VOIP release with the VOIP plug-ins enabled). He wants to upgrade to R75to get the benefits of Check Point's Software Blades. What would be the best way of doing this? A. This can not be done yet as R75 can not manage NGX R65 Gateways due to SmartDefenseand IPS mismatch problems. B. Run upgrade_export on R65 management, then install R75 on this machine and runupgrade_import and re-license the systems to use software blades. C. Just insert the R75 CD-ROM and run the in-place upgrade. D. This is not supported today as currently the VOIP Software Blade and VOIP plug-in is notavailable in R75.

Answer: D

Explanation:

QUESTION NO: 97 John currently administers a network using single CPU single core servers for the SecurityGateways and is running R75. His company is now going to implement VOIP and needs moreperformance on the Gateways. He is now adding more memory to the systems and also upgradesthe CPU to a modern quad core CPU in the server. He wants to use CoreXL technology to benefitfrom the new performance benchmarks of this technology. How can he achieve this? A. Nothing needs to be done. SecurePlatform recognized the change during reboot and adjustedall the settings automatically. B. He just needs to go to cpconfig on the CLI and enable CoreXL. Only a restart of the firewall isrequired to benefit from CoreXL technology. C. He needs to reinstall the Gateways because during the initial installation, it was a single-coreCPU but the wrong Linux kernel was installed. There is no other upgrade path available. D. He just needs to go to cpconfig on the CLI and enable CoreXL. After the required reboot he willbenefit from the new technology.

Answer: D

Explanation:

QUESTION NO: 98

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 40

Page 41: 156-215.75

You are running a R75 Security Gateway on SecurePlatform. In case of a hardware failure, youhave a server with the exact same hardware and firewall version installed. What backup methodcould be used to quickly put the secondary firewall into production? A. upgrade_export B. manual backup C. snapshot D. backup

Answer: C

Explanation:

QUESTION NO: 99 Before upgrading SecurePlatform, you should create a backup. To save time, many administratorsuse the command backup. This creates a backup of the Check Point configuration as well as thesystem configuration. An administrator has installed the latest HFA on the system for fixing traffic problem after creatinga backup file. There is a mistake in the very complex static routing configuration. The Check Pointconfiguration has not been changed. Can the administrator use a restore to fix the errors in staticrouting? A. The restore can be done easily by the command restore and selecting the appropriate backupfile. B. A backup cannot be restored, because the binary files are missing. C. The restore is not possible because the backup file does not have the same build number(version). D. The restore is done by selecting Snapshot Management from the boot menu of SecurePlatform.

Answer: A

Explanation:

QUESTION NO: 100 Which operating systems are supported by a Check Point Security Gateway on an open server? A. Check Point SecurePlatform and Microsoft Windows B. Sun Solaris, Red Hat Enterprise Linux, Check Point SecurePlatform, IPSO, Microsoft Windows C. Check Point SecurePlatform, IPSO, Sun Solaris, Microsoft Windows D. Microsoft Windows, Red Hat Enterprise Linux, Sun Solaris, IPSO

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 41

Page 42: 156-215.75

Answer: A

Explanation:

Topic 2, Volume B

QUESTION NO: 101 You intend to upgrade a Check Point Gateway from R65 to R75. Prior to upgrading, you want tobackup the Gateway should there be any problems with the upgrade. Which of the following allowsfor the Gateway configuration to be completely backed up into a manageable size in the leastamount of time? A. Backup B. Snapshot C. Upgrade_export D. Database_revision

Answer: A

Explanation:

QUESTION NO: 102 Your network is experiencing connectivity problems and you want to verify if routing problems arepresent. You need to disable the firewall process but still allow routing to pass through theGateway running on an IP Appliance running IPSO. What command do you need to run afterstopping the firewall service? A. fw fwd routing B. ipsofwd on admin C. fw load routed D. ipsofwd slowpath

Answer: B

Explanation:

QUESTION NO: 103 Where can you find the Check Point's SNMP MIB file?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 42

Page 43: 156-215.75

A. $FWDIR/conf/snmp.mib B. It is obtained only by request from the TAC. C. $CPDIR/lib/snmp/chkpt.mib D. There is no specific MIB file for Check Point products.

Answer: C

Explanation:

QUESTION NO: 104 You want to generate a cpinfo file via CLI on a system running SecurePlatform. This will takeabout 40 minutes since the log files are also needed. What action do you need to take regardingtimeout? A. Log in as the default user expert and start cpinfo. B. No action is needed because cpshell has a timeout of one hour by default. C. Log in as Administrator, set the timeout to one hour with the command idle 60 and start cpinfo. D. Log in as admin, switch to expert mode, set the timeout to one hour with the command, idle 60,then start cpinto.

Answer: C

Explanation:

QUESTION NO: 105 Many companies have defined more than one administrator. To increase security, only oneadministrator should be able to install a Rule Base on a specific Firewall. How do you configurethis? A. Define a permission profile in SmartDashboard with read/write privileges, but restrict it to allother firewalls by placing them in the Policy Targets field. Then, an administrator with thispermission profile cannot install a policy on any Firewall not listed here. B. In the General Properties of the object representing the specific Firewall, go to the SoftwareBlades product list and select Firewall. Right-click in the menu, select Administrator to Install todefine only this administrator. C. Put the one administrator in an Administrator group and configure this group in the specificFirewall object in Advanced / Permission to Install. D. Right-click on the object representing the specific administrator, and select that Firewall inPolicy Targets.

Answer: C

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 43

Page 44: 156-215.75

Explanation:

QUESTION NO: 106 What is the officially accepted diagnostic tool for IP appliance support? A. Ipsinfo B. Uag-diag C. CST D. cpinfo

Answer: C

Explanation:

QUESTION NO: 107 You are the Security Administrator for MegaCorp. A Check Point firewall is installed and in use ona SecurePlatform. You have trouble configuring the speed and duplex settings of your Ethernetinterfaces. Which of the following commands can be used to configure the speed and duplexsettings of an Ethernet interface and will survive a reboot? Give the BEST answer. A. cthtool B. ifconfig – a C. eth_set D. mii_tool

Answer: C

Explanation:

QUESTION NO: 108 Which command enables IP forwarding on IPSO? A. echo 1 > /proc/sys/net/ipv4/ip_forward B. clish -c set routing active enable C. echo 0 > /proc/sys/net/ipv4/ip_forward D. ipsofwd on admin

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 44

Page 45: 156-215.75

Answer: D

Explanation:

QUESTION NO: 109 How many inspection capture points are shown in fw monitor? A. 2 B. 1 C. Depends on the number of interfaces on the Gateway D. 4

Answer: D

Explanation:

QUESTION NO: 110 Looking at an fw monitor capture in Wireshark, the initiating packet in Hide NAT translateson________. A. I B. O C. o D. i

Answer: B

Explanation:

QUESTION NO: 111 You want to create an ASCII formatted output file of the fw monitor command. What is the correctsyntax to accomplish this task? A. fw monitor -e "accept;" > /tmp/monitor.txt B. fw monitor -e "accept;" -f > /tmp/monitor.txt C. fw monitor -m iO -e "accept;" -o /tmp/monitor.txt D. fw monitor -e "accept;" -w /tmp/monitor.txt

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 45

Page 46: 156-215.75

Answer: A

Explanation:

QUESTION NO: 112 When you run the fw monitor -e "accept;" command, what type of traffic is captured? A. Only inbound traffic, before and after the inbound inspection. B. All traffic coming in all directions, before and after inbound and outbound inspection. C. All traffic accepted by the Rule Base. D. Only outbound traffic, before and after the outbound inspection.

Answer: B

Explanation:

QUESTION NO: 113 The button Get Address, found on the Host Node Object > General Properties page, will retrievewhat? A. The domain name B. The fully qualified domain name C. The Mac address D. The IP address

Answer: D

Explanation:

QUESTION NO: 114 You have just been hired as the Security Administrator for the Insure-It-All insurance company.Your manager gives you the following requirements for controlling DNS traffic: Required Result #1: Accept domain-name-over-TCP traffic (zone-transfer traffic) Required Result #2: Log domain-name-over-TCP traffic (zone-transfer traffic) Desired Result #1: Accept domain-name-over-UDP traffic (queries traffic)

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 46

Page 47: 156-215.75

---

Desired Result #2: Do not log domain-name-over-UDP traffic (queries traffic) Desired Result #3: Do not clutter the Rule Base try creating explicit rules for traffic that can becontrolled using Global Properties To begin, you make the following configuration changes, and install the Security Policy

Select the box Accept Domain Name over TCP (Zone Transfer) in Global Properties Select the box Accept Domain Name over UDP (Queries) in Global Properties Select the box Log Implied Rules in Global Properties

Do your initial actions meet the required and desired results? A. The actions achieve the required results, and two of the desired results. B. The actions achieve all required results, but none of the desired results. C. The actions do not achieve the required results. D. The actions meet all required and desired results.

Answer: A

Explanation:

QUESTION NO: 115 When you change an implicit rule’s order from last to first in global properties, how do you makethe change take effect? A. Select save from the file menu B. Reinstall the security policy C. Select install database from the policy menu D. Run fw fetch from the security gateway

Answer: B

Explanation:

QUESTION NO: 116 You create implicit and explicit rules for the following network. The group object internal-networksincludes networks 10.10.10.0 and 10.10.20.0. Assume Accept ICMP requests is enabled asBefore last in Global Properties.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 47

Page 48: 156-215.75

Based on these rules, what happens if you Ping from host 10.10.10.5 to a host on the Internet byIP address? ICMP will be: A. dropped by rule 0. B. dropped by rule 2, the Cleanup Rule. C. accepted by rule 1. D. dropped by the last Implicit rule.

Answer: C

Explanation:

QUESTION NO: 117 How does the Get Address button, found on the Host Node Object > General Properties pageretrieve the address? A. Route Table B. SNMP Get C. Address resolution (ARP. RARP) D. Name resolution (hosts file, DNS, cache)

Answer: D

Explanation:

QUESTION NO: 118 Anti-Spoofing is typically set up on which object type? A. Host B. Domain C. Network D. Security Gateway

Answer: D

Explanation:

QUESTION NO: 119

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 48

Page 49: 156-215.75

Spoofing is a method of: A. Hiding your firewall from unauthorized users. B. Disguising an illegal IP address behind an authorized IP address through port addressTranslation. C. Making packets appear as if they come from an authorized IP address D. Detecting people using false or wrong authentication logins.

Answer: C

Explanation:

QUESTION NO: 120 Certificates for Security Gateways are created during a simple initialization from______. A. SmartUpdate B. sysconfig C. The ICA management tool. D. SmartDashboard

Answer: D

Explanation:

QUESTION NO: 121 Which of the below is the MOST correct process to reset SIC from SmartDashboard? A. Run cpconfig, and click Reset. B. Click the Communication button for the firewall object, then click Reset. Run cpconfig and typea new activation key. C. Click Communication > Reset on the Gateway object, and type a new activation key. D. Run cpconfig, and select Secure Internal Communication > Change One Time Password.

Answer: B

Explanation:

QUESTION NO: 122

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 49

Page 50: 156-215.75

You installed Security Management Server on a computer using SecurePlatform in the MegaCorphome office. You use IP address 10.1.1.1. You also installed the Security Gateway on a secondSecurePlatform computer, which you plan to ship to another Administrator at a MegaCorp huboffice. What is the correct order for pushing SIC certificates to the Gateway before shipping it? 1) Run cpconfig on the gateway, set secure internal communication, enter the activation key andreconfirm. 2) Initialize internal certificate authority (ICA) on the security Management server. 3) Confirm the gateway object with the host name and IP address for the remote site. 4) Click the communication button in the gateway object’s general screen, enter the activation key,and click initialize and ok. 5) Install the security policy. A. 2, 3, 4, 5, 1 B. 1, 3, 2, 4, 5 C. 2, 3, 4, 1, 5 D. 2, 1, 3, 4, 5

Answer: B

Explanation:

QUESTION NO: 123 Although SIC was already established and running, Joe reset SIC between the SecurityManagement Server and a remote Gateway. He set a new activation key on the Gateway's sidewith the cpconfig command and put in the same activation key in the Gateway's object on theSecurity Management Server Unfortunately SIC cannot be established. What is a possible reasonfor the problem? A. The installed policy blocks the communication. B. Joe forgot to reboot the Gateway. C. Joe forgot to exit from cpconfig. D. The old Gateway object should have been deleted and recreated.

Answer: C

Explanation:

QUESTION NO: 124

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 50

Page 51: 156-215.75

You want to reset SIC between smberlin and sgosaka. In SmartDashboard, you choose sgosaka, Communication, Reset. On sgosaka, you start cpconfig,choose Secure Internal Communication and enter the new SIC Activation Key. The screen readsThe SIC was successfully initialized and jumps back to the cpconfig menu. When trying toestablish a connection, instead of a working connection, you receive this error message: What is the reason for this behavior? A. You must first initialize the Gateway object in SmartDashboard (i.e., right-click on the object,choose Basic Setup / Initialize). B. The Gateway was not rebooted, which is necessary to change the SIC key. C. The Check Point services on the Gateway were not restarted because you are still in thecpconfig utility. D. The activation key contains letters that are on different keys on localized keyboards. Therefore,the activation can not be typed in a matching fashion.

Answer: C

Explanation:

QUESTION NO: 125 Which rule should be the Cleanup Rule in the Rule Base? A. Last. It serves a logging function before the implicit drop. B. Last, it explicitly drops otherwise accepted traffic C. Before last followed by the Stealth Rule. D. First, it explicitly accepts otherwise dropped traffic.

Answer: A

Explanation:

QUESTION NO: 126 What are the two basic rules which should be used by all Security Administrators? A. Administrator Access and Stealth rules B. Cleanup and Administrator Access rules C. Network Traffic and Stealth rules

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 51

Page 52: 156-215.75

D. Cleanup and Stealth rules

Answer: D

Explanation:

QUESTION NO: 127 Which item below in a Security Policy would be enforced first? A. Administrator-defined Rule Base B. Network Address Translation C. IP spoofing/IP options D. Security Policy "First" rule

Answer: C

Explanation:

QUESTION NO: 128 When you hide a rule in a Rule Base, how can you then disable the rule? A. Use the search utility in SmartDashboard to view all hidden rules Select the relevant rule andclick Disable Rule(s). B. Right-click on the hidden rule place-holder bar and select Disable Rule(s). C. Right-click on the hidden rule place-holder bar and uncheck Hide, then right-click and selectDisable Rule(s); re-hide the rule. D. Hidden rules are already effectively disabled from Security Gateway enforcement.

Answer: C

Explanation:

QUESTION NO: 129 A Stealth rule is used to: A. Use the Security Gateway to hide the border router from internal attacks. B. Cloak the type of Web server in use behind the Security Gateway. C. Prevent communication to the Security Gateway itself.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 52

Page 53: 156-215.75

D. Prevent tracking of hosts behind the Security Gateway.

Answer: C

Explanation:

QUESTION NO: 130 A Clean-up rule is used to: A. Drop without logging connections that would otherwise be dropped and logged fry default B. Log connections that would otherwise be accepted without logging by default. C. Log connections that would otherwise be dropped without logging by default. D. Drop without logging connections that would otherwise be accepted and logged by default

Answer: C

Explanation:

QUESTION NO: 131 A ____________ rule is designed to log and drop all other communication that does not matchanother rule. A. Stealth B. Cleanup C. Reject D. Anti-Spoofing

Answer: B

Explanation:

QUESTION NO: 132 Which statement is TRUE about implicit rules? A. They are derived from Global Properties and explicit object properties. B. The Gateway enforces implicit rules that enable outgoing packets only. C. You create them in SmartDashboard. D. Changes to the Security Gateway's default settings do not affect implicit rules.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 53

Page 54: 156-215.75

Answer: A

Explanation:

QUESTION NO: 133 You have included the Cleanup Rule in your Rule Base. Where in the Rule Base should theAccept ICMP Requests implied rule have no effect? A. First B. Before Last C. Last D. After Stealth Rule

Answer: C

Explanation:

QUESTION NO: 134 All of the following are Security Gateway control connections defined by default implied rules,EXCEPT: A. Acceptance of IKE and RDP traffic for communication and encryption purposes. B. Exclusion of specific services for reporting purposes. C. Communication with server types, such as RADIUS, CVP, UFP, TACACS, and LDAP. D. Specific traffic that facilitates functionality, such as logging, management, and key exchange.

Answer: B

Explanation:

QUESTION NO: 135 In a distributed management environment, the administrator has removed all default check boxesfrom the Policy / Global Properties / Firewall tab. In order for the Security Gateway to send logs tothe Security Management Server, an explicit rule must be created to allow the Security Gateway tocommunicate to the Security Management Server on port ______. A. 259 B. 257

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 54

Page 55: 156-215.75

C. 900 D. 256

Answer: B

Explanation:

QUESTION NO: 136 Examine the following Security Policy. What, if any, changes could be made to accommodate Rule4?

A. Nothing at all B. Modify the Source or Destination columns in Rule 4 C. Remove the service HTTPS from the Service column in Rule A D. Modify the VPN column in Rule 2 to limit access to specific traffic

Answer: D

Explanation:

QUESTION NO: 137 A Security Policy has several database versions. What configuration remains the same no matterwhich version is used? A. Rule Bases_5_0.fws

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 55

Page 56: 156-215.75

B. Internal Certificate Authority (ICA) certificate C. Fwauth.NDB D. Objects_5_0.C

Answer: B

Explanation:

QUESTION NO: 138 You are working with multiple Security Gateways that enforce an extensive number of rules. Tosimplify Security administration, which one of the following would you choose to do? A. Create a separate Security Policy package for each remote Security Gateway B. Run separate SmartConsole instances to login and configure each Security Gateway directly C. Eliminate all possible contradictory rules such as the Stealth or Cleanup rules D. Create network objects that restrict all applicable rules to only certain networks

Answer: A

Explanation:

QUESTION NO: 139 You are working with multiple Security Gateways that enforce a common set of rules. To minimizethe number of policy packages, which one of the following would you choose to do? A. Install a separate local Security Management Server and SmartConsole for each remoteSecurity Gateway. B. Create a separate Security Policy package for each remote Security Gateway and specifyInstall On / Gateways. C. Create a single Security Policy package with Install On / Target defined whenever a unique ruleis required for a specific Gateway. D. Run separate SmartDashbord instance to login and configure each Security Gateway directly.

Answer: C

Explanation:

QUESTION NO: 140 Which rules are not applied on a first-match basis?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 56

Page 57: 156-215.75

A. Cleanup B. User Authentication C. Session Authentication D. Client Authentication

Answer: B

Explanation:

QUESTION NO: 141 Installing a policy usually has no impact on currently existing connections. Which statement isTRUE? A. Users being authenticated by Client Authentication have to re-authenticate. B. Site-to-Site VPNs need to re-authenticate, so Phase 1 is passed again after installing theSecurity Policy. C. All FTP downloads are reset; users have to start their downloads again. D. All connections are reset, so a policy install is recommended during announced downtime only.

Answer: A

Explanation:

QUESTION NO: 142 Several Security Policies can be used for different installation targets. The firewall protectingHuman Resources' servers should have a unique Policy Package. These rules may only beinstalled on this machine and not accidentally on the Internet firewall. How can this be configured? A. A Rule Base is always installed on all possible targets. The rules to be installed on a firewall aredefined by the selection in the row Install On of the Rule Base. B. When selecting the correct firewall in each line of the row Install On of the Rule Base, only thisfirewall is shown in the list of possible installation targets after selecting Policy > Install. C. In the SmartDashboard main menu go to Policy / Policy Installation / Targets and select thecorrect firewall to be put into the list via Specific Targets. D. A Rule Base can always be installed on any Check Point firewall object It is necessary to selectthe appropriate target directly after selecting Policy > Install.

Answer: C

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 57

Page 58: 156-215.75

QUESTION NO: 143 Which of these security policy changes optimize Security Gateway performance? A. Use Automatic NAT rules instead of Manual NAT rules whenever possible B. Putting the least-used rule at the top of the Rule Base C. Using groups within groups in the manual NAT Rule Base D. Using domain objects in rules when possible

Answer: A

Explanation:

QUESTION NO: 144 Your perimeter Security Gateway's external IP is 200.200.200.3. Your network diagram shows:

RequireD. Allow only network 192.168.10.0 and 192.168.20.0 to go out to the Internet, using 200.200.200.5. The local network 192.168.1.0/24 needs to use 200.200.200.3 to go out to the Internet. Assuming you enable all the settings in the NAT page of Global Properties, how could you achievethese requirements? A. Create a network object 192.168.0.0/16. Enable Hide NAT on the NAT page. Enter200.200.200.5 as the hiding IP address. Add and ARP entry for 200.200.200.5 for the MAC

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 58

Page 59: 156-215.75

address of 200.200.200.3. B. Create network objects for 192.168.10.0/24 and 192.168.20.0/24. Enable Hide NAT on bothnetwork objects, using 200.200.200.5 as hiding IP address Add an ARP entry for 200.200.200.3for the MAC address of 200.200.200.5. C. Create an Address Range object, starting from 192.168.10.1 to 192.168.20.254. Enable HideNAT on the NAT page of the address range object. Enter Hiding IP address 200.200.200.5. Addan ARP entry for 200.200.200.5 for the MAC address of 200.200.200.3. D. Create two network objects: 192.168.10.0/24. and 192.168.20.0/24. Add the two networkobjects. Create a manual NAT rule like the following Original source –group object; Destination –any Service – any, Translated source – 200.200.200.5; Destination – original, Service – original.

Answer: C

Explanation:

QUESTION NO: 145 Because of a pre-existing design constraints, you set up manual NAT rules for your HTTP server.However, your FTP server and SMTP server are both using automatic NAT rules. All traffic fromyour FTP and SMTP servers are passing through the Security Gateway without a problem, buttraffic from the Web server is dropped on rule 0 because of anti-spoofing settings. What is causingthis? A. Allow bi-directional NAT is not checked in Global Properties. B. Manual NAT rules are not configured correctly. C. Translate destination on client side is not checked in Global Properties under manual NATrules. D. Routing is not configured correctly.

Answer: C

Explanation:

QUESTION NO: 146 You enable Hide NAT on the network object, 10.1.1.0 behind the Security Gateway's externalinterface. You browse to from host, 10.1.1.10 successfully. You enable a log on the rule thatallows 10.1.1.0 to exit the network. How many log entries do you see for that connection inSmartView Tracker? A. Only one, outbound B. Two, one for outbound, one for inbound

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 59

Page 60: 156-215.75

C. Only one, inbound D. Two, both outbound, one for the real IP connection and one for the NAT IP connection

Answer: A

Explanation:

QUESTION NO: 147 Which of the following statements BEST describes Check Point's Hide Network AddressTranslation method? A. Many-to-one NAT which implements PAT (Port Address Translation) for accomplishing bothSource and Destination IP address translation B. Translates many destination IP addresses into one destination IP address C. Translates many source IP addresses into one source IP address D. One-to-one NAT which implements PAT (Port Address Translation) for accomplishing bothSource and Destination IP address translation

Answer: C

Explanation:

QUESTION NO: 148 Which Check Point address translation method allows an administrator to use fewer ISP-assignedIP addresses than the number of internal hosts requiring Internet connectivity? A. Static Destination B. Hide C. Dynamic Destination D. Static Source

Answer: B

Explanation:

QUESTION NO: 149 NAT can NOT be configured on which of the following objects?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 60

Page 61: 156-215.75

A. Address Range B. HTTP Logical Server C. Host D. Gateway

Answer: B

Explanation:

QUESTION NO: 150 NAT can be implemented on which of the following lists of objects? A. Host, Network B. Host, User C. Domain, Network D. Network, Dynamic Object

Answer: A

Explanation:

QUESTION NO: 151 Which Check Point address translation method is necessary if you want to connect from a host onthe Internet via HTTP to a server with a reserved (RFC 1918) IP address on your DMZ? A. Static Destination Address Translation B. Port Address Translation C. Dynamic Source Address Translation D. Hide Address Translation

Answer: A

Explanation:

QUESTION NO: 152 You want to implement Static Destination NAT in order to provide external, Internet users accessto an internal Web Server that has a reserved (RFC 1918) IP address. You have an unused validIP address on the network between your Security Gateway and ISP router. You control the routerthat sits between the external interface of the firewall and the Internet.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 61

Page 62: 156-215.75

What is an alternative configuration if proxy ARP cannot be used on your Security Gateway? A. Place a static host route on the firewall for the valid IP address to the internal Web server. B. Place a static ARP entry on the ISP router for the valid IP address to the firewall’s externaladdress. C. Publish a proxy ARP entry on the ISP router instead of the firewall for the valid IP address. D. Publish a proxy ARP entry on the internal Web server instead of the firewall for the valid IPaddress.

Answer: B

Explanation:

QUESTION NO: 153 After implementing Static Address Translation to allow Internet traffic to an internal Web Server onyour DMZ, you notice that any NATed connections to that machine are being dropped by anti-spoofing protections. Which of the following is the MOST LIKELY cause? A. The Global Properties setting Translate destination on client side is checked. But the topologyon the external interface is set to External.Change topology to Others +. B. The Global Properties setting Translate destination on client side is unchecked. But thetopology on the external interface is set to Others +. Change topology to External C. The Global Properties setting Translate destination on client side is checked But the topologyon the DMZ interface is set to Internal -Network defined by IP and Mask Uncheck the GlobalProperties setting Translate destination on client side D. The Global Properties setting Translate destination on client side is unchecked. But thetopology on the DMZ interface is set to Internal - Network defined by IP and Mask. Check theGlobal Properties setting Translate destination on client side.

Answer: D

Explanation:

QUESTION NO: 154 Which NAT option applicable for Automatic NAT applies to Manual NAT as well? A. Allow bi-directional NAT B. Automatic ARP configuration C. Enable IP Pool NAT D. Translate destination on client-side

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 62

Page 63: 156-215.75

Answer: D

Explanation:

QUESTION NO: 155 Your main internal network 10.10.10.0/24 allows all traffic to the Internet using Hide NAT. You alsohave a small network 10.10.20.0/24 behind the internal router. You want to configure the kernel totranslate the source address only when network 10.10.20.0 tries to access the Internet for HTTP,SMTP, and FTP services. Which of the following configurations will allow this network to accessthe Internet? A. Configure three Manual Static NAT rules for network 10.10.20.0/24, one for each service B. Configure one Manual Hide NAT rule for HTTP, FTP, and SMTP services for network10.10.20.0/24 C. Configure Automatic Hide NAT on network 10.10.20.0/24 and then edit the Service column inthe NAT Rule Base on the automatic rule D. Configure Automatic Static NAT on network 10.10.20.0/24

Answer: B

Explanation:

QUESTION NO: 156 You have three servers located in a DMZ, using private IP addresses. You want internal usersfrom 10.10.10.x to access the DMZ servers by public IP addresses. Internal_net 10.10.10.x isconfigured for Hide NAT behind the Security Gateway's external interface. What is the best configuration for 10.10.10.x users to access the DMZ servers, using the DMZservers' public IP addresses?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 63

Page 64: 156-215.75

A. When connecting to the Internet, configure manual Static NAT rules to translate the DMZservers B. When the source is the internal network 10.10.10.x, configure manual static NAT rules totranslate the DMZ servers. C. When connecting to internal network 10 10.10 x. configure Hide NAT for the DMZ servers. D. When connecting to the internal network 10.10.10x, configure Hide Nat for the DMZ networkbehind the DMZ interface of the Security Gateway

Answer: B

Explanation:

QUESTION NO: 157 An internal host initiates a session to and is set for Hide NAT behind the Security Gateway. Theinitiating traffic is an example of __________. A. None of these B. source NAT C. destination NAT D. client side NAT

Answer: B

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 64

Page 65: 156-215.75

QUESTION NO: 158 A host on the Internet initiates traffic to the Static NAT IP of your Web server behind the SecurityGateway. With the default settings in place for NAT, the initiating packet will translatethe_________. A. source on client side B. destination on server side C. destination on client side D. source on server side

Answer: C

Explanation:

QUESTION NO: 159 A Web server behind the Security Gateway is set to Automatic Static NAT. Client side NAT is notchecked in the Global Properties. A client on the Internet initiates a session to the Web Server.Assuming there is a rule allowing this traffic, what other configuration must be done to allow thetraffic to reach the Web server? A. Automatic ARP must be unchecked in the Global Properties. B. A static route must be added on the Security Gateway to the internal host. C. Nothing else must be configured. D. A static route for the NAT IP must be added to the Gateway's upstream router.

Answer: B

Explanation:

QUESTION NO: 160 When translation occurs using automatic Hide NAT, what also happens? A. Nothing happens. B. The source port is modified. C. The destination port is modified. D. The destination is modified.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 65

Page 66: 156-215.75

Answer: B

Explanation:

QUESTION NO: 161 The fw monitor utility is used to troubleshoot which of the following problems? A. Phase two key negotiation B. User data base corruption C. Address translation D. Log Consolidation Engine

Answer: C

Explanation:

QUESTION NO: 162 The fw monitor utility would be best to troubleshoot which of the following problems? A. An error occurs when editing a network object in SmartDashboard B. A statically NATed Web server behind a Security Gateway cannot be reached from the Internet. C. You get an invalid ID error in SmartView Tracker for phase 2 IKE key negotiations. D. A user in the user database is corrupt.

Answer: B

Explanation:

QUESTION NO: 163 Looking at the SYN packets in the Wireshark output, select the statement that is true about NAT.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 66

Page 67: 156-215.75

A. There is not enough information provided in the Wireshark capture to determine NAT settings. B. This is an example hide NAT. C. There is an example of Static NAT and translate destination on client side unchecked in GlobalProperties. D. This is an example of Static NAT and Translate destination on client side checked in GlobalProperties.

Answer: D

Explanation:

QUESTION NO: 164 In SmartDashboard, Translate destination on client side is checked in Global Properties. WhenNetwork Address Translation is used: A. It is necessary to add a static route to the Gateway's routing table. B. The Security Gateway's ARP file must be modified. C. It is not necessary to add a static route to the Gateway's routing table. D. VLAN tagging cannot be defined for any hosts protected by the Gateway.

Answer: C

Explanation:

QUESTION NO: 165 Secure Internal Communications (SIC) is completely NAT-tolerant because it is based on: A. MAC addresses. B. SIC names. C. SIC is not NAT-tolerant.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 67

Page 68: 156-215.75

D. IP addresses.

Answer: B

Explanation:

QUESTION NO: 166 Static NAT connections, by default, translate on which firewall kernel inspection point? A. Post-inbound B. Eitherbound C. Inbound D. Outbound

Answer: C

Explanation:

QUESTION NO: 167 In a Hide NAT connection outbound, which portion of the packet is modified? A. Source IP address and destination port B. Destination IP address and destination port C. Source IP address and source port D. Destination IP address and destination port

Answer: C

Explanation:

QUESTION NO: 168 You are MegaCorp's Security Administrator. There are various network objects which must beNATed. Some of them use the Automatic Hide NAT method, while others use the Automatic StaticNAT method. What is the order of the rules if both methods are used together? Give the bestanswer. A. The Administrator decides on the order of the rules by shifting the corresponding rules up anddown.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 68

Page 69: 156-215.75

B. The Static NAT rules have priority over the Hide NAT rules and the NAT on a node has priorityover the NAT on a network or an address range C. The Hide NAT rules have priority over the Static NAT rules and the NAT on a node has priorityover the NAT on a network or an address range D. The position of the rules depends on the time of their creation. The rules created first areplaced at the top; rules created later are placed successively below the others.

Answer: B

Explanation:

QUESTION NO: 169 Which answers are TRUE? Automatic Static NAT CANNOT be used when: i) NAT decision is based on the destination port ii) Source and Destination IP both have to be translated iii) The NAT rule should only be installed on a dedicated Gateway only iv) NAT should be performed on the server side A. (i), (ii), and (iii) B. (i), and (ii) C. (ii) and (iv) D. only (i)

Answer: D

Explanation:

QUESTION NO: 170 In order to have full control, you decide to use Manual NAT entries instead of Automatic NATrules. Which of the following is NOT true? A. When using Static NAT, you must enter ARP entries for the Gateway on all hosts that are usingthe NAT Gateway with that Gateway's internal interface IP address. B. When using Static NAT, you must add proxy ARP entries to the Gateway for all hidingaddresses. C. If you chose Automatic NAT instead, all necessary entries are done for you. D. When using Dynamic Hide NAT with an address that is not configured on a Gateway interface,

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 69

Page 70: 156-215.75

you need to add a proxy ARP entry for that address.

Answer: A

Explanation:

QUESTION NO: 171 After filtering a fw monitor trace by port and IP, a packet is displayed three times; in the i, I, and oinspection points, but not in the O inspection point. Which is the likely source of the issue? A. The packet has been sent out through a VPN tunnel unencrypted. B. An IPSO ACL has blocked the outbound passage of the packet. C. A SmartDefense module has blocked the packet D. It is an issue with NAT

Answer: D

Explanation:

QUESTION NO: 172 A marketing firm's networking team is trying to troubleshoot user complaints regarding access toaudio-streaming material from the Internet. The networking team asks you to check the object andrule configuration settings for the perimeter Security Gateway. Which SmartConsole applicationshould you use to check these objects and rules? A. SmartView Tracker B. SmartView Status C. SmartView Monitor D. SmartDashboard

Answer: D

Explanation:

QUESTION NO: 173 Which statement below describes the most correct strategy for implementing a Rule Base? A. Add the Stealth Rule before the last rule.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 70

Page 71: 156-215.75

B. Umit grouping to rules regarding specific access. C. Place the most frequently used rules at the top of the Policy and the ones that are notfrequently used further down. D. Place a network-traffic rule above the administrator access rule.

Answer: C

Explanation:

QUESTION NO: 174 Which of the following is a viable consideration when determining Rule Base order? A. Grouping authentication rules with address-translation rules B. Grouping rules by date of creation C. Grouping reject and drop rules after the Cleanup Rule D. Grouping functionally related rules together

Answer: D

Explanation:

QUESTION NO: 175 Which of the following is a viable consideration when determining Rule Base order? A. Adding SAM rules at the top of the Rule Base B. Placing frequently accessed rules before less frequently accessed rules C. Grouping rules by date of creation D. Grouping IPS rules with dynamic drop rules

Answer: B

Explanation:

QUESTION NO: 176 Which of the following is a viable consideration when determining Rule Base order? A. Grouping IPS rules with dynamic drop rules B. Grouping reject and drop rules after the Cleanup Rule

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 71

Page 72: 156-215.75

C. Placing more restrictive rules before more permissive rules D. Grouping authentication rules with QOS rules

Answer: C

Explanation:

QUESTION NO: 177 You would use the Hide Rule feature to: A. Make rules invisible to incoming packets. B. View only a few rules without the distraction of others C. Hide rules from read-only administrators. D. Hide rules from a SYN/ACK attack.

Answer: B

Explanation:

QUESTION NO: 178 When you add a resource object to a rule, which of the following occurs? A. All packets that match the resource will be dropped. B. All packets matching that rule are either encrypted or decrypted by the defined resource. C. All packets matching the resource service are analyzed through an application-layer proxy. D. Users attempting to connect to the destination of the rule will be required to authenticate.

Answer: C

Explanation:

QUESTION NO: 179 You are a Security Administrator using one Security Management Server managing three differentfirewalls. One of the firewalls does NOT show up in the dialog box when attempting to install aSecurity Policy. Which of the following is a possible cause? A. The firewall object has been created but SIC has not yet been established. B. The license for this specific firewall has expired.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 72

Page 73: 156-215.75

C. The firewall has failed to sync with the Security Management Server for 60 minutes. D. The firewall is not listed in the Policy Installation Targets screen for this policy package.

Answer: D

Explanation:

QUESTION NO: 180 Your shipping company uses a custom application to update the shipping distribution database.The custom application includes a service used only to notify remote sites that the distributiondatabase is malfunctioning. The perimeter Security Gateway’s Rule Base includes a rule to acceptthis traffic. Since you are responsible for multiple sites, you want notification by a text message toyour cellular phone, whenever traffic is accepted on this rule. Which of the following would workBEST for your purpose? A. SmartView Monitor Threshold B. SNMP trap C. Logging implied rules D. User-defined alert script

Answer: D

Explanation:

QUESTION NO: 181 The fw stat -l command includes all of the following except: A. The number of packets that have been inspected B. The date and time of the policy that is installed. C. The number of times the policy has been installed D. The number of packets that have been dropped

Answer: C

Explanation:

QUESTION NO: 182 Which command allows verification of the Security Policy name and install date on a SecurityGateway?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 73

Page 74: 156-215.75

A. fw show policy B. fw ctl pstat -policy C. fw stat -l D. fwver-p

Answer: C

Explanation:

QUESTION NO: 183 You have two rules, ten users, and two user groups in a Security Policy. You create databaseversion 1 for this configuration. You then delete two existing users and add a new user group. Youmodify one rule and add two new rules to the Rule Base. You save the Security Policy and createdatabase version 2. After awhile, you decide to roll back to version 1 to use the Rule Base, but youwant to keep your user database. How can you do this? A. Run fwm_dbexport to export the user database. Select restore the entire database in theDatabase Revision screen. Then, run fwm_dbimport. B. Restore the entire database, except the user database, and then create the new user and usergroup. C. Restore the entire database, except the user database. D. Run fwm dbexport -l filename. Restore the database. Then, run fwm dbimport -l filename toimport the users.

Answer: C

Explanation:

QUESTION NO: 184 Which feature or command provides the easiest path for Security Administrators to revert to earlierversions of the same Security Policy and objects configuration? A. Policy Package management B. dbexport/dbimport C. Database Revision Control D. upgrade_export/upgrade_import

Answer: C

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 74

Page 75: 156-215.75

QUESTION NO: 185 Your Security Management Server fails and does not reboot. One of your remote SecurityGateways managed by the Security Management Server reboots. What occurs with the remoteGateway after reboot? A. Since the Security Management Server is not available, the remote Gateway cannot fetch theSecurity Policy. Therefore, no traffic is allowed through the Gateway. B. Since the Security Management Server is not available, the remote Gateway cannot fetch theSecurity Policy. Therefore, all traffic is allowed through the Gateway. C. Since the Security Management Server is not available, the remote Gateway uses the localSecurity Policy, but does not log traffic. D. The remote Gateway fetches the last installed Security Policy locally and passes trafficnormally. The Gateway will log locally, since the Security Management Server is not available.

Answer: D

Explanation:

QUESTION NO: 186 How can you configure an application to automatically launch on the Security Management Serverwhen traffic is dropped or accepted by a rule in the Security Policy? A. Pop-up alert script B. User-defined alert script C. Custom scripts cannot be executed through alert scripts D. SNMP trap alert script

Answer: B

Explanation:

QUESTION NO: 187 Which of the following is NOT useful to verify whether or NOT a Security Policy is active on aGateway? A. Check the name of Security Policy of the appropriate Gateway in Smart Monitor. B. Cpstat fw – f policy C. fw stat D. fw ctl get string active_secpol

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 75

Page 76: 156-215.75

Answer: D

Explanation:

QUESTION NO: 188 Of the following, what parameters will not be preserved when using Database Revision Control? 1) Simplified mode Rule Bases 2) Traditional mode Rule Bases 3) Secure Platform WebUI Users 4) SIC certificates 5) SmartView Tracker audit logs 6) SmartView Tracker traffic logs 7) Implied Rules 8) IPS Profiles 9) Blocked connections 10) Manual NAT rules 11) VPN communities 12) Gateway route table 13) Gateway licenses A. 3, 4, 5, 6, 9, 12, 13 B. 5, 6, 9, 12, 13 C. 1, 2, 8, 10, 11 D. 2, 4, 7, 10, 11

Answer: A

Explanation:

QUESTION NO: 189 Which of the following describes the default behavior of an R75 Security Gateway?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 76

Page 77: 156-215.75

A. Traffic is filtered using controlled port scanning. B. All traffic is expressly permitted via explicit rules. C. Traffic not explicitly permitted is dropped. D. IP protocol types listed as secure are allowed by default, i.e. ICMP, TCP, UDP sessions areinspected.

Answer: C

Explanation:

QUESTION NO: 190 When you use the Global Properties' default settings on R75, which type of traffic will be droppedif no explicit rule allows the traffic? A. SmartUpdate connections B. Firewall logging and ICA key-exchange information C. Outgoing traffic originating from the Security Gateway D. RIP traffic

Answer: D

Explanation:

QUESTION NO: 191 You have installed a R75 Security Gateway on SecurePlatform. To manage the Gateway from theenterprise Security Management Server, you create a new Gateway object and Security Policy.When you install the new Policy from the Policy menu, the Gateway object does not appear in theInstall Policy window as a target. What is the problem? A. The new Gateway's temporary license has expired. B. The object was created with Node > Gateway. C. The Gateway object is not specified in the first policy rule column Install On. D. No Masters file is created for the new Gateway.

Answer: B

Explanation:

QUESTION NO: 192

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 77

Page 78: 156-215.75

Select the correct statement about Secure Internal Communications (SIC) Certificates. SICCertificates: A. Are used for securing internal network communications between the SmartDashboard and theSecurity Management Server. B. For R75 Security Gateways are created during the Security Management Server installation. C. Decrease network security by securing administrative communication among the SecurityManagement Servers and the Security Gateway. D. Uniquely identify Check Point enabled machines; they have the same function as VPNCertificates.

Answer: D

Explanation:

QUESTION NO: 193 John is the Security Administrator in his company. He installs a new R75 Security ManagementServer and a new R75 Gateway. He now wants to establish SIC between them. After entering theactivation key, the message "Trust established" is displayed in SmartDashboard, but SIC still doesnot seem to work because the policy won't install and interface fetching still does not work. Whatmight be a reason for this? A. This must be a human error. B. The Gateway's time is several days or weeks in the future and the SIC certificate is not yetvalid. C. SIC does not function over the network. D. It always works when the trust is established.

Answer: B

Explanation:

QUESTION NO: 194 A _______ rule is used to prevent all traffic going to the R75 Security Gateway. A. Cleanup B. Reject C. Stealth D. IPS

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 78

Page 79: 156-215.75

Answer: C

Explanation:

QUESTION NO: 195 In a distributed management environment, the administrator has removed the default check fromAccept Control Connections under the Policy / Global Properties / FireWall tab. In order for theSecurity Management Server to install a policy to the Firewall, an explicit rule must be created toallow the server to communicate to the Security Gateway on port ______. A. 256 B. 80 C. 900 D. 259

Answer: A

Explanation:

QUESTION NO: 196 Your internal network is configured to be 10.1.1.0/24. This network is behind your perimeter R75Gateway, which connections to your ISP provider. How do you configure the Gateway to allow thisnetwork to go out to the internet? A. Use Hide NAT for network 10.1.1.0/24 behind the internal interface of your perimeter Gateway. B. Use Hide NAT for network 10.1.1.0/24 behind the external IP address of your perimeterGateway. C. Use automatic Static NAT for network 10.1.1.0/24. D. Do nothing, as long as 10.1.1.0 network has the correct default Gateway.

Answer: B

Explanation:

QUESTION NO: 197 Which specific R75 GUI would you use to add an address translation rule? A. SmartConsole

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 79

Page 80: 156-215.75

--

B. SmartDashboard C. SmartNAT D. SmartView Monitor

Answer: B

Explanation:

QUESTION NO: 198 You are a Security Administrator who has installed Security Gateway R75 on your network. Youneed to allow a specific IP address range for a partner site to access your intranet Web server. Tolimit the partner's access for HTTP and FTP only, you did the following: 1. Created manual Static NAT rules for the Web server. 2. Created the following settings in the Global Properties’ Network Address Translation screen

Allow bi-directional NAT* Translate destination on client side

Do you above settings limit the partner’s access? A. Yes, This will ensure that traffic only matches the specific rule configured for this traffic, andthat the Gateway translates the traffic after accepting the packet. B. Yes, Both of these settings are only application to automatically NAT rules. C. No, The first setting is not applicable. The second setting will reduce performance, bytranslating traffic in the kernel nearest the intranet server. D. No. The first setting is only applicable to automatic NAT rules. The second setting is necessaryto make sure there are no conflicts between NAT and anti-spoofing.

Answer: D

Explanation:

QUESTION NO: 199 You enable Automatic Static NAT on an internal host node object with a private IP address of10.10.10.5, which is NATed into 216.216.216.5. (You use the default settings in Global Properties/ NAT.) When you run fw monitor on the R75 Security Gateway and then start a new HTTP connectionfrom host 10.10.10.5 to browse the Internet, at what point in the monitor output will you observethe HTTP SYN-ACK packet translated from 216.216.216.5 back into 10.10.10.5?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 80

Page 81: 156-215.75

A. i=inbound kernel, before the virtual machine B. O=outbound kernel, after the virtual machine C. o=outbound kernel, before the virtual machine D. I=inbound kernel, after the virtual machine

Answer: D

Explanation:

QUESTION NO: 200 You have configured a remote site Gateway that supports your boss's access from his home officeusing a DSL dialup connection. Everything worked fine yesterday, but today all connectivity is lost.Your initial investigation results in "nobody has touched anything", which you can support bytaking a look in SmartView Tracker Management. What is the problem and what can be doneabout it? A. You cannot use NAT and a dialup connection. B. The NAT configuration is not correct; you can only use private IP addresses in a static NATsetup. C. A static NAT setup may not work with DSL, since the external IP may change. Hide NAT behindthe Gateway is the preferred method here. D. According to published limitations of Security Gateway R75, there's a bug with NAT. A restart ofthe Gateway will help here.

Answer: C

Explanation:

Topic 3, Volume C

QUESTION NO: 201 A client has created a new Gateway object that will be managed at a remote location. When theclient attempts to install the Security Policy to the new Gateway object, the object does not appearin the Install On check box. What should you look for? A. A Gateway object created using the Check Point > Externally Managed VPN Gateway optionfrom the Network Objects dialog box. B. Anti-spoofing not configured on the interfaces on the Gateway object. C. A Gateway object created using the Check Point > Security Gateway option in the networkobjects, dialog box, but still needs to configure the interfaces for the Security Gateway object. D. Secure Internal Communications (SIC) not configured for the object.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 81

Page 82: 156-215.75

Answer: A

Explanation:

QUESTION NO: 202 A Security Policy installed by another Security Administrator has blocked all SmartDashboardconnections to the stand-alone installation of R75. After running the fw unloadlocal command, youare able to reconnect with SmartDashboard and view all changes. Which of the following changeis the most likely cause of the block? A. A Stealth Rule has been configured for the R75 Gateway. B. The Allow Control Connections setting in Policy / Global Properties has been unchecked. C. The Security Policy installed to the Gateway had no rules in it D. The Gateway Object representing your Gateway was configured as an Externally ManagedVPN Gateway.

Answer: B

Explanation:

QUESTION NO: 203 Which of the following is NOT a valid selection for tracking and controlling packets in R75? A. Reject B. Accept C. Hold D. Session Auth

Answer: C

Explanation:

QUESTION NO: 204 When configuring anti-spoofing on the Security Gateway object interfaces, which of the following isNOT a valid R75 topology configuration? A. Specific B. External

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 82

Page 83: 156-215.75

C. Any D. Not Defined

Answer: C

Explanation:

QUESTION NO: 205 You are conducting a security audit. While reviewing configuration files and logs, you notice logsaccepting POP3 traffic, but you do not see a rule allowing POP3 traffic in the Rule Base. Which ofthe following is the most likely cause? A. The POP3 rule is disabled. B. POP3 is one of 3 services (POP3, IMAP, and SMTP) accepted by the default mail object inR75. C. POP3 is accepted in Global Properties. D. The POP3 rule is hidden.

Answer: D

Explanation:

QUESTION NO: 206 You are about to test some rule and object changes suggested in an R75 news group. Whichbackup solution should you use to ensure the easiest restoration of your Security Policy to itsprevious configuration after testing the changes? A. upgrade export command B. Manual copies of the $FWDIR/conf directory C. SecurePlatform backup utilities D. Database Revision Control

Answer: D

Explanation:

QUESTION NO: 207 Which R75 feature or command allows Security Administrators to revert to earlier versions of theSecurity Policy without changing object configurations?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 83

Page 84: 156-215.75

A. fwm dbexport/fwm dbimport B. Policy Package management C. upgrade_export/upgrade„import D. Database Revision Control

Answer: B

Explanation:

QUESTION NO: 208 What must a Security Administrator do to comply with a management requirement to log all trafficaccepted through the perimeter Security gateway? A. Install the View Implicit Rules package using SmartUpdate B. Define two log serves on the R75 Gateway object Enable Log Implied Rules on the first logserver. Enable Log Rule Base on the second log server. Use SmartReporter to merge the two logserver records into the same database for HIPPA log audits. C. In Global Properties > Reporting Tools check the box Enable tracking all rules (including rulesmarked as None in the Track column). Send these logs to a secondary log server for a completelogging history. Use your normal log server for standard logging for troubleshooting. D. Check the Log Implied Rules Globally box on the R75 Gateway object.

Answer: C

Explanation:

QUESTION NO: 209 You have configured Automatic Static NAT on an internal host-node object. You clear the boxTranslate destination on client site from Global Properties / NAT. Assuming all other NAT settingsin Global Properties are selected, what else must be configured so that a host on the Internet caninitiate an inbound connection to this host? A. A static route, to ensure packets destined for the public NAT IP address will reach theGateway's internal interface. B. A proxy ARP entry, to ensure packets destined for the public IP address will reach the SecurityGateway’s external interface. C. The NAT IP address must be added to the anti-spoofing group of the external gateway interface D. No extra configuration is needed

Answer: A

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 84

Page 85: 156-215.75

QUESTION NO: 210 Cara wants to monitor the top services on her Security Gateway (fw-chicago), but she is getting anerror message. Other Security Gateways are reporting the information except a new SecurityGateway that was just recently deployed. Analyze the error message from the output below anddetermine what Cara can do to correct the problem.

A. She should re-install the security policy on the security Gateway since it was using the defaultrule base B. She should create a firewall rule to allow the CPMI traffic back to her smart console. C. She should let the monitoring run longer in order for it to collect sampled data D. She should edit the security Gateway object and enable the monitoring Software Blade.

Answer: D

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 85

Page 86: 156-215.75

QUESTION NO: 211 What will happen when Reset is pressed and confirmed?

A. The gateway certificate will be revoked on the security management server only B. SIC will be reset on the Gateway only C. The Gateway certificate will be revoked on the security management server and SIC will bereset on the Gateway D. The gateway certificate on the gateway only

Answer: A

Explanation:

QUESTION NO: 212 Which rule is responsible for the installation failure?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 86

Page 87: 156-215.75

A. Rule 4 B. Rule 3 C. Rule 5 D. Rule 6

Answer: A

Explanation:

QUESTION NO: 213 What happens if Web Server is checked? A. Web Intelligence will be applied to the host. B. An implied rule will be added allowing HTTP requests to the host. C. Anti-virus settings will be applied to the host. D. An implied rule will be added allowing HTTP request from and to the host.

Answer: A

Explanation:

QUESTION NO: 214 When configuring the network interfaces of a Check Point Gateway, the direction can be defined

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 87

Page 88: 156-215.75

as Internal or External. What is the meaning of Interface leads to DMZ?

A. It defines the DMZ Interface since this information is necessary for Content Control. B. Using restricted Gateways, this option automatically turns off the counting of IP Addressesoriginating from this interface C. When selecting this option. Ann-Spoofing is configured automatically to this net. D. Activating this option automatically turns this interface to External

Answer: A

Explanation:

QUESTION NO: 215

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 88

Page 89: 156-215.75

Security Administrator, Anna has done the following: What will happen when she recreates the firewall object? A. Creating the object will result in a duplicate IP address warning. B. Get interfaces will show all interfaces. C. Establishing the SIC will fail. D. Get interfaces will still show only the old interfaces but not the newly added ones.

Answer: C

Explanation:

QUESTION NO: 216 The SIC certificate is stored in the________ directory. A. $FUIDIR/conf B. $CPDIR/conf C. $FWDIR/database D. $CPDIR/registry

Answer: B

Explanation:

QUESTION NO: 217 You run cpconfig to reset SIC on the Security Gateway. After the SIC reset operation is complete,the policy that will be installed is the: A. Last policy that was installed B. Default filter C. Standard policy D. Initial policy

Answer: D

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 89

Page 90: 156-215.75

QUESTION NO: 218 Nancy has lost SIC communication with her Security Gateway and she needs to re-establish SIC.What would be the correct order of steps needed to perform this task? 1) Create a new activation key on the Security Gateway, then exit cpconfig. 2) Click the Communication tab on the Security Gateway object, and then click Reset. 3) Run the cpconfig tool, and then select Secure Internal Communication to reset. 4) Input the new activation key in the Security Gateway object, and then click initialize 5) Run the cpconfig tool, then select source Internal Communication to reset. A. 5, 4, 1, 2 B. 2, 3, 1, 4 C. 2, 5, 1, 4 D. 3, 1, 4, 2

Answer: B

Explanation: Configuration Options:

----------------------

(1) Licenses and contracts

(2) SNMP Extension

(3) PKCS#11 Token

(4) Random Pool

(5) Secure Internal Communication

(6) Disable Advanced Routing

(7) Enable cluster membership for this gateway

(8) Disable Check Point SecureXL

(9) Automatic start of Check Point Products

QUESTION NO: 219 To check the Rule Base, some rules can be hidden so they do not distract the administrator fromthe unhidden rules. Assume that only rules accepting HTTP or SSH will be shown. How do youaccomplish this? A. In SmartDashboard menu, select Search / Rule Base Queries. In the window that opens, createa new Query, give it a name (e.g. "HTTP_SSH") and define a clause regarding the two servicesHTTP and SSH. When having applied this, define a second clause for the action Accept and

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 90

Page 91: 156-215.75

combine them with the Boolean operator AND. B. This cannot be configured since two selections (Service, Action) are not possible. C. Ask your reseller to get a ticket for Check Point SmartUse and deliver him the cpinfo file of theSecurity Management Server. D. In SmartDashboard, right-click in the column field Service and select Query Column. Then, putthe services HTTP and SSH in the list. Do the same in the field Action and select Accept here.

Answer: A

Explanation:

QUESTION NO: 220 What CANNOT be configured for existing connections during a policy install? A. Keep all connections B. Keep data connections C. Reset all connections D. Re-match connections

Answer: C

Explanation:

QUESTION NO: 221 You just installed a new Web server in the DMZ that must be reachable from the Internet. Youcreate a manual Static NAT rule as follows:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 91

Page 92: 156-215.75

"web_public_IP" is the node object that represents the new Web server's public IP address."web_private_IP" is the node object that represents the new Web site's private IP address. Youenable all settings from Global Properties > NAT. When you try to browse the Web server from the Internet, you see the error "page cannot bedisplayed". Which statements are possible reasons for this? i). There is no route defined on the Security Gateway for the public IP address to the Web server'sprivate IP address. ii) There is no Security Policy defined that allows HTTP traffic to the protected Web server. iii) There is an ARP entry on the Gateway but the settings Merge Manual proxy ARP andAutomatic ARP configuration are enabled in Global Properties. The Security Gateway ignoresmanual ARP entries. iv) There is no ARP table entry for the protected Web server's public IP address. A. (i), (ii), (iv) B. (iii) C. (i), (ii) D. (i), (ii), (iii), (iv)

Answer: D

Explanation:

QUESTION NO: 222 You just installed a new Web server in the DMZ that must be reachable from the Internet. Youcreate a manual Static NAT rule as follows: "web_public_IP" is the node object that represents the public IP address of the new Web server."web_private_IP" is the node object that represents the new Web site's private IP address. Youenable all settings from Global Properties > NAT. When you try to browse the Web server from the Internet you see the error "page cannot bedisplayed". Which of the following is NOT a possible reason? A. There is no NAT rule translating the source IP address of packets coming from the protectedWeb server. B. There is no route defined on the Security Gateway for the public IP address to the private IPaddress of the Web server.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 92

Page 93: 156-215.75

C. There is no ARP table entry for the public IP address of the protected Web server. D. There is no Security Policy defined that allows HTTP traffic to the protected Web server.

Answer: A

Explanation:

QUESTION NO: 223 You are responsible for the configuration of MegaCorp's Check Point Firewall. You need to allowtwo NAT rules to match a connection. Is it possible? Give the BEST answer. A. Yes, it is possible to have two NAT rules which match a connection, but only when usingAutomatic NAT (bidirectional NAT). B. No, it is not possible to have more one NAT rule matching a connection. When the firewallreceives a packet belonging to a concentration, it compares it against the first rule in the RuleBase, then the second rule, and so on When it finds a rule that matches, it stops checking andapplies that rule. C. Yes, it is possible to have two NAT rules which match a connection, but only in using ManualNAT (bidirectional NAT) D. Yes, there are always as many active NAT rules as there are connections.

Answer: A

Explanation:

QUESTION NO: 224 You have created a Rule Base for firewall, websydney. Now you are going to create a new policypackage with security and address translation rules for a second Gateway. What is TRUE aboutthe new package's NAT rules?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 93

Page 94: 156-215.75

A. Rules 1 and 5 will be appear in the new package B. Rules 1, 3, 4 and 5 will appear in the new package C. Rules1,2, 3 and 4 will appear in the new package D. NAT rules will be empty in the new package

Answer: C

Explanation:

QUESTION NO: 225 A Hide NAT rule has been created which includes a source address group of ten (10) networksand three (3) other group objects (containing 4, 5, and 6 host objects respectively). Assuming alladdresses are non-repetitive, how many effective rules have you created? A. 1 B. 25 C. 2 D. 13

Answer: B

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 94

Page 95: 156-215.75

QUESTION NO: 226 What is the purpose of a Stealth Rule? A. To permit implied rules B. To permit management traffic C. To prevent users from connecting directly to the gateway D. To drop all traffic to the management server that is not explicitly permitted

Answer: C

Explanation:

QUESTION NO: 227 Where are automatic NAT rules added to the Rule Base? A. Before last B. Middle C. First D. Last

Answer: C

Explanation:

QUESTION NO: 228 What is the default setting when you use NAT? A. Manual NAT B. Server-side NAT C. Hide NAT D. Client-side NAT

Answer: D

Explanation:

QUESTION NO: 229

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 95

Page 96: 156-215.75

You receive a notification that long-lasting Telnet connections to a mainframe are dropped after anhour of inactivity. Reviewing SmartView Tracker shows the packet is dropped with the error:"Unknown established connection" How do you resolve this problem without causing other security issues? Choose the BESTanswer. A. Increase the service-based session timeout of the default Telnet service to 24-hours. B. Create a new TCP service object on port 23 called Telnet-mainframe. Define a service-basedsession Timeout of 24-hours. Use this new object only in the rule that allows the Telnetconnections to the mainframe. C. Ask the mainframe users to reconnect every time this error occurs. D. Increase the TCP session timeout under Global Properties > Stateful Inspection.

Answer: B

Explanation:

QUESTION NO: 230 Which SmartConsole tool would you use to see the last policy pushed in the audit log? A. SmartView Tracker B. None, SmartConsole applications only communicate with the Security Management Server. C. SmartView Status D. SmartView Server

Answer: A

Explanation:

QUESTION NO: 231 SmartView Tracker logs the following Security Administrator activities, EXCEPT: A. Administrator login and logout B. Object creation, deletion, and editing C. Tracking SLA compliance D. Rule Base changes

Answer: C

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 96

Page 97: 156-215.75

QUESTION NO: 232 A security audit has determined that your unpatched Web application server is accessing a SQLserver. You believe that you have enabled the proper IPS setting but would like to verify this usingSmartView Tracker. Which of the following entries confirms that this information is being blockedagainst attack? A. ASCII Only Response Header detecteD.SQL B. Fingerprint Scrambling: Changed [SQL] to [Perl] C. Concealed HTTP response [SQL Server]. (Error Code WSE0160003) D. HTTP response spoofing: remove signature [SQL Server]

Answer: C

Explanation:

QUESTION NO: 233 What happens when you select File > Export from the SmartView Tracker menu? A. Logs in fw.log are exported to a file that can be opened by Microsoft Excel. B. Exported log entries are not viewable in SmartView Tracker. C. Current logs are exported to a new *.log file. D. Exported log entries are deleted from fw.log.

Answer: A

Explanation:

QUESTION NO: 234 By default, when you click File > Switch Active File in SmartView Tracker, the SecurityManagement Server: A. Purges the current log file, and prompts you for the new log’s mode. B. Saves the current log file, names the log file by date and time, and starts a new log file. C. Purges the current log file and starts the new log file. D. Prompts you to enter a filename, and then saves the log file.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 97

Page 98: 156-215.75

Answer: B

Explanation:

QUESTION NO: 235 You are working with three other Security Administrators. Which SmartConsole component can beused to monitor changes to rules or object properties made by the other administrators? A. Eventia Monitor B. SmartView Monitor C. SmartView Tracker D. Eventia Tracker

Answer: C

Explanation:

QUESTION NO: 236 Which SmartView Tracker mode allows you to read the SMTP e-mail body sent from the ChiefExecutive Officer (CEO) of a company? A. This is not a SmartView Tracker feature. B. Display Payload View C. Display Capture Action D. Network and Endpoint Tab

Answer: A

Explanation:

QUESTION NO: 237 You want to display log entries containing information from a specific column in the SmartViewTracker. If you want to see ONLY those entries, what steps would you take? A. Right-click column, Search…/ Add string / Apply Filter B. Right-click column, Edit Filter / Specific / Add / OK C. Left-click column, Search / Add string / Apply Filter D. Left-click column, Specific / Add / Apply Filter

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 98

Page 99: 156-215.75

Answer: B

Explanation:

QUESTION NO: 238 How do you define a service object for a TCP port range? A. Manage Services / New TCP, provide name and define port: x-y B. Manage Services / New Group, provide name and add all service ports for range individually tothe group object C. Manage Services / New Other, provide name and define protocol: 17, Range: x-y D. Manage Services / New Other, provide name and define protocol: x-y

Answer: A

Explanation:

QUESTION NO: 239 You can include External commands in SmartView Tracker by the menu Tools > CustomCommands. The Security Management Server is running under SecurePlatform, and the GUI is on a systemrunning Microsoft Windows. How do you run the command traceroute on an IP address? A. There is no possibility to expand the three pre-defined options Ping, Whois, and Nslookup. B. Go to the menu Tools > Custom Commands and configure the Windows command tracert.exeto the list. C. Use the program GUIdbedit to add the command traceroute to the Security ManagementServer properties. D. Go to the menu, Tools > Custom Commands and configure the Linux command traceroute tothe list.

Answer: B

Explanation:

QUESTION NO: 240

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 99

Page 100: 156-215.75

Where is the best place to find information about connections between two machines? A. On a Security Management Server, using SmartView Tracker B. All options are valid. C. On a Security Gateway using the command fw log. D. On a Security Gateway Console interface; it gives you detailed access to log files and statetable information

Answer: A

Explanation:

QUESTION NO: 241 Which of the following can be found in cpinfo from an enforcement point? A. The complete file objects_5_0. c B. Policy file information specific to this enforcement point C. Everything NOT contained in the file r2info D. VPN keys for all established connections to all enforcement points

Answer: B

Explanation:

QUESTION NO: 242 One of your remote Security Gateway's suddenly stops sending logs, and you cannot install theSecurity Policy on the Gateway. All other remote Security Gateways are logging normally to theSecurity Management Server, and Policy installation is not affected. When you click the Test SICstatus button in the problematic Gateway object you receive an error message. What is theproblem? A. There is no connection between the Security Management Server and the remote Gateway.Rules or routing may block the connection. B. The remote Gateway's IP address has changed, which invalidates the SIC Certificate. C. The time on the Security Management Server's clock has changed, which invalidates theremote Gateway's Certificate. D. The Internal Certificate Authority for the Security Management Server object has been removedfrom objects_5_0.C.

Answer: A

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 100

Page 101: 156-215.75

Explanation:

QUESTION NO: 243 What information is found in the SmartView Tracker Management log? A. Most accessed Rule Base rule B. Number of concurrent IKE negotiations C. SIC revoke certificate event D. Destination IP address

Answer: C

Explanation:

QUESTION NO: 244 What information is found in the SmartView Tracker Management log? A. Destination IP address B. Policy Package rule modification date/time stamp C. Historical reports log D. Most accessed Rule Base rule

Answer: B

Explanation:

QUESTION NO: 245 How do you use SmartView Monitor to compile traffic statistics for your company's Internet activityduring production hours? A. View total packets passed through the security gateway B. Use the Traffic Counters settings and SmartView Monitor to generate a graph showing the totalHTTP traffic for the day. C. Select the Tunnels view, and generate a report on the statistics D. Configure a suspicious activity rule which triggers an alert when HTTP traffic pass throughgateway

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 101

Page 102: 156-215.75

Answer: B

Explanation:

QUESTION NO: 246 What are the results of the commanD. fw sam [Target IP Address]? A. Connections from the specified target are blocked without the need to change the SecurityPolicy. B. Connections to and from the specified target are blocked with the need to change the SecurityPolicy. C. Connections to and from the specified target are blocked without the need to change theSecurity Policy. D. Connections to the specified target are blocked without the need to change the Security Policy.

Answer: C

Explanation:

QUESTION NO: 247 An internal router is sending UDP keep-alive packets that are being encapsulated with GRE andsent through your R70 Security Gateway to a partner site. A rule for GRE traffic is configured forACCEPT/LOG. Although the keep-alive packets are being sent every 1 minute, a search throughthe SmartView Tracker logs for GRE traffic only shows one entry for the whole day (early in themorning after a Policy install). Your partner site indicates they are successfully receiving the GRE encapsulated keep-alivepackets on the 1-minute interval. If GRE encapsulation is turned off on the router, SmartView Tracker shows a log entry for the UDPkeep-alive packet every minute. Which of the following is the BEST explanation for this behavior? A. The Log Server log unification process unifies all log entries from the Security Gateway on aspecific connection into only one log entry in the SmartView Tracker. GRE traffic has a 10 minutesession timeout, thus each keep-alive packet is considered part of the original logged connectionat the beginning of the day. B. The Log Server is failing to log GRE traffic property because it is VPN traffic. Disable all VPN

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 102

Page 103: 156-215.75

configurations to the partner site to enable proper logging. C. The log unification process is using a LUUID (Log Unification Unique Identification) that hasbecome corrupt. Because it is encrypted, the R75 Security Gateway cannot distinguishbetweenGRE sessions. This is a known issue with the GRE. Use IPSEC instead of the non GREprotocol for encapsulation. D. The setting Log does not capture this level of details for GRE Set the rule tracking a action toaudit since certain types of traffic can only tracked this way.

Answer: A

Explanation:

QUESTION NO: 248 Which of the following explanations best describes the command fw logswitch [-h target] [+ | -][oldlog]? A. Display a remote machine’s log-file list. B. Control Kernel C. Display protocol Hosts D. Create a new Log file. The old log has moved

Answer: D

Explanation:

QUESTION NO: 249 You are the Security Administrator for MegaCorp and are enjoying your holiday. One day, youreceive a call that some connectivity problems have occurred. Before the holiday, you configuredthe access from the holiday hotel to your Management Portal. You can see and analyze variousobjects. Which objects can you create? A. None. SmartPortal access is read-only. B. Network objects and services C. Security rules only D. Network objects, services and internal users

Answer: A

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 103

Page 104: 156-215.75

QUESTION NO: 250 Which port must be allowed to pass through enforcement points in order to allow packet logging tooperate correctly? A. 514 B. 256 C. 257 D. 258

Answer: C

Explanation:

QUESTION NO: 251 In SmartView Tracker, which rule shows when a packet is dropped due to anti-spoofing? A. Blank field under Rule Number B. Rule 0 C. Cleanup Rule D. Rule 1

Answer: B

Explanation:

QUESTION NO: 252 Each grocery store in a regional chain is protected by a Security Gateway. The information-technology audit department wants a report including: The name of the Security Policy installed on each remote Security Gateway. The date and time the Security Policy was installed. General performance statistics (CPU Use, average CPU time, active real memory, etc) Which one SmartConsole application can you use to gather all this information? A. SmartView Tracker B. SmartView Monitor

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 104

Page 105: 156-215.75

C. SmartDashboard D. SmartUpdate

Answer: B

Explanation:

QUESTION NO: 253 You administer a large, geographically distributed network. The Internet connection at a remotesite failed during the weekend, and the Security Gateway logged locally for over 48 hours. It ispossible that the logs may have consumed most of the free space on the Gateway's hard disk.Which SmartConsole application displays the percent of free hard-disk space on the remoteSecurity Gateway? A. SmartView Tracker B. SmartView Monitor C. This information can only be viewed with fw ctl pstat command from the CLI D. Eventia Analyzer

Answer: B

Explanation:

QUESTION NO: 254 You find a suspicious connection from a problematic host. You decide that you want to blockeverything from that whole network, not just the problematic host. You want to block this for anhour while you investigate further, but you do not want to add any rules to the Rule Base. How doyou achieve this? A. Add a “temporary” rule using SmartDashboard and select hide rule. B. Create a Suspicious Activity Rule in SmartView Monitor C. Use dbedit to script the addition of a rule directly into the Rule Bases_5_0. fws configurationfile. D. Select block intruder from the tools menu in SmartView Tracker.

Answer: B

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 105

Page 106: 156-215.75

QUESTION NO: 255 You have blocked an IP address via the Block Intruder feature of SmartView Tracker. How canyou view the blocked addresses? A. Run f wm blockedview. B. In SmartView Monitor, select the Blocked Intruder option from the query tree view C. In SmartView Monitor, select Suspicious Activity Rules from the Tools menu and select therelevant Security Gateway from the list. D. In SmartView Tracker, click the Active tab. and the actively blocked connections displays

Answer: C

Explanation:

QUESTION NO: 256 In SmartDashboard, you configure 45 MB as the required free hard-disk space to accommodatelogs. What can you do to keep old log files, when free space falls below 45 MB? A. Configure a script to run fw logswitch and SCP the output file to a separate file server. B. Do nothing. Old logs are deleted, until free space is restored. C. Use the fwm logexport command to export the old log files to another location. D. Do nothing. The Security Management Server automatically copies old logs to a backup serverbefore purging.

Answer: A

Explanation:

QUESTION NO: 257 You are Security Administrator for a large call center. The management team is concerned thatemployees may be installing and attempting to use peer-to-peer file-sharing utilities, during theirlunch breaks. The call center's network is protected by an internal Security Gateway, configured todrop peer-to-peer file-sharing traffic. Which option do you use to determine the number of packetsdropped by each Gateway? A. SmartView Monitor B. SmartView Tracker C. SmartView Status D. SmartDashboard

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 106

Page 107: 156-215.75

Answer: A

Explanation:

QUESTION NO: 258 How do you configure an alert in SmartView Monitor? A. By choosing the Gateway, and Configure Thresholds. B. By right-clicking on the Gateway, and selecting System Information. C. An alert cannot be configured in SmartView Monitor. D. By right-clicking on the Gateway, and selecting Properties.

Answer: A

Explanation:

QUESTION NO: 259 True or False: SmartView Monitor can be used to create alerts on a specified Gateway. A. True, by choosing the Gateway and selecting System Information. B. True, by right-clicking on the Gateway and selecting Configure Thresholds. C. False, alerts can only be set in SmartDashboard Global Properties. D. False, an alert cannot be created for a specified Gateway.

Answer: B

Explanation:

QUESTION NO: 260 Which R75 SmartConsole tool would you use to verify the installed Security Policy name on aSecurity Gateway? A. SmartView Status B. SmartView Monitor C. None, SmartConsole applications only communicate with the Security Management Server. D. SmartUpdate

Answer: B

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 107

Page 108: 156-215.75

Explanation:

QUESTION NO: 261 Which R75 SmartConsole tool would you use to verify the installed Security Policy name on aSecurity Gateway? A. SmartUpdate B. SmartView Server C. SmartView Tracker D. None, SmartConsole applications only communicate with the Security Management Server.

Answer: C

Explanation:

QUESTION NO: 262 You have detected a possible intruder listed in SmartView Tracker's active pane. What is thefastest method to block this intruder from accessing your network indefinitely? A. In SmartDashbourd, select IPS / Network Security Denial of Service B. In SmartView Tracker, select Tools / Block Intruder C. In SmartView Monitor, select Tool / Suspicious Activity Rules. D. Modify the Rule Base to drop these connections from the network.

Answer: B

Explanation:

QUESTION NO: 263 Where can an administrator specify the notification action to be taken by the firewall in the eventthat available disk space drops below 15%? A. Real Time Monitor / Gateway Settings / Status Monitor B. SmartView Tracker / Audit Tab / Gateway Counters C. This can only be monitored by a user-defined script. D. SmartView Monitor / Gateway Status / Threshold Settings

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 108

Page 109: 156-215.75

Answer: D

Explanation:

QUESTION NO: 264 Where can an administrator configure the notification action in the event of a policy install timechange? A. SmartView Tracker / Audit Log B. SmartView Monitor / Gateways / Thresholds Settings C. SmartDashboard / Security Gateway Object / Advanced Properties Tab D. SmartDashboard / Policy Package Manager

Answer: B

Explanation:

QUESTION NO: 265 Where are custom queries stored in R75 SmartView Tracker? A. On the Security Management Server tied to the Administrator User Database login name. B. On the SmartView Tracker PC local file system under the user's profile. C. On the Security Management Server tied to the GUI client IP. D. On the SmartView Tracker PC local file system shared by all users of that local PC.

Answer: A

Explanation:

QUESTION NO: 266 How do you view a Security Administrator's activities with SmartConsole? A. SmartView Tracker in the Management tab B. SmartView Tracker in the Network and Endpoint tabs C. SmartView Monitor using the Administrator Activity filter D. Eventia Suite

Answer: A

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 109

Page 110: 156-215.75

Explanation:

QUESTION NO: 267 Which SmartView Tracker selection would most effectively show who installed a Security Policyblocking all traffic from the corporate network? A. Custom filter B. Network and Endpoint tab C. Management Tab D. Active tab

Answer: C

Explanation:

QUESTION NO: 268 You are reviewing the Security Administrator activity for a bank and comparing it to the changelog. How do you view Security Administrator activity? A. SmartView Tracker cannot display Security Administrator activity: instead, view the system logson the Security Management Server's Operating System B. SmartView Tracker in Management Mode C. SmartView Tracker in Active Mode D. SmartView Tracker in Network and Endpoint Mode

Answer: B

Explanation:

QUESTION NO: 269 Which of the following R75 SmartView Tracker views will display a popup warning aboutperformance implications on the Security Gateway? A. Active Tab B. Audit Tab C. Account Query D. All Records Query

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 110

Page 111: 156-215.75

Answer: A

Explanation:

QUESTION NO: 270 While in Smart View Tracker, Brady has noticed some very odd network traffic that he thinks couldbe an intrusion. He decides to block the traffic for 60 but cannot remember all the steps. What isthe correct order of steps needed to perform this? 1) Select the Active Mode tab In Smart view Tracker 2) Select Tools > Block Intruder 3) Select the Log Viewing tab in SmartView Tracker 4) Set the Blocking Time out value to 60 minutes 5) Highlight the connection he wishes to block A. 3, 2, 5, 4 B. 3, 5, 2, 4 C. 1, 5, 2, 4 D. 1, 2, 5, 4

Answer: C

Explanation:

QUESTION NO: 271 What information is found in the SmartView Tracker Management log? A. Rule author B. TCP handshake average duration C. TCP source port D. Top used QOS rule

Answer: A

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 111

Page 112: 156-215.75

QUESTION NO: 272 Where do you enable popup alerts for IPS settings that have detected suspicious activity? A. In SmartView Monitor, select Tools / Alerts B. In SmartView Tracker, select Tools / Custom Commands C. In SmartDashboard, edit the Gateway object, and select IPS / Alerts D. In SmartDashboard, select Global Properties / Log and Alert / Alert Commands

Answer: A

Explanation:

QUESTION NO: 273 Which R75 GUI would you use to see the number of packets accepted since the last policy install? A. SmartView Monitor B. SmartView Status C. SmartView Tracker D. SmartDashboard

Answer: A

Explanation:

QUESTION NO: 274 You are trying to save a custom log query in R75 SmartView Tracker, but getting the followingerror "Could not save 'query-name' (Error Database is Read only). Which of the following is a likely explanation for this? A. You have read-only rights to the Security Management Server database. B. You do not have the explicit right to save a custom query in your administrator permissionprofile under SmartConsole customization C. You do not have OS write permissions on the local SmartView Tracker PC in order to save thecustom query locally D. Another administrator is currently connected to the Security Management Server with read/writepermissions which impacts your ability to save custom log queries to the Security ManagementServer.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 112

Page 113: 156-215.75

Answer: A

Explanation:

QUESTION NO: 275 The R75 fw monitor utility is used to troubleshoot which of the following problems? A. Phase two key negotiation B. User data base corruption C. Log Consolidation Engine D. Traffic issues

Answer: D

Explanation:

QUESTION NO: 276 You are the Security Administrator for MegaCorp. In order to see how efficient your firewall RuleBase is, you would like to see how often the particular rules match. Where can you see it? Givethe BEST answer. A. In SmartReporter, in the section Firewall Blade - Activity / Network Activity with informationconcerning Top Matched Logged Rules. B. It is not possible to see it directly. You can open SmartDashboard and select UserDefined inthe Track column. Afterwards, you need to create your own program with an external counter. C. In the SmartView Tracker, if you activate the column Matching Rate. D. SmartReporter provides this information in the section Firewall Blade - Security / Rule BaseAnalysis with information concerning Top Matched Logged Rules.

Answer: D

Explanation:

QUESTION NO: 277 A company has disabled logging for some of the most commonly used Policy rules. This was todecrease load on the Security Management Server and to make tracking dropped connectionseasier. What action would you recommend to get reliable statistics about the network traffic usingSmartReporter?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 113

Page 114: 156-215.75

A. Turn the field Track of each rule to LOG. B. Network traffic cannot be analyzed when the Security Management Server has a high load. C. Configure Additional Logging on a separate log server. D. SmartReporter analyzes all network traffic, logged or not.

Answer: C

Explanation:

QUESTION NO: 278 What is a Consolidation Policy? A. The collective name of the Security Policy, Address Translation, and IPS Policies. B. The specific Policy written in SmartDashboard to configure which log data is stored in theSmartReporter database. C. The collective name of the logs generated by SmartReporter. D. A global Policy used to share a common enforcement policy for multiple Security Gateways.

Answer: B

Explanation:

QUESTION NO: 279 Which feature in R75 permits blocking specific IP addresses for a specified time period? A. Suspicious Activity Monitoring B. HTTP Methods C. Block Port Overflow D. Local Interface Spoofing

Answer: A

Explanation:

QUESTION NO: 280 You find a suspicious FTP site trying to connect to one of your internal hosts. How do you block itin real time and verify it is successfully blocked?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 114

Page 115: 156-215.75

A. Highlight the suspicious connection in SmartView Tracker Log mode. Block it using Tools >Block Intruder menu. Observe in the Log mode that the suspicious connection does not appearagain in this SmartView Tracker view. B. Highlight the suspicious connection in SmartView Tracker Active mode. Block it using Tools >Block Intruder menu. Observe in the Active mode that the suspicious connection is listed in thisSmartView Tracker view as "dropped". C. Highlight the suspicious connection in SmartView Tracker Log mode. Block it using Tools >Block Intruder menu. Observe in the Log mode that the suspicious connection is listed in thisSmartView Tracker view as "dropped". D. Highlight the suspicious connection in SmartView Tracker Active mode. Block it using Tools >Block Intruder menu. Observe in the Active mode that the suspicious connection does not appearagain in this SmartView Tracker view.

Answer: D

Explanation:

QUESTION NO: 281 Your Security Gateways are running near performance capacity and will get upgraded hardwarenext week. Which of the following would be MOST effective for quickly dropping all connectionsfrom a specific attacker's IP at a peak time of day? A. SAM - Block Intruder feature of SmartView Tracker B. Intrusion Detection System (IDS) Policy install C. SAM - Suspicious Activity Rules feature of SmartView Monitor D. Change the Rule Base and install the Policy to all Security Gateways

Answer: C

Explanation:

QUESTION NO: 282 Your company enforces a strict change control policy. Which of the following would be MOSTeffective for quickly dropping an attacker's specific active connection? A. SAM - Suspicious Activity Rules feature of SmartView Monitor B. Change the Rule Base and install the Policy to all Security Gateways C. Intrusion Detection System (IDS) Policy install D. Block Intruder feature of SmartView Tracker

Answer: D

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 115

Page 116: 156-215.75

Explanation:

QUESTION NO: 283 What do you use to view a R75 Security Gateway's status, including CPU use, amount of virtualmemory, percent of free hard-disk space, and version? A. Only possible via command line tools B. SmartView Tracker C. SmartView Monitor D. SmartUpdate

Answer: C

Explanation:

QUESTION NO: 284 Which R75 component displays the number of packets accepted, rejected, and dropped on aspecific Security Gateway, in real time? A. Smart Event B. SmartView Monitor C. SmartView Status D. SmartUpdate

Answer: B

Explanation:

QUESTION NO: 285 SmartView Tracker R75 consists of three different modes. They are: A. Log, Active, and Audit B. Log, Active, and Management C. Log, Track, and Management D. Network & Endpoint, Active, and Management

Answer: D

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 116

Page 117: 156-215.75

Explanation:

QUESTION NO: 286 You want to configure a mail alert for every time the policy is installed to a specific Gateway.Where would you configure this alert? A. In SmartView Monitor, select Gateway > Configure Thresholds and in SmartDashboard SelectGlobal Properties > Log and alerts > Alert Commands. B. In SmartView Monitor, select Gateway > Configure Thresholds. C. In SmartDashboard, select Global Properties > Log and Alerts > Alert Commands. D. You cannot create a mail alert for Policy installation

Answer: A

Explanation:

QUESTION NO: 287 Your boss wants you to closely monitor an employee suspected of transferring company secrets tothe competition. The IT department discovered the suspect installed a WinSCP client in order touse encrypted communication. Which of the following methods is best to accomplish this task? A. Watch his IP in SmartView monitor by setting an alert action to any packet that matches yourRule base and his IP Address for inbound and outbound traffic. B. Use SmartView Tracker to follow his actions by filtering log entries that feature the WinSCPsource or destination port. Then, export the corresponding entries to a separate log file fordocumentation. C. Use SmartDashboard to add a rule in the firewall rule Base that matches his IP address andthose of potential target and suspucious9 protocols. Apply the alert action or customizedmessaging. D. Send the suspect an email with a key logging Trojan attached, to get direct information abouthis wrong doing

Answer: B

Explanation:

QUESTION NO: 288

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 117

Page 118: 156-215.75

MegaCorp's security infrastructure separates Security Gateways geographically. You mustrequest a central license for one remote Security Gateway. How do you apply the license? A. Using the remote Gateway’s IP address, and attaching the license to the remote Gateway viaSmartUpdate. B. Using your Security Management Server’s IP address, and attaching the license to the remoteGateway via SmartUpdate. C. Using each of the Gateways’ IP addresses, and applying the license on the SecurityManagement Server with the cprlic put command. D. Using the remote Gateway’s IP address and applying the license locally with the cplic putcommand.

Answer: B

Explanation:

QUESTION NO: 289 Identify the correct step performed by SmartUpdate to upgrade a remote Security Gateway. Afterselecting Packages / Distribute Only and choosing the target Gateway, the: A. selected package is copied from the Package Repository on the Security Management Serverto the Security Gateway but the installation IS NOT performed. B. selected package is copied from the Package Repository on the Security Management Serverto the Security Gateway and the installation IS performed. C. SmartUpdate wizard walks the Administrator through a distributed installation. D. selected package is copied from the CD-ROM of the SmartUpdate PC directly to the SecurityGateway and the installation IS performed.

Answer: A

Explanation:

QUESTION NO: 290 Identify the correct step performed by SmartUpdate to upgrade a remote Security Gateway. Afterselecting Packages / Distribute Only and choosing the target Gateway, the: A. selected package is copied from the Package Repository on the Security Management Serverto the Security Gateway but the installation IS NOT performed. B. selected package is copied from the Package Repository on the Security Management Serverto the Security Gateway and the installation IS performed.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 118

Page 119: 156-215.75

C. SmartUpdate wizard walks the Administrator through a distributed installation. D. selected package is copied from the CD-ROM of the SmartUpdate PC directly to the SecurityGateway and the installation IS performed.

Answer: A

Explanation:

QUESTION NO: 291 Identify the correct step performed by SmartUpdate to upgrade a remote Security Gateway. Afterselecting Packages / Distribute and Install Selected Package and choosing the target Gateway,the: A. selected package is copied from the CD-ROM of the SmartUpdate PC directly to the SecurityGateway and the installation IS performed. B. selected package is copied from the Package Repository on the Security Management Serverto the Security Gateway but the installation IS NOT performed. C. SmartUpdate wizard walks the Administrator through a distributed installation. D. selected package is copied from the Package Repository on the Security Management Serverto the Security Gateway and the installation IS performed.

Answer: D

Explanation:

QUESTION NO: 292 Identify the correct step performed by SmartUpdate to upgrade a remote Security Gateway. Afterselecting Packages Select / Add from CD, the: A. entire contents of the CD-ROM arc copied to the packages directory on the selected remoteSecurity Gateway B. selected package is copied to the Package Repository on the Security Management Server. C. entire contents of the CD-ROM are copied to the Package Repository on the SecurityManagement Server D. selected package is copied to the packages directory on the selected remote Security Gateway

Answer: B

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 119

Page 120: 156-215.75

QUESTION NO: 293 What physical machine must have access to the User Center public IP address when checking fornew packages with smartUpdate? A. SmartUpdate GUI PC B. SmartUpdate Repository SQL database Server C. A Security Gateway retrieving the new upgrade package D. SmartUpdate installed Security Management Server PC

Answer: A

Explanation:

QUESTION NO: 294 What port is used for communication to the User Center with SmartUpdate? A. CPMI 200 B. HTTPS 443 C. HTTP 80 D. TCP 8080

Answer: B

Explanation:

QUESTION NO: 295 You are a Security Administrator preparing to deploy a new HFA (Hotfix Accumulator) to tenSecurity Gateways at five geographically separate locations. What is the BEST method toimplement this HFA? A. Send a Certified Security Engineer to each site to perform the update. B. Use SmartUpdate to install the packages to each of the Security Gateways remotely. C. Use a SSH connection to SCP the HFA to each Security Gateway. Once copied locally, imitatea remote installation command and monitor the installation progress with SmartView Monitor D. Send a CD-ROM with the HFA to each location and have local personnel install it.

Answer: B

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 120

Page 121: 156-215.75

QUESTION NO: 296 An advantage of using central instead of local licensing is: A. A license can be taken from one Security Management server and given to another SecurityManagement Server. B. Only one IP address is used for all licenses. C. Licenses are automatically attached to their respective Security Gateways. D. The license must be renewed when changing the IP address of security Gateway. Eachmodule’s license has a unique IP address.

Answer: B

Explanation:

QUESTION NO: 297 You are running the license_upgrade tool on your SecurePlatform Gateway. Which of the followingcan you NOT do with the upgrade tool? A. View the status of currently installed licenses B. Perform the actual license-upgrade process C. View the licenses in the SmartUpdate License Repository D. Simulate the license-upgrade process

Answer: C

Explanation:

QUESTION NO: 298 If a SmartUpdate upgrade or distribution operation fails on SecurePlatfom, how is the systemrecovered? A. The Administrator must remove the rpm packages manually, and re-attempt the upgrade. B. The Administrator can only revert to a previously created snapshot (if there is one) with thecommand cprinstall snapshot <object name> <filename>. C. The Administrator must reinstall the last version via the command cprinstall revert <objectname> <file name>. D. SecurePlatform will reboot and automatically revert to the last snapshot version prior to

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 121

Page 122: 156-215.75

upgrade.

Answer: D

Explanation:

QUESTION NO: 299 Why should the upgrade_export configuration file (.tgz) be deleted after you complete the importprocess? A. It will conflict with any future upgrades when using SmartUpdate. B. SmartUpdate will start a new installation process if the machine is rebooted. C. It contains your security configuration, which could be exploited. D. It will prevent a future successful upgrade_export since the .tgz file cannot be overwritten.

Answer: C

Explanation:

QUESTION NO: 300 Which of these components does NOT require a Security Gateway R75 license? A. SmartUpdate upgrading/patching B. Security Management Server C. SmartConsole D. Check Point Gateway

Answer: C

Explanation:

Topic 4, Volume D

QUESTION NO: 301 You plan to migrate a Windows NG with Application Intelligence (AI) R55 SmartCenter Server toR75. You also plan to upgrade four VPN-1 Pro Gateways at remote offices, and one local VPN-1Pro Gateway at your company's headquarters to R75. The Management Server configurationmust be migrated. What is the correct procedure to migrate the configuration?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 122

Page 123: 156-215.75

A. 1. Upgrade the remote gateway via smartUpdate. 2. upgrade the security management server, using the R75 CD B. 1. From the R75 CD-ROM on the security management server, select Upgrade 2. Reboot after installation and upgrade all licenses via SmartUpdate 3. Reinstall all gateways using R 70 and install a policy C. 1. Copy the $PWDIR\ conf directory from the security management server 2. Save directory contents to another file server 3. Uninstall the security management server, and install anew security management server 4. Move the saved directory contents to $ PWDIR\conf replacing the default installation files 5. Reinstall all gateways using R75 and install a security policy D. 1. From the R75 CD- ROM in the security management server, select export 2. Install R 70 on a new PC using the option installation using imported configuration 3. Reboot after installation and update all licenses via smartUpdate 4. Upgrade software on all five remote Gateway via SmartUpdate

Answer: D

Explanation:

QUESTION NO: 302 You are using SmartUpdate to fetch data and perform a remote upgrade to a R75 SecurityGateway. Which of the following statements is FALSE? A. A remote installation can be performed without the SVN Foundation package installed on aremote NG with Application Intelligence Security Gateway. B. If SmartDashboard is open during package upload and upgrade, the upgrade will fail. C. SmartUpdate can query the Security Management Server and Gateway for product information. D. SmartUpdate can query license information running locally on the Gateway.

Answer: A

Explanation:

QUESTION NO: 303 What action can be performed from SmartUpdate R75? A. remote_uninstall_verifier B. upgrade_export C. fw stat -l D. cpinfo

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 123

Page 124: 156-215.75

Answer: D

Explanation:

QUESTION NO: 304 Which tool CANNOT be launched from SmartUpdate R75? A. snapshot B. SecurePlatform WebUI C. cpinfo D. IP Appliance Voyager

Answer: A

Explanation:

QUESTION NO: 305 If a Security Gateway enforces three protections, LDAP Injection, Malicious Code Protector, andHeader Rejection, which Check Point license is required in SmartUpdate? A. Data Loss Prevention B. SmartEvent Intro C. SSL: VPN D. IPS

Answer: D

Explanation:

QUESTION NO: 306 Central license management allows a Security Administrator to perform which of the followingfunctions? 1) Check for expired licenses. 2) Sort licenses and view license properties 3) Attach both R75 Central and Local licenses to a remote module

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 124

Page 125: 156-215.75

4) Delete both R75 Local licenses and Central licenses from a remote module 5) Add or remove a license to or from the license repository 6) Attach and/or delete only R75 Central licenses to a remote module (not local licenses) A. 2, 5, & 6 B. 2, 3, 4, & 5 C. 1, 2, 5, & 6 D. 1, 2, 3, 4, & 5

Answer: D

Explanation:

QUESTION NO: 307 Sally has a Hot Fix Accumulator (HFA) she wants to install on her Security Gateway whichoperates with SecurePlatform, but she cannot SCP the HFA to the system. She can SSH into theSecurity Gateway, but she has never been able to SCP files to it. What would be the most likelyreason she cannot do so? A. She needs to run cpconfig to enable the ability to SCP files. B. She needs to edit /etc/scpusers and add the Standard Mode account. C. She needs to run sysconfig and restart the SSH process. D. She needs to edit /etc/SSHd/SSHd_config and add the Standard Mode account.

Answer: B

Explanation:

QUESTION NO: 308 Which command gives an overview of your installed licenses? A. cplic print B. showlic C. cplicense D. lic print

Answer: A

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 125

Page 126: 156-215.75

QUESTION NO: 309 Where are SmartEvent licenses installed? A. Security Gateway B. SmartEvent server C. Security Management Server D. Log Server

Answer: B

Explanation:

QUESTION NO: 310 You currently do not have a Check Point software subscription for one of your products. What willhappen if you attempt to upgrade the license for this product? A. The license will be upgraded with a warning B. It is deleted C. It is upgraded with new available features, but cannot be activated D. The license is not upgraded

Answer: D

Explanation:

QUESTION NO: 311 Which of the following statements about service contracts, i.e., Certificate, software subscription,or support contract, is FALSE? A. A service contract can apply only for a single set of Security Gateways managed by the sameSecurity Management Server. B. The contract file is stored on the Security Management Server and downloaded to all SecurityGateways during the upgrade process. C. Most software-subscription contracts are permanent, and need not be renewed after a certaintime passes. D. Service Contracts can apply for an entire User Center account.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 126

Page 127: 156-215.75

Answer: C

Explanation:

QUESTION NO: 312 You have an NGX R65 Gateway running on SecurePlatform. The Gateway also serves as a PolicyServer. When you run patch add CD from the Security Gateway R75 CD-ROM, what does thiscommand allow you to upgrade? A. Only the R75 Security Gateway B. Only the patch utility is upgraded using this command C. All products, except the Policy Server D. Both the operating system and all Check Point products

Answer: D

Explanation:

QUESTION NO: 313 Your network includes a SecurePlatform machine running NG with Application Intelligence (AI)R55. This configuration acts as both the primary Security Management Server and VPN-1 ProGateway. You add one machine, so you can implement Security Gateway R75 in a distributedenvironment. The new machine is an Intel CoreDuo processor, with 2 GB RAM and a 500-GBhard drive. How do you use these two machines to successfully migrate the NG with AI R55configuration? A. 1. On the existing machine, export the NG with AJ R55 configuration to a network share. 2. Insert the R75 CD-ROM in the old machine Install the R7D Security Gateway only whilereinstalling the SecurePlatform OS over the top of the existing installation. Complete sysconfig. 3. On the new machine, install SecurePlatform as the primary Security Management Server only. 4. Transfer the exported. tgz file into the new machine, import the configuration, and then reboot 5. Open SmartDashboard, change the Gateway object to the new version, and reset SIC for theGateway object. B. 1. Export the configuration on the existing machine to a tape drive 2. Uninstall the Security Management Server from the existing machine, using sysconfig. 3. Insert the R75 CD-ROM. run the patch add CD-ROM command to upgrade the existingmachine to the R75 Security Gateway, and reboot 4. Install a new primary Security Management Server on the new machine 5. Change the Gateway object to the new version, and reset SIC C. 1. Export the configuration on the existing machine to a network share 2. Uninstall the Security Gateway from the existing machine, using sysconfig

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 127

Page 128: 156-215.75

3. Insert the R75 CD ROM. and run the patch add CD-HGM command to upgrade the SecurityManagement Server to Security Gateway R 70 4. Select upgrade with imported file, and reboot 5. Install a new R75 Security Gateway as the only module on the new machine, and reset SIC tothe new Gateway D. 1. Export the configuration on the existing machine as a backup only 2. Edit $FWDIR\product. conf on the existing machine, to disable the VPN-1 Pro Gatewaypackage 3. Reboot the existing machine 4. Perform an in place upgrade on the Security Management Server using the command "patchodd cd" 5. On the new machine, install SecurePlatform as the R75 Security Gateway only 6. Run sysconfig to complete the configuration 7. From SmartDashboard, reconfigure the Gateway object to the new version, and reset SIC

Answer: A

Explanation:

QUESTION NO: 314 After installing Security Gateway R75, you discover that one port on your Intel Quad NIC on theSecurity Gateway is not fetched by a Get Topology request. What is the most likely cause andsolution? A. Your NIC driver is installed but was not recognized. Apply the latest SecurePlatform R75 HotfixAccumulator (HFA). B. The NIC is faulty. Replace it and reinstall. C. Make sure the driver for your particular NIC is available, and reinstall. You will be prompted forthe driver. D. If an interface is not configured, it is not recognized. Assign an IP address and subnet maskusing the WebUI.

Answer: D

Explanation:

QUESTION NO: 315 You are installing your R75Security Gateway. Which is NOT a valid option for the hardwareplatform? A. Crossbeam

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 128

Page 129: 156-215.75

B. Solaris C. Windows D. IPSO

Answer: A

Explanation:

QUESTION NO: 316 You plan to upgrade from R65 to R75 Software Blades. Do you need new licenses and licensestrings for this scenario? A. No, the upgrade will preserve licenses. B. Yes, you need to buy/convert licenses in the User Center first, and then reapply licenses toupgraded systems with the new Software Blades licenses. C. Yes, the upgrade will do an automatic conversion in the User Center, but you will need toreattach the new licenses. D. No, the upgrade will convert all licenses to R75.

Answer: B

Explanation:

QUESTION NO: 317 What is the command to upgrade a SecurePlatform NG with Application Intelligence R55Management Server to R75? A. fwm upgrade_tool B. upgrade_mgmt C. patch add cd D. fw install_mgmt

Answer: C

Explanation:

QUESTION NO: 318 Jeff wanted to upgrade his Security Gateway to R75, but he remembers that he needs to have acontracts file from the User Center before he can start the upgrade. If Jeff wants to download the

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 129

Page 130: 156-215.75

contracts file from the User Center, what is the correct order of steps needed to perform this? 1) Select Update Contracts from User Center. 2) Enter your Username for your User Center account. 3) Enter your Password for your User Center account. 4) Click the Browse button to specify the path to your download contracts file. 5) Enter your Username and Password for your Security Gateway. A. 2, 3, 4 B. 1, 5, 4 C. 5, 2, 3 D. 1, 2, 3

Answer: D

Explanation:

QUESTION NO: 319 Your current Check Point enterprise consists of one Management Server and four Gateways infour different locations with the following versions: All devices are running SecurePlatform. You are upgrading your enterprise to R75. Place therequired tasks from the following list in the correct order for upgrading your enterprise to R75. 1) Upgrade all gateways to R75 2) Upgrade all gateways 3 and 4 to R 65 3) Upgrade all gateways 2, 3, and 4 to R 65 4) Upgrade all gateway 4 to R 65 5) Perform pre-upgrade verifier on Security management server 6) Perform pre-upgrade verifier on all Gateways 7) Perform License upgrade checker on Gateway 2 8) Perform License upgrade checker on Gateway 3

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 130

Page 131: 156-215.75

9) Perform License upgrade checker on Gateway 4 10) Perform License upgrade checker on Security Management Server 11) Perform License upgrade checker on all devices 12) Upgrade security management server to R 70 A. 11, 5, 12, 3, 1 B. 9, 4, 5, 12, 1 C. 5, 6, 12, 1 D. 11, 5, 12, 2, 1

Answer: B

Explanation:

QUESTION NO: 320 In which directory do you install the R75 pre-upgrade verifier on a SecurePlatform SecurityManagement Server? A. It does not matter since the dynamic information entered by the Administrator will cause it toretrieve the proper configurations. B. In $PWDIR/ conf. C. It does not matter as long as the Administrator uses chmod to permit the file to execute. D. in $PWDIR/ bin

Answer: A

Explanation:

QUESTION NO: 321 What happens to evaluation licenses during the license-upgrade process? A. They are dropped. B. They remain untouched, but may not activate all features of a new version. C. They automatically expire. D. They are upgraded with new available features.

Answer: B

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 131

Page 132: 156-215.75

QUESTION NO: 322 One of your licenses is set for an IP address no longer in use. What happens to this license duringthe license-upgrade process? A. It is upgraded with new available features but the IP remains the same B. It remains untouched. C. It is upgraded with the previous features using the new IP address D. It is dropped

Answer: B

Explanation:

QUESTION NO: 323 All Check Point Suite products before version RXX need to be upgraded to RXX before you canupgrade them to R75. RXX is: A. R55 B. R65 C. R61 D. R60

Answer: B

Explanation:

QUESTION NO: 324 R75 is compatible with UTM-1 Edge gateways X.X and above. X.X is: A. 6.5 B. 7.5 C. 7.0 D. 8.5

Answer: B

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 132

Page 133: 156-215.75

QUESTION NO: 325 Can you upgrade a clustered deployment with zero downtime? A. No, this is not possible. B. Yes, if you select the option zero downtime, it will keep one member active C. No, you must bring all gateways down. D. Yes, this is the default setting.

Answer: B

Explanation:

QUESTION NO: 326 As a Security Administrator, you must refresh the Client Authentication authorization time-outevery time a new user connection is authorized. How do you do this? Enable the RefreshableTimeout setting: A. in the user object’s Authentication screen B. in the Gateway object’s Authentication screen C. in the Limit tab of the Client Authentication Action Properties screen D. in the Global Properties Authentication screen

Answer: C

Explanation:

QUESTION NO: 327 Your Rule Base includes a Client Authentication rule, using partial authentication and standardsign-on for HTTP, Telnet, and FTP services. The rule was working, until this morning. Now usersare not prompted for authentication, and they see error page cannot be displayed in the browser.In SmartView Tracker, you discover the HTTP connection is dropped when the Gateway is thedestination. What did you do to cause Client Authentication to fail? A. disabled R75 Control Connections in Global Properties B. enabled Static NAT on the problematic machines C. added a rule below the Client Authentication rule, blocking HTTP from the internal network

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 133

Page 134: 156-215.75

D. added the Stealth Rule before the Client Authentication rule

Answer: D

Explanation:

QUESTION NO: 328 The technical-support department has a requirement to access an intranet server. Whenconfiguring a User Authentication rule to achieve this, which of the following should youremember? A. The Security Gateway first checks if there is any rule that does not require authentication forthis type of connection before invoking the Authentication Security Server. B. Once a user is first authenticated, the user will not be prompted for authentication again untillogging out. C. You can only use the rule for Telnet, FTP, SMTP, and rlogin services. D. You can limit the authentication attempts in the Authentication tab of the User Propertiesscreen.

Answer: A

Explanation:

QUESTION NO: 329 Which column in the Rule Base is used to define authentication parameters? A. Source B. Action C. Track D. Service

Answer: B

Explanation:

QUESTION NO: 330 Choose the BEST sequence for configuring user management in SmartDashboard, Using anLDAP server.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 134

Page 135: 156-215.75

A. Configure a server object for the LDAP Account Unit, enable LDAP in Global Properties B. Configure a workstation object for the LDAP server; configure a server object for the LDAP inglobal properties. C. Enable LDAP in Global Properties, configure a host-node object for the LDAP server, andconfigure a server object for the LDAP Account Unit. D. Configure a server object for the LDAP Account Unit, and create an LDAP resource object.

Answer: C

Explanation:

QUESTION NO: 331 You cannot use SmartDashboard's SmartDirectory features to connect to the LDAP server. Whatshould you investigate? A. 1 and 3 B. 1 and 2 C. 2 and 3 D. 1, 2, and 3

Answer: C

Explanation:

QUESTION NO: 332 Identify the ports to which the Client Authentication daemon listens by default. A. 8080, 529 B. 259,900 C. 80, 256 D. 256,600

Answer: B

Explanation:

QUESTION NO: 333 What is the Manual Client Authentication TELNET Port?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 135

Page 136: 156-215.75

A. 23 B. 259 C. 264 D. 900

Answer: B

Explanation:

QUESTION NO: 334 Your company's Security Policy forces users to authenticate to the Gateway explicitly, before theycan use any services. The Gateway does not allow the Telnet service to itself from any location.How would you configure authentication on the Gateway? With a: A. Client Authentication for fully automatic sign on B. Client Authentication rule using the manual sign-on method, using HTTP on port 900 C. Client Authentication rule, using partially automatic sign on D. Session Authentication rule

Answer: B

Explanation:

QUESTION NO: 335 Which authentication type permits five different sign-on methods in the authentication propertieswindow? A. Manual Authentication B. Client Authentication C. Session Authentication D. User Authentication

Answer: B

Explanation:

QUESTION NO: 336 Which of the following objects is a valid source in an authentication rule?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 136

Page 137: 156-215.75

A. User@Network B. User@Any C. Host@Any D. User_group@Network

Answer: D

Explanation:

QUESTION NO: 337 Users are not prompted for authentication when they access their Web servers, even though youhave created an HTTP rule via User Authentication. Why? A. Users must use the SecuRemote Client, to use the User Authentication Rule. B. Another rule that accepts HTTP without authentication exists in the Rule Base. C. You checked the cache password on desktop option in Global Properties. D. You have forgotten to place the User Authentication Rule before the Stealth Rule.

Answer: B

Explanation:

QUESTION NO: 338 Which authentication type requires specifying a contact agent in the Rule Base? A. Client Authentication with Partially Automatic Sign On B. User Authentication C. Session Authentication D. Client Authentication with Manual Sign On

Answer: C

Explanation:

QUESTION NO: 339 What is the difference between Standard and Specific Sign On methods? A. Standard Sign On allows the user to be automatically authorized for all services that the rule

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 137

Page 138: 156-215.75

allows, but re-authenticate for each host to which he is trying to connect. Specific Sign On requiresthat the user re-authenticate for each service. B. Standard Sign On requires the user to re-authenticate for each service and each host to whichhe is trying to connect. Specific Sign On allows the user to sign on only to a specific IP address. C. Standard Sign On allows the user to be automatically authorized for all services that the ruleallows. Specific Sign On requires that the user re-authenticate for each service and each host towhich he is trying to connect. D. Standard Sign On allows the user to be automatically authorized for all services that the ruleallows. Specific Sign On requires that the user re-authenticate for each service specifically definedin the window Specific Action Properties.

Answer: C

Explanation:

QUESTION NO: 340 Which set of objects have an Authentication tab? A. Networks. Hosts B. Users, Networks C. Users, User Groups D. Templates, Users

Answer: D

Explanation:

QUESTION NO: 341 As a Security Administrator, you are required to create users for authentication. When you createa user for user authentication, the data is stored in the ___________. A. SmartUpdate repository B. User Database C. Rules Database D. Objects Database

Answer: B

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 138

Page 139: 156-215.75

QUESTION NO: 342 Review the following rules. Assume domain UDP is enabled in the implied rules. What happens when a user from the internal network tries to browse to the Internet using HTTP?The user:

A. is prompted three times before connecting to the Internet successfully. B. can go to the Internet after Telnetting to the client auth daemon port 259. C. can connect to the Internet successfully after being authenticated. D. can go to the Internet, without being prompted for authentication.

Answer: D

Explanation:

QUESTION NO: 343 Reviews the following rules and note the Client Authentication Action properties screen, as shownbelow:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 139

Page 140: 156-215.75

After being authenticated by the Security Gateway, when a user starts an HTTP connection to aWeb site, the user tries to FTP to another site using the command line. What happens to the user?The: A. user is prompted from that FTP site only, and does not need to enter his username andpassword for Client Authentication. B. User is prompted for Authentication by the Security Gateway again. C. FTP data connection is dropped after the user is authenticated successfully. D. FTP connection is dropped by rules 2.

Answer: A

Explanation:

QUESTION NO: 344 Which Security Gateway R75 configuration setting forces the Client Authentication authorizationtime-out to refresh, each time a new user is authenticated? The:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 140

Page 141: 156-215.75

A. Global Properties > Authentication parameters, adjusted to allow for Regular ClientRefreshment B. Time properties, adjusted on the user objects for each user, in the source of the ClientAuthentication rule C. IPS > Application Intelligence > Client Authentication > Refresh User Timeout option enabled D. Refreshable Timeout setting, in the Limits tab of the Client Authentication Action Propertiesscreen

Answer: D

Explanation:

QUESTION NO: 345 All R75 Security Servers can perform authentication with the exception of one. Which of theSecurity Servers cannot perform authentication? A. RLOGIN B. HTTP C. SMTP D. FTP

Answer: C

Explanation:

QUESTION NO: 346 Which of the following are authentication methods that Security Gateway R75 uses to validateconnection attempts? Select the response below that includes the MOST complete list of validauthentication methods. A. Proxied, User, Dynamic, Session B. Connection, User, Client C. User, Client, Session D. Connection, Proxied, Session

Answer: C

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 141

Page 142: 156-215.75

QUESTION NO: 347 Security Gateway R75 supports User Authentication for which of the following services? Select theresponse below that contains the MOST complete list of supported services. A. FTP, HTTP, TELNET B. FTP, TELNET C. SMTP, FTP, HTTP, TELNET D. SMTP, FTP, TELNET

Answer: A

Explanation:

QUESTION NO: 348 With the User Directory Software Blade, you can create R75 user definitions on a(n)_______Server. A. Radius B. NT Domain C. LDAP D. SecureID

Answer: C

Explanation:

QUESTION NO: 349 The User Directory Software Blade is used to integrate which of the following with SecurityGateway R75? A. RADIUS server B. Account management client server C. User authority server D. LDAP server

Answer: D

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 142

Page 143: 156-215.75

QUESTION NO: 350 If you are experiencing LDAP issues, which of the following should you check? A. Domain name resolution B. Overlapping VPN Domains C. Secure Internal Communications (SIC) D. Connectivity between the R75 Gateway and LDAP server

Answer: D

Explanation:

QUESTION NO: 351 How are cached usernames and passwords cleared from the memory of a R75 Security Gateway? A. By retrieving LDAP user information using the command fw fetchldap B. By using the Clear User Cache button in Smart Dashboard C. Usernames and password only clear from memory after they time out D. By installing a Security Policy

Answer: D

Explanation:

QUESTION NO: 352 Your users are defined in a Windows 2003 R2 Active Directory server. You must add LDAP usersto a Client Authentication rule. Which kind of user group do you need in the Client Authenticationrule in R75? A. All Users B. External-user group C. A group with a generic user D. LDAP group

Answer: D

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 143

Page 144: 156-215.75

QUESTION NO: 353 Which type of R75 Security Server does not provide User Authentication? A. FTP Security Server B. SMTP Security Server C. HTTP Security Server D. HTTPS Security Server

Answer: B

Explanation:

QUESTION NO: 354 Mr. Smith needs access to other networks and should be able to use all services, but sessionauthentication is not suitable. The Security Administrator selects client authentication with HTTP.The standard authentication port for client HTTP authentication (Port 900) is already in use. TheSecurity Administrator wants to use the Port 9001, but there are some connectivity problems.What is the reason for the connectivity problems? Give the BEST answer. A. The configuration of the service FW1_clntauth_http is not correct. B. The Security Policy is not correct. C. The configuration file $FWDIR/conf/fwauthd.conf is wrong. D. It is not possible to use any port other than the standard port 900 for the client authenticationvia HTTP.

Answer: C

Explanation:

QUESTION NO: 355 You are about to integrate RSA SecurID users into the Check Point infrastructure. What kind ofusers are to be defined via SmartDashboard? A. internet user group B. A group with generic user C. LDAP account unit Group D. All users

Answer: B

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 144

Page 145: 156-215.75

Explanation:

QUESTION NO: 356 User Mark is requesting a Website while he is using a computer out of the net_singapore network.

What is TRUE about his location restriction? A. Source setting in User Properties always takes precedence. B. It depends on how the User Auth object is configured; whether User Properties or SourceRestriction takes precedence. C. Source setting in Source column always takes precedence D. As location restrictions add up, he would be allowed from net_singapore and net_sydney.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 145

Page 146: 156-215.75

Answer: B

Explanation:

QUESTION NO: 357 In the given Rule Base, the client authentication in rule 4 is configured as fully automatic. Eric is amember of the LDAP group, MSAD_Group. When Eric tries to connect to a server on the Internet,what will happen? A. Eric will be blocked because LDAP is not allowed in the Rule Base. B. None of these things will happen. C. Eric will be authenticated and get access to the requested server. D. Eric will be blocked by the Stealth Rule.

Answer: B

Explanation:

QUESTION NO: 358 Assume you are a Security Administrator for ABCTech. You have allowed authenticated access tousers from Mkting_net to Finance_net. But in the user's properties, connections are only permittedwithin Mkting_net. What is the BEST way to resolve this conflict? A. Permit access to Finance_net B. Select ignore database in action properties window C. Select intersect with user database in the action properties window D. Select Intersect with user database or Ignore Database in the Action Properties window.

Answer: D

Explanation:

QUESTION NO: 359 When selecting an authentication scheme for a user, which scheme would you use if you onlywant the password to be stored locally? (The password is not stored at a third party component.)

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 146

Page 147: 156-215.75

A. Check Point Password B. TACACS C. SecurID D. OS Password

Answer: A

Explanation:

QUESTION NO: 360 For which service is it NOT possible to configure user authentication? A. HTTPS B. FTP C. SSH D. Telnet

Answer: C

Explanation:

QUESTION NO: 361 For remote user authentication, which authentication scheme is NOT supported? A. SecurlD B. TACACS C. Check Point Password D. RADIUS

Answer: B

Explanation:

QUESTION NO: 362 For information to pass securely between a Security Management Server and another CheckPoint component, what would NOT be required? A. The communication must be authenticated

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 147

Page 148: 156-215.75

B. The communication must use two-factor or biometric authentication. C. The communication must be encrypted D. The component must be time-and-date synchronized with the security management server.

Answer: B

Explanation:

QUESTION NO: 363 What is the bit size of a DES key? A. 112 B. 168 C. 56 D. 64

Answer: C

Explanation:

QUESTION NO: 364 What is the size of a hash produced by SHA-1? A. 128 B. 56 C. 40 D. 160

Answer: D

Explanation:

QUESTION NO: 365 Public keys and digital certificates do NOT provide which of the following? A. Authentication B. Nonrepudiation C. Data integrity

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 148

Page 149: 156-215.75

D. Availability

Answer: D

Explanation:

QUESTION NO: 366 If you check the box Use Aggressive Mode in the IKE Properties dialog box, the standard: A. three-packet IKE Phase 2 exchange Is replaced by a six-packet exchange B. three-packet IKE Phase 2 exchange is replaced by a two-packet exchange C. six-packet IKE Phase 1 exchange is replaced by a three-packet exchange D. three-packet IKE Phase 1 exchange is replaced by a six-packet exchange

Answer: C

Explanation:

QUESTION NO: 367 You are concerned that a message may have been intercepted and retransmitted, thuscompromising the security of the communication. You attach a code to the electronicallytransmitted message that uniquely identifies the sender. This code is known as a(n): A. diffie-Helman verification B. digital signature C. private key D. AES flag

Answer: B

Explanation:

QUESTION NO: 368 Your manager requires you to setup a new corporate VPN between all your branch offices. Herequires you to choose the strongest and most secure available algorithms for the headquarters tothe Research and Development branch office. In addition, you must use high performancealgorithms for all sales offices with shorter key length for the VPN keys. How would you configurethis scenario?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 149

Page 150: 156-215.75

A. This can not be achieved at all as all algorithms need to be the very same for all VPNs. B. This can only be done in traditional mode VPNs while not using simplified VPN settings. C. This can be done either in traditional mode or simplified VPN using 2 different communities andthe headquarters as the center for both communities. D. This can be done in a single community, but the encrypt action in the security Rule Base needsto be configured for exceptions.

Answer: C

Explanation:

QUESTION NO: 369 Whitfield Diffie and martin Hellman gave their names to what standard? A. An encryption scheme that makes pre-shared keys obsolete B. An algorithm that is used in IPsec QuickMode and as an additional option in IPsec QuickMode(PFS) C. A Key Exchange Protocol for the advanced Encryption Standard D. A Key Agreement / Derivation Protocol that constructs secure keys over an insecure channel.

Answer: D

Explanation:

QUESTION NO: 370 If you need strong protection for the encryption of user data, what option would be the BESTchoice? A. When you need strong encryption, IPsec is not the best choice. SSL VPNs are a better choice. B. Disable Diffie Hellman by using stronger certificate based key-derivation. Use AES-256 bit onall encrypted channels and add PFS to QuickMode. Use double encryption by implementing AHand ESP as protocols. C. Use certificates for Phase 1, SHA for all hashes, AES for all encryption and PFS, and use ESPprotocol. D. Use Diffie Hellman for key construction and pre-shared keys for Quick Mode. Choose SHA inQuick Mode and encrypt with AES. Use AH protocol. Switch to Aggressive Mode.

Answer: C

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 150

Page 151: 156-215.75

QUESTION NO: 371 What is used to validate a digital certificate? A. IPsec B. CRL C. S/MIME D. PKCS

Answer: B

Explanation:

QUESTION NO: 372 Assume an intruder has compromised your current IKE Phase 1 and Phase 2 keys. Which of thefollowing options will end the intruder’s access after the next Phase 2 exchange occurs? A. Perfect Forward Secrecy B. SHA1 Hash Completion C. Phase 3 Key Revocation D. M05 Hash Completion

Answer: A

Explanation:

QUESTION NO: 373 Which statement defines Public Key Infrastructure? Security is provided: A. By authentication B. By Certificate Authorities, digital certificates, and two-way symmetric- key encryption C. By Certificate Authorities, digital certificates, and public key encryption. D. Via both private and public keys, without the use of digital Certificates.

Answer: C

Explanation:

QUESTION NO: 374

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 151

Page 152: 156-215.75

Review the following list of actions that Security Gateway R75 can take when it controls packets.The Policy Package has been configured for Simplified Mode VPN. Select the response below thatincludes the available actions: A. Accept, Drop, Encrypt, Session Auth B. Accept, Reject, Encrypt, Drop C. Accept, Drop, Reject, Client Auth D. Accept, Hold, Reject, Proxy

Answer: C

Explanation:

QUESTION NO: 375 Your organization maintains several IKE VPNs. Executives in your organization want to knowwhich mechanism Security Gateway R75 uses to guarantee the authenticity and integrity ofmessages. Which technology should you explain to the executives? A. Key-exchange protocols B. Digital signatures C. Certificate Revocation Lists D. Application Intelligence

Answer: B

Explanation:

QUESTION NO: 376 Which of the following provides confidentiality services for data and messages in a Check PointVPN? A. Cryptographic checksums B. Digital signatures C. Asymmetric Encryption D. Symmetric Encryption

Answer: D

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 152

Page 153: 156-215.75

QUESTION NO: 377 Your company has two headquarters, one in London, and one in New York. Each office includesseveral branch offices. The branch offices need to communicate with the headquarters in theircountry, not with each other, and only the headquarters need to communicate directly. What is theBEST configuration for establishing VPN Communities for this company? VPN Communitiescomprised of: A. Two star and one mesh Community: One star Community is set up for each site, withheadquarters as the center of the Community and its branches as satellites. The mesh Communityincludes only New York and London Gateways. B. One star Community with the option to "mesh" the center of the star: New York and LondonGateways added to the center of the star with the mesh canter Gateways option checked, allLondon branch offices defined m one satellite window, but all New York branch offices defined manother satellite window. C. Two mesh and one star Community One mesh Community is set up for each of theheadquarters and its branch offices The star Community is configured with London as the centerof the Community and New York is the satellite. D. Three mesh Communities: One for London headquarters and its branches, one for New Yorkheadquarters and its branches, and one f;or London and New York headquarters.

Answer: A

Explanation:

QUESTION NO: 378 Which of these attributes would be critical for a site-to-site VPN? A. Strong authentication B. Centralized management C. Strong data encryption D. Scalability to accommodate user groups

Answer: C

Explanation:

QUESTION NO: 379 Which of the following is NOT true for Clientless VPN?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 153

Page 154: 156-215.75

A. The Gateway accepts any encryption method that is proposed by the client and supported inthe VPN B. Secure communication is provided between clients and servers that support HTTP C. User Authentication is supported D. The Gateway can enforce the use of strong encryption

Answer: B

Explanation:

QUESTION NO: 380 You want to establish a VPN, using certificates. Your VPN will exchange certificates with anexternal partner. Which of the following activities should you do first? A. Manually import your partner’s Certificate Revocation List. B. Exchange exported CA keys and use them to create a new server object to represent yourpartner's Certificate Authority (CA). C. Create a new logical-server object to represent your partner’s CA D. Manually import your partner’s Control List.

Answer: B

Explanation:

QUESTION NO: 381 Your company is still using traditional mode VPN configuration on all Gateways and policies. Yourmanager now requires you to migrate to a simplified VPN policy to benefit from the new features.This needs to be done with no downtime due to critical applications which must run constantly.How would you start such a migration? A. This cannot be done without downtime as a VPN between a traditional mode Gateway and asimplified mode Gateway does not work. B. You first need to completely rewrite all policies in simplified mode and then push this new policyto all Gateways at the same time. C. This can not be done as it requires a SIC- reset on the Gateways first forcing an outage. D. Convert the required Gateway policies using the simplified VPN wizard, check their logic andthen migrate Gateway per Gateway.

Answer: D

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 154

Page 155: 156-215.75

QUESTION NO: 382 Your manager requires you to setup a VPN to a new business partner site. The administrator fromthe partner site gives you his VPN settings and you notice that he setup AES 128 for IKE phase 1and AES 256 for IKE phase 2. Why is this a problematic setup? A. All is fine as the longest key length has been chosen for encrypting the data and a shorter keylength for higher performance for setting up the tunnel. B. All is fine and can be used as is. C. Only 128 bit keys are used for phase 1 keys which are protecting phase 2, so the longer keylength in phase 2 only costs performance and does not add security due to a shorter key in phase1. D. The 2 algorithms do not have the same key length and so don't work together. You will get theerror ".... No proposal chosen...."

Answer: C

Explanation:

QUESTION NO: 383 Why are certificates preferred over pre-shared keys in an IPsec VPN? A. Weak scalability: PSKs need to be set on each and every Gateway B. Weak performance: PSK takes more time to encrypt than Drffie-Hellman C. Weak security: PSKs can only have 112 bit length. D. Weak Security: PSK are static and can be brute-forced.

Answer: D

Explanation:

QUESTION NO: 384 Multi-Corp must comply with industry regulations in implementing VPN solutions among multiplesites. The corporate Information Assurance policy defines the following requirements: What is the most appropriate setting to comply with these requirements? Portability Standard

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 155

Page 156: 156-215.75

Key management Automatic, external PKI Session keys changed at configured times during a connection’s lifetime Key length No less than 128-bit Data integrity Secure against inversion and brute-force attacks What is the most appropriate setting to comply with theses requirements? A. IKE VPNs: SHA1 encryption for IKE Phase 1, and MD5 encryption for phase 2, AES hash B. IKE VPNs: DES encryption for IKE phase 1, and 3DES encryption for phase 2, MD 5 hash C. IKE VPNs: CAST encryption for IKE Phase 1, and SHA 1 encryption for phase 2, DES hash D. IKE VPNs: AES encryption for IKE Phase 1, and AES encryption for Phase 2; SHA1 hash

Answer: D

Explanation:

QUESTION NO: 385 What happens in relation to the CRL cache after a cpstop and cpstart have been initiated? A. The Gateway retrieves a new CRL on startup, and discards the old CRL as invalid. B. The Gateway continues to use the old CRL, as long as it is valid. C. The Gateway continuous to use the old CRL even if it is not valid, until a new CRL is cashed. D. The Gateway issues a crl_zap on startup, which empties the cache and forces certificateretrieval.

Answer: B

Explanation:

QUESTION NO: 386 Which of the following is TRUE concerning control connections between the Security ManagementServer and the Gateway in a VPN Community? Control Connections are: A. encrypted using SIC and re-encrypted again by the Community regardless of VPN domainconfiguration. B. encrypted by the Community. C. not encrypted, only authenticated. D. encrypted using SIC.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 156

Page 157: 156-215.75

Answer: D

Explanation:

QUESTION NO: 387 How many times is the firewall kernel invoked for a packet to be passed through a VPNconnection? A. Three times B. Twice C. Once D. None The IPSO kernel handles it

Answer: B

Explanation:

QUESTION NO: 388 You have traveling salesmen connecting to your VPN community from all over the world. Whichtechnology would you choose? A. SSL VPN: It has more secure and robust encryption schemes than IPsec. B. IPseC.It allows complex setups that match any network situation available to the client, i.e.connection from a private customer network or various hotel networks. C. SSL VPN: It only requires HTTPS connections between client and server. These are most likelyopen from all networks, unlike IPsec, which uses protocols and ports which are blocked by manysites. D. IPseC.It offers encryption, authentication, replay protection and all algorithms that are state ofthe art (AES) or that perform very well. It is native to many client operating systems, so setup caneasily be scripted.

Answer: C

Explanation:

QUESTION NO: 389 You wish to configure a VPN and you want to encrypt not just the data packet, but the originalheader. Which encryption scheme would you select?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 157

Page 158: 156-215.75

A. Both encrypt the data and header B. Tunneling-mode encryption C. In-place encryption

Answer: B

Explanation:

QUESTION NO: 390 You wish to view the current state of the customer's VPN tunnels, including those that are downand destroyed. Which SmartConsole application will provide you with this information? A. SmartView Monitor B. SmartView Status C. SmartView Tracker D. SmartUpdate

Answer: A

Explanation:

QUESTION NO: 391 Which VPN Community object is used to configure Hub Mode VPN routing in SmartDashboard? A. Mesh B. Star C. Routed D. Remote Access

Answer: B

Explanation:

QUESTION NO: 392 When a user selects to allow Hot-spot, SecureClient modifies the Desktop Security Policy and/orHub Mode routing to enable Hot-spot registration. Which of the following is NOT true concerningthis modification?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 158

Page 159: 156-215.75

A. IP addresses accessed during registration are recorded. B. Ports accessed during registration are recorded. C. The number of IP addresses accessed is unrestricted. D. The modification is restricted by time.

Answer: C

Explanation:

QUESTION NO: 393 For VPN routing to succeed, what must be configured? A. VPN routing is not configured in the Rule Base or Community objects. Only the native-routingmechanism on each Gateway can direct the traffic via its VTI configured interfaces. B. No rules need to be created; implied rules that cover inbound and outbound traffic on thecentral (HUB) Gateway are already in place from Policy > Properties > Accept VPN-1 ControlConnections. C. At least two rules in the Rule Base must be created, one to cover traffic inbound and the otherto cover traffic outbound on the central (HUB) Security Gateway. D. A single rule in the Rule Base must cover all traffic on the central (HUB) Security Gateway forthe VPN domain.

Answer: D

Explanation:

QUESTION NO: 394 What can NOT be selected for VPN tunnel sharing? A. One tunnel per subnet pair B. One tunnel per Gateway pair C. One tunnel per pair of hosts D. One tunnel per VPN domain pair

Answer: D

Explanation:

QUESTION NO: 395

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 159

Page 160: 156-215.75

Marc is a Security Administrator configuring a VPN tunnel between his site and a partner site. Hejust created the partner city's firewall object and a community. While trying to add the firewalls tothe community only his firewall could be chosen. The partner city's firewall does not appear. Whatis a possible reason for the problem? A. IPsec VPN Software Blade on the partner city's firewall object is not activated. B. The partner city's firewall object was created as an interoperable device. C. The partner city's Gateway is running VPN-1 NG AI. D. Only Check Point Gateways could be added to a community.

Answer: A

Explanation:

QUESTION NO: 396 If Henry wanted to configure Perfect Forward Secrecy for his VPN tunnel, in which phase would hebe configuring this? A. Aggressive Mode B. Diffie-Hellman C. Phase 2 D. Phase 1

Answer: C

Explanation:

QUESTION NO: 397 You install and deploy SecurePlatform with default settings. You allow Visitor Mode in the RemoteAccess properties of the Gateway object and install policy, but SecureClient refuses to connect.What is the cause of this? A. Set Visitor Mode in Policy > Global Properties / Remote-Access / VPN - Advanced. B. Office mode is not configured. C. The WebUI on SecurePlatform runs on port 443 (HTTPS). When you configure Visitor Mode itcannot bind to default port 443, because it's used by another program (WebUI). You need tochange the WebUI port, or run Visitor Mode on a different port. D. You need to start SSL Network Extender first, than use Visitor Mode.

Answer: C

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 160

Page 161: 156-215.75

Explanation:

QUESTION NO: 398 With deployment of SecureClient, you have defined in the policy that you allow traffic only to anencrypted domain. But when your mobile users move outside of your company, they often cannotuse SecureClient because they have to register first (i.e. in Hotel or Conference rooms). How doyou solve this problem? A. Allow your users to turn off SecureClient B. Allow for unencrypted traffic C. Allow traffic outside the encrypted domain D. Enable Hot Spot/Hotel Registration

Answer: D

Explanation:

QUESTION NO: 399 What statement is true regarding Visitor Mode? A. VPN authentication and encrypted traffic are tunneled through port TCP 443. B. All VPN traffic is tunneled through UDP port 4500. C. Only Main mode and Quick mode traffic are tunneled on TCP port 443. D. Only ESP traffic is tunneled through port TCP 443.

Answer: A

Explanation:

QUESTION NO: 400 Phase 1 uses________. A. Conditional B. Sequential C. Asymmetric D. Symmetric

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 161

Page 162: 156-215.75

Answer: C

Explanation:

Topic 5, Volume E

QUESTION NO: 401 If you were NOT using IKE aggressive mode for your IPsec tunnel, how many packets would yousee for normal Phase 1 exchange? A. 6 B. 2 C. 3 D. 9

Answer: A

Explanation:

QUESTION NO: 402 How many packets does the IKE exchange use for Phase 1 Main Mode? A. 6 B. 1 C. 3 D. 12

Answer: A

Explanation:

QUESTION NO: 403 How many packets does the IKE exchange use for Phase 1 Aggressive Mode? A. 12 B. 3 C. 1 D. 6

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 162

Page 163: 156-215.75

Answer: B

Explanation:

QUESTION NO: 404 Which of the following actions take place in IKE Phase 2 with Perfect Forward Secrecy disabled? A. The DH public keys are exchanged. B. Peers authenticate using certificates or preshared secrets. C. Symmetric IPsec keys are generated. D. Each Security Gateway generates a private Diffie-Hellman (DH) key from random pools.

Answer: C

Explanation:

QUESTION NO: 405 Which of the following commands can be used to remove site-to-site IPsec Security Association(SA)? A. fw ipsec tu B. vpn ipsec C. vpn debug ipsec D. vpn tu

Answer: D

Explanation:

QUESTION NO: 406 In which IKE phase are IKE SA's negotiated? A. Phase 4 B. Phase 1 C. Phase 3 D. Phase 2

Answer: B

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 163

Page 164: 156-215.75

Explanation:

QUESTION NO: 407 In which IKE phase are IPsec SA's negotiated? A. Phase 3 B. Phase 1 C. Phase 2 D. Phase 4

Answer: C

Explanation:

QUESTION NO: 408 You wish to configure an IKE VPN between two R75 Security Gateways, to protect two networks.The network behind one Gateway is 10.15.0.0/16, and network 192.168.9.0/24 is behind thepeer's Gateway. Which type of address translation should you use to ensure the two networksaccess each other through the VPN tunnel? A. Hide NAT B. Static NAT C. Manual NAT D. None

Answer: D

Explanation:

QUESTION NO: 409 Which operating system is not supported by SecureClient? A. MacOS X B. Windows XP SP2 C. Windows Vista D. IPSO 3.9

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 164

Page 165: 156-215.75

Answer: D

Explanation:

QUESTION NO: 410 Which of the following SSL Network Extender server-side prerequisites is NOT correct? A. The Gateway must be configured to work with Visitor Mode. B. There are distinctly separate access rules required for SecureClient users vs. SSL NetworkExtender users. C. To use Integrity Clientless Security (ICS), you must install the IC3 server or configuration tool. D. The specific Security Gateway must be configured as a member of the Remote AccessCommunity

Answer: B

Explanation:

QUESTION NO: 411 Which of the following is NOT supported with Office Mode? A. SecuRemote B. SSL Network Extender C. SecureClient D. Endpoint Connect

Answer: A

Explanation:

QUESTION NO: 412 Which of the following is NOT supported with office mode? A. Transparent mode B. L2TP C. Secure Client D. SSL Network Extender

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 165

Page 166: 156-215.75

Answer: A

Explanation:

QUESTION NO: 413 Your organization has many Edge Gateways at various branch offices allowing users to accesscompany resources. For security reasons, your organization's Security Policy requires all Internettraffic initiated behind the Edge Gateways first be inspected by your headquarters' R75 SecurityGateway. How do you configure VPN routing in this star VPN Community? A. To Internet and other targets only B. To center or through the center to other satellites, to Internet and other VPN targets C. To center and other satellites, through center D. To center only

Answer: B

Explanation:

QUESTION NO: 414 Of the following VPN Community options, which is most likely to provide a balance between IKEcompatibility to VPN-capable devices (Check Point and non-Check Point) and preservingresources on the R75 Gateway? VPN tunnel sharing per: A. pair of hosts, no permanent tunnels, Diffie-Hellman Group 1 for Phase 1. B. subnet, no permanent tunnels, Diffie-Hellman Group 2 for Phase 1. C. subnet, permanent tunnels, Diffie-Hellman Group 1 for Phase 1. D. pair of hosts, permanent tunnels, Diffie-Hellman Group 2 for Phase 1.

Answer: B

Explanation:

QUESTION NO: 415 There are three options available for configuring a firewall policy on the SecureClient Mobiledevice. Which of the following is NOT an option? A. Configured on endpoint client

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 166

Page 167: 156-215.75

B. No C. Configured on server D. yes

Answer: C

Explanation:

QUESTION NO: 416 When attempting to connect with SecureClient Mobile the following error message is received. The certificate provided is invalid. Please provide the username and password. What is the probable cause of the error? A. The certificate provided is invalid. B. The user's credentials are invalid. C. The user attempting to connect is not configured to have an office mode IP address so theconnection failed. D. There is no connection to the server, and the client disconnected.

Answer: A

Explanation:

QUESTION NO: 417 Which operating system is NOT supported by Endpoint Connect R75? A. MacOS X B. Windows XP SP2 O C. C. Windows Vista 64-bit SP1 D. Windows 2000 SP1

Answer: A

Explanation:

QUESTION NO: 418 Using the output below, what type of VPN Community is configured for fw-stlouis?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 167

Page 168: 156-215.75

A. Traditional B. Domain-Based C. Meshed D. Star

Answer: C

Explanation:

QUESTION NO: 419 You are evaluating the configuration of a mesh VPN Community used to create a site-to-site VPN.This graphic displays the VPN properties in this mesh Community.

Which of the following would be the most valid conclusion? A. The VPN Community will perform IKE Phase 1 key-exchange encryption using the longest keySecurity Gateway R75 supports. B. Changing the setting Perform IPsec data encryption with from AES-128 to 3DES will increasethe encryption overhead. C. Changing the setting Perform key exchange encryption with 3DES to DES will enhance theVPN Community's security, and reduce encryption overhead.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 168

Page 169: 156-215.75

D. Change the data-integrity settings for this VPN CommunitybecauseMD5 is incompatible withAES.

Answer: B

Explanation:

QUESTION NO: 420 What is a possible reason for the IKE failure shown in this screenshot?

A. Mismatch in VPN Domains. B. Mismatch in Diffie-Hellman group. C. Mismatch in encryption schemes. D. Mismatch in preshared secrets.

Answer: D

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 169

Page 170: 156-215.75

QUESTION NO: 421 How can you access the Certificate Revocation List (CRL) on the firewall, if you have configured aStealth Rule as the first explicit rule? A. You can access the Revocation list by means of a browser using the URL: http://IP-FW:18264/ICA CRL1.crl1 provided the implied rules are activated per default. B. The CRL is encrypted, so it is useless to attempt to access it. C. You cannot access the CRL, since the Stealth Rule will drop the packets D. You can only access the CRI via the Security Management Server as the internal CA is locatedon that server

Answer: A

Explanation:

QUESTION NO: 422 Which could be an appropriate solution for assigning a unique Office Mode IP address to EndpointConnect users? A. Configure a DHCP server with IP reservation using the information gathered by the utility vpnmacutil. B. Edit $ PWDIA/conf/SCM_ assignment. conf on the management server with the correct username and office mode ip address C. Create a DHCP resource with the fixed IP address to use name mapping. D. Fixed office mode IP can be configured as a user property in smart dash board

Answer: A

Explanation:

QUESTION NO: 423 In the SmartView Tracker you receive the error, …peer send invalid ID information… while tryingto establish an IKE VPN tunnel. Where does this error normally result from and how can you solveit? This error normally results from: A. a mismatch in the authentication algorithms used in IKE phase one and can be corrected bychanging them to match. B. an invalid IP address configured on one tunnel endpoint; normally the internal one in theGeneral tab. This can be solved with link selection or by changing this IP to the one facing theother tunnel endpoint.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 170

Page 171: 156-215.75

C. an invalid IP address configured on one tunnel endpoint, normally the internal one in theGeneral tab. This can be resolved by adding the correct IPs to the Topology tab of both Gatewayson both sites. D. a mismatch in the IPs of the VPN tunnel endpoints and can not be resolved.

Answer: B

Explanation:

QUESTION NO: 424 How many packets are required for IKE Phase 2? A. 2 B. 12 C. 6 D. 3

Answer: D

Explanation:

QUESTION NO: 425 Which of the following actions do NOT take place in IKE Phase 1? A. Each side generates a session key from its private key and peer’s public key B. Peers agree on integrity method C. Diffie-Hillman key is combined with the key material to produce the symmetrical IPsec key. D. Peers agree on encryption method

Answer: C

Explanation:

QUESTION NO: 426 When using an encryption algorithm, which is generally considered the best encryption method? A. DES B. AES

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 171

Page 172: 156-215.75

C. Triple DES D. CAST cipher

Answer: B

Explanation:

QUESTION NO: 427 Fill in the blank: When you want to create a VPN community where all participating gateways areable to connect to each other, you need to set up a ___________ community. A. Remote Access B. Meshed C. SSL VPN D. Star

Answer: B

Explanation:

QUESTION NO: 428 Which do you configure to give remote access VPN users a local IP address? A. Office mode IP pool B. NAT pool C. Encryption domain pool D. Authentication pool

Answer: A

Explanation:

QUESTION NO: 429 When using vpn tu, which option must you choose if you only want to clear phase 2 for a specificIP (gateway)? A. (6) Delete all IPsec SAs for a given User (Client) B. (7) Delete all IPsec+IKE SAs for a given peer (GW)

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 172

Page 173: 156-215.75

C. (8) Delete all IPsec+IKE SAs for a given User (Client) D. (5) Delete all IPsec SAs for a given peer (GW)

Answer: D

Explanation:

QUESTION NO: 430 When using vpn tu, which option must you choose if you want to rebuild your VPN for a specific IP(gateway)?

A. (6) Delete all IPsec SAs for a given User (Client) B. (7) Delete all IPsec+IKE SAs for a given peer (GW) C. (5) Delete all IPsec SAs for a given peer (GW) D. (8) Delete all IPsec+IKE SAs for a given User (Client)

Answer: B

Explanation:

QUESTION NO: 431 Which of the following statements about file-type recognition in Content Inspection is TRUE? A. Antivirus status is monitored using SmartView Tracker. B. A scan failure will only occur if the antivirus engine fails to initialize. C. All file types are considered "at risk", and are not configurable by the Administrator or theSecurity Policy. D. The antivirus engine acts as a proxy, caching the scanned file before delivering it to the client.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 173

Page 174: 156-215.75

Answer: D

Explanation:

QUESTION NO: 432 Which antivirus scanning method does not work if the Gateway is connected as a node in proxymode? A. Scan by Direction B. Scan by File Type C. Scan by Server D. Scan by IP Address

Answer: A

Explanation:

QUESTION NO: 433 Which OPSEC server can be used to prevent users from accessing certain Web sites? A. LEA B. AMON C. UFP D. CVP

Answer: C

Explanation:

QUESTION NO: 434 How do you control the maximum number of mail messages in a spool directory? A. In the Gateway object's SMTP settings under the Advanced window B. in the smtp.conf file on the Security Management Server C. In the Security Server window in Global Properties D. In IPS SMTP settings

Answer: A

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 174

Page 175: 156-215.75

Explanation:

QUESTION NO: 435 If you experience unwanted traffic from a specific IP address, how can you stop it most quickly? A. Check anti-spoofing settings B. Configure a rule to block the address C. Create a SAM rule D. Activate an IPS protection

Answer: C

Explanation:

QUESTION NO: 436 URL filtering policy can make exceptions for specific sites by being enforced: A. Only for specific sources and destinations. B. For all traffic, except on specific sources and destinations. C. For alt traffic, except blocked sites. D. For all traffic. There are no exceptions.

Answer: B

Explanation:

QUESTION NO: 437 The URL Filtering Policy can be configured to monitor URLs in order to: A. Log sites from blocked categories. B. Redirect users to a new URL. C. Block sites only once. D. Alert the Administrator to block a suspicious site.

Answer: A

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 175

Page 176: 156-215.75

QUESTION NO: 438 Which type of resource could a Security Administrator use to control access to specific file shareson target machines? A. URI B. CIFS C. Telnet D. FTP

Answer: B

Explanation:

QUESTION NO: 439 What rules send log information to Dshield.org when Storm Center is configured? A. Determined in IPS, Dshield Storm Center configuration: Security Management Server sendslogs from rules with tracking set to either Alert or one of the specific User Defined Alerts B. Determined by the Global Properties configuration: Log defined in the Log and Alerts section,rules with tracking sent to Account or SNMP trap. C. Determined in Web Intelligence, configuration: Information Disclosure is configured; rules withtracking set to User Defined Alerts or SNMP trap. D. Determined by the Dshield Storm Center Logging setting in Logs and Master of the SecurityManagement Server object rules with tracking set to Log or None.

Answer: A

Explanation:

QUESTION NO: 440 A security audit has determined that your unpatched Web application server is accessing a SQLserver. Which IPS setting will allow the Security Gateway to prevent this error page fromdisplaying information about the SQL server in your DMZ? A. In Web Intelligence / General / HTTP Protocol Inspection, enables ASCII only responseheaders. B. In web intelligence / HTTP Protocol Inspection, select the box Enforce Strict HTTP response

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 176

Page 177: 156-215.75

parsing. C. In application intelligence / FingerPrint Scrambling / WEB Apps, Select the Scramble errormessage checkbox. D. In Web Intelligence / Information Disclosure / Error Concealment

Answer: D

Explanation:

QUESTION NO: 441 Antivirus protection on a Check Point Gateway is available for all of the following protocols,EXCEPT: A. FTP B. SMTP C. HTTP D. TELNET

Answer: D

Explanation:

QUESTION NO: 442 Which Security Servers can perform authentication tasks, but CANNOT perform content securitytasks? A. RHV HTTPS B. FTP C. RLOGIN D. HTTP

Answer: C

Explanation:

QUESTION NO: 443 Which Security Servers can perform authentication tasks, but CANNOT perform content securitytasks?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 177

Page 178: 156-215.75

A. HTTPS B. Telnet C. FTP D. HTTP

Answer: B

Explanation:

QUESTION NO: 444 When using the Anti-Virus Content Security, how are different file types analyzed? A. They are analyzed by their un-encoded format. B. They are analyzed by their magic number. C. They are analyzed by the MIME header. D. They are analyzed by their file extension (i.e. .bat, .exe. .doc)

Answer: B

Explanation:

QUESTION NO: 445 For which protocol is anti-virus not available? A. SMTP B. FTP C. HTTPS D. HTTP

Answer: C

Explanation:

QUESTION NO: 446 Where can you view anti-spam status? A. SmartView Monitor B. SmartDashboard

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 178

Page 179: 156-215.75

C. SmartView Tracker D. SmartUpdate

Answer: A

Explanation:

QUESTION NO: 447 Where can you view the anti-virus status? A. SmartDashboard B. SmartView Tracking C. SmartView Monitor D. SmartUpdate

Answer: C

Explanation:

QUESTION NO: 448 How would you create a temporary user bypass to the URL Filtering policy in Security Gateway? A. By adding an exception in URL Filtering / Advanced I Network Exceptions B. By enabling it in URL Filtering /Advanced / Bypass C. By creating an authentication rule in the Firewall D. It is not possible

Answer: D

Explanation:

QUESTION NO: 449 You manage a global network extending from your base in Chicago to Tokyo, Calcutta and Dallas.Management wants to report detailing the current software level of each Enterprise class SecurityGateway. You plan to take the opportunity to create a proposal outline listing the most cost-effective way to upgrade your Gateways. Which two SmartConsole applications will you use tocreate this report and outline?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 179

Page 180: 156-215.75

A. SmartLSM and SmartUpdate B. SmartView Tracker and SmartView Monitor C. SmartView Monitor and SmartUpdate D. SmartDashboard and SmartView Tracker

Answer: D

Explanation:

QUESTION NO: 450 Message digests use which of the following? A. SHA-1 and MD5 B. IDEA and RC4 C. SSL and MD4 D. DES and RC4

Answer: C

Explanation:

QUESTION NO: 451 Which of the following is a hash algorithm? A. DES B. IDEA C. MD5 D. 3DES

Answer: A

Explanation:

QUESTION NO: 452 Which of the following uses the same key to decrypt as it does to encrypt? A. Asymmetric encryption B. Symmetric encryption

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 180

Page 181: 156-215.75

C. Certificate-based encryption D. Dynamic encryption

Answer: A

Explanation:

QUESTION NO: 453 You believe Phase 2 negotiations are failing while you are attempting to configure a site-to-siteVPN with one of your firm's business partners. Which SmartConsole application should you use toconfirm your suspicions? A. SmartDashboard B. SmartView Tracker C. SmartUpdate D. SmartView Status

Answer: C

Explanation:

QUESTION NO: 454 A digital signature: A. Provides a secure key exchange mechanism over the Internet B. Automatically exchanges shared keys. C. Guarantees the authenticity and integrity of a message. D. Decrypts data to its original form.

Answer: B

Explanation:

QUESTION NO: 455 Your bank's distributed R75 installation has Security Gateways up for renewal. WhichSmartConsole application will tell you which Security Gateways have licenses that will expirewithin the next 30 days?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 181

Page 182: 156-215.75

A. SmartView Tracker B. Smart Portal C. SmartUpdate D. SmartDashboard

Answer: A

Explanation:

QUESTION NO: 456 When launching SmartDashboard, what information is required to log into R75? A. User Name, Management Server IP, certificate fingerprint file B. User Name, Password. Management Server IP C. Password. Management Server IP D. Password, Management Server IP, LDAP Server IP

Answer: D

Explanation:

QUESTION NO: 457 Which component functions as the Internal Certificate Authority for R75? A. Security Gateway B. Management Server C. Policy Server D. SmartLSM

Answer: C

Explanation:

QUESTION NO: 458 To reduce the information given to you in SmartView Tracker, what can you do to find informationabout data being sent between pcosaka and pctokyo?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 182

Page 183: 156-215.75

A. Double-click an entry representing a connection between both endpoints. B. Press CTRL+F in order to open the find dialog, and then search the corresponding IPaddresses. C. Apply a source filter by adding both endpoint IP addresses with the equal option set. D. Use a regular expression to filter out relevant logging entries.

Answer: C

Explanation:

QUESTION NO: 459 A third-shift Security Administrator configured and installed a new Security Policy early thismorning. When you arrive, he tells you that he has been receiving complaints that Internet accessis very slow. You suspect the Security Gateway virtual memory might be the problem. WhichSmartConsole component would you use to verify this? A. SmartView Tracker B. SmartView Monitor C. This information can only be viewed with fw ctl pstat command from the CLI. D. Eventia Analyzer

Answer: B

Explanation:

QUESTION NO: 460 You wish to analyze the packet size distribution of your traffic with SmartView Monitor. Unfortunately, the message, There are no machines that contain Firewall Blade and SmartViewMonitor appears. A. What should you do to analyze the packet size distribution of your traffic? Give the BESTanswer. B. Purchase the SmartView Monitor license for your Security Management Server. C. Purchase the SmartView Monitor license for your Security Gateway. D. Enable Monitoring on your Security Gateway. E. Enable Monitoring on your Security Management Server.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 183

Page 184: 156-215.75

Answer: C

Explanation:

QUESTION NO: 461 When troubleshooting NAT entries in SmartView Tracker, which column do we need to check toview the new source IP when using NAT? A. XlateSrc B. XlateSPort C. XlateDst D. XlateDPort

Answer: A

Explanation:

QUESTION NO: 462 When troubleshooting NAT entries in SmartView Tracker, which column do we need to check toview the NAT'd source port when using source NAT? A. XlateDst B. XlateDPort C. XlateSPort D. XlateSrc

Answer: C

Explanation:

QUESTION NO: 463 Which Client Authentication sign-on method requires the user to first authenticate via the UserAuthentication mechanism when logging in to a remote server with Telnet? A. Standard Sign On B. Manual Sign On

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 184

Page 185: 156-215.75

C. Agent Automatic Sign On D. Partially Automatic Sign On

Answer: D

Explanation:

QUESTION NO: 464 Your company has two headquarters, one in London, one in New York. Each of the headquartersincludes several branch offices. The branch offices only need to communicate with theheadquarters in their country, not with each other, and the headquarters need to communicatedirectly. What is the BEST configuration for establishing VPN Communities among the branchoffices and their headquarters, and between the two headquarters? VPN Communities comprisedof: A. Three mesh Communities: one for London headquarters and its branches; one for New Yorkheadquarters and its branches; and one for London and New York headquarters. B. Three star Communities: The first one is between New York headquarters and its branches.The second star Community is between London headquarters and its branches. The third starCommunity is between New York and London headquarters but it is irrelevant which site is"center" and which "satellite". C. Two mesh and one star Community: Each mesh Community is set up for each site betweenheadquarters their branches. The star Community has New York as the center and London as itssatellite. D. One star Community with the option to mesh the center of the star: New York and LondonGateways added to the center of the star with the "mesh center Gateways" option checked; allLondon branch offices defined in one satellite window; but, all New York branch offices defined inanother satellite window.

Answer: B

Explanation:

QUESTION NO: 465 Phase 2 uses ___________, if not using Perfect Forward Secrecy. A. Symmetric B. Conditional C. Sequential D. Asymmetric

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 185

Page 186: 156-215.75

Answer: A

Explanation:

QUESTION NO: 466 The SIC certificate is stored in the directory _______________. A. $CPDIR/conf B. $FWDIR/database C. $CPDIR/registry D. $FWDIR/conf

Answer: A

Explanation:

QUESTION NO: 467 Access Role objects define users, machines, and network locations as: A. One object B. Credentialed objects C. Separate objects D. Linked objects

Answer: A

Explanation:

QUESTION NO: 468 What command syntax would you use to see accounts the gateway suspects are serviceaccounts? A. pdp check_log B. adlog check__acoounts C. pdp show service D. adlog service_accounts

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 186

Page 187: 156-215.75

Answer: D

Explanation:

QUESTION NO: 469 If a security gateway enforces three protections, LDAP injection, Malicious Code ProtectorRejection, which checkpoint license is required in SmartPhone? A. SmallEvent intro B. IPS C. SSL VPN D. Data Loss Prevention

Answer: B

Explanation:

QUESTION NO: 470 Using Captive Portal, unidentified users may be blocked, allowed to enter required credentials, orrequired to downloaD. A. ICA Certificate B. SecureClient C. Full Endpoint Client D. Identity Awareness Agent

Answer: D

Explanation:

QUESTION NO: 471 What is true about the Rule Base shown?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 187

Page 188: 156-215.75

(i). HTTP traffic from webrome to websingapore will be encrypted (ii). HTTP traffic from websingapore to webrome will be encrypted (iii). HTTP traffic from webrome ro websingapore will be encrypted (iv). HTTP traffic from websingapore to webromw will be blocked A. (ii) and (iii) B. (iii) and (iv) C. (i), (ii) and (iii) D. (iii) only

Answer: C

Explanation:

QUESTION NO: 472 The third-shift Administrator was updating Security Management Server Access settings in GlobalProperties and testing. He managed to lock himself out of his account. How can you unlock thisaccount? A. Delete the file sdmin.lock in the Security Management Server directory $PWDIR/tmp/ B. The fwn lock_admin –u <account name> from Security Management Server command line C. Type fwn unlock_admin – u from the Security Gateway command line D. Type fwn unlock_admin from the Security Management Server Command line

Answer: B

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 188

Page 189: 156-215.75

QUESTION NO: 473 What command syntax would you use to turn on PDP logging in a distributed environment? A. pdp tracker on B. pdp log = l C. pdp track = l D. pdp logging on

Answer: A

Explanation:

QUESTION NO: 474 Once an Access Role is configured, in which Rule Bases can it be implemented? A. DLP B. Mobile Access C. Firewall D. IPS

Answer: C

Explanation:

QUESTION NO: 475 Identity Awareness is implemented to manage access to protected resources based on a user's_____________. A. Location B. Application requirement C. Computer MAC address D. Time of connection

Answer: B

Explanation:

QUESTION NO: 476

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 189

Page 190: 156-215.75

Which of the following is NOT defined by an Access Role object? A. Source Network B. Source Logging and/or Alerting Rule C. Source Machine D. Source Server

Answer: B

Explanation:

QUESTION NO: 477 Which rule is responsible for installation feature?

A. Rule 4 B. Rule 8 C. Rule 7 D. Rule 5

Answer: B

Explanation:

QUESTION NO: 478 What information is found in the SmartView Tracker Management log? A. Administrator SmartDashboard logout event

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 190

Page 191: 156-215.75

B. SecurePlatform expert login event C. Creation of an administrator using cpconfig D. FTP username authentication failure

Answer: A

Explanation:

QUESTION NO: 479 Captive Portal is a _____________ that allows the gateway to request login information from theuser. A. LDAP server add-on B. Transparent network inspection tool C. Separately licensed feature D. Pre-configured and customizable web-based tool

Answer: D

Explanation:

QUESTION NO: 480 Which of the following items should be configured for the Security Management Server toauthenticate via LDAP? A. Windows logon password B. Active Directory Server object C. WMI object D. Check Point Password

Answer: B

Explanation:

QUESTION NO: 481 You plan to create a backup of the rules, objects, policies, and global properties from an R75Security Management Server. Which of the following backup and restore solution can you use?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 191

Page 192: 156-215.75

1. Upgrade_export and upgrade_import utilities 2. Database revision control 3. SecurePlatform backup utilities 4. Policy package management 5. Manual copies of the $CPDIR/conf directory A. 2, 4, 5 B. 1, 3, 4 C. 1, 2, 3 D. 1, 2, 3, 4, 5

Answer: C

Explanation:

QUESTION NO: 482 You install and deploy SecurePlatform with default settings. You allow visitor Mode in the Gatewayobject’s Remote Access properties and install policy, but SecureClient refuses to connect. What isthe cause of this? A. Set the Visitor Mode Policy > Global Properties > Remote-Access > VPN – Advanced B. Offline mode is not configured C. You need to start SSL Network Extended first, then use Visitor Mode D. The WebUI on SecurePlatform runs on port 443 (HTTPS). When you configure Visitor Mode itcannot bind to default port 443, because it’s used by another program (WebUI). You need tochange the WebUI port, or run Visitor Mode on a different port.

Answer: D

Explanation:

QUESTION NO: 483 Which of the following allows administrators to allow or deny traffic to or from a specific networkbased on the user's credentials? A. Access Role B. Access Rule

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 192

Page 193: 156-215.75

C. Access Policy D. Access Certificate

Answer: B

Explanation:

QUESTION NO: 484 What are you required to do before running the command upgrade_export? A. Run a cpatop on the Security Management Server B. Run a cpstop on the Security Gateway C. Close all GUI clients D. Run cpconfig and set yourself up as a GUI client

Answer: C

Explanation:

QUESTION NO: 485 What action CANNOT be run from SmartUpdate R75? A. Reboot Gateway B. Fetch sync status C. Get all Gateway Data D. Preinstall verifier

Answer: B

Explanation:

QUESTION NO: 486 What happens if the identity of a user is known? A. If the user credentials do not match an Access Role, the gateway moves onto the next rule. B. If the user credentials do not match an Access Role, the system displays the Captive Portal C. If the user credentials do not match an Access Role, the traffic is automatically dropped D. If the user credentials do not match an Access Role, the system displays a sandbox.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 193

Page 194: 156-215.75

Answer: A

Explanation:

QUESTION NO: 487 My Awareness is implemented to manage access to protected resources based on a user's_____________. A. Time of connection B. Application requirement C. Identity D. Computer MAC address

Answer: C

Explanation:

QUESTION NO: 488 You are the Security Administrator for MegaCorp and would like to view network activity usingSmartReporter. You select a standard report as you can see here, you can select the LondonGateway.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 194

Page 195: 156-215.75

When you attempt to configure the Express Report, you are unable to select Gateway.

What is the reason for this behavior? Give the BEST answer A. You must enable the Eventia Express Mode on the London Gateway B. You must enable Monitoring in the London Gateway object's General Properties C. You have the license for Eventia Reporter in Standard mode only D. You must enable the Express Mode inside Eventia Reporter.

Answer: B

Explanation:

QUESTION NO: 489 The Identity Agent is a lightweight endpoint agent that authenticates securely with Single Sign-On(SSO). What is not a recommended usage of this method? A. Leveraging identity for Data Center protection B. Protecting highly sensitive servers C. When accuracy in detecting identity is crucial D. Identity based enforcement for non-AD users (non-Windows and guest users)

Answer: D

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 195

Page 196: 156-215.75

QUESTION NO: 490 Certificates for Security Gateways are created during a simple initialization from ___________. A. The ICA management tool B. SmartUpdate C. Sysconfig D. SmartDashboard

Answer: A

Explanation:

QUESTION NO: 491 What mechanism does a gateway configured with Identity Awareness and LDAP initially use tocommunicate with a Windows 2003 or 2008 server? A. RCP B. LDAP C. WMI D. CIFS

Answer: C

Explanation:

QUESTION NO: 492 Which of the following are available SmartConsole clients which can be installed from the R75Windows CD? Read all answer and select the most complete and valid list. A. SmartView Tracker, CPINFO, SmartUpdate B. SmartView Tracker, SmartDashboard, SmartLSM, SmartView Monitor C. SmartView Tracker, SmartDashboard, CPINFO, SmartUpdate, SmartView Status D. Security Policy Editor, Log viewer, Real Time Monitor GUI

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 196

Page 197: 156-215.75

Answer: A

Explanation:

QUESTION NO: 493 Which of the following items should be configured for the Security Management Server toauthenticate using LDAP? A. Domain Admin password B. Check Point Password C. Windows logon password D. WM1 object

Answer: A

Explanation:

QUESTION NO: 494 The Captive Portal tool: A. Allows access to users already identified B. Acquires identities from unidentified users C. Is deployed from the Identity Awareness page in the Global Properties settings D. Is only used for guest user authentication

Answer: B

Explanation:

QUESTION NO: 495 The London Security Gateway Administrator has just installed the Security Gateway andManagement Server. He has not changed any default settings. As he tries to configure theGateway, he is unable to connect. Which troubleshooting suggestion will NOT help him? A. Check if some intermediate network device has a wrong routing table entry, VLAN assignment,duplex-mismatch, or trunk issue.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 197

Page 198: 156-215.75

B. Verify that the Rule Base explicitly allows management connections. C. Test the IP address assignment and routing settings ofthe Security ManagementServer,Gateway, and console client. D. Verify the SIC initialization.

Answer: B

Explanation:

QUESTION NO: 496 How can you reset the Security Administrator password that was created during initial SecurityManagement Server installation on SecurePlatform? A. Export the user database into an ASCII file with fwm dbexport. Open this file with an editor, anddelete the Password portion of the file. Then log in to the account without a password. You will beprompted to assign a new password. B. Launch SmartDashboard in the User Management screen, and edit the cpconfig administrator. C. Type cpm -a, and provide the existing administrator's account name. Reset the SecurityAdministrator's password. D. As expert user Type fwm -a, and provide the existing administrator's account name. Reset theSecurity Administrator's password.

Answer: D

Explanation:

QUESTION NO: 497 How can you activate the SNMP daemon on a Check Point Security Gateway? A. Using the command line, enter snmp_install. B. Any of these options will work. C. In SmartDashboard, right-click a Check Point object and select Activate SNMP. D. From cpconfig, select Activate SNMP extensions..

Answer: D

Explanation:

QUESTION NO: 498

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 198

Page 199: 156-215.75

What will happen when Reset is pressed and confirmed in the Trust Communication windowlaunched from the Gateway object? A. The Gateway certificate will be revoked on the Gateway only. B. The Gateway certificate will be revoked on the Security Management Server and SIC will bereset on the Gateway. C. SIC will be reset on the Gateway only. D. The Gateway certificate will be revoked on the Security Management Server only.

Answer: D

Explanation:

QUESTION NO: 499 In the Security Policy shown here, which rule inhibits Rule 4?

A. Rule 3 B. Rule 1 C. Rule 2 D. No rule inhibits Rule 4.

Answer: C

Explanation:

QUESTION NO: 500 Which command allows Security Policy name and install date verification on a Security Gateway?

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 199

Page 200: 156-215.75

A. fw ver -p B. fw stat -l C. fw show policy D. fw ctl pstat -policy

Answer: B

Explanation:

QUESTION NO: 501 Identity Awareness is implemented to manage access to protected resources based on a user's_____________. A. Time of connection B. Application requirement C. Identity D. Computer MAC address

Answer: C

Explanation:

QUESTION NO: 502 John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HRservers to a set of designated IP addresses to minimize malware infection and unauthorizedaccess risks. Thus, the gateway policy permits access only from John's desktop which is assigneda static IP address 10.0.0.19. He has received a new laptop and wants to access the HR Web Server from anywhere in theorganization. The IT department gave the laptop a static IP address, but that limits him tooperating it only from his desk. The current Rule Base contains a rule that lets John Adamsaccess the HR Web Server from his laptop with a static IP (10.0.0.19). He wants to move around the organization and continue to have access to the HR Web Server. Tomake this scenario work, the IT administrator: 1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources,and installs the policy. 2) Adds an access role object to the Firewall Rule Base that lets John Adams access the HR WebServer from any machine and from any location and installs policy.

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 200

Page 201: 156-215.75

John plugged in his laptop to the network on a different network segment and was not able toconnect to the HR Web server. What is the next troubleshooting step? A. John should install the Identity Awareness Agent B. Investigate this as a network connectivity issue C. After enabling Identity Awareness, reboot the gateway D. He should lock and unlock the computer

Answer: D

Explanation:

QUESTION NO: 503 John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HRservers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned a static IPaddress 10.0.0.19. John received a laptop and wants to access the HR Web Server from anywhere in theorganization. The IT department gave the laptop a static IP address, but that limits him tooperating it only from his desk. The current Rule Base contains a rule that lets John Adamsaccess the HR Web Server from his laptop with a static IP (10.0.0.19). He wants to move aroundthe organization and continue to have access to the HR Web Server. To make this scenario work, the IT administrator: 1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sourcesinstalls the policy. 2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HRWeb Server from any machine and from any location. John plugged in his laptop to the network on a different network segment and he is not able toconnect. How does he solve this problem? A. John should lock and unlock the computer B. Investigate this as a network connectivity issue C. John should install the Identity Awareness Agent D. The firewall admin should install the Security Policy

Answer: D

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 201

Page 202: 156-215.75

QUESTION NO: 504 John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HRservers to designated IP addresses to minimize malware infection and unauthorized access risks.Thus, the gateway policy permits access only from John's desktop which is assigned a static IPaddress 10.0.0.19. John received a laptop and wants to access the HR Web Server from anywhere in theorganization. The IT department gave the laptop a static IP address, but that limits him tooperating it only from his desk. The current Rule Base contains a rule that lets John Adamsaccess the HR Web Server from his laptop with a static IP (10.0.0.19). He wants to move aroundthe organization and continue to have access to the HR Web Server. To make this scenario work, the IT administrator: 1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sourcesinstalls the policy. 2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HRWeb Server from any machine and from any location. What should John do when he cannot access the web server from a different personal computer? A. John should lock and unlock his computer B. John should install the Identity Awareness Agent C. Investigate this as a network connectivity issue D. The access should be changed to authenticate the user instead of the PC

Answer: D

Explanation:

QUESTION NO: 505 The CEO of ACME recently bought her own personal iPad. She wants to access the internalFinance Web server from her iPad. Because the iPad is not a member of the Active Directorydomain, she cannot identify seamlessly with AD Query. However, she can enter her ADcredentials in the Captive Portal and then get the same access as on her office computer. Heraccess to resources is based on rules in the Firewall Rule Base. To make this scenario work, the IT administrator must:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 202

Page 203: 156-215.75

1) Enable Identity Awareness on a gateway and select Captive Portal as one of the IdentitySources. 2) In the Portal Settings window in the User Access section, make sure that Name and passwordlogin is selected. 3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access networkdestinations. Select accept as the Action. When Jennifer McHanry tries to access the resource but is unable. What should she do? A. Have the security administrator select the Action field of the Firewall Rule "Redirect HTTPconnections to an authentication (captive) portal" B. Install the Identity Awareness agent on her iPad C. Have the security administrator reboot the firewall D. Have the security administrator select Any for the Machines tab in the appropriate Access Role

Answer: A

Explanation:

QUESTION NO: 506 When using LDAP as an authentication method for Identity Awareness, the query: A. Prompts the user to enter credentials. B. Requires administrators to specifically allow LDAP traffic to and from the LDAP Server and theSecurity Gateway. C. Requires client and server side software. D. Is transparent, requiring no client or server side software.

Answer: D

Explanation:

QUESTION NO: 507 Which of the following firewall modes DOES NOT allow for Identity Awareness to be deployed? A. Bridge B. High Availability C. Lode Sharing

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 203

Page 204: 156-215.75

D. Fail Open

Answer: A

Explanation:

QUESTION NO: 508 Identity Awareness can be deployed in which of the following modes? A. Router B. Detect C. Lode Sharing D. High Availability

Answer: B

Explanation:

QUESTION NO: 509 What happens if the identity of a user is known? A. If the user credentials do not match an Access Role, the system displays the Captive Portal. B. If the user credentials do not match an Access Role, the system displays a sandbox. C. If the user credentials do not match an Access Role, the traffic is automatically dropped. D. If the user credentials match an Access Role, the rule is applied and traffic is accepted ordropped based on the defined action.

Answer: D

Explanation:

QUESTION NO: 510 Which of the following is an authentication method used by Identity Awareness? A. Captive Portal B. PKI C. SSL D. RSA

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 204

Page 205: 156-215.75

Answer: A

Explanation:

QUESTION NO: 511 Which of the following is an authentication method used by Identity Awareness? A. PKI B. SSL C. RSA D. LDAP

Answer: D

Explanation:

QUESTION NO: 512 What is the purpose of an Identity Agent? A. Manual entry of user credentials for LDAP authentication B. Audit a user's access, and send that data to a log server C. Disable Single Sign On D. Provide user and machine identity to a gateway

Answer: D

Explanation:

QUESTION NO: 513 What type of traffic can be re-directed to the Captive Portal? A. FTP B. All of the above C. SMTP D. HTTP

Answer: D

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 205

Page 206: 156-215.75

QUESTION NO: 514 Users with Identity Awareness Agent installed on their machines login with __________, so thatwhen the user logs into the domain, that information is also used to meet Identity Awarenesscredential requests. A. ICA Certificates B. Key-logging C. SecureClient D. Single Sign-On

Answer: D

Explanation:

QUESTION NO: 515 Which of the following methods is NOT used by Identity Awareness to catalog identities? A. AD Query B. GPO C. Captive Portal D. Identity Agent

Answer: B

Explanation:

QUESTION NO: 516 When using AD Query to authenticate users for Identity Awareness, identity data is receivedseamlessly from the Microsoft Active Directory (AD). What is NOT a recommended usage of thismethod? A. Leveraging identity in Internet application control B. Identity-based enforcement for non-AD users (non-Windows and guest users) C. Identity-based auditing and logging D. Basic identity enforcement in the internal network

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 206

Page 207: 156-215.75

Answer: B

Explanation:

QUESTION NO: 517 Which of the following is NOT a valid option when configuring access for Captive Portal? A. According to the Firewall Policy B. From the Internet C. Through internal interfaces D. Through all interfaces

Answer: B

Explanation:

QUESTION NO: 518 How granular may an administrator filter an Access Role? A. Windows Domain B. AD User C. Radius Group D. Specific ICA Certificate

Answer: B

Explanation:

QUESTION NO: 519 Captive Portal may be used with HTTPS: A. No, it only works with FTP B. Yes C. No, it only works with FTP and HTTP D. No, it only works with HTTP

Answer: B

Explanation:

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 207

Page 208: 156-215.75

QUESTION NO: 520 With Access Roles, is it possible to deny a single user access to a certain file? A. Yes, if you add the user to a blocked group B. Yes, if you deny access based on the user's machine C. No, Access Roles are based on user groups, not individual users D. Yes, if you deny access based on the user's location

Answer: A

Explanation:

QUESTION NO: 521 Where do you verify that SmartDirectory is enabled? A. Verify that Global Properties > SmartDirectory (LDAP) > Use SmartDirectory (LDAP) forSecurity Gateways is checked B. Verify that Global Properties > Authentication > Use SmartDirectory (LDAP) for SecurityGateways is checked C. Verify that Security Gateway > General Properties > Authentication > Use SmartDirectory(LDAP) for Security Gateways is checked D. Verify that Security Gateway > General Properties > SmartDirectory (LDAP) > UseSmartDirectory (LDAP) for Security Gateways is checked

Answer: A

Explanation:

QUESTION NO: 522 Where does the security administrator activate Identity Awareness within SmartDashboard? A. LDAP Server Object > General Properties B. Gateway Object > General Properties C. Policy > Global Properties > Identity Awareness D. Security Management Server > Identity Awareness

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 208

Page 209: 156-215.75

Answer: B

Explanation:

QUESTION NO: 523 How do you configure the Security Policy to provide user access to the Captive Portal through anexternal (Internet) interface? A. Change the Identity Awareness settings under Global Properties to allow Captive Portal accesson all interfaces. B. Change the Identity Awareness settings under Global Properties to allow Captive Portal accessfor an external interface. C. Change the gateway settings to allow Captive Portal access via an external interface. D. No action is necessary. This access is available by default.

Answer: C

Explanation:

QUESTION NO: 524 To qualify as an Identity Awareness enabled rule, which columns may include an Access Role? A. Track B. Action C. Source D. User

Answer: C

Explanation:

QUESTION NO: 525 What command with appropriate switches would you use to test Identity Awareness connectivity? A. test_ad B. test_ldap C. test_ad_connectivity D. test_ldap_connectivity

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 209

Page 210: 156-215.75

Answer: C

Explanation:

QUESTION NO: 526 Which of the following authentication methods can be configured in the Identity Awareness setupwizard? A. Captive Portal B. TACAS C. Check Point Password D. Windows password

Answer: A

Explanation:

QUESTION NO: 527 Which of the following authentication methods can be configured in the Identity Awareness setupwizard? A. TACAS B. Check Point Password C. Windows password D. LDAP

Answer: D

Explanation:

QUESTION NO: 528 What gives administrators more flexibility when configuring Captive Portal instead of LDAP queryfor Identity Awareness authentication? A. Captive Portal is more secure than standard LDAP B. Captive Portal is more transparent to the user C. Nothing, LDAP query is required when configuring Captive Portal D. Captive Portal works with both configured users and guests

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 210

Page 211: 156-215.75

Answer: D

Explanation:

QUESTION NO: 529 Match the terms with their definitions:

A. A-3, B-4, C-1, D-2 B. A-2, B-3, C-4, D-1 C. A-3, B-2, C-1, D-4 D. A-3, B-2, C-4, D-1

Answer: D

Explanation:

QUESTION NO: 530 To qualify as an Identity Awareness enabled rule, which columns may include an Access Role? A. Track B. User C. Destination D. Action

Answer: C

Checkpoint 156-215.75 Exam

"Pass Any Exam. Any Time." - www.actualtests.com 211