Checkpoint.Actualtests.156-215.75.v2012-04-08

178
156-215.75 Number : 000000 Passing Score : 800 Time Limit : 120 min File Version : 1.0 Checkpoint 156215.75 Check Point Certified Security Administrator R75 Version: 3.0 Checkpoint 156215.75 Exam Topic 1, Volume A

Transcript of Checkpoint.Actualtests.156-215.75.v2012-04-08

Page 1: Checkpoint.Actualtests.156-215.75.v2012-04-08

156-215.75

Number: 000­000Passing Score: 800Time Limit: 120 minFile Version: 1.0

Checkpoint 156­215.75

Check Point Certified Security Administrator R75

Version: 3.0Checkpoint 156­215.75 Exam

Topic 1, Volume A

Page 2: Checkpoint.Actualtests.156-215.75.v2012-04-08

Exam A

QUESTION 1Of the three mechanisms Check Point uses for controlling traffic, which enables firewalls to incorporate layer 4awareness in packet inspection?

A. IPS

B. Packet filtering

C. Stateful Inspection

D. Application Intelligence

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 2Which of the following statements about Bridge mode is TRUE?

A. When managing a Security Gateway in Bridge mode, it is possible to use a bridge interface for NetworkAddress Translation.

B. Assuming a new installation, bridge mode requires changing the existing IP routing of the network.

C. All ClusterXL modes are supported.

D. A bridge must be configured with a pair of interfaces.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 3Which SmartConsole component can Administrators use to track remote administrative activities?

A. WebUI

B. Eventia Reporter

C. SmartView Monitor

D. SmartView Tracker

Answer: DSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 2Checkpoint 156­215.75 Exam

QUESTION 4Which of the following statements is TRUE about management plug­ins?

Page 3: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. The plug­in is a package installed on the Security Gateway.

B. A management plug­in interacts with a Security Management Server to provide new features and support fornew products.

C. Using a plug­in offers full central management only if special licensing is applied to specific features of theplug­in.

D. Installing a management plug­in is just like an upgrade process. (It overwrites existing components.)

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 5UDP packets are delivered if they are _________.

A. A legal response to an allowed request on the inverse UDP ports and IP

B. A Stateful ACK to a valid SYN­SYN­/ACK on the inverse UDP ports and IP

C. Reference in the SAM related Dynamic tables

D. Bypassing the Kernel by the "forwarding layer" of clusterXL

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 6The Check Point Security Gateway's virtual machine (kernel) exists between which two layers of the OSImodel?

A. Session and Network layers

B. Application and Presentation layers

C. Physical and Datalink layers

D. Network and Datalink layers

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 7"Pass Any Exam. Any Time." ­ www.actualtests.com 3Checkpoint 156­215.75 ExamThe customer has a small Check Point installation, which includes one Linux Enterprise 3.0 server working asthe SmartConsole, and a second server running Windows 2003 as both Security Management Server runningWindows 2003 as both Security Management Server and Security Gateway. This is an example of a(n).

A. Stand­Alone Installation

Page 4: Checkpoint.Actualtests.156-215.75.v2012-04-08

B. Distributed Installation

C. Hybrid Installation

D. Unsupported configuration

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 8The customer has a small Check Point installation which includes one Windows 2003 server as theSmartConsole and a second server running SecurePlatform as both Security Management Server and theSecurity Gateway. This is an example of a(n):

A. Unsupported configuration.

B. Hybrid Installation.

C. Distributed Installation.

D. Stand­Alone Installation.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 9The customer has a small Check Point installation which includes one Windows XP workstation as theSmartConsole, one Solaris server working as Security Management Server, and a third server runningSecurePlatform as Security Gateway. This is an example of a(n):

A. Stand­Alone Installation.

B. Unsupported configuration

C. Distributed Installation.

D. Hybrid Installation.

Answer: CSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 4Checkpoint 156­215.75 Exam

QUESTION 10The customer has a small Check Point installation which includes one Windows 2003 server as SmartConsoleand Security Management Server with a second server running SecurePlatform as Security Gateway. This is anexample of a(n):

A. Hybrid Installation.

Page 5: Checkpoint.Actualtests.156-215.75.v2012-04-08

B. Unsupported configuration.

C. Distributed Installation.

D. Stand­Alone Installation.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 11When doing a Stand­Alone Installation, you would install the Security Management Server with which otherCheck Point architecture component?

A. SecureClient

B. Security Gateway

C. SmartConsole

D. None, Security Management Server would be installed by itself

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 12You are a security architect and need to design a secure firewall, VPN and IPS solution. Where would be thebest place to install IPS in the topology if the internal network is already protected?

A. On the firewall itself to protect all connected networks centrally.

B. On each network segment separately.

C. On the LAN is enough, the DMZ does not need to be protected.

D. In front of the firewall is enough.

Answer: ASection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 5Checkpoint 156­215.75 Exam

QUESTION 13You are installing a Security Management Server. Your security plan calls for three administrators for thisparticular server. How many can you create during installation?

A. Depends on the license installed on the Security Management Server

B. Only one with full access and one with read­only access

C. One

D. As many as you want

Page 6: Checkpoint.Actualtests.156-215.75.v2012-04-08

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 14During which step in the installation process is it necessary to note the fingerprint for first­time verification?

A. When establishing SIC between the Security Management Server and the Gateway

B. When configuring the Security Management Server using cpconfig

C. When configuring the Security Gateway object in SmartDashboard

D. When configuring the Gateway in the WebUl

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 15How can you most quickly reset Secure Internal Communications (SIC) between a Security Management Serverand Security Gateway?

A. Run the command fwm sic­reset to initialize the Internal Certificate Authority (ICA) of the SecurityManagement Server. Then retype the activation key on the Security Gateway from SmartDashboard.

B. Use SmartDashboard to retype the activation key on the Security Gateway. This will automatically Sync SICto both the Security Management Server and Gateway.

C. From cpconfig on the Gateway, choose the Secure Internal Communication option and retype the activationkey. Next, retype the same key in the Gateway object in SmartDashboard and reinitialize Secure InternalCommunications (SIC)."Pass Any Exam. Any Time." ­ www.actualtests.com 6Checkpoint 156­215.75 Exam

D. From the Security Management Server's command line, Type fw putkey ­p <shared key> < IP Address ofsecurity Gateway>.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 16How can you recreate the account of the Security Administrator, which was created during initial installation ofthe Management Server on SecurePlatform?

A. Launch cpconfig and delete the Administrator's account. Recreate the account with the same name.

B. Export the user database into an ASCII file with fwm dbexport. Open this file with an editor, and delete theAdministrator Account portion of the file. You will be prompted to create a new account.

C. Type cpm ­a, and provide the existing Administrator's account name. Reset the Security Administrator'spassword.

Page 7: Checkpoint.Actualtests.156-215.75.v2012-04-08

D. Launch SmartDashboard in the User Management screen, and delete the cpconfig administrator.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 17You are running the Security Gateway on SecurePlatform and configure SNX with default settings. The clientfails to connect to the Security Gateway. What is wrong?

A. The routing table on the client does not get modified.

B. The client has Active­X blocked.

C. The client is configured incorrectly.

D. The SecurePlatform Web User Interface is listening on port 443.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 18When Jon first installed the system, he forgot to configure DNS servers on his Security Gateway.

"Pass Any Exam. Any Time." ­ www.actualtests.com 7Checkpoint 156­215.75 ExamHow could Jon configure DNS servers now that his Security Gateway is in production?

A. Login to the firewall using SSH and run cpconfig, then select Domain Name Servers.

B. Login to the firewall using SSH and run fwm, then select System Configuration and Domain Name Servers.

C. Login to the SmartDashboard, edit the firewall Gateway object, select the tab Interfaces, then Domain NameServers.

D. Login to the firewall using SSH and run sysconfig, then select Domain Name Servers.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 19Once installed, the R75 kernel resides directly below which layer of the OSI model? Note:Application is the top and Physical is the bottom of the IP stack.

A. Network

B. Transport

C. Data Link

D. Session

Page 8: Checkpoint.Actualtests.156-215.75.v2012-04-08

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 20R75's INSPECT Engine inserts itself into the kernel between which two layers of the OSI model?

A. Presentation and Application

B. Physical and Data

C. Session and Transport

D. Data and Network

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 21"Pass Any Exam. Any Time." ­ www.actualtests.com 8Checkpoint 156­215.75 ExamWhat would be the benefit of upgrading from SmartDefense to IPS R75?

A. The SmartDefense is replaced by the technology of IPS­1.

B. The SmartDefense technology expands IPS­1 to IPS R75.

C. Completely rewritten engine provides improved security performance and reporting.

D. There is no difference ­ IPS R75is the new name.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 22You need to completely reboot the Operating System after making which of the following changes on theSecurity Gateway? i.e. the command cprestart is not sufficient.

A. 3 only

B. 1, 2, 3, 4, and 5

C. 2, 3 only

D. 3, 4, and 5 only

Answer: CSection: (none)

Explanation/Reference:Explanation:

Page 9: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 23The Security Gateway is installed on SecurePlatform R75. The default port for the Web User Interface is_______.

A. TCP 18211

B. TCP 257

C. TCP 4433

D. TCP 443

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 24"Pass Any Exam. Any Time." ­ www.actualtests.com 9Checkpoint 156­215.75 ExamYour customer wishes to install the SmartConsole on a Windows system. What are the minimum hardwarerequirements for R75? Give the BEST answer.

A. 500 MB Free disk space and 512 MB RAM

B. 1 GB Free disk space and 512 MB RAM

C. 1 GB Free disk space and 1 GB RAM

D. 512 MB Free disk space and 1 GB RAM

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 25From the output below, where is this fingerprint generated?

Page 10: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. SmartUpdate

B. Security Management Server

C. SmartDashboard

D. SmartConsole

Answer: BSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 10Checkpoint 156­215.75 Exam

QUESTION 26Tom has been tasked to install Check Point R75 in a distributed deployment. Before Tom installs the systemsthis way, how many machines will he need if he does not include a SmartConsole machine in his calculations?

A. One machine

B. One machine, but it needs to be installed using SecurePlatform for compatibility purposes

C. Three machines

D. Two machines

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 27Over the weekend, an Administrator without access to SmartDashboard installed a new R75 Security Gatewayusing SecurePlatform. You want to confirm communication between the Gateway and the Management Server

Page 11: Checkpoint.Actualtests.156-215.75.v2012-04-08

by installing the Security Policy. What might prevent you from installing the Policy?

A. You first need to initialize SIC in SmartUpdate.

B. You have not established Secure Internal Communications (SIC) between the Security Gateway andManagement Server. You must initialize SIC on the Security Management Server.

C. You have not established Secure Internal Communications (SIC) between the Security Gateway andManagement Server. You must initialize SIC on both the Security Gateway and the Management Server.

D. You first need to run the fw unloadlocal command on the new Security Gateway.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 28An Administrator without access to SmartDashboard installed a new IPSO­based R75 Security Gateway overthe weekend. He e­mailed you the SIC activation key. You want to confirm communication between the SecurityGateway and the Management Server by installing the Policy. What might prevent you from installing thePolicy?

"Pass Any Exam. Any Time." ­ www.actualtests.com 11Checkpoint 156­215.75 Exam

A. You first need to create a new Gateway object in SmartDashboard, establish SIC via the Communicationbutton, and define the Gateway's topology.

B. You have not established Secure Internal Communications (SIC) between the Security Gateway andManagement Server You must initialize SIC on the Security Management Server.

C. An intermediate local Security Gateway does not allow a policy install through it to the remote new SecurityGateway appliance Resolve by running the tw unloadlocal command on the local Security Gateway.

D. You first need to run the fw unloadlocal command on theR75Security Gateway appliance in order to removethe restrictive default policy.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 29How can you reset the password of the Security Administrator that was created during initial installation of theSecurity Management Server on SecurePlatform?

A. Type cpm ­a, and provide the existing administrator's account name. Reset the Security Administrator'spassword.

B. Export the user database into an ASCII file with fwm dbexport. Open this file with an editor, and delete the"Password" portion of the file. Then log in to the account without a password. You will be prompted to assigna new password.

C. Launch SmartDashboard in the User Management screen, and edit the cpconfig administrator.

D. Type fwm ­a, and provide the existing administrator's account name. Reset the Security Administrator'spassword

Answer: D

Page 12: Checkpoint.Actualtests.156-215.75.v2012-04-08

Section: (none)

Explanation/Reference:Explanation:

QUESTION 30You have configured SNX on the Security Gateway. The client connects to the Security Gateway and the userenters the authentication credentials. What must happen after authentication that allows the client to connect tothe Security Gateway's VPN domain?

A. Active­X must be allowed on the client.

B. An office mode address must be obtained by the client.

C. SNX modifies the routing table to forward VPN traffic to the Security Gateway.

D. The SNX client application must be installed on the client."Pass Any Exam. Any Time." ­ www.actualtests.com 12Checkpoint 156­215.75 Exam

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 31The Administrator of the Tokyo Security Management Server cannot connect from his workstation in Osaka.Which of the following lists the BEST sequence of steps to troubleshoot this issue?

A. Check for matching OS and product versions of the Security Management Server and the client. Then, pingthe Gateways to verify connectivity. If successful, scan the log files for any denied management packets.

B. Call Tokyo to check if they can ping the Security Management Server locally. If so, login to sgtokyo, verifymanagement connectivity and Rule Base. If this looks okay, ask your provider if they have some firewallrules that filters out your management traffic.

C. Verify basic network connectivity to the local Gateway, service provider, remote Gateway, remote networkand target machine. Then, test for firewall rules that deny management access to the target. If successful,verify that pcosaka is a valid client IP address.

Page 13: Checkpoint.Actualtests.156-215.75.v2012-04-08

D. Check the allowed clients and users on the Security Management Server. If pcosaka and your user accountare valid, check for network problems. If there are no network related issues, this is likely to be a problemwith the server itself. Check for any patches and upgrades. If still unsuccessful, open a case with TechnicalSupport.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 32The Internal Certificate Authority (ICA) CANNOT be used for:

"Pass Any Exam. Any Time." ­ www.actualtests.com 13Checkpoint 156­215.75 Exam

A. Virtual Private Network (VPN) Certificates for gateways

B. NAT rules

C. Remote­access users

D. SIC connections

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 33Match each of the following command to there correct function. Each command has one function only listed.

A. C1>F2; C2>F1; C3>F6; C4>F4

B. C1>F6; C2>F4; C3>F2; C4>F5

C. C1>F2; C4>F4; C3>F1; C4>F5

D. C1>F4; C2>F6, C3>F3; C4>F2

Answer: BSection: (none)

Page 14: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation/Reference:Explanation:

QUESTION 34Which command displays the installed Security Gateway version?

A. fw stat

B. cpstat ­gw

C. fw ver

D. tw printver"Pass Any Exam. Any Time." ­ www.actualtests.com 14Checkpoint 156­215.75 Exam

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 35Which command line interface utility allows the administrator to verify the name and timestamp of the SecurityPolicy currently installed on a firewall module?

A. fw ctl pstat

B. fw stat

C. cpstat fwd

D. fw ver

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 36The command fw fetch causes the:

A. Security Management Server to retrieve the IP addresses of the target Security Gateway.

B. Security Gateway to retrieve the compiled policy and inspect code from the Security Management Serverand install it to the kernel.

C. Security Gateway to retrieve the user database information from the tables on the Security ManagementServer

D. Security Management Server to retrieve the debug logs of the target Security Gateway

Answer: BSection: (none)

Explanation/Reference:Explanation:

Page 15: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 37Which command is used to uninstall the Security Policy directly from the Security Gateway?

A. fwm unload.local

B. cpstop

C. fwm load <gtwynames­IP> NULL"Pass Any Exam. Any Time." ­ www.actualtests.com 15Checkpoint 156­215.75 Exam

D. fw unloadlocal

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 38Suppose the Security Gateway hard drive fails and you are forced to rebuild it. You have a snapshot file storedto a TFTP server and backups of your Security Management Server. What is the correct procedure forrebuilding the Gateway quickly?

A. Run the revert command to restore the snapshot. Reinstall any necessary Check Point products. EstablishSIC and install the Policy.

B. Run the revert command to restore the snapshot, establish SIC, and install the Policy.

C. Reinstall the base operating system (i.e., SecurePlatform). Configure the Gateway interface so that theGateway can communicate with the TFTP server. Reinstall any necessary Check Point products andpreviously applied hotfixes. Revert to the stored snapshot image, and install the Policy.

D. Reinstall the base operating system (i.e., SecurePlatform). Configure the Gateway interface so that theGateway can communicate with the TFTP server. Revert to the stored snapshot image, and install theSecurity Policy.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 39Which of the following statements accurately describes the upgrade_export command?

A. Upgrade_export is used when upgrading the Security Gateway, and allows certain files to be included beforeexporting.

B. Used when upgrading the Security Gateway, upgrade_export includes modified files directory.

C. Upgrade_export stores network­configuration data, objects, global properties, and the data base revisionsprior to upgrading the security Management Server.

D. Used primarily when upgrading the Security Management Server, upgrade_export stores all objectdatabases and the conf directories for importing to a newer version of the Security Gateway.

Answer: DSection: (none)

Explanation/Reference:Explanation:

Page 16: Checkpoint.Actualtests.156-215.75.v2012-04-08

"Pass Any Exam. Any Time." ­ www.actualtests.com 16Checkpoint 156­215.75 Exam

QUESTION 40What are you required to do before running upgrade__ export?

A. Run cpconfig and set yourself up as a GUI client.

B. Run a cpstop on the Security Management Server

C. Run a cpstop on the Security Gateway.

D. Close all GUI clients

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 41A snapshot delivers a complete backup of SecurePlatform. The resulting file can be stored on servers or as alocal file in /var/cpsnapshot/snapshots. How do you restore a local snapshot named MySnapshot.tgz?

A. As expert user, type the command snapshot ­ r MySnapshot.tgz.

B. As expert user, type the command snapshot ­ R to restore from a local file. Then, provide the correct name.

C. As expert user, type the command revert ­­file MySnapshot.tgz.

D. Reboot the system and call the start menu. Select the option Snapshot Management, provide the Expertpassword and select [L] for a restore from a local file. Then, provide the correct file name.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 42What is the primary benefit of using upgrade_export over either backup of snapshot?

A. The backup and snapshot commands can take long time to run whereas upgrade_export will take a muchshorter amount of time.

B. upgrade_export will back up routing tables, hosts files, and manual ARP configurations, where backup andsnapshot will not.

C. upgrade_export is operating system independent and can be used when backup or snapshot is "Pass AnyExam. Any Time." ­ www.actualtests.com 17Checkpoint 156­215.75 Examnot available.

D. upgrade_export has an option to backup the system and SmartView tracker logs while back and snapshotwill not.

Answer: CSection: (none)

Explanation/Reference:

Page 17: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation:

QUESTION 43Amy is unsure that her nightly backup configured from the Check Point backup tool is working. If she logged intoher Gateway using SSH, in which directory would she find her nightly backups?

A. /opt/backups

B. /var/CPbackup/backups

C. /backups

D. /var/backups

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 44What is the syntax for uninstalling a package using newpkg?

A. ­s (pathname of package)

B. ­u (pathname of package)

C. newpkg CANNOT be used to uninstall

D. ­i (full pathname of package)

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 45Which utility allows you to configure the DHCP service on SecurePlatform from the command line?

A. sysconfig

B. dhcp_cfg"Pass Any Exam. Any Time." ­ www.actualtests.com 18Checkpoint 156­215.75 Exam

C. cpconfig

D. ifconfig

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 46Which utility is necessary for reestablishing SIC?

Page 18: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. fwm sic_reset

B. cpconfig

C. cplic

D. sysconfig

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 47You are consulting with an Administrator who has locked himself out of SmartDashboard installed on astandalone SecurePlatform Security Gateway. Now, he cannot access the Security Management Server viaSmartDashboard or any other SmartConsole tools. How can you get him reconnected to SmartDashboard?

A. Run fw uninstall localhost on the Security Gateway.

B. Run fw unloadlocal on the Security Gateway.

C. Run fw unlocklocal on the Security Management Server.

D. Delete the $fwdir/database/manage.lock file and run cprestart.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 48The third­shift Administrator was updating Security Management Server access settings in Global Propertiesand testing. He managed to lock himself out of his account. How can you unlock this account?

"Pass Any Exam. Any Time." ­ www.actualtests.com 19Checkpoint 156­215.75 Exam

A. Type fwm lock_admin ­u <account name> from the command line of the Security Management Server.

B. Type fwm unlock_admin ­u from the command line of the Security Gateway.

C. Delete the file admin.lock in the $FWDIR/tmp/ directory of the Security Management Server.

D. Type fwm unlock_admin from the command line of the Security Management Server.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 49The third shift administrator was updating security management server access setting in global properties. Hemanaged to lock the entire Administrator out of their accounts. How should you unlock these accounts?

A. Logging to smart dash board as special cpconfig_admin account. Right click on each administrator objectand select Unlock.

Page 19: Checkpoint.Actualtests.156-215.75.v2012-04-08

B. Type fwm lock_admin ­ua from the command line of the security management server

C. Reinstall the security management Server and restore using upgrade _imort

D. Delete the file admin .lock in the sfwdir/ tmp/directory of the security managem,ent server.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 50You are the Security Administrator in a large company called ABC. A Check Point Firewall is installed and in useon SecurePlatform. You are concerned that the system might not be retaining your entries for the interfaces androuting configuration. You would like to verify your entries in the corresponding file(s) on SecurePlatform. Wherecan you view them? Give the BEST answer.

A. /etc/conf/route.C

B. /etc/sysconfig/netconf.C

C. /etc/sysconfig/network­scripts/ifcfg­ethx

D. /etc/sysconfig/network

Answer: BSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 20Checkpoint 156­215.75 Exam

QUESTION 51When using SecurePlatform, it might be necessary to temporarily change the MAC address of the interface eth0 to 00:0C:29:12:34:56. After restarting the network the old MAC address should be active. How do youconfigure this change?

A. Open the WebUI, select Network > Connections > eth0. Place the new MAC address in the field PhysicalAddress, and press Apply to save the settings.

B. As expert user, issue these commands:# IP link set eth0 down# IP link set eth0 addr 00:0C:29:12:34:56# IP link set eth0 up

C. As expert user, issue the command:# IP link set eth0 addr 00:0C:29:12:34:56

D. Edit the file /etc/sysconfig/netconf.c and put the new MAC address in the field (conf: (conns:( conn:hwaddr ("00:0C:29:12:34:56")

Answer: BSection: (none)

Explanation/Reference:Explanation:

Page 20: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 52Several Security Policies can be used for different installation targets. The Firewall protecting HumanResources' servers should have its own Policy Package. These rules must be installed on this machine and noton the Internet Firewall. How can this be accomplished?

A. A Rule Base can always be installed on any Check Point Firewall object. It is necessary to select theappropriate target directly after selecting Policy / Install on Target.

B. A Rule Base is always installed on all possible targets. The rules to be installed on a Firewall are defined bythe selection in the row Install On of the Rule Base.

C. In the menu of SmartDashboard, go to Policy / Policy Installation Targets and select the correct firewall viaSpecific Targets.

D. When selecting the correct Firewall in each line of the row Install On of the Rule Base, only this Firewall isshown in the list of possible installation targets after selecting Policy / Install on Target.

Answer: CSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 21Checkpoint 156­215.75 Exam

QUESTION 53Where is the IPSO Boot Manager physically located on an IP Appliance?

A. In the / nvram directory

B. On an external jump drive

C. On the platform's BIOS

D. On built­in compact Flash memory

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 54ALL of the following options are provided by the SecurePlatform sysconfig utility, EXCEPT:

A. DHCP Server configuration

B. GUI Clients

C. Time & Date

D. Export setup

Answer: BSection: (none)

Explanation/Reference:Explanation:

Page 21: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 55Which of the following options is available with the SecurePlatform cpconfig utility?

A. GUI Clients

B. Time & Date

C. Export setup

D. DHCP Server configuration

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 56"Pass Any Exam. Any Time." ­ www.actualtests.com 22Checkpoint 156­215.75 ExamWhich command would provide the most comprehensive diagnostic information to Check Point TechnicalSupport?

A. diag

B. cpinfo ­o date.cpinfo.txt

C. netstat > date.netstat.txt

D. cpstat > date.cpatat.txt

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 57Which of the following statements accurately describes the snapshot command?

A. snapshot creates a full OS­level backup, including network­interface data, Check Point product information,and configuration settings during an upgrade of a SecurePlatform Security Gateway.

B. A Gateway snapshot includes configuration settings and Check Point product information from the remoteSecurity Management Server.

C. snapshot creates a full system­level backup of the Security Management Server on any OS

D. snapshot stores only the system­configuration settings on the Gateway.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 58How do you recover communications between your Security Management Server and Security Gateway if youlock yourself out via a rule or policy mis­configuration?

Page 22: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. fw delete all.all@localhost

B. cpstop

C. fw unloadlocal

D. fw unload policy

Answer: CSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 23Checkpoint 156­215.75 Exam

QUESTION 59How can you check whether IP forwarding is enabled on an IP Security Appliance?

A. clish ­c show routing active enable

B. echo 1 > /proc/sys/net/ipv4/ip_forwarding

C. ipsofwd list

D. cat/proc/sys/net/ipv4/ip_forward

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 60For normal packet transmission of an accepted communication to a host protected by a Security Gateway, howmany lines per packet are recorded on a packet analyzer like Wireshark using fw monitor?

A. 2

B. 4

C. 3

D. None

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 61How can I verify the policy version locally installed on the Firewall?

A. fw ver

B. fw ctl iflist

C. fw ver ­k

Page 23: Checkpoint.Actualtests.156-215.75.v2012-04-08

D. fw stat

Answer: DSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 24Checkpoint 156­215.75 Exam

QUESTION 62If you run fw monitor without any parameters, what does the output display?

A. In /var/adm/monitor. Out

B. On the console

C. In /tmp/log/monitor ­ out

D. In / var/log/monitor. out

Answer: BSection: (none)

Explanation/Reference:Explanation:From user guide:ExampleThe easiest way to usefw monitoris to invoke it without any parameter. This will output every packetfrom every interface that passes (or at least reaches) the Check Point gateway. Please note that the samepacket is appearing several times (two times in the example below). This is caused byfw monitorcapturing thepackets at different capture points.

Outputcpmodule]# fw monitormonitor: getting filter (from command line)monitor: compilingmonitorfilter:Compiled OK.monitor: loadingmonitor: monitoring (control­C to stop)eth0:i[285]: 172.16.1.133 ­> 172.16.1.2 (TCP) len=285 id=1075 TCP: 1050 ­> 18190 ...PA. seq=bf8bc98eack=941b05bceth0:I[285]: 172.16.1.133 ­> 172.16.1.2 (TCP) len=285 id=1075 TCP: 1050 ­> 18190 ...PA. seq=bf8bc98eack=941b05bceth0:o[197]: 172.16.1.2 ­> 172.16.1.133 (TCP) len=197 id=44599 TCP: 18190 ­> 1050 ...PA. seq=941b05bcack=bf8bca83eth0:O[197]: 172.16.1.2 ­> 172.16.1.133 (TCP) len=197 id=44599 TCP: 18190 ­> 1050 ...PA. seq=941b05bcack=bf8bca83eth0:o[1500]: 172.16.1.2 ­> 172.16.1.133 (TCP) len=1500 id=44600 TCP^C18190 ­> 1050 ....A. seq=941b0659 ack=bf8bca83monitor: caught sig 2monitor: unloading

"Pass Any Exam. Any Time." ­ www.actualtests.com 25Checkpoint 156­215.75 Exam

Page 24: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 63What is the desired outcome when running the command cpinfo ­z ­o cpinfo.out?

A. Send output to a file called cpinfo.out in compressed format.

B. Send output to a file called cpinfo.out in usable format for the CP InfoView utility.

C. Send output to a file called cpinfo.out without address resolution.

D. Send output to a file called cpinfo.out and provide a screen print at the same time.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 64Another administrator accidentally installed a Security Policy on the wrong firewall. Having done this, you areboth locked out of the firewall that is called myfw1. What command would you execute on your system consoleon myfw1 in order for you to push out a new Security Policy?

A. fw dbloadlocal

B. fw unloadlocal

C. cpstop

D. fw ctl filter

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 65Which of the following commands will completely remove the Security Policy from being enforced on a SecurityGateway?

A. fw unload

B. fw unloadlocal

C. cpstop

D. fw unload local

Answer: BSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 26Checkpoint 156­215.75 Exam

QUESTION 66Which of the following commands identifies whether or not a Security Policy is installed or the Security Gatewayis operating with the initial policy?

Page 25: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. fw monitor

B. fw ctl pstat

C. cp stat

D. fw stat

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 67A Web server behind the Security Gateway is set to Automatic Static NAT. Client side NAT is enabled in theGlobal Properties. A client on the Internet initiates a session to the Web Server. On the initiating packet, NAToccurs on which inspection point?

A. I

B. O

C. o

D. i

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 68To monitor all traffic between a network and the Internet on a SecurePlatform Gateway, what is the BEST utilityto use?

A. snoop

B. cpinfo

C. infoview

D. tcpdump

Answer: DSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 27Checkpoint 156­215.75 Exam

QUESTION 69You are creating an output file with the following command:

fw monitor ­e "accept (src=10.20.30.40 or dst=10.20.30.40);" ­o ~/output

Which tool do you use to analyze this file?

Page 26: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. You can analyze it with Wireshark or Ethereal.

B. You can analyze the output file with any ASCI editor.

C. The output file format is CSV, so you can use MS Excel to analyze it.

D. You cannot analyze it with any tool as the syntax should be:fw monitor ­e accept ([12,b]=10.20.30.40 or [16,b]=10.20.30.40); ­o ~/output.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 70You issue the fw monitor command with no arguments. Which of the following inspection points will bedisplayed?

A. Before the virtual machine, in the inbound direction

B. After the virtual machine, in the outbound direction

C. All inspection points

D. Before the virtual machine, in the outbound direction

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 71What is the command used to view which policy is installed?

A. fw ctl install

B. fwm stat

C. fw ctl pstat"Pass Any Exam. Any Time." ­ www.actualtests.com 28Checkpoint 156­215.75 Exam

D. fw stat

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 72How can you view cpinfo on a SecurePlatform machine?

A. tcpdump

B. snoop ­ i

C. infotab

Page 27: Checkpoint.Actualtests.156-215.75.v2012-04-08

D. Text editor, such as vi

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 73How is wear on the flash storage device mitigated on appliance diskless platforms?

A. A RAM drive reduces the swap file thrashing which causes fast wear on the device.

B. The external PCMCIA­based flash extension has the swap file mapped to it, allowing easy replacement.

C. Issue FW­1 bases its package structure on the Security Management Server, dynamically loading when thefirewall is booted.

D. PRAM flash devices are used, eliminating the longevity.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 74In previous versions, the full TCP three­way handshake was sent to the firewall kernel for inspection. How is thisimproved in the current version of IPSO Flows/SecureXL?

A. Only the initial SYN packet is inspected. The rest are handled by IPSO.

B. Packets are offloaded to a third­party hardware card for near­line inspection."Pass Any Exam. Any Time." ­ www.actualtests.com 29Checkpoint 156­215.75 Exam

C. Packets are virtualized to a RAM drive­based FW VM.

D. Resources are proactively assigned using predictive algorithmic techniques.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 75Select the correct statement about Secure Internal Communications (SIC) Certificates. SIC Certificates arecreated:

A. And used for securing internal network communications between SmartView Tracker and an OPSECdevice.

B. For the Security Management Server during the Security Management Server installation.

C. For Security Gateways during the Security Gateway installation.

D. To decrease network security by securing administrative communication among the Security ManagementServers and the Security Gateway.

Page 28: Checkpoint.Actualtests.156-215.75.v2012-04-08

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 76Select the correct statement about Secure Internal Communications (SIC) Certificates. SIC Certificates:

A. Increase network security by securing administrative communication with a two­factor challenge responseauthentication.

B. Uniquely identify machines installed with Check Point software only. They have the same function as RSAAuthentication Certificates.

C. Are for Security Gateways created during the Security Management Server installation.

D. Can be used for securing internal network communications between the Security Gateway and an OPSECdevice.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 77"Pass Any Exam. Any Time." ­ www.actualtests.com 30Checkpoint 156­215.75 ExamWhich of the following statements regarding SecureXL and CoreXL is TRUE?

A. SecureXL is an application for accelerating connections.

B. CoreXL enables multi­core processing for program interfaces.

C. SecureXL is only available inR75.

D. CoreXL is included in SecureXL.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 78Beginning with R75, Software Blades were introduced. One of the Software Blades is the IPS Software Blade asa replacement for SmartDefense. When buying or upgrading to a bundle, some blades are included, e.g. FW,VPN, IPS in SG103. Which statement is NOT true?

A. The license price includes IPS Updates for the first year.

B. The IPS Software Blade can be used for an unlimited time.

C. There is no need to renew the service contract after one year.

D. After one year, it is mandatory to renew the service contract for the IPS Software Blade because it has beenbundled with the license when purchased.

Answer: D

Page 29: Checkpoint.Actualtests.156-215.75.v2012-04-08

Section: (none)

Explanation/Reference:Explanation:

QUESTION 79You need to plan the company's new security system. The company needs a very high level of security and alsohigh performance and high throughput for their applications. You need to turn on most of the integrated IPSchecks while maintaining high throughput. What would be the BEST solution for this scenario?

A. You need to buy a strong multi­core machine and run R70 or later on SecurePlatform with CoreXLtechnology enabled.

B. Bad luck, both together can not be achieved.

C. The IPS does not run when CoreXL is enabled.

D. The IPS system does not affect the firewall performance and CoreXL is not needed in this scenario.

Answer: ASection: (none)

Explanation/Reference:"Pass Any Exam. Any Time." ­ www.actualtests.com 31Checkpoint 156­215.75 Exam

Explanation:

QUESTION 80John is the Security Administrator in his company. He needs to maintain the highest level of security on thefirewalls he manages. He is using Check Point R75. Does he need the IPS Software Blade for achieving thisgoal?

A. No, all IPS protections are active, but can't be uploaded without the license like SmartDefense.

B. Yes, otherwise no protections can be enabled.

C. Yes, otherwise the firewall will pass all traffic unfiltered and unchecked.

D. No, the Gateway will always be protected and the IPS checks can't be managed without a license.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 81Which command allows you to view the contents of an R75 table?

A. fw tab ­x <tablename>

B. fw tab ­a <tablename>

C. fw tab ­s <tablename>

D. fw tab ­t <tablename>

Answer: DSection: (none)

Page 30: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation/Reference:Explanation:

QUESTION 82Your R75 enterprise Security Management Server is running abnormally on Windows 2003 Server. You decideto try reinstalling the Security Management Server, but you want to try keeping the critical Security ManagementServer configuration settings intact (i.e., all Security Policies, databases, SIC, licensing etc.) What is the BESTmethod to reinstall the Server and keep its critical configuration?

A. 1) Run the latest upgrade_export utility to export the configuration "Pass Any Exam. Any Time." ­ www.actualtests.com 32Checkpoint 156­215.75 Exam2) Leave the exported ­ tgz file in %FWDIR\bin.3) Install the primary security Management Server on top of the current installation4) Run upgrade_import to Import the configuration.

B. 1) Insert theR75CD­ROM. and select the option to export the configuration into a . tgz file2) Skip any upgrade verification warnings since you are not upgrading.3) Transfer the. tgz file to another networked machine.4) Download and run the cpclean utility and reboot.5) Use theR75CD_ROM to select the upgrade__import option to import the c

C. 1) Download the latest upgrade_export utility and run it from a \ temp directory to export the Configuration.2) Perform any requested upgrade verification suggested steps.3) Uninstall allR75packages via Add/Remove Programs and reboot4) Use smartUpdate to reinstall the Security Management server and reboot5) Transfer the .tgz file back to the local \ temp.6) Run upgrade_import to import the configuration.

D. 1) Download the latest upgrade_export utility and run it from a \ temp directory to export the Configuration.2) Transferee .tgz file to another network machine3) Uninstall allR75packages via Add/Remove Programs and reboot4) Install again using theR75CD ROM as a primary security management server5) Reboot and than transfer the .tgz file back to the local\ tem p6) Run upgcade_import to import the configuration.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 83Your primary Security Management Server runs on SecurePlatform. What is the easiest way to back up yourSecurity Gateway R75 configuration, including routing and network configuration files?

A. Using the upgrade_export command.

B. Copying the $FWDIR/conf and $FWDIR/lib directory to another location.

C. Run the pre_upgrade_verifier and save the .tgz file to the /temp directory.

D. Using the native SecurePlatform backup utility from command line or in the Web based user interface.

Answer: DSection: (none)

Explanation/Reference:Explanation:

Page 31: Checkpoint.Actualtests.156-215.75.v2012-04-08

"Pass Any Exam. Any Time." ­ www.actualtests.com 33Checkpoint 156­215.75 Exam

QUESTION 84You need to back up the routing, interface, and DNS configuration information from your R75 SecurePlatformSecurity Gateway. Which backup­and­restore solution do you use?

A. SecurePlatform backup utilities

B. upgrade_export and upgrade_import commands

C. Database Revision Control

D. Manual copies of the $FWDIR/conf directory

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 85Your R75 primary Security Management Server is installed on SecurePlatform. You plan to schedule theSecurity Management Server to run fw logswitch automatically every 48 hours. How do you create thisschedule?

A. Create a time object, and add 48 hours as the interval. Open the primary Security Management Serverobject's Logs and Masters window, enable Schedule log switch, and select the Time object.

B. Create a time object, and add 48 hours as the interval. Open the Security Gateway object's Logs andMasters window, enable Schedule log switch, and select the Time object.

C. Create a time object, and add 48 hours as the interval. Select that time object's Global Properties > Logsand Masters window, to schedule a logswitch.

D. On a SecurePlatform Security Management Server, this can only be accomplished by configuring the fwlogswitch command via the cron utility.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 86Which of the following methods will provide the most complete backup of an R75 configuration?

A. Policy Package Management

B. Copying the $PWDIR\conf and $CPDIR\conf directories to another server

C. upgrade_export command

D. Database Revision Control"Pass Any Exam. Any Time." ­ www.actualtests.com 34Checkpoint 156­215.75 Exam

Answer: CSection: (none)

Page 32: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation/Reference:Explanation:

QUESTION 87Which of the following commands can provide the most complete restore of an R75 configuration?

A. Cpconfig

B. Upgrade_import

C. fwm dbimport ­p

D. cpinfo ­recover

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 88When restoring R75 using the command upgrade > Port. Which of the following items is NOT restored?

A. Licenses

B. Global properties

C. SIC Certificates

D. Route tables

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 89Your organization's disaster recovery plan needs an update to the backup and restore section to reap thebenefits of the new distributed R75 installation. Your plan must meet the following required and desiredobjectives:

Required Objective: The Security Policy repository must be backed up no less frequently than every 24 hours.

Desired Objective: The R75 components that enforce the Security Polices should be blocked up at

"Pass Any Exam. Any Time." ­ www.actualtests.com 35Checkpoint 156­215.75 Examleast once a week.

Desired Objective: Back up R75 logs at least once a week

Your disaster recovery plan is as follows:

Use the cron utility to run the upgrade_ export command each night on the Security Management Servers.

Configure the organization's routine backup software to back up the files created by the upgrade_ exportcommand.

Page 33: Checkpoint.Actualtests.156-215.75.v2012-04-08

Configure the SecurePlatform backup utility to back up the Security Gateways every Saturday night

Use the cron utility to run the upgrade export: command each Saturday niqht on the log servers

Configure an automatic, nightly loqswitch

Configure the organization's routine backup software to back up the switched logs every night

Upon evaluation, your plan:

A. Meets the required objective but does not meet either desired objective.

B. Does not meet the required objective.

C. Meets the required objective and only one desired objective.

D. Meets the required objective and both desired objectives.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 90Your company is running Security Management Server R75 on SecurePlatform, which has been migratedthrough each version starting from Check Point 4.1. How do you add a new administrator account?

A. Using SmartDashboard, under Users, select Add New Administrator

B. Using the Web console on SecurePlatform under Product configuration, select Administrators

C. Using SmartDashboard or cpconf ig

D. Using cpconftg on the Security Management Server, choose Administrators

Answer: ASection: (none)

Explanation/Reference:"Pass Any Exam. Any Time." ­ www.actualtests.com 36Checkpoint 156­215.75 Exam

Explanation:

QUESTION 91Which of the following tools is used to generate a Security Gateway R75 configuration report?

A. ethereal

B. cpinfo

C. licview

D. infoview

Answer: BSection: (none)

Explanation/Reference:Explanation:

Page 34: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 92Which of the following is a CLI command for Security Gateway R75?

A. fwm policy_print <policyname>

B. fw shutdown

C. fw merge

D. fw tab ­u

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 93What information is provided from the options in this screenshot?

"Pass Any Exam. Any Time." ­ www.actualtests.com 37Checkpoint 156­215.75 Exam

(i)Whether a SIC certificate was generated for the Gateway

(ii)Whether the operating system is SecurePlatform or SecurePlatform Pro

(iii)Whether this is a standalone or distributed installation

A. (i), (ii) and (iii)

B. (i) and (iii)

C. (i) and (ii)

D. (ii) and (iii)

Answer: DSection: (none)

Page 35: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation/Reference:Explanation:

QUESTION 94Peter is your new Security Administrator. On his first working day, he is very nervous and sets the wrongpassword three times. His account is locked. What can be done to unlock Peter's account? Give the BESTanswer.

A. You can unlock Peter's account by using the command fwm unlock_admin ­u Peter on the SecurityGateway.

B. It is not possible to unlock Peter's account. You have to install the firewall once again or abstain from Peter'shelp.

C. You can unlock Peter's account by using the command fwm lock_admin ­u Peter on the SecurityManagement Server.

D. You can unlock Peter's account by using the command fwm unlock_admin ­u Peter on the SecurityManagement Server."Pass Any Exam. Any Time." ­ www.actualtests.com 38Checkpoint 156­215.75 Exam

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 95Which CLI command verifies the number of cores on your firewall machine?

A. fw ctl pstat

B. fw ctl core stat

C. fw ctl multik stat

D. cpstat fw ­f core

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 96John currently administers a network using NGX R65.4 on the Security Management Server and NGXR65.2.100 (the VOIP release with the VOIP plug­ins enabled). He wants to upgrade to R75 to get the benefits ofCheck Point's Software Blades. What would be the best way of doing this?

A. This can not be done yet asR75can not manage NGX R65 Gateways due to SmartDefense and IPSmismatch problems.

B. Run upgrade_export on R65 management, then installR75on this machine and run upgrade_import and re­license the systems to use software blades.

C. Just insert theR75CD­ROM and run the in­place upgrade.

D. This is not supported today as currently the VOIP Software Blade and VOIP plug­in is not available inR75.

Answer: D

Page 36: Checkpoint.Actualtests.156-215.75.v2012-04-08

Section: (none)

Explanation/Reference:Explanation:

QUESTION 97John currently administers a network using single CPU single core servers for the Security Gateways and isrunning R75. His company is now going to implement VOIP and needs more performance on the Gateways. Heis now adding more memory to the systems and also upgrades the CPU to a modern quad core CPU in theserver. He wants to use CoreXL technology to benefit

"Pass Any Exam. Any Time." ­ www.actualtests.com 39Checkpoint 156­215.75 Examfrom the new performance benchmarks of this technology. How can he achieve this?

A. Nothing needs to be done. SecurePlatform recognized the change during reboot and adjusted all thesettings automatically.

B. He just needs to go to cpconfig on the CLI and enable CoreXL. Only a restart of the firewall is required tobenefit from CoreXL technology.

C. He needs to reinstall the Gateways because during the initial installation, it was a single­core CPU but thewrong Linux kernel was installed. There is no other upgrade path available.

D. He just needs to go to cpconfig on the CLI and enable CoreXL. After the required reboot he will benefit fromthe new technology.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 98You are running a R75 Security Gateway on SecurePlatform. In case of a hardware failure, you have a serverwith the exact same hardware and firewall version installed. What backup method could be used to quickly putthe secondary firewall into production?

A. upgrade_export

B. manual backup

C. snapshot

D. backup

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 99Before upgrading SecurePlatform, you should create a backup. To save time, many administrators use thecommand backup. This creates a backup of the Check Point configuration as well as the system configuration.

An administrator has installed the latest HFA on the system for fixing traffic problem after creating a backup file.There is a mistake in the very complex static routing configuration. The Check Point configuration has not beenchanged. Can the administrator use a restore to fix the errors in static routing?

Page 37: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. The restore can be done easily by the command restore and selecting the appropriate backup file."Pass Any Exam. Any Time." ­ www.actualtests.com 40Checkpoint 156­215.75 Exam

B. A backup cannot be restored, because the binary files are missing.

C. The restore is not possible because the backup file does not have the same build number (version).

D. The restore is done by selecting Snapshot Management from the boot menu of SecurePlatform.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 100Which operating systems are supported by a Check Point Security Gateway on an open server?

A. Check Point SecurePlatform and Microsoft Windows

B. Sun Solaris, Red Hat Enterprise Linux, Check Point SecurePlatform, IPSO, Microsoft Windows

C. Check Point SecurePlatform, IPSO, Sun Solaris, Microsoft Windows

D. Microsoft Windows, Red Hat Enterprise Linux, Sun Solaris, IPSO

Answer: ASection: (none)

Explanation/Reference:Explanation:

Topic 2, Volume B

QUESTION 101You intend to upgrade a Check Point Gateway from R65 to R75. Prior to upgrading, you want to backup theGateway should there be any problems with the upgrade. Which of the following allows for the Gatewayconfiguration to be completely backed up into a manageable size in the least amount of time?

A. Backup

B. Snapshot

C. Upgrade_export

D. Database_revision

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 102"Pass Any Exam. Any Time." ­ www.actualtests.com 41Checkpoint 156­215.75 ExamYour network is experiencing connectivity problems and you want to verify if routing problems are present. Youneed to disable the firewall process but still allow routing to pass through the Gateway running on an IPAppliance running IPSO. What command do you need to run after stopping the firewall service?

Page 38: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. fw fwd routing

B. ipsofwd on admin

C. fw load routed

D. ipsofwd slowpath

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 103Where can you find the Check Point's SNMP MIB file?

A. $FWDIR/conf/snmp.mib

B. It is obtained only by request from the TAC.

C. $CPDIR/lib/snmp/chkpt.mib

D. There is no specific MIB file for Check Point products.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 104You want to generate a cpinfo file via CLI on a system running SecurePlatform. This will take about 40 minutessince the log files are also needed. What action do you need to take regarding timeout?

A. Log in as the default user expert and start cpinfo.

B. No action is needed because cpshell has a timeout of one hour by default.

C. Log in as Administrator, set the timeout to one hour with the command idle 60 and start cpinfo.

D. Log in as admin, switch to expert mode, set the timeout to one hour with the command, idle 60, then startcpinto.

Answer: CSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 42Checkpoint 156­215.75 Exam

QUESTION 105Many companies have defined more than one administrator. To increase security, only one administrator shouldbe able to install a Rule Base on a specific Firewall. How do you configure this?

Page 39: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. Define a permission profile in SmartDashboard with read/write privileges, but restrict it to all other firewallsby placing them in the Policy Targets field. Then, an administrator with this permission profile cannot install apolicy on any Firewall not listed here.

B. In the General Properties of the object representing the specific Firewall, go to the Software Blades productlist and select Firewall. Right­click in the menu, select Administrator to Install to define only thisadministrator.

C. Put the one administrator in an Administrator group and configure this group in the specific Firewall object inAdvanced / Permission to Install.

D. Right­click on the object representing the specific administrator, and select that Firewall in Policy Targets.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 106What is the officially accepted diagnostic tool for IP appliance support?

A. Ipsinfo

B. Uag­diag

C. CST

D. cpinfo

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 107You are the Security Administrator for MegaCorp. A Check Point firewall is installed and in use on aSecurePlatform. You have trouble configuring the speed and duplex settings of your Ethernet interfaces. Whichof the following commands can be used to configure the speed and duplex settings of an Ethernet interface andwill survive a reboot? Give the BEST answer.

"Pass Any Exam. Any Time." ­ www.actualtests.com 43Checkpoint 156­215.75 Exam

A. cthtool

B. ifconfig ­ a

C. eth_set

D. mii_tool

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 108Which command enables IP forwarding on IPSO?

Page 40: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. echo 1 > /proc/sys/net/ipv4/ip_forward

B. clish ­c set routing active enable

C. echo 0 > /proc/sys/net/ipv4/ip_forward

D. ipsofwd on admin

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 109How many inspection capture points are shown in fw monitor?

A. 2

B. 1

C. Depends on the number of interfaces on the Gateway

D. 4

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 110Looking at an fw monitor capture in Wireshark, the initiating packet in Hide NAT translates on________.

A. I"Pass Any Exam. Any Time." ­ www.actualtests.com 44Checkpoint 156­215.75 Exam

B. O

C. o

D. i

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 111You want to create an ASCII formatted output file of the fw monitor command. What is the correct syntax toaccomplish this task?

A. fw monitor ­e "accept;" > /tmp/monitor.txt

B. fw monitor ­e "accept;" ­f > /tmp/monitor.txt

C. fw monitor ­m iO ­e "accept;" ­o /tmp/monitor.txt

D. fw monitor ­e "accept;" ­w /tmp/monitor.txt

Page 41: Checkpoint.Actualtests.156-215.75.v2012-04-08

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 112When you run the fw monitor ­e "accept;" command, what type of traffic is captured?

A. Only inbound traffic, before and after the inbound inspection.

B. All traffic coming in all directions, before and after inbound and outbound inspection.

C. All traffic accepted by the Rule Base.

D. Only outbound traffic, before and after the outbound inspection.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 113The Get Address button, found on the Host Node Object / General Properties page, will retrieve what?

A. The IP address"Pass Any Exam. Any Time." ­ www.actualtests.com 45Checkpoint 156­215.75 Exam

B. The domain name

C. The fully qualified domain name

D. The Mac address

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 114You have just been hired as the Security Administrator for the Insure­It­All insurance company. Your managergives you the following requirements for controlling DNS traffic:

Required Result #1: Accept domain­name­over­TCP traffic (zone­transfer traffic)

Required Result #2: Log domain­name­over­TCP traffic (zone­transfer traffic)

Desired Result #1: Accept domain­name­over­UDP traffic (queries traffic)

Desired Result #2: Do not log domain­name­over­UDP traffic (queries traffic)

Desired Result #3: Do not clutter the Rule Base try creating explicit rules for traffic that can be controlled usingGlobal Properties

To begin, you make the following configuration changes, and install the Security Policy

Page 42: Checkpoint.Actualtests.156-215.75.v2012-04-08

­ Select the box Accept Domain Name over TCP (Zone Transfer) in Global Properties­ Select the box Accept Domain Name over UDP (Queries) in Global Properties­ Select the box Log Implied Rules in Global Properties

Do your initial actions meet the required and desired results?

A. The actions achieve the required results, and two of the desired results.

B. The actions achieve all required results, but none of the desired results.

C. The actions do not achieve the required results.

D. The actions meet all required and desired results.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 115When you change an implicit rule's order from last to first in global properties, how do you make

"Pass Any Exam. Any Time." ­ www.actualtests.com 46Checkpoint 156­215.75 Examthe change take effect?

A. Select save from the file menu

B. Reinstall the security policy

C. Select install database from the policy menu

D. Run fw fetch from the security gateway

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 116You create implicit and explicit rules for the following network. The group object internal­networks includesnetworks 10.10.10.0 and 10.10.20.0. Assume Accept ICMP requests is enabled as Before last in GlobalProperties.

Based on these rules, what happens if you Ping from host 10.10.10.5 to a host on the Internet by IP address?ICMP will be:

A. dropped by rule 0.

B. dropped by rule 2, the Cleanup Rule.

C. accepted by rule 1.

D. dropped by the last Implicit rule.

Answer: CSection: (none)

Explanation/Reference:

Page 43: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation:

QUESTION 117How does the Get Address button, found on the Host Node Object > General Properties page retrieve theaddress?

A. Route Table

B. SNMP Get

C. Address resolution (ARP. RARP)

D. Name resolution (hosts file, DNS, cache)

Answer: DSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 47Checkpoint 156­215.75 Exam

QUESTION 118Anti­Spoofing is typically set up on which object type?

A. Host

B. Domain

C. Network

D. Security Gateway

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 119Spoofing is a method of:

A. Hiding your firewall from unauthorized users.

B. Disguising an illegal IP address behind an authorized IP address through port address Translation.

C. Making packets appear as if they come from an authorized IP address

D. Detecting people using false or wrong authentication logins.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 120Certificates for Security Gateways are created during a simple initialization from______.

Page 44: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. SmartUpdate

B. sysconfig

C. The ICA management tool.

D. SmartDashboard

Answer: DSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 48Checkpoint 156­215.75 Exam

QUESTION 121Which of the below is most correct process to reset SIC from SmartDashboard?

A. Run cpconfig, and click reset

B. Click the Communication > button for the firewall object, then click Reset Run cpconfig and type a newactivation key

C. Click Communication > Reset on the Gateway object, and type a new activation key

D. Run cpconfig, and select Secure Internal Communication > Change One Time Password

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 122You installed Security Management Server on a computer using SecurePlatform in the MegaCorp home office.You use IP address 10.1.1.1. You also installed the Security Gateway on a second SecurePlatform computer,which you plan to ship to another Administrator at a MegaCorp hub office. What is the correct order for pushingSIC certificates to the Gateway before shipping it?

1) Run cpconfig on the gateway, set secure internal communication, enter the activation key and reconfirm.

2) Initialize internal certificate authority (ICA) on the security Management server.

3) Confirm the gateway object with the host name and IP address for the remote site.

4) Click the communication button in the gateway object's general screen, enter the activation key, and clickinitialize and ok.

5) Install the security policy.

A. 2, 3, 4, 5, 1

B. 1, 3, 2, 4, 5

C. 2, 3, 4, 1, 5

D. 2, 1, 3, 4, 5

Answer: B

Page 45: Checkpoint.Actualtests.156-215.75.v2012-04-08

Section: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 49Checkpoint 156­215.75 Exam

QUESTION 123Although SIC was already established and running, Joe reset SIC between the Security Management Serverand a remote Gateway. He set a new activation key on the Gateway's side with the cpconfig command and putin the same activation key in the Gateway's object on the Security Management Server Unfortunately SICcannot be established. What is a possible reason for the problem?

A. The installed policy blocks the communication.

B. Joe forgot to reboot the Gateway.

C. Joe forgot to exit from cpconfig.

D. The old Gateway object should have been deleted and recreated.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 124You want to reset SIC between smberlin and sgosaka.

In SmartDashboard, you choose sgosaka, Communication, Reset. On sgosaka, you start cpconfig, chooseSecure Internal Communication and enter the new SIC Activation Key. The screen reads The SIC wassuccessfully initialized and jumps back to the cpconfig menu. When trying to establish a connection, instead of aworking connection, you receive this error message:

What is the reason for this behavior?

A. You must first initialize the Gateway object in SmartDashboard (i.e., right­click on the object, choose BasicSetup / Initialize).

B. The Gateway was not rebooted, which is necessary to change the SIC key.

C. The Check Point services on the Gateway were not restarted because you are still in the cpconfig utility.

D. The activation key contains letters that are on different keys on localized keyboards. Therefore, theactivation can not be typed in a matching fashion.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 125Which rule should be the Cleanup Rule in the Rule Base?

"Pass Any Exam. Any Time." ­ www.actualtests.com 50Checkpoint 156­215.75 Exam

Page 46: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. Last. It serves a logging function before the implicit drop.

B. Last, it explicitly drops otherwise accepted traffic

C. Before last followed by the Stealth Rule.

D. First, it explicitly accepts otherwise dropped traffic.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 126What are the two basic rules which should be used by all Security Administrators?

A. Administrator Access and Stealth rules

B. Cleanup and Administrator Access rules

C. Network Traffic and Stealth rules

D. Cleanup and Stealth rules

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 127Which item below in a Security Policy would be enforced first?

A. Administrator­defined Rule Base

B. Network Address Translation

C. IP spoofing/IP options

D. Security Policy "First" rule

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 128When you hide a rule in a Rule Base, how can you then disable the rule?

A. Use the search utility in SmartDashboard to view all hidden rules Select the relevant rule and click DisableRule(s)."Pass Any Exam. Any Time." ­ www.actualtests.com 51Checkpoint 156­215.75 Exam

B. Right­click on the hidden rule place­holder bar and select Disable Rule(s).

C. Right­click on the hidden rule place­holder bar and uncheck Hide, then right­click and select Disable Rule(s);re­hide the rule.

Page 47: Checkpoint.Actualtests.156-215.75.v2012-04-08

D. Hidden rules are already effectively disabled from Security Gateway enforcement.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 129A Stealth rule is used to:

A. Use the Security Gateway to hide the border router from internal attacks.

B. Cloak the type of Web server in use behind the Security Gateway.

C. Prevent communication to the Security Gateway itself.

D. Prevent tracking of hosts behind the Security Gateway.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 130A Clean­up rule is used to:

A. Drop without logging connections that would otherwise be dropped and logged fry default

B. Log connections that would otherwise be accepted without logging by default.

C. Log connections that would otherwise be dropped without logging by default.

D. Drop without logging connections that would otherwise be accepted and logged by default

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 131A ____________ rule is designed to log and drop all other communication that does not match another rule.

A. Stealth"Pass Any Exam. Any Time." ­ www.actualtests.com 52Checkpoint 156­215.75 Exam

B. Cleanup

C. Reject

D. Anti­Spoofing

Answer: BSection: (none)

Explanation/Reference:Explanation:

Page 48: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 132Which statement is TRUE about implicit rules?

A. They are derived from Global Properties and explicit object properties.

B. The Gateway enforces implicit rules that enable outgoing packets only.

C. You create them in SmartDashboard.

D. Changes to the Security Gateway's default settings do not affect implicit rules.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 133You have included the Cleanup Rule in your Rule Base. Where in the Rule Base should the Accept ICMPRequests implied rule have no effect?

A. First

B. Before Last

C. Last

D. After Stealth Rule

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 134All of the following are Security Gateway control connections defined by default implied rules, EXCEPT:

A. Acceptance of IKE and RDP traffic for communication and encryption purposes."Pass Any Exam. Any Time." ­ www.actualtests.com 53Checkpoint 156­215.75 Exam

B. Exclusion of specific services for reporting purposes.

C. Communication with server types, such as RADIUS, CVP, UFP, TACACS, and LDAP.

D. Specific traffic that facilitates functionality, such as logging, management, and key exchange.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 135In a distributed management environment, the administrator has removed all default check boxes from thePolicy / Global Properties / Firewall tab. In order for the Security Gateway to send logs to the SecurityManagement Server, an explicit rule must be created to allow the Security Gateway to communicate to theSecurity Management Server on port ______.

Page 49: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. 259

B. 257

C. 900

D. 256

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 136Examine the following Security Policy. What, if any, changes could be made to accommodate Rule 4?

A. Nothing at all"Pass Any Exam. Any Time." ­ www.actualtests.com 54Checkpoint 156­215.75 Exam

B. Modify the Source or Destination columns in Rule 4

C. Remove the service HTTPS from the Service column in Rule A

D. Modify the VPN column in Rule 2 to limit access to specific traffic

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 137A Security Policy has several database versions. What configuration remains the same no matter which versionis used?

A. Rule Bases_5_0.fws

Page 50: Checkpoint.Actualtests.156-215.75.v2012-04-08

B. Internal Certificate Authority (ICA) certificate

C. Fwauth.NDB

D. Objects_5_0.C

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 138You are working with multiple Security Gateways that enforce an extensive number of rules. To simplify Securityadministration, which one of the following would you choose to do?

A. Create a separate Security Policy package for each remote Security Gateway

B. Run separate SmartConsole instances to login and configure each Security Gateway directly

C. Eliminate all possible contradictory rules such as the Stealth or Cleanup rules

D. Create network objects that restrict all applicable rules to only certain networks

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 139You are working with multiple Security Gateways that enforce a common set of rules. To minimize the numberof policy packages, which one of the following would you choose to do?

"Pass Any Exam. Any Time." ­ www.actualtests.com 55Checkpoint 156­215.75 Exam

A. Install a separate local Security Management Server and SmartConsole for each remote Security Gateway.

B. Create a separate Security Policy package for each remote Security Gateway and specify Install On /Gateways.

C. Create a single Security Policy package with Install On / Target defined whenever a unique rule is requiredfor a specific Gateway.

D. Run separate SmartDashbord instance to login and configure each Security Gateway directly.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 140Which rules are not applied on a first­match basis?

A. Cleanup

B. User Authentication

C. Session Authentication

Page 51: Checkpoint.Actualtests.156-215.75.v2012-04-08

D. Client Authentication

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 141Installing a policy usually has no impact on currently existing connections. Which statement is TRUE?

A. Users being authenticated by Client Authentication have to re­authenticate.

B. Site­to­Site VPNs need to re­authenticate, so Phase 1 is passed again after installing the Security Policy.

C. All FTP downloads are reset; users have to start their downloads again.

D. All connections are reset, so a policy install is recommended during announced downtime only.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 142"Pass Any Exam. Any Time." ­ www.actualtests.com 56Checkpoint 156­215.75 ExamSeveral Security Policies can be used for different installation targets. The firewall protecting Human Resources'servers should have a unique Policy Package. These rules may only be installed on this machine and notaccidentally on the Internet firewall. How can this be configured?

A. A Rule Base is always installed on all possible targets. The rules to be installed on a firewall are defined bythe selection in the row Install On of the Rule Base.

B. When selecting the correct firewall in each line of the row Install On of the Rule Base, only this firewall isshown in the list of possible installation targets after selecting Policy > Install.

C. In the SmartDashboard main menu go to Policy / Policy Installation / Targets and select the correct firewallto be put into the list via Specific Targets.

D. A Rule Base can always be installed on any Check Point firewall object It is necessary to select theappropriate target directly after selecting Policy > Install.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 143Which of these security policy changes optimize Security Gateway performance?

A. Use Automatic NAT rules instead of Manual NAT rules whenever possible

B. Putting the least­used rule at the top of the Rule Base

C. Using groups within groups in the manual NAT Rule Base

D. Using domain objects in rules when possible

Page 52: Checkpoint.Actualtests.156-215.75.v2012-04-08

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 144Your perimeter Security Gateway's external IP is 200.200.200.3. Your network diagram shows:

"Pass Any Exam. Any Time." ­ www.actualtests.com 57Checkpoint 156­215.75 Exam

Required: Allow only network 192.168.10.0 and 192.168.20.0 to go out to the Internet, using 200.200.200.5.

The local network 192.168.1.0/24 needs to use 200.200.200.3 to go out to the Internet.

Assuming you enable all the settings in the NAT page of Global Properties, how could you achieve theserequirements?

A. Create a network object 192.168.0.0/16. Enable Hide NAT on the NAT page. Enter 200.200.200.5 as thehiding IP address. Add and ARP entry for 200.200.200.5 for the MAC address of 200.200.200.3.

B. Create network objects for 192.168.10.0/24 and 192.168.20.0/24. Enable Hide NAT on both networkobjects, using 200.200.200.5 as hiding IP address Add an ARP entry for 200.200.200.3 for the MAC addressof 200.200.200.5.

C. Create an Address Range object, starting from 192.168.10.1 to 192.168.20.254. Enable Hide NAT on theNAT page of the address range object. Enter Hiding IP address 200.200.200.5. Add an ARP entry for200.200.200.5 for the MAC address of 200.200.200.3.

D. Create two network objects: 192.168.10.0/24. and 192.168.20.0/24. Add the two network objects. Create amanual NAT rule like the following Original source ­group object; Destination ­ any Service ­ any, Translatedsource ­ 200.200.200.5; Destination ­ original, Service ­ original.

Answer: CSection: (none)

Page 53: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation/Reference:Explanation:

QUESTION 145"Pass Any Exam. Any Time." ­ www.actualtests.com 58Checkpoint 156­215.75 ExamBecause of a pre­existing design constraints, you set up manual NAT rules for your HTTP server. However,your FTP server and SMTP server are both using automatic NAT rules. All traffic from your FTP and SMTPservers are passing through the Security Gateway without a problem, but traffic from the Web server is droppedon rule 0 because of anti­spoofing settings. What is causing this?

A. Allow bi­directional NAT is not checked in Global Properties.

B. Manual NAT rules are not configured correctly.

C. Translate destination on client side is not checked in Global Properties under manual NAT rules.

D. Routing is not configured correctly.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 146You enable Hide NAT on the network object, 10.1.1.0 behind the Security Gateway's external interface. Youbrowse to from host, 10.1.1.10 successfully. You enable a log on the rule that allows 10.1.1.0 to exit thenetwork. How many log entries do you see for that connection in SmartView Tracker?

A. Only one, outbound

B. Two, one for outbound, one for inbound

C. Only one, inbound

D. Two, both outbound, one for the real IP connection and one for the NAT IP connection

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 147Which of the following statements BEST describes Check Point's Hide Network Address Translation method?

A. Many­to­one NAT which implements PAT (Port Address Translation) for accomplishing both Source andDestination IP address translation

B. Translates many destination IP addresses into one destination IP address

C. Translates many source IP addresses into one source IP address

D. One­to­one NAT which implements PAT (Port Address Translation) for accomplishing both "Pass AnyExam. Any Time." ­ www.actualtests.com 59Checkpoint 156­215.75 ExamSource and Destination IP address translation

Answer: CSection: (none)

Page 54: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation/Reference:Explanation:

QUESTION 148Which Check Point address translation method allows an administrator to use fewer ISP­assigned IP addressesthan the number of internal hosts requiring Internet connectivity?

A. Static Destination

B. Hide

C. Dynamic Destination

D. Static Source

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 149NAT can NOT be configured on which of the following objects?

A. Address Range

B. HTTP Logical Server

C. Host

D. Gateway

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 150NAT can be implemented on which of the following lists of objects?

A. Domain network

B. Host network

C. Host user

D. Network, Dynamic Object"Pass Any Exam. Any Time." ­ www.actualtests.com 60Checkpoint 156­215.75 Exam

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 151

Page 55: Checkpoint.Actualtests.156-215.75.v2012-04-08

Which Check Point address translation method is necessary if you want to connect from a host on the Internetvia HTTP to a server with a reserved (RFC 1918) IP address on your DMZ?

A. Static Destination Address Translation

B. Port Address Translation

C. Dynamic Source Address Translation

D. Hide Address Translation

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 152You want to implement Static Destination NAT in order to provide external, Internet users access to an internalWeb Server that has a reserved (RFC 1918) IP address. You have an unused valid IP address on the networkbetween your Security Gateway and ISP router. You control the router that sits between the external interface ofthe firewall and the Internet.

What is an alternative configuration if proxy ARP cannot be used on your Security Gateway?

A. Place a static host route on the firewall for the valid IP address to the internal Web server.

B. Place a static ARP entry on the ISP router for the valid IP address to the firewall's external address.

C. Publish a proxy ARP entry on the ISP router instead of the firewall for the valid IP address.

D. Publish a proxy ARP entry on the internal Web server instead of the firewall for the valid IP address.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 153After implementing Static Address Translation to allow Internet traffic to an internal Web Server on your DMZ,you notice that any NATed connections to that machine are being dropped by anti­

"Pass Any Exam. Any Time." ­ www.actualtests.com 61Checkpoint 156­215.75 Examspoofing protections. Which of the following is the MOST LIKELY cause?

A. The Global Properties setting Translate destination on client side is checked. But the topology on theexternal interface is set to External.Change topology to Others +.

B. The Global Properties setting Translate destination on client side is unchecked. But the topology on theexternal interface is set to Others +. Change topology to External

C. The Global Properties setting Translate destination on client side is checked But the topology on the DMZinterface is set to Internal ­Network defined by IP and Mask Uncheck the Global Properties setting Translatedestination on client side

D. The Global Properties setting Translate destination on client side is unchecked. But the topology on the DMZinterface is set to Internal ­ Network defined by IP and Mask. Check the Global Properties setting Translatedestination on client side.

Answer: D

Page 56: Checkpoint.Actualtests.156-215.75.v2012-04-08

Section: (none)

Explanation/Reference:Explanation:

QUESTION 154Which NAT option applicable for Automatic NAT applies to Manual NAT as well?

A. Allow bi­directional NAT

B. Automatic ARP configuration

C. Enable IP Pool NAT

D. Translate destination on client­side

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 155Your main internal network 10.10.10.0/24 allows all traffic to the Internet using Hide NAT. You also have a smallnetwork 10.10.20.0/24 behind the internal router. You want to configure the kernel to translate the sourceaddress only when network 10.10.20.0 tries to access the Internet for HTTP, SMTP, and FTP services. Whichof the following configurations will allow this network to access the Internet?

A. Configure three Manual Static NAT rules for network 10.10.20.0/24, one for each service

B. Configure one Manual Hide NAT rule for HTTP, FTP, and SMTP services for network 10.10.20.0/24

C. Configure Automatic Hide NAT on network 10.10.20.0/24 and then edit the Service column in "Pass AnyExam. Any Time." ­ www.actualtests.com 62Checkpoint 156­215.75 Examthe NAT Rule Base on the automatic rule

D. Configure Automatic Static NAT on network 10.10.20.0/24

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 156You have three servers located in a DMZ, using private IP addresses. You want internal users from 10.10.10.xto access the DMZ servers by public IP addresses. Internal_net 10.10.10.x is configured for Hide NAT behindthe Security Gateway's external interface.

What is the best configuration for 10.10.10.x users to access the DMZ servers, using the DMZ servers' public IPaddresses?

Page 57: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. When connecting to the Internet, configure manual Static NAT rules to translate the DMZ servers

B. When the source is the internal network 10.10.10.x, configure manual static NAT rules to translate the DMZservers.

C. When connecting to internal network 10 10.10 x. configure Hide NAT for the DMZ servers.

D. When connecting to the internal network 10.10.10x, configure Hide Nat for the DMZ network behind theDMZ interface of the Security Gateway

Answer: BSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 63Checkpoint 156­215.75 Exam

QUESTION 157An internal host initiates a session to www.google.com and is set for Hide NAT behind the Security Gateway.The initiating traffic is an example of __________.

A. Client side NAT

B. Destination NAT

C. Source NAT

D. None of these

Answer: CSection: (none)

Explanation/Reference:Explanation:

Page 58: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 158A host on the Internet initiates traffic to the Static NAT IP of your Web server behind the Security Gateway. Withthe default settings in place for NAT, the initiating packet will translate the_________.

A. source on client side

B. destination on server side

C. destination on client side

D. source on server side

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 159A Web server behind the Security Gateway is set to Automatic Static NAT. Client side NAT is not checked in theGlobal Properties. A client on the Internet initiates a session to the Web Server. Assuming there is a ruleallowing this traffic, what other configuration must be done to allow the traffic to reach the Web server?

A. Automatic ARP must be unchecked in the Global Properties.

B. A static route must be added on the Security Gateway to the internal host.

C. Nothing else must be configured.

D. A static route for the NAT IP must be added to the Gateway's upstream router."Pass Any Exam. Any Time." ­ www.actualtests.com 64Checkpoint 156­215.75 Exam

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 160When translation occurs using automatic Hide NAT, what also happens?

A. Nothing happens.

B. The source port is modified.

C. The destination port is modified.

D. The destination is modified.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 161The fw monitor utility is used to troubleshoot which of the following problems?

Page 59: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. Phase two key negotiation

B. User data base corruption

C. Address translation

D. Log Consolidation Engine

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 162The fw monitor utility would be best to troubleshoot which of the following problems?

A. An error occurs when editing a network object in SmartDashboard

B. A statically NATed Web server behind a Security Gateway cannot be reached from the Internet.

C. You get an invalid ID error in SmartView Tracker for phase 2 IKE key negotiations.

D. A user in the user database is corrupt.

Answer: BSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 65Checkpoint 156­215.75 Exam

QUESTION 163Looking at the SYN packets in the Wireshark output, select the statement that is true about NAT.

A. There is not enough information provided in the Wireshark capture to determine NAT settings.

B. This is an example hide NAT.

C. There is an example of Static NAT and translate destination on client side unchecked in Global Properties.

D. This is an example of Static NAT and Translate destination on client side checked in Global Properties.

Answer: DSection: (none)

Page 60: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation/Reference:Explanation:

QUESTION 164In SmartDashboard, Translate destination on client side is checked in Global Properties. When NetworkAddress Translation is used:

A. It is necessary to add a static route to the Gateway's routing table.

B. The Security Gateway's ARP file must be modified.

C. It is not necessary to add a static route to the Gateway's routing table.

D. VLAN tagging cannot be defined for any hosts protected by the Gateway.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 165Secure Internal Communications (SIC) is completely NAT­tolerant because it is based on:

"Pass Any Exam. Any Time." ­ www.actualtests.com 66Checkpoint 156­215.75 Exam

A. MAC addresses.

B. SIC names.

C. SIC is not NAT­tolerant.

D. IP addresses.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 166Static NAT connections, by default, translate on which inspection point of the firewall kernel?

A. Outbound

B. Eitherbound

C. Inbound

D. Post­inbound

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 167

Page 61: Checkpoint.Actualtests.156-215.75.v2012-04-08

In a Hide NAT connection outbound, which portion of the packet is modified?

A. Source IP address and destination port

B. Destination IP address and destination port

C. Source IP address and source port

D. Destination IP address and destination port

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 168You are MegaCorp's Security Administrator. There are various network objects which must be NATed. Some ofthem use the Automatic Hide NAT method, while others use the Automatic Static NAT method. What is theorder of the rules if both methods are used together? Give the best answer.

"Pass Any Exam. Any Time." ­ www.actualtests.com 67Checkpoint 156­215.75 Exam

A. The Administrator decides on the order of the rules by shifting the corresponding rules up and down.

B. The Static NAT rules have priority over the Hide NAT rules and the NAT on a node has priority over the NATon a network or an address range

C. The Hide NAT rules have priority over the Static NAT rules and the NAT on a node has priority over the NATon a network or an address range

D. The position of the rules depends on the time of their creation. The rules created first are placed at the top;rules created later are placed successively below the others.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 169Which answers are TRUE? Automatic Static NAT CANNOT be used when:

i) NAT decision is based on the destination port

ii) Source and Destination IP both have to be translated

iii) The NAT rule should only be installed on a dedicated Gateway only

iv) NAT should be performed on the server side

A. (i), (ii), and (iii)

B. (i), and (ii)

C. (ii) and (iv)

D. only (i)

Answer: DSection: (none)

Page 62: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation/Reference:Explanation:

QUESTION 170In order to have full control, you decide to use Manual NAT entries instead of Automatic NAT rules. Which is ofthe following is NOT true?

A. When using Dynamic Hide NAT with an address that is not configured on a Gateway interface, you need toadd a proxy ARP entry for that address.

B. When using Static NAT, you must enter ARP entries for the Gateway on all hosts that are using the NATGateway with that Gateway's internal interface IP address."Pass Any Exam. Any Time." ­ www.actualtests.com 68Checkpoint 156­215.75 Exam

C. When using Static NAT, you must add proxy ARP entries to the Gateway for all hiding addresses.

D. If you chose Automatic NAT instead, all necessary entries are done for you.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 171After filtering a fw monitor trace by port and IP, a packet is displayed three times; in the i, I, and o inspectionpoints, but not in the O inspection point. Which is the likely source of the issue?

A. The packet has been sent out through a VPN tunnel unencrypted.

B. An IPSO ACL has blocked the outbound passage of the packet.

C. A SmartDefense module has blocked the packet

D. It is an issue with NAT

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 172A marketing firm's networking team is trying to troubleshoot user complaints regarding access to audio­streaming material from the Internet. The networking team asks you to check the object and rule configurationsettings for the perimeter Security Gateway. Which SmartConsole application should you use to check theseobjects and rules?

A. SmartView Tracker

B. SmartView Status

C. SmartView Monitor

D. SmartDashboard

Answer: DSection: (none)

Page 63: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation/Reference:Explanation:

QUESTION 173Which statement below describes the most correct strategy for implementing a Rule Base?

"Pass Any Exam. Any Time." ­ www.actualtests.com 69Checkpoint 156­215.75 Exam

A. Add the Stealth Rule before the last rule.

B. Umit grouping to rules regarding specific access.

C. Place the most frequently used rules at the top of the Policy and the ones that are not frequently used furtherdown.

D. Place a network­traffic rule above the administrator access rule.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 174Which of the following is a viable consideration when determining Rule Base order?

A. Grouping functionally related rules together

B. Grouping rules by date of creation

C. Grouping authentication rules with address translation rules

D. Grouping reject and drop rules after the cleanup rule

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 175Which of the following is a viable consideration when determining Rule Base order?

A. Grouping rules by date of creation

B. Adding SAM rules at the top of the Rule Base

C. Placing frequently accessed rules before less frequently accessed rules

D. Grouping IPS rules with dynamic drop rules

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 176

Page 64: Checkpoint.Actualtests.156-215.75.v2012-04-08

Which of the following is a viable consideration when determining Rule Base order?

A. Grouping authentication rules with QOS rules"Pass Any Exam. Any Time." ­ www.actualtests.com 70Checkpoint 156­215.75 Exam

B. Grouping IPS rules with dynamic drop rules

C. Placing more restrictive rules before more permissive rules

D. Grouping reject and drop rules after the Cleanup Rule

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 177You would use the Hide Rule feature to:

A. Make rules invisible to incoming packets.

B. View only a few rules without the distraction of others

C. Hide rules from read­only administrators.

D. Hide rules from a SYN/ACK attack.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 178When you add a resource object to a rule, which of the following occurs?

A. All packets that match the resource will be dropped.

B. All packets matching that rule are either encrypted or decrypted by the defined resource.

C. All packets matching the resource service are analyzed through an application­layer proxy.

D. Users attempting to connect to the destination of the rule will be required to authenticate.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 179You are a Security Administrator using one Security Management Server managing three different firewalls.One of the firewalls does NOT show up in the dialog box when attempting to install a Security Policy. Which ofthe following is a possible cause?

A. The firewall object has been created but SIC has not yet been established."Pass Any Exam. Any Time." ­ www.actualtests.com 71Checkpoint 156­215.75 Exam

Page 65: Checkpoint.Actualtests.156-215.75.v2012-04-08

B. The license for this specific firewall has expired.

C. The firewall has failed to sync with the Security Management Server for 60 minutes.

D. The firewall is not listed in the Policy Installation Targets screen for this policy package.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 180Your shipping company uses a custom application to update the shipping distribution database. The customapplication includes a service used only to notify remote sites that the distribution database is malfunctioning.The perimeter Security Gateway's Rule Base includes a rule to accept this traffic. Since you are responsible formultiple sites, you want notification by a text message to your cellular phone, whenever traffic is accepted onthis rule. Which of the following would work BEST for your purpose?

A. SmartView Monitor Threshold

B. SNMP trap

C. Logging implied rules

D. User­defined alert script

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 181The fw stat ­l command includes all of the following except:

A. The number of packets that have been inspected

B. The date and time of the policy that is installed.

C. The number of times the policy has been installed

D. The number of packets that have been dropped

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 182Which command allows verification of the Security Policy name and install date on a Security

"Pass Any Exam. Any Time." ­ www.actualtests.com 72Checkpoint 156­215.75 ExamGateway?

A. fw show policy

B. fw ctl pstat ­policy

Page 66: Checkpoint.Actualtests.156-215.75.v2012-04-08

C. fw stat ­l

D. fwver­p

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 183You have two rules, ten users, and two user groups in a Security Policy. You create database version 1 for thisconfiguration. You then delete two existing users and add a new user group. You modify one rule and add twonew rules to the Rule Base. You save the Security Policy and create database version 2. After awhile, youdecide to roll back to version 1 to use the Rule Base, but you want to keep your user database. How can you dothis?

A. Run fwm_dbexport to export the user database. Select restore the entire database in the Database Revisionscreen. Then, run fwm_dbimport.

B. Restore the entire database, except the user database, and then create the new user and user group.

C. Restore the entire database, except the user database.

D. Run fwm dbexport ­l filename. Restore the database. Then, run fwm dbimport ­l filename to import theusers.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 184Which feature or command provides the easiest path for Security Administrators to revert to earlier versions ofthe same Security Policy and objects configuration?

A. Policy Package management

B. dbexport/dbimport

C. Database Revision Control

D. upgrade_export/upgrade_import

Answer: CSection: (none)

Explanation/Reference:"Pass Any Exam. Any Time." ­ www.actualtests.com 73Checkpoint 156­215.75 Exam

Explanation:

QUESTION 185Your Security Management Server fails and does not reboot. One of your remote Security Gateways managedby the Security Management Server reboots. What occurs with the remote Gateway after reboot?

Page 67: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. Since the Security Management Server is not available, the remote Gateway cannot fetch the SecurityPolicy. Therefore, no traffic is allowed through the Gateway.

B. Since the Security Management Server is not available, the remote Gateway cannot fetch the SecurityPolicy. Therefore, all traffic is allowed through the Gateway.

C. Since the Security Management Server is not available, the remote Gateway uses the local Security Policy,but does not log traffic.

D. The remote Gateway fetches the last installed Security Policy locally and passes traffic normally. TheGateway will log locally, since the Security Management Server is not available.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 186How can you configure an application to automatically launch on the Security Management Server when trafficis dropped or accepted by a rule in the Security Policy?

A. Pop­up alert script

B. User­defined alert script

C. Custom scripts cannot be executed through alert scripts

D. SNMP trap alert script

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 187Which of the following is NOT useful to verify whether or NOT a Security Policy is active on a Gateway?

"Pass Any Exam. Any Time." ­ www.actualtests.com 74Checkpoint 156­215.75 Exam

A. Check the name of Security Policy of the appropriate Gateway in Smart Monitor.

B. Cpstat fw ­ f policy

C. fw stat

D. fw ctl get string active_secpol

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 188Of the following, what parameters will not be preserved when using Database Revision Control?

1) Simplified mode Rule Bases

Page 68: Checkpoint.Actualtests.156-215.75.v2012-04-08

2) Traditional mode Rule Bases

3) Secure Platform WebUI Users

4) SIC certificates

5) SmartView Tracker audit logs

6) SmartView Tracker traffic logs

7) Implied Rules

8) IPS Profiles

9) Blocked connections

10) Manual NAT rules

11) VPN communities

12) Gateway route table

13) Gateway licenses

A. 3, 4, 5, 6, 9, 12, 13

B. 5, 6, 9, 12, 13

C. 1, 2, 8, 10, 11

D. 2, 4, 7, 10, 11

Answer: ASection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 75Checkpoint 156­215.75 Exam

QUESTION 189Which of the following describes the default behavior of an R75 Security Gateway?

A. Traffic is filtered using controlled port scanning.

B. All traffic is expressly permitted via explicit rules.

C. Traffic not explicitly permitted is dropped.

D. IP protocol types listed as secure are allowed by default, i.e. ICMP, TCP, UDP sessions are inspected.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 190When you use the Global Properties' default settings on R75, which type of traffic will be dropped if no explicit

Page 69: Checkpoint.Actualtests.156-215.75.v2012-04-08

rule allows the traffic?

A. SmartUpdate connections

B. Firewall logging and ICA key­exchange information

C. Outgoing traffic originating from the Security Gateway

D. RIP traffic

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 191You have installed a R75 Security Gateway on SecurePlatform. To manage the Gateway from the enterpriseSecurity Management Server, you create a new Gateway object and Security Policy. When you install the newPolicy from the Policy menu, the Gateway object does not appear in the Install Policy window as a target. Whatis the problem?

A. The object was created with Node / Gateway.

B. The Gateway object is not specified in the Install On column of the first policy rule.

C. The new Gateway's temporary license has expired.

D. No Masters file is created for the new Gateway."Pass Any Exam. Any Time." ­ www.actualtests.com 76Checkpoint 156­215.75 Exam

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 192Select the correct statement about Secure Internal Communications (SIC) Certificates. SIC Certificates:

A. Are used for securing internal network communications between the SmartDashboard and the SecurityManagement Server.

B. ForR75Security Gateways are created during the Security Management Server installation.

C. Decrease network security by securing administrative communication among the Security ManagementServers and the Security Gateway.

D. Uniquely identify Check Point enabled machines; they have the same function as VPN Certificates.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 193John is the Security Administrator in his company. He installs a new R75 Security Management Server and anew R75 Gateway. He now wants to establish SIC between them. After entering the activation key, the message"Trust established" is displayed in SmartDashboard, but SIC still does not seem to work because the policy

Page 70: Checkpoint.Actualtests.156-215.75.v2012-04-08

won't install and interface fetching still does not work. What might be a reason for this?

A. This must be a human error.

B. The Gateway's time is several days or weeks in the future and the SIC certificate is not yet valid.

C. SIC does not function over the network.

D. It always works when the trust is established.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 194"Pass Any Exam. Any Time." ­ www.actualtests.com 77Checkpoint 156­215.75 ExamA _______ rule is used to prevent all traffic going to the R75 Security Gateway.

A. Cleanup

B. Reject

C. Stealth

D. IPS

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 195In a distributed management environment, the administrator has removed the default check from Accept ControlConnections under the Policy / Global Properties / FireWall tab. In order for the Security Management Server toinstall a policy to the Firewall, an explicit rule must be created to allow the server to communicate to the SecurityGateway on port ______.

A. 256

B. 80

C. 900

D. 259

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 196Your internal network is configured to be 10.1.1.0/24. This network is behind your perimeter R75 Gateway,which connections to your ISP provider. How do you configure the Gateway to allow this network to go out to theinternet?

Page 71: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. Use Hide NAT for network 10.1.1.0/24 behind the internal interface of your perimeter Gateway.

B. Use Hide NAT for network 10.1.1.0/24 behind the external IP address of your perimeter Gateway.

C. Use automatic Static NAT for network 10.1.1.0/24.

D. Do nothing, as long as 10.1.1.0 network has the correct default Gateway.

Answer: BSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 78Checkpoint 156­215.75 Exam

QUESTION 197Which specific R75 GUI would you use to add an address translation rule?

A. SmartConsole

B. SmartDashboard

C. SmartNAT

D. SmartView Monitor

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 198You are a Security Administrator who has installed Security Gateway R75 on your network. You need to allow aspecific IP address range for a partner site to access your intranet Web server. To limit the partner's access forHTTP and FTP only, you did the following:

1. Created manual Static NAT rules for the Web server.

2. Created the following settings in the Global Properties' Network Address Translation screen

­ Allow bi­directional NAT*­ Translate destination on client side

Do you above settings limit the partner's access?

A. Yes, This will ensure that traffic only matches the specific rule configured for this traffic, and that theGateway translates the traffic after accepting the packet.

B. Yes, Both of these settings are only application to automatically NAT rules.

C. No, The first setting is not applicable. The second setting will reduce performance, by translating traffic in thekernel nearest the intranet server.

D. No. The first setting is only applicable to automatic NAT rules. The second setting is necessary to make surethere are no conflicts between NAT and anti­spoofing.

Answer: DSection: (none)

Page 72: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation/Reference:Explanation:

QUESTION 199"Pass Any Exam. Any Time." ­ www.actualtests.com 79Checkpoint 156­215.75 ExamYou enable Automatic Static NAT on an internal host node object with a private IP address of 10.10.10.5, whichis NATed into 216.216.216.5. (You use the default settings in Global Properties / NAT.)

When you run fw monitor on the R75 Security Gateway and then start a new HTTP connection from host10.10.10.5 to browse the Internet, at what point in the monitor output will you observe the HTTP SYN­ACKpacket translated from 216.216.216.5 back into 10.10.10.5?

A. i=inbound kernel, before the virtual machine

B. O=outbound kernel, after the virtual machine

C. o=outbound kernel, before the virtual machine

D. I=inbound kernel, after the virtual machine

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 200You have configured a remote site Gateway that supports your boss's access from his home office using a DSLdialup connection. Everything worked fine yesterday, but today all connectivity is lost. Your initial investigationresults in "nobody has touched anything", which you can support by taking a look in SmartView TrackerManagement. What is the problem and what can be done about it?

A. You cannot use NAT and a dialup connection.

B. The NAT configuration is not correct; you can only use private IP addresses in a static NAT setup.

C. A static NAT setup may not work with DSL, since the external IP may change. Hide NAT behind theGateway is the preferred method here.

D. According to published limitations of Security GatewayR75, there's a bug with NAT. A restart of the Gatewaywill help here.

Answer: CSection: (none)

Explanation/Reference:Explanation:

Topic 3, Volume C

QUESTION 201A client has created a new Gateway object that will be managed at a remote location. When the client attemptsto install the Security Policy to the new Gateway object, the object does not appear in the Install On check box.What should you look for?

"Pass Any Exam. Any Time." ­ www.actualtests.com 80Checkpoint 156­215.75 Exam

Page 73: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. A Gateway object created using the Check Point > Externally Managed VPN Gateway option from theNetwork Objects dialog box.

B. Anti­spoofing not configured on the interfaces on the Gateway object.

C. A Gateway object created using the Check Point > Security Gateway option in the network objects, dialogbox, but still needs to configure the interfaces for the Security Gateway object.

D. Secure Internal Communications (SIC) not configured for the object.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 202A Security Policy installed by another Security Administrator has blocked all SmartDashboard connections to thestand­alone installation of R75. After running the fw unloadlocal command, you are able to reconnect withSmartDashboard and view all changes. Which of the following change is the most likely cause of the block?

A. A Stealth Rule has been configured for theR75Gateway.

B. The Allow Control Connections setting in Policy / Global Properties has been unchecked.

C. The Security Policy installed to the Gateway had no rules in it

D. The Gateway Object representing your Gateway was configured as an Externally Managed VPN Gateway.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 203Which of the following is NOT a valid selection for tracking and controlling packets in R75?

A. Reject

B. Accept

C. Hold

D. Session Auth

Answer: CSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 81Checkpoint 156­215.75 Exam

QUESTION 204When configuring anti­spoofing on the Security Gateway object interfaces, which of the following is NOT a validR75 topology configuration?

A. Specific

Page 74: Checkpoint.Actualtests.156-215.75.v2012-04-08

B. External

C. Any

D. Not Defined

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 205You are conducting a security audit. While reviewing configuration files and logs, you notice logs acceptingPOP3 traffic, but you do not see a rule allowing POP3 traffic in the Rule Base. Which of the following is the mostlikely cause?

A. The POP3 rule is disabled.

B. POP3 is one of 3 services (POP3, IMAP, and SMTP) accepted by the default mail object inR75.

C. POP3 is accepted in Global Properties.

D. The POP3 rule is hidden.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 206You are about to test some rule and object changes suggested in an R75 news group. Which backup solutionshould you use to ensure the easiest restoration of your Security Policy to its previous configuration after testingthe changes?

A. upgrade export command

B. Manual copies of the $FWDIR/conf directory

C. SecurePlatform backup utilities

D. Database Revision Control

Answer: DSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 82Checkpoint 156­215.75 Exam

QUESTION 207Which R75 feature or command allows Security Administrators to revert to earlier versions of the Security Policywithout changing object configurations?

A. fwm dbexport/fwm dbimport

B. Policy Package management

Page 75: Checkpoint.Actualtests.156-215.75.v2012-04-08

C. upgrade_export/upgrade,,import

D. Database Revision Control

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 208What must a Security Administrator do to comply with a management requirement to log all traffic acceptedthrough the perimeter Security gateway?

A. Install the View Implicit Rules package using SmartUpdate

B. Define two log serves on the R75 Gateway object Enable Log Implied Rules on the first log server. EnableLog Rule Base on the second log server. Use SmartReporter to merge the two log server records into thesame database for HIPPA log audits.

C. In Global Properties > Reporting Tools check the box Enable tracking all rules (including rules marked asNone in the Track column). Send these logs to a secondary log server for a complete logging history. Useyour normal log server for standard logging for troubleshooting.

D. Check the Log Implied Rules Globally box on the R75 Gateway object.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 209You have configured Automatic Static NAT on an internal host­node object. You clear the box Translatedestination on client site from Global Properties / NAT. Assuming all other NAT settings in Global Properties areselected, what else must be configured so that a host on the Internet can initiate an inbound connection to thishost?

"Pass Any Exam. Any Time." ­ www.actualtests.com 83Checkpoint 156­215.75 Exam

A. A static route, to ensure packets destined for the public NAT IP address will reach the Gateway's internalinterface.

B. A proxy ARP entry, to ensure packets destined for the public IP address will reach the Security Gateway'sexternal interface.

C. The NAT IP address must be added to the anti­spoofing group of the external gateway interface

D. No extra configuration is needed

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 210Cara wants to monitor the top services on her Security Gateway (fw­chicago), but she is getting an error

Page 76: Checkpoint.Actualtests.156-215.75.v2012-04-08

message. Other Security Gateways are reporting the information except a new Security Gateway that was justrecently deployed. Analyze the error message from the output below and determine what Cara can do to correctthe problem.

A. She should re­install the security policy on the security Gateway since it was using the default "Pass AnyExam. Any Time." ­ www.actualtests.com 84Checkpoint 156­215.75 Examrule base

B. She should create a firewall rule to allow the CPMI traffic back to her smart console.

C. She should let the monitoring run longer in order for it to collect sampled data

D. She should edit the security Gateway object and enable the monitoring Software Blade.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 211What will happen when Reset is pressed and confirmed?

Page 77: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. The gateway certificate will be revoked on the security management server only

B. SIC will be reset on the Gateway only

C. The Gateway certificate will be revoked on the security management server and SIC will be reset on theGateway

D. The gateway certificate on the gateway only

Answer: ASection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 85Checkpoint 156­215.75 Exam

QUESTION 212Which rule is responsible for the installation failure?

Page 78: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. Rule 4

B. Rule 3

C. Rule 5

D. Rule 6

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 213What happens if Web Server is checked?

A. Web Intelligence will be applied to the host.

B. An implied rule will be added allowing HTTP requests to the host.

C. Anti­virus settings will be applied to the host.

D. An implied rule will be added allowing HTTP request from and to the host.

Answer: ASection: (none)

Explanation/Reference:"Pass Any Exam. Any Time." ­ www.actualtests.com 86Checkpoint 156­215.75 Exam

Explanation:

QUESTION 214

Page 79: Checkpoint.Actualtests.156-215.75.v2012-04-08

When configuring the network interfaces of a Check Point Gateway, the direction can be defined as Internal orExternal. What is the meaning of Interface leads to DMZ?

A. It defines the DMZ Interface since this information is necessary for Content Control.

B. Using restricted Gateways, this option automatically turns off the counting of IP Addresses originating fromthis interface

C. When selecting this option. Ann­Spoofing is configured automatically to this net.

D. Activating this option automatically turns this interface to External "Pass Any Exam. Any Time." ­ www.actualtests.com 87Checkpoint 156­215.75 Exam

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 215Security Administrator, Anna has done the following:

What will happen when she recreates the firewall object?

Page 80: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. Creating the object will result in a duplicate IP address warning.

B. Get interfaces will show all interfaces.

C. Establishing the SIC will fail.

D. Get interfaces will still show only the old interfaces but not the newly added ones.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 216The SIC certificate is stored in the________ directory.

A. $FUIDIR/conf

B. $CPDIR/conf

C. $FWDIR/database

D. $CPDIR/registry

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 217You run cpconfig to reset SIC on the Security Gateway. After the SIC reset operation is complete, the policy thatwill be installed is the:

A. Last policy that was installed

B. Default filter"Pass Any Exam. Any Time." ­ www.actualtests.com 88Checkpoint 156­215.75 Exam

C. Standard policy

D. Initial policy

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 218Nancy has lost SIC communication with her Security Gateway and she needs to re­establish SIC. What wouldbe the correct order of steps needed to perform this task?

1) Create a new activation key on the Security Gateway, then exit cpconfig.

2) Click the Communication tab on the Security Gateway object, and then click Reset.

3) Run the cpconfig tool, and then select Secure Internal Communication to reset.

Page 81: Checkpoint.Actualtests.156-215.75.v2012-04-08

4) Input the new activation key in the Security Gateway object, and then click initialize

5) Run the cpconfig tool, then select source Internal Communication to reset.

A. 5, 4, 1, 2

B. 2, 3, 1, 4

C. 2, 5, 1, 4

D. 3, 1, 4, 2

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 219To check the Rule Base, some rules can be hidden so they do not distract the administrator from the unhiddenrules. Assume that only rules accepting HTTP or SSH will be shown. How do you accomplish this?

A. In SmartDashboard menu, select Search / Rule Base Queries. In the window that opens, create a newQuery, give it a name (e.g. "HTTP_SSH") and define a clause regarding the two services HTTP and SSH.When having applied this, define a second clause for the action Accept and combine them with the Booleanoperator AND.

B. This cannot be configured since two selections (Service, Action) are not possible.

C. Ask your reseller to get a ticket for Check Point SmartUse and deliver him the cpinfo file of the "Pass AnyExam. Any Time." ­ www.actualtests.com 89Checkpoint 156­215.75 ExamSecurity Management Server.

D. In SmartDashboard, right­click in the column field Service and select Query Column. Then, put the servicesHTTP and SSH in the list. Do the same in the field Action and select Accept here.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 220What CANNOT be configured for existing connections during a policy install?

A. Keep all connections

B. Keep data connections

C. Reset all connections

D. Re­match connections

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 221

Page 82: Checkpoint.Actualtests.156-215.75.v2012-04-08

You just installed a new Web server in the DMZ that must be reachable from the Internet. You create a manualStatic NAT rule as follows:

"web_public_IP" is the node object that represents the public IP address of the new Web server."web_private_IP" is the node object that represents the new Web site's private IP address. You enable allsettings from Global Properties > NAT.

When you try to browse the Web server from the Internet, you see the error "page cannot be

"Pass Any Exam. Any Time." ­ www.actualtests.com 90Checkpoint 156­215.75 Examdisplayed". Which statements are possible reasons for this?

i) There is no route defined on the Security Gateway for the public IP address to the private IP address of theWeb server.

ii) There is no Security Policy defined that allows HTTP traffic to the protected Web server.

iii) There is an ARP entry on the Gateway but the settings Merge Manual proxy ARP and Automatic ARPconfiguration are enabled in Global Properties. The Security Gateway ignores manual ARP entries.

iv) There is no ARP table entry for the public IP address of the protected Web server.

A. (iii)

B. (i), (ii), (iii), (iv)

C. (i), (ii), (iv)

D. (i), (ii)

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 222You just installed a new Web server in the DMZ that must be reachable from the Internet. You create a manualStatic NAT rule as follows:

"web_public_IP" is the node object that represents the public IP address of the new Web server."web_private_IP" is the node object that represents the new Web site's private IP address. You enable all

Page 83: Checkpoint.Actualtests.156-215.75.v2012-04-08

settings from Global Properties > NAT.

When you try to browse the Web server from the Internet you see the error "page cannot be displayed". Whichof the following is NOT a possible reason?

A. There is no NAT rule translating the source IP address of packets coming from the protected Web server.

B. There is no route defined on the Security Gateway for the public IP address to the private IP address of theWeb server.

C. There is no ARP table entry for the public IP address of the protected Web server.

D. There is no Security Policy defined that allows HTTP traffic to the protected Web server.

Answer: ASection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 91Checkpoint 156­215.75 Exam

QUESTION 223You are responsible for the configuration of MegaCorp's Check Point Firewall. You need to allow two NAT rulesto match a connection. Is it possible? Give the BEST answer.

A. Yes, it is possible to have two NAT rules which match a connection, but only when using Automatic NAT(bidirectional NAT).

B. No, it is not possible to have more one NAT rule matching a connection. When the firewall receives a packetbelonging to a concentration, it compares it against the first rule in the Rule Base, then the second rule, andso on When it finds a rule that matches, it stops checking and applies that rule.

C. Yes, it is possible to have two NAT rules which match a connection, but only in using Manual NAT(bidirectional NAT)

D. Yes, there are always as many active NAT rules as there are connections.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 224You have created a Rule Base for firewall, websydney. Now you are going to create a new policy package withsecurity and address translation rules for a second Gateway. What is TRUE about the new package's NATrules?

"Pass Any Exam. Any Time." ­ www.actualtests.com 92Checkpoint 156­215.75 Exam

Page 84: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. Rules 1 and 5 will be appear in the new package

B. Rules 1, 3, 4 and 5 will appear in the new package

C. Rules 2, 3 and 4 will appear in the new package

D. NAT rules will be empty in the new package

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 225A Hide NAT rule has been created which includes a source address group of ten (10) networks and three (3)other group objects (containing 4, 5, and 6 host objects respectively). Assuming all addresses are non­repetitive, how many effective rules have you created?

A. 1

B. 25

C. 2

D. 13

Answer: BSection: (none)

Explanation/Reference:Explanation:

Page 85: Checkpoint.Actualtests.156-215.75.v2012-04-08

"Pass Any Exam. Any Time." ­ www.actualtests.com 93Checkpoint 156­215.75 Exam

QUESTION 226What is a Stealth rule used for?

A. To permit implied rules

B. To permit management traffic

C. To prevent users from connecting directly to the gateway

D. To drop all traffic to the management server that is not explicitly permitted

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 227Where are automatic NAT rules added to the Rule Base?

A. Before last

B. Middle

C. First

D. Last

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 228What is the default setting when you use NAT?

A. Manual NAT

B. Server­side NAT

C. Hide NAT

D. Client­side NAT

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 229"Pass Any Exam. Any Time." ­ www.actualtests.com 94Checkpoint 156­215.75 ExamYou receive a notification that long­lasting Telnet connections to a mainframe are dropped after an hour ofinactivity. Reviewing SmartView Tracker shows the packet is dropped with the error:

Page 86: Checkpoint.Actualtests.156-215.75.v2012-04-08

"Unknown established connection"

How do you resolve this problem without causing other security issues? Choose the BEST answer.

A. Increase the service­based session timeout of the default Telnet service to 24­hours.

B. Create a new TCP service object on port 23 called Telnet­mainframe. Define a service­based sessionTimeout of 24­hours. Use this new object only in the rule that allows the Telnet connections to themainframe.

C. Ask the mainframe users to reconnect every time this error occurs.

D. Increase the TCP session timeout under Global Properties > Stateful Inspection.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 230Which SmartConsole tool would you use to see the last policy pushed in the audit log?

A. SmartView Tracker

B. None, SmartConsole applications only communicate with the Security Management Server.

C. SmartView Status

D. SmartView Server

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 231SmartView Tracker logs the following Security Administrator activities, EXCEPT:

A. Administrator login and logout

B. Object creation, deletion, and editing

C. Tracking SLA compliance

D. Rule Base changes

Answer: CSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 95Checkpoint 156­215.75 Exam

QUESTION 232A security audit has determined that your unpatched Web application server is accessing a SQL server. Youbelieve that you have enabled the proper IPS setting but would like to verify this using SmartView Tracker.Which of the following entries confirms that this information is being blocked against attack?

Page 87: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. ASCII Only Response Header detected: SQL

B. Fingerprint Scrambling: Changed [SQL] to [Perl]

C. Concealed HTTP response [SQL Server]. (Error Code WSE0160003)

D. HTTP response spoofing: remove signature [SQL Server]

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 233What happens when you select File / Export from the SmartView Tracker menu?

A. Logs in fw.log are exported to a file that can be opened by Microsoft Excel.

B. Exported log entries are not viewable in SmartView Tracker.

C. Current logs are exported to a new *.log file.

D. Exported log entries are deleted from fw.log.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 234By default, when you click File > Switch Active File in SmartView Tracker, the Security Management Server:

A. Purges the current log file, and prompts you for the new log's mode.

B. Saves the current log file, names the log file by date and time, and starts a new log file.

C. Purges the current log file and starts the new log file.

D. Prompts you to enter a filename, and then saves the log file."Pass Any Exam. Any Time." ­ www.actualtests.com 96Checkpoint 156­215.75 Exam

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 235You are working with three other Security Administrators. Which SmartConsole component can be used tomonitor changes to rules or object properties made by the other administrators?

A. Eventia Monitor

B. SmartView Monitor

C. SmartView Tracker

D. Eventia Tracker

Page 88: Checkpoint.Actualtests.156-215.75.v2012-04-08

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 236Which SmartView Tracker mode allows you to read the SMTP e­mail body sent from the Chief Executive Officer(CEO) of a company?

A. This is not a SmartView Tracker feature.

B. Display Payload View

C. Display Capture Action

D. Network and Endpoint Tab

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 237You want to display log entries containing information from a specific column in the SmartView Tracker. If youwant to see ONLY those entries, what steps would you take?

A. Right­click column, Search.../ Add string / Apply Filter

B. Right­click column, Edit Filter / Specific / Add / OK

C. Left­click column, Search / Add string / Apply Filter

D. Left­click column, Specific / Add / Apply Filter"Pass Any Exam. Any Time." ­ www.actualtests.com 97Checkpoint 156­215.75 Exam

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 238How do you define a service object for a TCP port range?

A. Manage Services / New TCP, provide name and define port: x­y

B. Manage Services / New Group, provide name and add all service ports for range individually to the groupobject

C. Manage Services / New Other, provide name and define protocol: 17, Range: x­y

D. Manage Services / New Other, provide name and define protocol: x­y

Answer: ASection: (none)

Page 89: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation/Reference:Explanation:

QUESTION 239External commands can be included in SmartView Tracker via the menu Tools / Custom Commands. TheSecurity Management Server is running under SecurePlatform, and the GUI is on a system running MicrosoftWindows. How do you run the command, traceroute on an IP address?

A. Use the program GUIdbedit to add the command traceroute to the properties of the Security ManagementServer.

B. Go to the menu Tools / Custom Commands and configure the Windows command tracert.exe to the list.

C. There is no possibility to expand the three pre­defined options Ping, Whois, and Nslookup.

D. Go to the menu, Tools / Custom Commands and configure the Linux command traceroute to the list.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 240Where is the best place to find information about connections between two machines?

"Pass Any Exam. Any Time." ­ www.actualtests.com 98Checkpoint 156­215.75 Exam

A. On a Security Management Server, using SmartView Tracker

B. All options are valid.

C. On a Security Gateway using the command fw log.

D. On a Security Gateway Console interface; it gives you detailed access to log files and state table information

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 241Which of the following can be found in cpinfo from an enforcement point?

A. The complete file objects_5_0. c

B. Policy file information specific to this enforcement point

C. Everything NOT contained in the file r2info

D. VPN keys for all established connections to all enforcement points

Answer: BSection: (none)

Explanation/Reference:Explanation:

Page 90: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 242One of your remote Security Gateway's suddenly stops sending logs, and you cannot install the Security Policyon the Gateway. All other remote Security Gateways are logging normally to the Security Management Server,and Policy installation is not affected. When you click the Test SIC status button in the problematic Gatewayobject you receive an error message. What is the problem?

A. There is no connection between the Security Management Server and the remote Gateway.Rules or routing may block the connection.

B. The remote Gateway's IP address has changed, which invalidates the SIC Certificate.

C. The time on the Security Management Server's clock has changed, which invalidates the remote Gateway'sCertificate.

D. The Internal Certificate Authority for the Security Management Server object has been removed fromobjects_5_0.C.

Answer: ASection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 99Checkpoint 156­215.75 Exam

QUESTION 243What information is found in the SmartView Tracker Management log?

A. Most accessed Rule Base rule

B. Number of concurrent IKE negotiations

C. SIC revoke certificate event

D. Destination IP address

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 244What information is found in the SmartView Tracker Management log?

A. Destination IP address

B. Policy Package rule modification date/time stamp

C. Historical reports log

D. Most accessed Rule Base rule

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 245

Page 91: Checkpoint.Actualtests.156-215.75.v2012-04-08

How do you use SmartView Monitor to compile traffic statistics for your company's Internet activity duringproduction hours?

A. View total packets passed through the security gateway

B. Use the Traffic Counters settings and SmartView Monitor to generate a graph showing the total HTTP trafficfor the day.

C. Select the Tunnels view, and generate a report on the statistics

D. Configure a suspicious activity rule which triggers an alert when HTTP traffic pass through gateway

Answer: BSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 100Checkpoint 156­215.75 Exam

QUESTION 246What are the results of the command: fw sam [Target IP Address]?

A. Connections from the specified target are blocked without the need to change the Security Policy.

B. Connections to and from the specified target are blocked with the need to change the Security Policy.

C. Connections to and from the specified target are blocked without the need to change the Security Policy.

D. Connections to the specified target are blocked without the need to change the Security Policy.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 247An internal router is sending UDP keep­alive packets that are being encapsulated with GRE and sent throughyour R70 Security Gateway to a partner site. A rule for GRE traffic is configured for ACCEPT/LOG. Although thekeep­alive packets are being sent every 1 minute, a search through the SmartView Tracker logs for GRE trafficonly shows one entry for the whole day (early in the morning after a Policy install).

Your partner site indicates they are successfully receiving the GRE encapsulated keep­alive packets on the 1­minute interval.

If GRE encapsulation is turned off on the router, SmartView Tracker shows a log entry for the UDP keep­alivepacket every minute.

Which of the following is the BEST explanation for this behavior?

A. The Log Server log unification process unifies all log entries from the Security Gateway on a specificconnection into only one log entry in the SmartView Tracker. GRE traffic has a 10 minute session timeout,thus each keep­alive packet is considered part of the original logged connection at the beginning of the day.

B. The Log Server is failing to log GRE traffic property because it is VPN traffic. Disable all VPN configurationsto the partner site to enable proper logging.

Page 92: Checkpoint.Actualtests.156-215.75.v2012-04-08

C. The log unification process is using a LUUID (Log Unification Unique Identification) that has become corrupt.Because it is encrypted, theR75Security Gateway cannot distinguish between GRE sessions. This is aknown issue with the GRE. Use IPSEC instead of the non GRE protocol for encapsulation.

D. The setting Log does not capture this level of details for GRE Set the rule tracking a action to "Pass AnyExam. Any Time." ­ www.actualtests.com 101Checkpoint 156­215.75 Examaudit since certain types of traffic can only tracked this way.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 248Which of the following explanations best describes the command fw logswitch [­h target] [+ | ­] [oldlog]?

A. Display a remote machine's log­file list.

B. Control Kernel

C. Display protocol Hosts

D. Create a new Log file. The old log has moved

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 249You are the Security Administrator for MegaCorp and are enjoying your holiday. One day, you receive a call thatsome connectivity problems have occurred. Before the holiday, you configured the access from the holiday hotelto your Management Portal. You can see and analyze various objects. Which objects can you create?

A. None. SmartPortal access is read­only.

B. Network objects and services

C. Security rules only

D. Network objects, services and internal users

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 250Which port must be allowed to pass through enforcement points in order to allow packet logging to operatecorrectly?

"Pass Any Exam. Any Time." ­ www.actualtests.com 102Checkpoint 156­215.75 Exam

A. 514

Page 93: Checkpoint.Actualtests.156-215.75.v2012-04-08

B. 256

C. 257

D. 258

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 251In SmartView Tracker, which rule shows when a packet is dropped due to anti­spoofing?

A. Blank field under Rule Number

B. Rule 0

C. Cleanup Rule

D. Rule 1

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 252Each grocery store in a regional chain is protected by a Security Gateway. The information­ technology auditdepartment wants a report including:

The name of the Security Policy installed on each remote Security Gateway.

The date and time the Security Policy was installed.

General performance statistics (CPU Use, average CPU time, active real memory, etc)

Which one SmartConsole application can you use to gather all this information?

A. SmartView Tracker

B. SmartView Monitor

C. SmartDashboard

D. SmartUpdate

Answer: BSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 103Checkpoint 156­215.75 Exam

QUESTION 253You administer a large, geographically distributed network. The Internet connection at a remote site failed during

Page 94: Checkpoint.Actualtests.156-215.75.v2012-04-08

the weekend, and the Security Gateway logged locally for over 48 hours. It is possible that the logs may haveconsumed most of the free space on the Gateway's hard disk. Which SmartConsole application displays thepercent of free hard­disk space on the remote Security Gateway?

A. SmartView Tracker

B. SmartView Monitor

C. This information can only be viewed with fw ctl pstat command from the CLI

D. Eventia Analyzer

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 254You find a suspicious connection from a problematic host. You decide that you want to block everything fromthat whole network, not just the problematic host. You want to block this for an hour while you investigatefurther, but you do not want to add any rules to the Rule Base. How do you achieve this?

A. Add a "temporary" rule using SmartDashboard and select hide rule.

B. Create a Suspicious Activity Rule in SmartView Monitor

C. Use dbedit to script the addition of a rule directly into the Rule Bases_5_0. fws configuration file.

D. Select block intruder from the tools menu in SmartView Tracker.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 255You have blocked an IP address via the Block Intruder feature of SmartView Tracker. How can you view theblocked addresses?

"Pass Any Exam. Any Time." ­ www.actualtests.com 104Checkpoint 156­215.75 Exam

A. Run f wm blockedview.

B. In SmartView Monitor, select the Blocked Intruder option from the query tree view

C. In SmartView Monitor, select Suspicious Activity Rules from the Tools menu and select the relevant SecurityGateway from the list.

D. In SmartView Tracker, click the Active tab. and the actively blocked connections displays

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 256In SmartDashboard, you configure 45 MB as the required free hard­disk space to accommodate logs. What can

Page 95: Checkpoint.Actualtests.156-215.75.v2012-04-08

you do to keep old log files, when free space falls below 45 MB?

A. Configure a script to run fw logswitch and SCP the output file to a separate file server.

B. Do nothing. Old logs are deleted, until free space is restored.

C. Use the fwm logexport command to export the old log files to another location.

D. Do nothing. The Security Management Server automatically copies old logs to a backup server beforepurging.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 257You are Security Administrator for a large call center. The management team is concerned that employees maybe installing and attempting to use peer­to­peer file­sharing utilities, during their lunch breaks. The call center'snetwork is protected by an internal Security Gateway, configured to drop peer­to­peer file­sharing traffic. Whichoption do you use to determine the number of packets dropped by each Gateway?

A. SmartView Monitor

B. SmartView Tracker

C. SmartView Status

D. SmartDashboard

Answer: ASection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 105Checkpoint 156­215.75 Exam

QUESTION 258How do you configure an alert in SmartView Monitor?

A. By choosing the Gateway, and Configure Thresholds.

B. By right­clicking on the Gateway, and selecting System Information.

C. An alert cannot be configured in SmartView Monitor.

D. By right­clicking on the Gateway, and selecting Properties.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 259True or False: SmartView Monitor can be used to create alerts on a specified Gateway.

Page 96: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. True, by choosing the Gateway and selecting System Information.

B. True, by right­clicking on the Gateway and selecting Configure Thresholds.

C. False, alerts can only be set in SmartDashboard Global Properties.

D. False, an alert cannot be created for a specified Gateway.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 260Which R75 SmartConsole tool would you use to verify the installed Security Policy name on a SecurityGateway?

A. SmartView Status

B. SmartView Monitor

C. None, SmartConsole applications only communicate with the Security Management Server.

D. SmartUpdate

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 261"Pass Any Exam. Any Time." ­ www.actualtests.com 106Checkpoint 156­215.75 ExamWhich R75 SmartConsole tool would you use to verify the installed Security Policy name on a SecurityGateway?

A. SmartUpdate

B. SmartView Server

C. SmartView Tracker

D. None, SmartConsole applications only communicate with the Security Management Server.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 262You have detected a possible intruder listed in SmartView Tracker's active pane. What is the fastest method toblock this intruder from accessing your network indefinitely?

A. In SmartDashbourd, select IPS / Network Security Denial of Service

B. In SmartView Tracker, select Tools / Block Intruder

C. In SmartView Monitor, select Tool / Suspicious Activity Rules.

Page 97: Checkpoint.Actualtests.156-215.75.v2012-04-08

D. Modify the Rule Base to drop these connections from the network.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 263Where can an administrator specify the notification action to be taken by the firewall in the event that availabledisk space drops below 15%?

A. Real Time Monitor / Gateway Settings / Status Monitor

B. SmartView Tracker / Audit Tab / Gateway Counters

C. This can only be monitored by a user­defined script.

D. SmartView Monitor / Gateway Status / Threshold Settings

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 264"Pass Any Exam. Any Time." ­ www.actualtests.com 107Checkpoint 156­215.75 ExamWhere can an administrator configure the notification action in the event of a policy install time change?

A. SmartView Tracker / Audit Log

B. SmartView Monitor / Gateways / Thresholds Settings

C. SmartDashboard / Security Gateway Object / Advanced Properties Tab

D. SmartDashboard / Policy Package Manager

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 265Where are custom queries stored in R75 SmartView Tracker?

A. On the Security Management Server tied to the Administrator User Database login name.

B. On the SmartView Tracker PC local file system under the user's profile.

C. On the Security Management Server tied to the GUI client IP.

D. On the SmartView Tracker PC local file system shared by all users of that local PC.

Answer: ASection: (none)

Explanation/Reference:

Page 98: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation:

QUESTION 266How do you view a Security Administrator's activities with SmartConsole?

A. SmartView Tracker in the Management tab

B. SmartView Tracker in the Network and Endpoint tabs

C. SmartView Monitor using the Administrator Activity filter

D. Eventia Suite

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 267Which SmartView Tracker selection would most effectively show who installed a Security Policy

"Pass Any Exam. Any Time." ­ www.actualtests.com 108Checkpoint 156­215.75 Examblocking all traffic from the corporate network?

A. Custom filter

B. Network and Endpoint tab

C. Management Tab

D. Active tab

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 268You are reviewing the Security Administrator activity for a bank and comparing it to the change log. How do youview Security Administrator activity?

A. SmartView Tracker cannot display Security Administrator activity: instead, view the system logs on theSecurity Management Server's Operating System

B. SmartView Tracker in Management Mode

C. SmartView Tracker in Active Mode

D. SmartView Tracker in Network and Endpoint Mode

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 269

Page 99: Checkpoint.Actualtests.156-215.75.v2012-04-08

Which of the following R75 SmartView Tracker views will display a popup warning about performanceimplications on the Security Gateway?

A. Active Tab

B. Audit Tab

C. Account Query

D. All Records Query

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 270"Pass Any Exam. Any Time." ­ www.actualtests.com 109Checkpoint 156­215.75 ExamWhile in Smart View Tracker, Brady has noticed some very odd network traffic that he thinks could be anintrusion. He decides to block the traffic for 60 but cannot remember all the steps. What is the correct order ofsteps needed to perform this?

1) Select the Active Mode tab In Smart view Tracker

2) Select Tools > Block Intruder

3) Select the Log Viewing tab in SmartView Tracker

4) Set the Blocking Time out value to 60 minutes

5) Highlight the connection he wishes to block

A. 3, 2, 5, 4

B. 3, 5, 2, 4

C. 1, 5, 2, 4

D. 1, 2, 5, 4

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 271What information is found in the SmartView Tracker Management log?

A. Rule author

B. TCP handshake average duration

C. TCP source port

D. Top used QOS rule

Answer: ASection: (none)

Page 100: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation/Reference:Explanation:

QUESTION 272Where do you enable popup alerts for IPS settings that have detected suspicious activity?

A. In SmartView Monitor, select Tools / Alerts

B. In SmartView Tracker, select Tools / Custom Commands

C. In SmartDashboard, edit the Gateway object, and select IPS / Alerts "Pass Any Exam. Any Time." ­ www.actualtests.com 110Checkpoint 156­215.75 Exam

D. In SmartDashboard, select Global Properties / Log and Alert / Alert Commands

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 273Which R75 GUI would you use to see the number of packets accepted since the last policy install?

A. SmartView Monitor

B. SmartView Status

C. SmartView Tracker

D. SmartDashboard

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 274You are trying to save a custom log query in R75 SmartView Tracker, but getting the following error "Could notsave 'query­name' (Error Database is Read only).

Which of the following is a likely explanation for this?

A. You have read­only rights to the Security Management Server database.

B. You do not have the explicit right to save a custom query in your administrator permission profile underSmartConsole customization

C. You do not have OS write permissions on the local SmartView Tracker PC in order to save the custom querylocally

D. Another administrator is currently connected to the Security Management Server with read/write permissionswhich impacts your ability to save custom log queries to the Security Management Server.

Answer: ASection: (none)

Explanation/Reference:Explanation:

Page 101: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 275The R75 fw monitor utility is used to troubleshoot which of the following problems?

"Pass Any Exam. Any Time." ­ www.actualtests.com 111Checkpoint 156­215.75 Exam

A. Phase two key negotiation

B. User data base corruption

C. Log Consolidation Engine

D. Traffic issues

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 276You are the Security Administrator for MegaCorp. In order to see how efficient your firewall Rule Base is, youwould like to see how often the particular rules match. Where can you see it? Give the BEST answer.

A. In SmartReporter, in the section Firewall Blade ­ Activity / Network Activity with information concerning TopMatched Logged Rules.

B. It is not possible to see it directly. You can open SmartDashboard and select UserDefined in the Trackcolumn. Afterwards, you need to create your own program with an external counter.

C. In the SmartView Tracker, if you activate the column Matching Rate.

D. SmartReporter provides this information in the section Firewall Blade ­ Security / Rule Base Analysis withinformation concerning Top Matched Logged Rules.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 277A company has disabled logging for some of the most commonly used Policy rules. This was to decrease loadon the Security Management Server and to make tracking dropped connections easier. What action would yourecommend to get reliable statistics about the network traffic using SmartReporter?

A. Turn the field Track of each rule to LOG.

B. Network traffic cannot be analyzed when the Security Management Server has a high load.

C. Configure Additional Logging on a separate log server.

D. SmartReporter analyzes all network traffic, logged or not.

Answer: CSection: (none)

Explanation/Reference:Explanation:

Page 102: Checkpoint.Actualtests.156-215.75.v2012-04-08

"Pass Any Exam. Any Time." ­ www.actualtests.com 112Checkpoint 156­215.75 Exam

QUESTION 278What is a Consolidation Policy?

A. The collective name of the Security Policy, Address Translation, and IPS Policies.

B. The specific Policy written in SmartDashboard to configure which log data is stored in the SmartReporterdatabase.

C. The collective name of the logs generated by SmartReporter.

D. A global Policy used to share a common enforcement policy for multiple Security Gateways.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 279Which feature in R75 permits blocking specific IP addresses for a specified time period?

A. Suspicious Activity Monitoring

B. HTTP Methods

C. Block Port Overflow

D. Local Interface Spoofing

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 280You find a suspicious FTP connection trying to connect to one of your internal hosts. How do you block it in realtime and verify it is successfully blocked?

A. Highlight the suspicious connection in SmartView Tracker Active mode. Block it using Tools / Block Intrudermenu. Observe in the Active mode that the suspicious connection is listed in this SmartView Tracker view as"dropped".

B. Highlight the suspicious connection in SmartView Tracker Active mode. Block it using Tools / Block Intrudermenu. Observe in the Active mode that the suspicious connection does not appear again in this SmartViewTracker view.

C. Highlight the suspicious connection in SmartView Tracker > Log mode. Block it using Tools > Block Intrudermenu. Observe in the Log mode that the suspicious connection does not appear again in this SmartViewTracker view.

D. Highlight the suspicious connection in SmartView Tracker Log mode. Block it using Tools / Block Intrudermenu. Observe in the Log mode that the suspicious connection does not appear "Pass Any Exam. AnyTime." ­ www.actualtests.com 113Checkpoint 156­215.75 Examagain in this SmartView Tracker view.

Answer: B

Page 103: Checkpoint.Actualtests.156-215.75.v2012-04-08

Section: (none)

Explanation/Reference:Explanation:

QUESTION 281Your Security Gateways are running near performance capacity and will get upgraded hardware next week.Which of the following would be MOST effective for quickly dropping all connections from a specific attacker's IPat a peak time of day?

A. SAM ­ Block Intruder feature of SmartView Tracker

B. Intrusion Detection System (IDS) Policy install

C. SAM ­ Suspicious Activity Rules feature of SmartView Monitor

D. Change the Rule Base and install the Policy to all Security Gateways

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 282Your company enforces a strict change control policy. Which of the following would be MOST effective forquickly dropping an attacker's specific active connection?

A. SAM ­ Suspicious Activity Rules feature of SmartView Monitor

B. Change the Rule Base and install the Policy to all Security Gateways

C. Intrusion Detection System (IDS) Policy install

D. Block Intruder feature of SmartView Tracker

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 283What do you use to view a R75 Security Gateway's status, including CPU use, amount of virtual memory,percent of free hard­disk space, and version?

A. Only possible via command line tools"Pass Any Exam. Any Time." ­ www.actualtests.com 114Checkpoint 156­215.75 Exam

B. SmartView Tracker

C. SmartView Monitor

D. SmartUpdate

Answer: CSection: (none)

Explanation/Reference:

Page 104: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation:

QUESTION 284Which R75 component displays the number of packets accepted, rejected, and dropped on a specific SecurityGateway, in real time?

A. Smart Event

B. SmartView Monitor

C. SmartView Status

D. SmartUpdate

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 285SmartView Tracker R75 consists of three different modes. They are:

A. Log, Active, and Audit

B. Log, Active, and Management

C. Log, Track, and Management

D. Network & Endpoint, Active, and Management

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 286You want to configure a mail alert for every time the policy is installed to a specific Gateway.Where would you configure this alert?

A. In SmartView Monitor, select Gateway > Configure Thresholds and in SmartDashboard Select "Pass AnyExam. Any Time." ­ www.actualtests.com 115Checkpoint 156­215.75 ExamGlobal Properties > Log and alerts > Alert Commands.

B. In SmartView Monitor, select Gateway > Configure Thresholds.

C. In SmartDashboard, select Global Properties > Log and Alerts > Alert Commands.

D. You cannot create a mail alert for Policy installation

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 287Your boss wants you to closely monitor an employee suspected of transferring company secrets to the

Page 105: Checkpoint.Actualtests.156-215.75.v2012-04-08

competition. The IT department discovered the suspect installed a WinSCP client in order to use encryptedcommunication. Which of the following methods is best to accomplish this task?

A. Watch his IP in SmartView monitor by setting an alert action to any packet that matches your Rule base andhis IP Address for inbound and outbound traffic.

B. Use SmartView Tracker to follow his actions by filtering log entries that feature the WinSCP source ordestination port. Then, export the corresponding entries to a separate log file for documentation.

C. Use SmartDashboard to add a rule in the firewall rule Base that matches his IP address and those ofpotential target and suspucious9 protocols. Apply the alert action or customized messaging.

D. Send the suspect an email with a key logging Trojan attached, to get direct information about his wrongdoing

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 288MegaCorp's security infrastructure separates Security Gateways geographically. You must request a centrallicense for one remote Security Gateway. How do you apply the license?

A. Using the remote Gateway's IP address, and attaching the license to the remote Gateway via SmartUpdate.

B. Using your Security Management Server's IP address, and attaching the license to the remote Gateway viaSmartUpdate.

C. Using each of the Gateways' IP addresses, and applying the license on the Security Management Serverwith the cprlic put command.

D. Using the remote Gateway's IP address and applying the license locally with the cplic put command."Pass Any Exam. Any Time." ­ www.actualtests.com 116Checkpoint 156­215.75 Exam

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 289Identify the correct step performed by SmartUpdate to upgrade a remote Security Gateway. After selectingPackages / Distribute Only and choosing the target Gateway, the:

A. selected package is copied from the Package Repository on the Security Management Server to theSecurity Gateway but the installation IS NOT performed.

B. selected package is copied from the Package Repository on the Security Management Server to theSecurity Gateway and the installation IS performed.

C. SmartUpdate wizard walks the Administrator through a distributed installation.

D. selected package is copied from the CD­ROM of the SmartUpdate PC directly to the Security Gateway andthe installation IS performed.

Answer: ASection: (none)

Explanation/Reference:

Page 106: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation:

QUESTION 290Identify the correct step performed by SmartUpdate to upgrade a remote Security Gateway. After selectingPackages / Distribute Only and choosing the target Gateway, the:

A. selected package is copied from the Package Repository on the Security Management Server to theSecurity Gateway but the installation IS NOT performed.

B. selected package is copied from the Package Repository on the Security Management Server to theSecurity Gateway and the installation IS performed.

C. SmartUpdate wizard walks the Administrator through a distributed installation.

D. selected package is copied from the CD­ROM of the SmartUpdate PC directly to the Security Gateway andthe installation IS performed.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 291Identify the correct step performed by SmartUpdate to upgrade a remote Security Gateway. After

"Pass Any Exam. Any Time." ­ www.actualtests.com 117Checkpoint 156­215.75 Examselecting Packages / Distribute and Install Selected Package and choosing the target Gateway, the:

A. selected package is copied from the CD­ROM of the SmartUpdate PC directly to the Security Gateway andthe installation IS performed.

B. selected package is copied from the Package Repository on the Security Management Server to theSecurity Gateway but the installation IS NOT performed.

C. SmartUpdate wizard walks the Administrator through a distributed installation.

D. selected package is copied from the Package Repository on the Security Management Server to theSecurity Gateway and the installation IS performed.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 292Identify the correct step performed by SmartUpdate to upgrade a remote Security Gateway. After selectingPackages Select / Add from CD, the:

A. entire contents of the CD­ROM arc copied to the packages directory on the selected remote SecurityGateway

B. selected package is copied to the Package Repository on the Security Management Server.

C. entire contents of the CD­ROM are copied to the Package Repository on the Security Management Server

D. selected package is copied to the packages directory on the selected remote Security Gateway

Answer: B

Page 107: Checkpoint.Actualtests.156-215.75.v2012-04-08

Section: (none)

Explanation/Reference:Explanation:

QUESTION 293What physical machine must have access to the User Center public IP address when checking for newpackages with smartUpdate?

A. SmartUpdate GUI PC

B. SmartUpdate Repository SQL database Server

C. A Security Gateway retrieving the new upgrade package

D. SmartUpdate installed Security Management Server PC

Answer: ASection: (none)

Explanation/Reference:"Pass Any Exam. Any Time." ­ www.actualtests.com 118Checkpoint 156­215.75 Exam

Explanation:

QUESTION 294What port is used for communication to the User Center with SmartUpdate?

A. CPMI 200

B. HTTPS 443

C. HTTP 80

D. TCP 8080

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 295You are a Security Administrator preparing to deploy a new HFA (Hotfix Accumulator) to ten Security Gatewaysat five geographically separate locations. What is the BEST method to implement this HFA?

A. Send a Certified Security Engineer to each site to perform the update.

B. Use SmartUpdate to install the packages to each of the Security Gateways remotely.

C. Use a SSH connection to SCP the HFA to each Security Gateway. Once copied locally, imitate a remoteinstallation command and monitor the installation progress with SmartView Monitor

D. Send a CD­ROM with the HFA to each location and have local personnel install it.

Answer: BSection: (none)

Explanation/Reference:

Page 108: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation:

QUESTION 296An advantage of using central instead of local licensing is:

A. A license can be taken from one Security Management server and given to another Security ManagementServer.

B. Only one IP address is used for all licenses.

C. Licenses are automatically attached to their respective Security Gateways.

D. The license must be renewed when changing the IP address of security Gateway. Each "Pass Any Exam.Any Time." ­ www.actualtests.com 119Checkpoint 156­215.75 Exammodule's license has a unique IP address.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 297You are running the license_upgrade tool on your SecurePlatform Gateway. Which of the following can youNOT do with the upgrade tool?

A. View the status of currently installed licenses

B. Perform the actual license­upgrade process

C. View the licenses in the SmartUpdate License Repository

D. Simulate the license­upgrade process

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 298If a SmartUpdate upgrade or distribution operation fails on SecurePlatfom, how is the system recovered?

A. The Administrator must remove the rpm packages manually, and re­attempt the upgrade.

B. The Administrator can only revert to a previously created snapshot (if there is one) with the commandcprinstall snapshot <object name> <filename>.

C. The Administrator must reinstall the last version via the command cprinstall revert <object name> <filename>.

D. SecurePlatform will reboot and automatically revert to the last snapshot version prior to upgrade.

Answer: DSection: (none)

Explanation/Reference:Explanation:

Page 109: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 299Why should the upgrade_export configuration file (.tgz) be deleted after you complete the import process?

"Pass Any Exam. Any Time." ­ www.actualtests.com 120Checkpoint 156­215.75 Exam

A. It will conflict with any future upgrades when using SmartUpdate.

B. SmartUpdate will start a new installation process if the machine is rebooted.

C. It contains your security configuration, which could be exploited.

D. It will prevent a future successful upgrade_export since the .tgz file cannot be overwritten.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 300Which of these components does NOT require a Security Gateway R75 license?

A. SmartUpdate upgrading/patching

B. Security Management Server

C. SmartConsole

D. Check Point Gateway

Answer: CSection: (none)

Explanation/Reference:Explanation:

Topic 4, Volume D

QUESTION 301You plan to migrate a Windows NG with Application Intelligence (AI) R55 SmartCenter Server to R75. You alsoplan to upgrade four VPN­1 Pro Gateways at remote offices, and one local VPN­1 Pro Gateway at yourcompany's headquarters to R75. The Management Server configuration must be migrated. What is the correctprocedure to migrate the configuration?

A. 1. Upgrade the remote gateway via smartUpdate.2. upgrade the security management server, using theR75CD

B. 1. From theR75CD­ROM on the security management server, select Upgrade2. Reboot after installation and upgrade all licenses via SmartUpdate3. Reinstall all gateways using R 70 and install a policy

C. 1. Copy the $PWDIR\ conf directory from the security management server2. Save directory contents to another file server3. Uninstall the security management server, and install anew security management server4. Move the saved directory contents to $ PWDIR\conf replacing the default installation files5. Reinstall all gateways usingR75and install a security policy

Page 110: Checkpoint.Actualtests.156-215.75.v2012-04-08

D. 1. From theR75CD­ ROM in the security management server, select export2. Install R 70 on a new PC using the option installation using imported configuration3. Reboot after installation and update all licenses via smartUpdate "Pass Any Exam. Any Time." ­ www.actualtests.com 121Checkpoint 156­215.75 Exam4. Upgrade software on all five remote Gateway via SmartUpdate

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 302You are using SmartUpdate to fetch data and perform a remote upgrade to a R75 Security Gateway. Which ofthe following statements is FALSE?

A. A remote installation can be performed without the SVN Foundation package installed on a remote NG withApplication Intelligence Security Gateway.

B. If SmartDashboard is open during package upload and upgrade, the upgrade will fail.

C. SmartUpdate can query the Security Management Server and Gateway for product information.

D. SmartUpdate can query license information running locally on the Gateway.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 303What action can be performed from SmartUpdate R75?

A. remote_uninstall_verifier

B. upgrade_export

C. fw stat ­l

D. cpinfo

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 304Which tool CANNOT be launched from SmartUpdate R75?

A. snapshot

B. SecurePlatform WebUI

C. cpinfo"Pass Any Exam. Any Time." ­ www.actualtests.com 122Checkpoint 156­215.75 Exam

Page 111: Checkpoint.Actualtests.156-215.75.v2012-04-08

D. IP Appliance Voyager

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 305If a Security Gateway enforces three protections, LDAP Injection, Malicious Code Protector, and HeaderRejection, which Check Point license is required in SmartUpdate?

A. Data Loss Prevention

B. SmartEvent Intro

C. SSL: VPN

D. IPS

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 306Central license management allows a Security Administrator to perform which of the following functions?

1) Check for expired licenses.

2) Sort licenses and view license properties

3) Attach both R75 Central and Local licenses to a remote module

4) Delete both R75 Local licenses and Central licenses from a remote module

5) Add or remove a license to or from the license repository

6) Attach and/or delete only R75 Central licenses to a remote module (not local licenses)

A. 2, 5, & 6

B. 2, 3, 4, & 5

C. 1, 2, 5, & 6

D. 1, 2, 3, 4, & 5

Answer: DSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 123Checkpoint 156­215.75 Exam

Page 112: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 307Sally has a Hot Fix Accumulator (HFA) she wants to install on her Security Gateway which operates withSecurePlatform, but she cannot SCP the HFA to the system. She can SSH into the Security Gateway, but shehas never been able to SCP files to it. What would be the most likely reason she cannot do so?

A. She needs to run cpconfig to enable the ability to SCP files.

B. She needs to edit /etc/scpusers and add the Standard Mode account.

C. She needs to run sysconfig and restart the SSH process.

D. She needs to edit /etc/SSHd/SSHd_config and add the Standard Mode account.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 308Which command gives an overview of your installed licenses?

A. cplic print

B. showlic

C. cplicense

D. lic print

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 309Where are SmartEvent licenses installed?

A. Security Gateway

B. SmartEvent server

C. Security Management Server

D. Log Server

Answer: BSection: (none)

Explanation/Reference:"Pass Any Exam. Any Time." ­ www.actualtests.com 124Checkpoint 156­215.75 Exam

Explanation:

QUESTION 310You currently do not have a Check Point software subscription for one of your products. What will happen if youattempt to upgrade the license for this product?

Page 113: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. The license will be upgraded with a warning

B. It is deleted

C. It is upgraded with new available features, but cannot be activated

D. The license is not upgraded

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 311Which of the following statements about service contracts, i.e., Certificate, software subscription, or supportcontract, is FALSE?

A. A service contract can apply only for a single set of Security Gateways managed by the same SecurityManagement Server.

B. The contract file is stored on the Security Management Server and downloaded to all Security Gatewaysduring the upgrade process.

C. Most software­subscription contracts are permanent, and need not be renewed after a certain time passes.

D. Service Contracts can apply for an entire User Center account.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 312You have an NGX R65 Gateway running on SecurePlatform. The Gateway also serves as a Policy Server.When you run patch add CD from the Security Gateway R75 CD­ROM, what does this command allow you toupgrade?

A. Only theR75Security Gateway"Pass Any Exam. Any Time." ­ www.actualtests.com 125Checkpoint 156­215.75 Exam

B. Only the patch utility is upgraded using this command

C. All products, except the Policy Server

D. Both the operating system and all Check Point products

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 313Your network includes a SecurePlatform machine running NG with Application Intelligence (AI) R55. Thisconfiguration acts as both the primary Security Management Server and VPN­1 Pro Gateway. You add onemachine, so you can implement Security Gateway R75 in a distributed environment. The new machine is anIntel CoreDuo processor, with 2 GB RAM and a 500­GB hard drive. How do you use these two machines tosuccessfully migrate the NG with AI R55 configuration?

Page 114: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. 1. On the existing machine, export the NG with AJ R55 configuration to a network share.2. Insert theR75CD­ROM in the old machine Install the R7D Security Gateway only while reinstalling theSecurePlatform OS over the top of the existing installation. Complete sysconfig.3. On the new machine, install SecurePlatform as the primary Security Management Server only.4. Transfer the exported. tgz file into the new machine, import the configuration, and then reboot5. Open SmartDashboard, change the Gateway object to the new version, and reset SIC for the Gatewayobject.

B. 1. Export the configuration on the existing machine to a tape drive2. Uninstall the Security Management Server from the existing machine, using sysconfig.3. Insert theR75CD­ROM. run the patch add CD­ROM command to upgrade the existing machine totheR75Security Gateway, and reboot4. Install a new primary Security Management Server on the new machine5. Change the Gateway object to the new version, and reset SIC

C. 1. Export the configuration on the existing machine to a network share2. Uninstall the Security Gateway from the existing machine, using sysconfig3. Insert theR75CD ROM. and run the patch add CD­HGM command to upgrade the Security ManagementServer to Security Gateway R 704. Select upgrade with imported file, and reboot5. Install a newR75Security Gateway as the only module on the new machine, and reset SIC to the newGateway

D. 1. Export the configuration on the existing machine as a backup only2. Edit $FWDIR\product. conf on the existing machine, to disable the VPN­1 Pro Gateway package3. Reboot the existing machine4. Perform an in place upgrade on the Security Management Server using the command "patch odd cd"5. On the new machine, install SecurePlatform as theR75Security Gateway only6. Run sysconfig to complete the configuration"Pass Any Exam. Any Time." ­ www.actualtests.com 126Checkpoint 156­215.75 Exam7. From SmartDashboard, reconfigure the Gateway object to the new version, and reset SIC

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 314After installing Security Gateway R75, you discover that one port on your Intel Quad NIC on the SecurityGateway is not fetched by a Get Topology request. What is the most likely cause and solution?

A. Your NIC driver is installed but was not recognized. Apply the latest SecurePlatformR75Hotfix Accumulator(HFA).

B. The NIC is faulty. Replace it and reinstall.

C. Make sure the driver for your particular NIC is available, and reinstall. You will be prompted for the driver.

D. If an interface is not configured, it is not recognized. Assign an IP address and subnet mask using theWebUI.

Answer: DSection: (none)

Explanation/Reference:Explanation:

Page 115: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 315You are installing your R75Security Gateway. Which is NOT a valid option for the hardware platform?

A. Crossbeam

B. Solaris

C. Windows

D. IPSO

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 316You plan to upgrade from R65 to R75 Software Blades. Do you need new licenses and license strings for thisscenario?

"Pass Any Exam. Any Time." ­ www.actualtests.com 127Checkpoint 156­215.75 Exam

A. No, the upgrade will preserve licenses.

B. Yes, you need to buy/convert licenses in the User Center first, and then reapply licenses to upgradedsystems with the new Software Blades licenses.

C. Yes, the upgrade will do an automatic conversion in the User Center, but you will need to reattach the newlicenses.

D. No, the upgrade will convert all licenses toR75.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 317What is the command to upgrade a SecurePlatform NG with Application Intelligence R55 Management Serverto R75?

A. fwm upgrade_tool

B. upgrade_mgmt

C. patch add cd

D. fw install_mgmt

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 318Jeff wanted to upgrade his Security Gateway to R75, but he remembers that he needs to have a contracts filefrom the User Center before he can start the upgrade. If Jeff wants to download the contracts file from the User

Page 116: Checkpoint.Actualtests.156-215.75.v2012-04-08

Center, what is the correct order of steps needed to perform this?

1) Select Update Contracts from User Center.

2) Enter your Username for your User Center account.

3) Enter your Password for your User Center account.

4) Click the Browse button to specify the path to your download contracts file.

5) Enter your Username and Password for your Security Gateway.

A. 2, 3, 4

B. 1, 5, 4"Pass Any Exam. Any Time." ­ www.actualtests.com 128Checkpoint 156­215.75 Exam

C. 5, 2, 3

D. 1, 2, 3

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 319Your current Check Point enterprise consists of one Management Server and four Gateways in four differentlocations with the following versions:

All devices are running SecurePlatform. You are upgrading your enterprise to R75. Place the required tasksfrom the following list in the correct order for upgrading your enterprise to R75.

1) Upgrade all gateways to R75

2) Upgrade all gateways 3 and 4 to R 65

3) Upgrade all gateways 2, 3, and 4 to R 65

4) Upgrade all gateway 4 to R 65

5) Perform pre­upgrade verifier on Security management server

6) Perform pre­upgrade verifier on all Gateways

7) Perform License upgrade checker on Gateway 2

8) Perform License upgrade checker on Gateway 3

9) Perform License upgrade checker on Gateway 4

10) Perform License upgrade checker on Security Management Server

11) Perform License upgrade checker on all devices

12) Upgrade security management server to R 70

Page 117: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. 11, 5, 12, 3, 1

B. 9, 4, 5, 12, 1

C. 5, 6, 12, 1

D. 11, 5, 12, 2, 1

Answer: BSection: (none)

Explanation/Reference:"Pass Any Exam. Any Time." ­ www.actualtests.com 129Checkpoint 156­215.75 Exam

Explanation:

QUESTION 320In which directory do you install the R75 pre­upgrade verifier on a SecurePlatform Security ManagementServer?

A. It does not matter since the dynamic information entered by the Administrator will cause it to retrieve theproper configurations.

B. In $PWDIR/ conf.

C. It does not matter as long as the Administrator uses chmod to permit the file to execute.

D. in $PWDIR/ bin

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 321What happens to evaluation licenses during the license­upgrade process?

A. They are dropped.

B. They remain untouched, but may not activate all features of a new version.

C. They automatically expire.

D. They are upgraded with new available features.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 322One of your licenses is set for an IP address no longer in use. What happens to this license during the license­upgrade process?

A. It is upgraded with new available features but the IP remains the same

B. It remains untouched.

C. It is upgraded with the previous features using the new IP address

Page 118: Checkpoint.Actualtests.156-215.75.v2012-04-08

D. It is dropped"Pass Any Exam. Any Time." ­ www.actualtests.com 130Checkpoint 156­215.75 Exam

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 323All Check Point Suite products before version RXX need to be upgraded to RXX before you can upgrade themto R75. RXX is:

A. R55

B. R65

C. R61

D. R60

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 324R75 is compatible with UTM­1 Edge gateways X.X and above. X.X is:

A. 6.5

B. 7.5

C. 7.0

D. 8.5

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 325Can you upgrade a clustered deployment with zero downtime?

A. No, this is not possible.

B. Yes, if you select the option zero downtime, it will keep one member active

C. No, you must bring all gateways down.

D. Yes, this is the default setting.

Answer: BSection: (none)

Explanation/Reference:

Page 119: Checkpoint.Actualtests.156-215.75.v2012-04-08

"Pass Any Exam. Any Time." ­ www.actualtests.com 131Checkpoint 156­215.75 Exam

Explanation:

QUESTION 326As a Security Administrator, you must refresh the Client Authentication authorization time­out every time a newuser connection is authorized. How do you do this? Enable the Refreshable Timeout setting:

A. in the user object's Authentication screen

B. in the Gateway object's Authentication screen

C. in the Limit tab of the Client Authentication Action Properties screen

D. in the Global Properties Authentication screen

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 327Your Rule Base includes a Client Authentication rule, using partial authentication and standard sign­on forHTTP, Telnet, and FTP services. The rule was working, until this morning. Now users are not prompted forauthentication, and they see error page cannot be displayed in the browser. In SmartView Tracker, you discoverthe HTTP connection is dropped when the Gateway is the destination. What caused Client Authentication tofail?

A. You added a rule below the Client Authentication rule, blocking HTTP from the internal network.

B. You added the Stealth Rule before the Client Authentication rule.

C. You disabledR75Control Connections in Global Properties.

D. You enabled Static NAT on the problematic machines.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 328The technical­support department has a requirement to access an intranet server. When configuring a UserAuthentication rule to achieve this, which of the following should you remember?

"Pass Any Exam. Any Time." ­ www.actualtests.com 132Checkpoint 156­215.75 Exam

A. The Security Gateway first checks if there is any rule that does not require authentication for this type ofconnection before invoking the Authentication Security Server.

B. Once a user is first authenticated, the user will not be prompted for authentication again until logging out.

C. You can only use the rule for Telnet, FTP, SMTP, and rlogin services.

D. You can limit the authentication attempts in the Authentication tab of the User Properties screen.

Answer: A

Page 120: Checkpoint.Actualtests.156-215.75.v2012-04-08

Section: (none)

Explanation/Reference:Explanation:

QUESTION 329Which column in the Rule Base is used to define authentication parameters?

A. Source

B. Action

C. Track

D. Service

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 330Choose the BEST sequence for configuring user management in SmartDashboard, Using an LDAP server.

A. Configure a server object for the LDAP Account Unit, enable LDAP in Global Properties

B. Configure a workstation object for the LDAP server; configure a server object for the LDAP in globalproperties.

C. Enable LDAP in Global Properties, configure a host­node object for the LDAP server, and configure a serverobject for the LDAP Account Unit.

D. Configure a server object for the LDAP Account Unit, and create an LDAP resource object.

Answer: CSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 133Checkpoint 156­215.75 Exam

QUESTION 331You cannot use SmartDashboard's SmartDirectory features to connect to the LDAP server. What should youinvestigate?

A. 1 and 3

B. 1 and 2

C. 2 and 3

D. 1, 2, and 3

Answer: CSection: (none)

Explanation/Reference:

Page 121: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation:

QUESTION 332Identify the ports to which the Client Authentication daemon listens by default.

A. 8080, 529

B. 259,900

C. 80, 256

D. 256,600

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 333What is the Manual Client Authentication TELNET Port?

A. 23

B. 259

C. 264

D. 900

Answer: BSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 134Checkpoint 156­215.75 Exam

QUESTION 334Your company's Security Policy forces users to authenticate to the Gateway explicitly, before they can use anyservices. The Gateway does not allow the Telnet service to itself from any location. How would you configureauthentication on the Gateway? With a:

A. Client Authentication for fully automatic sign on

B. Client Authentication rule using the manual sign­on method, using HTTP on port 900

C. Client Authentication rule, using partially automatic sign on

D. Session Authentication rule

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 335Which authentication type permits five different sign­on methods in the authentication properties window?

Page 122: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. Manual Authentication

B. Client Authentication

C. Session Authentication

D. User Authentication

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 336Which of the following objects is a valid source in an authentication rule?

A. User@Network

B. User@Any

C. Host@Any

D. User_group@Network

Answer: DSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 135Checkpoint 156­215.75 Exam

QUESTION 337Users are not prompted for authentication when they access their Web servers, even though you have createdan HTTP rule via User Authentication. Why?

A. Users must use the SecuRemote Client, to use the User Authentication Rule.

B. Another rule that accepts HTTP without authentication exists in the Rule Base.

C. You checked the cache password on desktop option in Global Properties.

D. You have forgotten to place the User Authentication Rule before the Stealth Rule.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 338Which authentication type requires specifying a contact agent in the Rule Base?

A. Client Authentication with Partially Automatic Sign On

B. User Authentication

C. Session Authentication

Page 123: Checkpoint.Actualtests.156-215.75.v2012-04-08

D. Client Authentication with Manual Sign On

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 339What is the difference between Standard and Specific Sign On methods?

A. Standard Sign On allows the user to be automatically authorized for all services that the rule allows, but re­authenticate for each host to which he is trying to connect. Specific Sign On requires that the user re­authenticate for each service.

B. Standard Sign On requires the user to re­authenticate for each service and each host to which he is trying toconnect. Specific Sign On allows the user to sign on only to a specific IP address.

C. Standard Sign On allows the user to be automatically authorized for all services that the rule allows. SpecificSign On requires that the user re­authenticate for each service and each host to which he is trying toconnect.

D. Standard Sign On allows the user to be automatically authorized for all services that the rule allows. SpecificSign On requires that the user re­authenticate for each service specifically defined in the window SpecificAction Properties."Pass Any Exam. Any Time." ­ www.actualtests.com 136Checkpoint 156­215.75 Exam

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 340Which set of objects have an Authentication tab?

A. Networks. Hosts

B. Users, Networks

C. Users, User Groups

D. Templates, Users

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 341As a Security Administrator, you are required to create users for authentication. When you create a user for userauthentication, the data is stored in the ___________.

A. SmartUpdate repository

B. User Database

C. Rules Database

Page 124: Checkpoint.Actualtests.156-215.75.v2012-04-08

D. Objects Database

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 342Review the following rules. Assume domain UDP is enabled in the implied rules.

What happens when a user from the internal network tries to browse to the Internet using HTTP? The user:

"Pass Any Exam. Any Time." ­ www.actualtests.com 137Checkpoint 156­215.75 Exam

A. is prompted three times before connecting to the Internet successfully.

B. can go to the Internet after Telnetting to the client auth daemon port 259.

C. can connect to the Internet successfully after being authenticated.

D. can go to the Internet, without being prompted for authentication.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 343Reviews the following rules and note the Client Authentication Action properties screen, as shown below:

Page 125: Checkpoint.Actualtests.156-215.75.v2012-04-08

After being authenticated by the Security Gateway, when a user starts an HTTP connection to a Web site, theuser tries to FTP to another site using the command line. What happens to the user? The:

A. user is prompted from that FTP site only, and does not need to enter his username and "Pass Any Exam.Any Time." ­ www.actualtests.com 138Checkpoint 156­215.75 Exampassword for Client Authentication.

B. User is prompted for Authentication by the Security Gateway again.

C. FTP data connection is dropped after the user is authenticated successfully.

D. FTP connection is dropped by rules 2.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 344Which Security Gateway R75 configuration setting forces the Client Authentication authorization time­out torefresh, each time a new user is authenticated? The:

A. Global Properties > Authentication parameters, adjusted to allow for Regular Client Refreshment

B. Time properties, adjusted on the user objects for each user, in the source of the Client Authentication rule

C. IPS > Application Intelligence > Client Authentication > Refresh User Timeout option enabled

D. Refreshable Timeout setting, in the Limits tab of the Client Authentication Action Properties screen

Answer: DSection: (none)

Page 126: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation/Reference:Explanation:

QUESTION 345All R75 Security Servers can perform authentication with the exception of one. Which of the Security Serverscannot perform authentication?

A. RLOGIN

B. HTTP

C. SMTP

D. FTP

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 346"Pass Any Exam. Any Time." ­ www.actualtests.com 139Checkpoint 156­215.75 ExamWhich of the following are authentication methods that Security Gateway R75 uses to validate connectionattempts? Select the response below that includes the MOST complete list of valid authentication methods.

A. Proxied, User, Dynamic, Session

B. Connection, User, Client

C. User, Client, Session

D. Connection, Proxied, Session

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 347Security Gateway R75 supports User Authentication for which of the following services? Select the responsebelow that contains the MOST complete list of supported services.

A. FTP, HTTP, TELNET

B. FTP, TELNET

C. SMTP, FTP, HTTP, TELNET

D. SMTP, FTP, TELNET

Answer: ASection: (none)

Explanation/Reference:Explanation:

Page 127: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 348With the User Directory Software Blade, you can create R75 user definitions on a(n) _______Server.

A. Radius

B. NT Domain

C. LDAP

D. SecureID

Answer: CSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 140Checkpoint 156­215.75 Exam

QUESTION 349The User Directory Software Blade is used to integrate which of the following with Security Gateway R75?

A. RADIUS server

B. Account management client server

C. User authority server

D. LDAP server

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 350If you are experiencing LDAP issues, which of the following should you check?

A. Domain name resolution

B. Overlapping VPN Domains

C. Secure Internal Communications (SIC)

D. Connectivity between theR75Gateway and LDAP server

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 351How are cached usernames and passwords cleared from the memory of a R75 Security Gateway?

A. By retrieving LDAP user information using the command fw fetchldap

B. By using the Clear User Cache button in Smart Dashboard

C. Usernames and password only clear from memory after they time out

Page 128: Checkpoint.Actualtests.156-215.75.v2012-04-08

D. By installing a Security Policy

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 352"Pass Any Exam. Any Time." ­ www.actualtests.com 141Checkpoint 156­215.75 ExamYour users are defined in a Windows 2003 Active Directory server. You must add LDAP users to a ClientAuthentication rule. Which kind of user group do you need in the Client Authentication rule in R75?

A. LDAP group

B. All Users

C. A group with a generic user

D. External­user group

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 353Which type of R75 Security Server does not provide User Authentication?

A. FTP Security Server

B. SMTP Security Server

C. HTTP Security Server

D. HTTPS Security Server

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 354Mr. Smith needs access to other networks and should be able to use all services, but session authentication isnot suitable. The Security Administrator selects client authentication with HTTP. The standard authenticationport for client HTTP authentication (Port 900) is already in use. The Security Administrator wants to use the Port9001, but there are some connectivity problems. What is the reason for the connectivity problems? Give theBEST answer.

A. The configuration of the service FW1_clntauth_http is not correct.

B. The Security Policy is not correct.

C. The configuration file $FWDIR/conf/fwauthd.conf is wrong.

D. It is not possible to use any port other than the standard port 900 for the client authentication via HTTP.

Page 129: Checkpoint.Actualtests.156-215.75.v2012-04-08

Answer: CSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 142Checkpoint 156­215.75 Exam

QUESTION 355You are about to integrate RSA SecurID users into the Check Point infrastructure. What kind of users are to bedefined via SmartDashboard?

A. internet user group

B. A group with generic user

C. LDAP account unit Group

D. All users

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 356User Marc is requesting a Website while he is using a computer out of the net_singapore network.What is TRUE about his location restriction?

"Pass Any Exam. Any Time." ­ www.actualtests.com 143Checkpoint 156­215.75 Exam

Page 130: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. Source setting in User Properties always takes precedence.

B. It depends on how the User Auth object is configured; whether User Properties or Source Restriction takesprecedence.

C. Source setting in Source column always takes precedence

D. As location restrictions add up, he would be allowed from net_singapore and net_sydney.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 357In the given Rule Base, the client authentication in rule 4 is configured as fully automatic. Eric is a member ofthe LDAP group, MSAD_Group. When Eric tries to connect to a server on the Internet, what will happen?

A. Eric will be blocked because LDAP is not allowed in the Rule Base.

B. None of these things will happen.

C. Eric will be authenticated and get access to the requested server.

D. Eric will be blocked by the Stealth Rule.

Answer: BSection: (none)

Explanation/Reference:Explanation:

Page 131: Checkpoint.Actualtests.156-215.75.v2012-04-08

"Pass Any Exam. Any Time." ­ www.actualtests.com 144Checkpoint 156­215.75 Exam

QUESTION 358Assume you are a Security Administrator for ABCTech. You have allowed authenticated access to users fromMkting_net to Finance_net. But in the user's properties, connections are only permitted within Mkting_net. Whatis the BEST way to resolve this conflict?

A. Permit access to Finance_net

B. Select ignore database in action properties window

C. Select intersect with user database in the action properties window

D. Select Intersect with user database or Ignore Database in the Action Properties window.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 359When selecting an authentication scheme for a user, which scheme would you use if you only want thepassword to be stored locally? (The password is not stored at a third party component.)

A. Check Point Password

B. TACACS

C. SecurID

D. OS Password

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 360For which service is it NOT possible to configure user authentication?

A. HTTPS

B. FTP

C. SSH

D. Telnet

Answer: CSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 145Checkpoint 156­215.75 Exam

Page 132: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 361For remote user authentication, which authentication scheme is NOT supported?

A. SecurlD

B. TACACS

C. Check Point Password

D. RADIUS

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 362For information to pass securely between a Security Management Server and another Check Point component,what would NOT be required?

A. The communication must be authenticated

B. The communication must use two­factor or biometric authentication.

C. The communication must be encrypted

D. The component must be time­and­date synchronized with the security management server.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 363What is the bit size of a DES key?

A. 112

B. 168

C. 56

D. 64

Answer: CSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 146Checkpoint 156­215.75 Exam

QUESTION 364What is the size of a hash produced by SHA­1?

A. 128

B. 56

Page 133: Checkpoint.Actualtests.156-215.75.v2012-04-08

C. 40

D. 160

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 365Public keys and digital certificates do NOT provide which of the following?

A. Authentication

B. Nonrepudiation

C. Data integrity

D. Availability

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 366If you check the box Use Aggressive Mode in the IKE Properties dialog box, the standard:

A. three­packet IKE Phase 2 exchange Is replaced by a six­packet exchange

B. three­packet IKE Phase 2 exchange is replaced by a two­packet exchange

C. six­packet IKE Phase 1 exchange is replaced by a three­packet exchange

D. three­packet IKE Phase 1 exchange is replaced by a six­packet exchange

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 367"Pass Any Exam. Any Time." ­ www.actualtests.com 147Checkpoint 156­215.75 ExamYou are concerned that a message may have been intercepted and retransmitted, thus compromising thesecurity of the communication. You attach a code to the electronically transmitted message that uniquelyidentifies the sender. This code is known as a(n):

A. diffie­Helman verification

B. digital signature

C. private key

D. AES flag

Answer: BSection: (none)

Page 134: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation/Reference:Explanation:

QUESTION 368Your manager requires you to setup a new corporate VPN between all your branch offices. He requires you tochoose the strongest and most secure available algorithms for the headquarters to the Research andDevelopment branch office. In addition, you must use high performance algorithms for all sales offices withshorter key length for the VPN keys. How would you configure this scenario?

A. This can not be achieved at all as all algorithms need to be the very same for all VPNs.

B. This can only be done in traditional mode VPNs while not using simplified VPN settings.

C. This can be done either in traditional mode or simplified VPN using 2 different communities and theheadquarters as the center for both communities.

D. This can be done in a single community, but the encrypt action in the security Rule Base needs to beconfigured for exceptions.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 369Whitfield Diffie and martin Hellman gave their names to what standard?

A. An encryption scheme that makes pre­shared keys obsolete

B. An algorithm that is used in IPsec QuickMode and as an additional option in IPsec QuickMode (PFS)

C. A Key Exchange Protocol for the advanced Encryption Standard

D. A Key Agreement / Derivation Protocol that constructs secure keys over an insecure channel."Pass Any Exam. Any Time." ­ www.actualtests.com 148Checkpoint 156­215.75 Exam

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 370If you need strong protection for the encryption of user data, what option would be the BEST choice?

A. When you need strong encryption, IPsec is not the best choice. SSL VPNs are a better choice.

B. Disable Diffie Hellman by using stronger certificate based key­derivation. Use AES­256 bit on all encryptedchannels and add PFS to QuickMode. Use double encryption by implementing AH and ESP as protocols.

C. Use certificates for Phase 1, SHA for all hashes, AES for all encryption and PFS, and use ESP protocol.

D. Use Diffie Hellman for key construction and pre­shared keys for Quick Mode. Choose SHA in Quick Modeand encrypt with AES. Use AH protocol. Switch to Aggressive Mode.

Answer: CSection: (none)

Page 135: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation/Reference:Explanation:

QUESTION 371What is used to validate a digital certificate?

A. IPsec

B. CRL

C. S/MIME

D. PKCS

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 372Assume an intruder has compromised your current IKE Phase 1 and Phase 2 keys. Which of the followingoptions will end the intruder's access after the next Phase 2 exchange occurs?

A. Perfect Forward Secrecy"Pass Any Exam. Any Time." ­ www.actualtests.com 149Checkpoint 156­215.75 Exam

B. SHA1 Hash Completion

C. Phase 3 Key Revocation

D. M05 Hash Completion

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 373Which statement defines Public Key Infrastructure? Security is provided:

A. By authentication

B. By Certificate Authorities, digital certificates, and two­way symmetric­ key encryption

C. By Certificate Authorities, digital certificates, and public key encryption.

D. Via both private and public keys, without the use of digital Certificates.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 374Review the following list of actions that Security Gateway R75 can take when it controls packets. The Policy

Page 136: Checkpoint.Actualtests.156-215.75.v2012-04-08

Package has been configured for Simplified Mode VPN. Select the response below that includes the availableactions:

A. Accept, Drop, Encrypt, Session Auth

B. Accept, Reject, Encrypt, Drop

C. Accept, Drop, Reject, Client Auth

D. Accept, Hold, Reject, Proxy

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 375Your organization maintains several IKE VPNs. Executives in your organization want to know which mechanismSecurity Gateway R75 uses to guarantee the authenticity and integrity of messages. Which technology shouldyou explain to the executives?

"Pass Any Exam. Any Time." ­ www.actualtests.com 150Checkpoint 156­215.75 Exam

A. Key­exchange protocols

B. Digital signatures

C. Certificate Revocation Lists

D. Application Intelligence

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 376Which of the following provides confidentiality services for data and messages in a Check Point VPN?

A. Cryptographic checksums

B. Digital signatures

C. Asymmetric Encryption

D. Symmetric Encryption

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 377Your company has two headquarters, one in London, and one in New York. Each office includes several branchoffices. The branch offices need to communicate with the headquarters in their country, not with each other, andonly the headquarters need to communicate directly. What is the BEST configuration for establishing VPNCommunities for this company? VPN Communities comprised of:

Page 137: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. Two star and one mesh Community: One star Community is set up for each site, with headquarters as thecenter of the Community and its branches as satellites. The mesh Community includes only New York andLondon Gateways.

B. One star Community with the option to "mesh" the center of the star: New York and London Gatewaysadded to the center of the star with the mesh canter Gateways option checked, all London branch officesdefined m one satellite window, but all New York branch offices defined m another satellite window.

C. Two mesh and one star Community One mesh Community is set up for each of the headquarters and itsbranch offices The star Community is configured with London as the center of the Community and New Yorkis the satellite.

D. Three mesh Communities: One for London headquarters and its branches, one for New York headquartersand its branches, and one f;or London and New York headquarters."Pass Any Exam. Any Time." ­ www.actualtests.com 151Checkpoint 156­215.75 Exam

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 378Which of these attributes would be critical for a site­to­site VPN?

A. Strong authentication

B. Centralized management

C. Strong data encryption

D. Scalability to accommodate user groups

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 379Which of the following is NOT true for Clientless VPN?

A. The Gateway accepts any encryption method that is proposed by the client and supported in the VPN

B. Secure communication is provided between clients and servers that support HTTP

C. User Authentication is supported

D. The Gateway can enforce the use of strong encryption

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 380You want to establish a VPN, using certificates. Your VPN will exchange certificates with an external partner.Which of the following activities should you do first?

Page 138: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. Manually import your partner's Certificate Revocation List.

B. Exchange exported CA keys and use them to create a new server object to represent your partner'sCertificate Authority (CA)."Pass Any Exam. Any Time." ­ www.actualtests.com 152Checkpoint 156­215.75 Exam

C. Create a new logical­server object to represent your partner's CA

D. Manually import your partner's Control List.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 381Your company is still using traditional mode VPN configuration on all Gateways and policies. Your manager nowrequires you to migrate to a simplified VPN policy to benefit from the new features. This needs to be done withno downtime due to critical applications which must run constantly.How would you start such a migration?

A. This cannot be done without downtime as a VPN between a traditional mode Gateway and a simplifiedmode Gateway does not work.

B. You first need to completely rewrite all policies in simplified mode and then push this new policy to allGateways at the same time.

C. This can not be done as it requires a SIC­ reset on the Gateways first forcing an outage.

D. Convert the required Gateway policies using the simplified VPN wizard, check their logic and then migrateGateway per Gateway.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 382Your manager requires you to setup a VPN to a new business partner site. The administrator from the partnersite gives you his VPN settings and you notice that he setup AES 128 for IKE phase 1 and AES 256 for IKEphase 2. Why is this a problematic setup?

A. All is fine as the longest key length has been chosen for encrypting the data and a shorter key length forhigher performance for setting up the tunnel.

B. All is fine and can be used as is.

C. Only 128 bit keys are used for phase 1 keys which are protecting phase 2, so the longer key length in phase2 only costs performance and does not add security due to a shorter key in phase 1.

D. The 2 algorithms do not have the same key length and so don't work together. You will get the error ".... Noproposal chosen...."

Answer: CSection: (none)

Explanation/Reference:Explanation:

Page 139: Checkpoint.Actualtests.156-215.75.v2012-04-08

"Pass Any Exam. Any Time." ­ www.actualtests.com 153Checkpoint 156­215.75 Exam

QUESTION 383Why are certificates preferred over pre­shared keys in an IPsec VPN?

A. Weak scalability: PSKs need to be set on each and every Gateway

B. Weak performance: PSK takes more time to encrypt than Drffie­Hellman

C. Weak security: PSKs can only have 112 bit length.

D. Weak Security: PSK are static and can be brute­forced.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 384Multi­Corp must comply with industry regulations in implementing VPN solutions among multiple sites. Thecorporate Information Assurance policy defines the following requirements:

What is the most appropriate setting to comply with these requirements?

Portability Standard

Key management Automatic, external PKI

Session keys changed at configured times during a connection's lifetime

Key length No less than 128­bit

Data integrity Secure against inversion and brute­force attacks

What is the most appropriate setting to comply with theses requirements?

A. IKE VPNs: SHA1 encryption for IKE Phase 1, and MD5 encryption for phase 2, AES hash

B. IKE VPNs: DES encryption for IKE phase 1, and 3DES encryption for phase 2, MD 5 hash

C. IKE VPNs: CAST encryption for IKE Phase 1, and SHA 1 encryption for phase 2, DES hash

D. IKE VPNs: AES encryption for IKE Phase 1, and AES encryption for Phase 2; SHA1 hash

Answer: DSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 154Checkpoint 156­215.75 Exam

QUESTION 385What happens in relation to the CRL cache after a cpstop and cpstart have been initiated?

Page 140: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. The Gateway retrieves a new CRL on startup, and discards the old CRL as invalid.

B. The Gateway continues to use the old CRL, as long as it is valid.

C. The Gateway continuous to use the old CRL even if it is not valid, until a new CRL is cashed.

D. The Gateway issues a crl_zap on startup, which empties the cache and forces certificate retrieval.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 386Which of the following is TRUE concerning control connections between the Security Management Server andthe Gateway in a VPN Community? Control Connections are:

A. encrypted using SIC and re­encrypted again by the Community regardless of VPN domain configuration.

B. encrypted by the Community.

C. not encrypted, only authenticated.

D. encrypted using SIC.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 387How many times is the firewall kernel invoked for a packet to be passed through a VPN connection?

A. Three times

B. Twice

C. Once

D. None The IPSO kernel handles it

Answer: BSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 155Checkpoint 156­215.75 Exam

QUESTION 388You have traveling salesmen connecting to your VPN community from all over the world. Which technologywould you choose?

A. SSL VPN: It has more secure and robust encryption schemes than IPsec.

B. IPsec: It allows complex setups that match any network situation available to the client, i.e.connection from a private customer network or various hotel networks.

Page 141: Checkpoint.Actualtests.156-215.75.v2012-04-08

C. SSL VPN: It only requires HTTPS connections between client and server. These are most likely open fromall networks, unlike IPsec, which uses protocols and ports which are blocked by many sites.

D. IPsec: It offers encryption, authentication, replay protection and all algorithms that are state of the art (AES)or that perform very well. It is native to many client operating systems, so setup can easily be scripted.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 389You wish to configure a VPN and you want to encrypt not just the data packet, but the original header. Whichencryption scheme would you select?

A. Both encrypt the data and header

B. Tunneling­mode encryption

C. In­place encryption

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 390You wish to view the current state of the customer's VPN tunnels, including those that are down and destroyed.Which SmartConsole application will provide you with this information?

A. SmartView Monitor

B. SmartView Status

C. SmartView Tracker"Pass Any Exam. Any Time." ­ www.actualtests.com 156Checkpoint 156­215.75 Exam

D. SmartUpdate

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 391Which VPN Community object is used to configure Hub Mode VPN routing in SmartDashboard?

A. Mesh

B. Star

C. Routed

D. Remote Access

Answer: B

Page 142: Checkpoint.Actualtests.156-215.75.v2012-04-08

Section: (none)

Explanation/Reference:Explanation:

QUESTION 392When a user selects to allow Hot­spot, SecureClient modifies the Desktop Security Policy and/or Hub Moderouting to enable Hot­spot registration. Which of the following is NOT true concerning this modification?

A. IP addresses accessed during registration are recorded.

B. Ports accessed during registration are recorded.

C. The number of IP addresses accessed is unrestricted.

D. The modification is restricted by time.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 393For VPN routing to succeed, what must be configured?

A. VPN routing is not configured in the Rule Base or Community objects. Only the native­routing mechanism oneach Gateway can direct the traffic via its VTI configured interfaces.

B. No rules need to be created; implied rules that cover inbound and outbound traffic on the "Pass Any Exam.Any Time." ­ www.actualtests.com 157Checkpoint 156­215.75 Examcentral (HUB) Gateway are already in place from Policy > Properties > Accept VPN­1 Control Connections.

C. At least two rules in the Rule Base must be created, one to cover traffic inbound and the other to covertraffic outbound on the central (HUB) Security Gateway.

D. A single rule in the Rule Base must cover all traffic on the central (HUB) Security Gateway for the VPNdomain.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 394What can NOT be selected for VPN tunnel sharing?

A. One tunnel per subnet pair

B. One tunnel per Gateway pair

C. One tunnel per pair of hosts

D. One tunnel per VPN domain pair

Answer: DSection: (none)

Page 143: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation/Reference:Explanation:

QUESTION 395Marc is a Security Administrator configuring a VPN tunnel between his site and a partner site. He just createdthe partner city's firewall object and a community. While trying to add the firewalls to the community only hisfirewall could be chosen. The partner city's firewall does not appear. What is a possible reason for the problem?

A. IPsec VPN Software Blade on the partner city's firewall object is not activated.

B. The partner city's firewall object was created as an interoperable device.

C. The partner city's Gateway is running VPN­1 NG AI.

D. Only Check Point Gateways could be added to a community.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 396"Pass Any Exam. Any Time." ­ www.actualtests.com 158Checkpoint 156­215.75 ExamIf Henry wanted to configure Perfect Forward Secrecy for his VPN tunnel, in which phase would he beconfiguring this?

A. Aggressive Mode

B. Diffie­Hellman

C. Phase 2

D. Phase 1

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 397You install and deploy SecurePlatform with default settings. You allow Visitor Mode in the Remote Accessproperties of the Gateway object and install policy, but SecureClient refuses to connect.What is the cause of this?

A. Set Visitor Mode in Policy > Global Properties / Remote­Access / VPN ­ Advanced.

B. Office mode is not configured.

C. The WebUI on SecurePlatform runs on port 443 (HTTPS). When you configure Visitor Mode it cannot bindto default port 443, because it's used by another program (WebUI). You need to change the WebUI port, orrun Visitor Mode on a different port.

D. You need to start SSL Network Extender first, than use Visitor Mode.

Answer: CSection: (none)

Explanation/Reference:

Page 144: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation:

QUESTION 398With deployment of SecureClient, you have defined in the policy that you allow traffic only to an encrypteddomain. But when your mobile users move outside of your company, they often cannot use SecureClientbecause they have to register first (i.e. in Hotel or Conference rooms). How do you solve this problem?

A. Allow your users to turn off SecureClient

B. Allow for unencrypted traffic

C. Allow traffic outside the encrypted domain

D. Enable Hot Spot/Hotel Registration

Answer: DSection: (none)

Explanation/Reference:"Pass Any Exam. Any Time." ­ www.actualtests.com 159Checkpoint 156­215.75 Exam

Explanation:

QUESTION 399What statement is true regarding Visitor Mode?

A. VPN authentication and encrypted traffic are tunneled through port TCP 443.

B. All VPN traffic is tunneled through UDP port 4500.

C. Only Main mode and Quick mode traffic are tunneled on TCP port 443.

D. Only ESP traffic is tunneled through port TCP 443.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 400Phase 1 uses________.

A. Conditional

B. Sequential

C. Asymmetric

D. Symmetric

Answer: CSection: (none)

Explanation/Reference:Explanation:

Topic 5, Volume E

Page 145: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 401If you were NOT using IKE aggressive mode for your IPsec tunnel, how many packets would you see for normalPhase 1 exchange?

A. 6

B. 2

C. 3

D. 9

Answer: ASection: (none)

Explanation/Reference:"Pass Any Exam. Any Time." ­ www.actualtests.com 160Checkpoint 156­215.75 Exam

Explanation:

QUESTION 402How many packets does the IKE exchange use for Phase 1 Main Mode?

A. 6

B. 1

C. 3

D. 12

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 403How many packets does the IKE exchange use for Phase 1 Aggressive Mode?

A. 12

B. 3

C. 1

D. 6

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 404Which of the following actions take place in IKE Phase 2 with Perfect Forward Secrecy disabled?

A. The DH public keys are exchanged.

B. Peers authenticate using certificates or preshared secrets.

Page 146: Checkpoint.Actualtests.156-215.75.v2012-04-08

C. Symmetric IPsec keys are generated.

D. Each Security Gateway generates a private Diffie­Hellman (DH) key from random pools.

Answer: CSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 161Checkpoint 156­215.75 Exam

QUESTION 405Which of the following commands can be used to remove site­to­site IPsec Security Association (SA)?

A. fw ipsec tu

B. vpn ipsec

C. vpn debug ipsec

D. vpn tu

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 406In which IKE phase are IKE SA's negotiated?

A. Phase 4

B. Phase 1

C. Phase 3

D. Phase 2

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 407In which IKE phase are IPsec SA's negotiated?

A. Phase 3

B. Phase 1

C. Phase 2

D. Phase 4

Answer: CSection: (none)

Page 147: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 162Checkpoint 156­215.75 Exam

QUESTION 408You wish to configure an IKE VPN between two R75 Security Gateways, to protect two networks. The networkbehind one Gateway is 10.15.0.0/16, and network 192.168.9.0/24 is behind the peer's Gateway. Which type ofaddress translation should you use to ensure the two networks access each other through the VPN tunnel?

A. Hide NAT

B. Static NAT

C. Manual NAT

D. None

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 409Which operating system is not supported by SecureClient?

A. MacOS X

B. Windows XP SP2

C. Windows Vista

D. IPSO 3.9

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 410Which of the following SSL Network Extender server­side prerequisites is NOT correct?

A. The Gateway must be configured to work with Visitor Mode.

B. There are distinctly separate access rules required for SecureClient users vs. SSL Network Extender users.

C. To use Integrity Clientless Security (ICS), you must install the IC3 server or configuration tool.

D. The specific Security Gateway must be configured as a member of the Remote Access Community

Answer: BSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 163Checkpoint 156­215.75 Exam

Page 148: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 411Which of the following is NOT supported with Office Mode?

A. SecuRemote

B. SSL Network Extender

C. SecureClient

D. Endpoint Connect

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 412Which of the following is NOT supported with office mode?

A. Transparent mode

B. L2TP

C. Secure Client

D. SSL Network Extender

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 413Your organization has many Edge Gateways at various branch offices allowing users to access companyresources. For security reasons, your organization's Security Policy requires all Internet traffic initiated behindthe Edge Gateways first be inspected by your headquarters' R75 Security Gateway. How do you configure VPNrouting in this star VPN Community?

A. To Internet and other targets only

B. To center or through the center to other satellites, to Internet and other VPN targets

C. To center and other satellites, through center

D. To center only

Answer: BSection: (none)

Explanation/Reference:"Pass Any Exam. Any Time." ­ www.actualtests.com 164Checkpoint 156­215.75 Exam

Explanation:

QUESTION 414Of the following VPN Community options, which is most likely to provide a balance between IKE compatibility to

Page 149: Checkpoint.Actualtests.156-215.75.v2012-04-08

VPN­capable devices (Check Point and non­Check Point) and preserving resources on the R75 Gateway? VPNtunnel sharing per:

A. pair of hosts, no permanent tunnels, Diffie­Hellman Group 1 for Phase 1.

B. subnet, no permanent tunnels, Diffie­Hellman Group 2 for Phase 1.

C. subnet, permanent tunnels, Diffie­Hellman Group 1 for Phase 1.

D. pair of hosts, permanent tunnels, Diffie­Hellman Group 2 for Phase 1.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 415There are three options available for configuring a firewall policy on the SecureClient Mobile device. Which ofthe following is NOT an option?

A. Configured on endpoint client

B. No

C. Configured on server

D. yes

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 416When attempting to connect with SecureClient Mobile the following error message is received.

The certificate provided is invalid. Please provide the username and password.

What is the probable cause of the error?

A. The certificate provided is invalid."Pass Any Exam. Any Time." ­ www.actualtests.com 165Checkpoint 156­215.75 Exam

B. The user's credentials are invalid.

C. The user attempting to connect is not configured to have an office mode IP address so the connection failed.

D. There is no connection to the server, and the client disconnected.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 417Which operating system is NOT supported by Endpoint Connect R75?

Page 150: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. MacOS X

B. Windows XP SP2 O C.

C. Windows Vista 64­bit SP1

D. Windows 2000 SP1

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 418Using the output below, what type of VPN Community is configured for fw­stlouis?

A. Traditional

B. Meshed

C. Domain­Based

D. Star

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 419You are evaluating the configuration of a mesh VPN Community used to create a site­to­site VPN. This graphicdisplays the VPN properties in this mesh Community.

"Pass Any Exam. Any Time." ­ www.actualtests.com 166Checkpoint 156­215.75 Exam

Page 151: Checkpoint.Actualtests.156-215.75.v2012-04-08

Which of the following would be the most valid conclusion?

A. The VPN Community will perform IKE Phase 1 key­exchange encryption using the longest key SecurityGatewayR75supports.

B. Changing the setting Perform IPsec data encryption with from AES­128 to 3DES will increase the encryptionoverhead.

C. Changing the setting Perform key exchange encryption with 3DES to DES will enhance the VPNCommunity's security, and reduce encryption overhead.

D. Change the data­integrity settings for this VPN CommunitybecauseMD5 is incompatible with AES.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 420What is a possible reason for the IKE failure shown in this screenshot?

"Pass Any Exam. Any Time." ­ www.actualtests.com 167Checkpoint 156­215.75 Exam

Page 152: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. Mismatch in VPN Domains.

B. Mismatch in Diffie­Hellman group.

C. Mismatch in encryption schemes.

D. Mismatch in preshared secrets.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 421How can you access the Certificate Revocation List (CRL) on the firewall, if you have configured a Stealth Ruleas the first explicit rule?

A. You can access the Revocation list by means of a browser using the URL: http://IP­FW:18264/ICA CRL1.crl1 provided the implied rules are activated per default.

B. The CRL is encrypted, so it is useless to attempt to access it.

C. You cannot access the CRL, since the Stealth Rule will drop the packets

D. You can only access the CRI via the Security Management Server as the internal CA is located on thatserver

Answer: ASection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 168Checkpoint 156­215.75 Exam

Page 153: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 422Which could be an appropriate solution for assigning a unique Office Mode IP address to Endpoint Connectusers?

A. Configure a DHCP server with IP reservation using the information gathered by the utility vpn macutil.

B. Edit $ PWDIA/conf/SCM_ assignment. conf on the management server with the correct user name andoffice mode ip address

C. Create a DHCP resource with the fixed IP address to use name mapping.

D. Fixed office mode IP can be configured as a user property in smart dash board

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 423In the SmartView Tracker you receive the error, ...peer send invalid ID information... while trying to establish anIKE VPN tunnel. Where does this error normally result from and how can you solve it? This error normallyresults from:

A. a mismatch in the authentication algorithms used in IKE phase one and can be corrected by changing themto match.

B. an invalid IP address configured on one tunnel endpoint; normally the internal one in the General tab. Thiscan be solved with link selection or by changing this IP to the one facing the other tunnel endpoint.

C. an invalid IP address configured on one tunnel endpoint, normally the internal one in the General tab. Thiscan be resolved by adding the correct IPs to the Topology tab of both Gateways on both sites.

D. a mismatch in the IPs of the VPN tunnel endpoints and can not be resolved.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 424How many packets are required for IKE Phase 2?

A. 2

B. 12

C. 6"Pass Any Exam. Any Time." ­ www.actualtests.com 169Checkpoint 156­215.75 Exam

D. 3

Answer: DSection: (none)

Explanation/Reference:Explanation:

Page 154: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 425Which of the following actions do NOT take place in IKE Phase 1?

A. Each side generates a session key from its private key and peer's public key

B. Peers agree on integrity method

C. Diffie­Hillman key is combined with the key material to produce the symmetrical IPsec key.

D. Peers agree on encryption method

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 426When using an encryption algorithm, which is generally considered the best encryption method?

A. DES

B. AES

C. Triple DES

D. CAST cipher

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 427Fill in the blank: When you want to create a VPN community where all participating gateways are able toconnect to each other, you need to set up a ___________ community.

A. Remote Access

B. Meshed

C. SSL VPN

D. Star"Pass Any Exam. Any Time." ­ www.actualtests.com 170Checkpoint 156­215.75 Exam

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 428Which do you configure to give remote access VPN users a local IP address?

A. Office mode IP pool

B. NAT pool

Page 155: Checkpoint.Actualtests.156-215.75.v2012-04-08

C. Encryption domain pool

D. Authentication pool

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 429When using vpn tu, which option must you choose if you only want to clear phase 2 for a specific IP (gateway)?

A. (6) Delete all IPsec SAs for a given User (Client)

B. (7) Delete all IPsec+IKE SAs for a given peer (GW)

C. (8) Delete all IPsec+IKE SAs for a given User (Client)

D. (5) Delete all IPsec SAs for a given peer (GW)

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 430When using vpn tu, which option must you choose if you want to rebuild your VPN for a specific IP (gateway)?

"Pass Any Exam. Any Time." ­ www.actualtests.com 171Checkpoint 156­215.75 Exam

A. (6) Delete all IPsec SAs for a given User (Client)

B. (7) Delete all IPsec+IKE SAs for a given peer (GW)

C. (5) Delete all IPsec SAs for a given peer (GW)

D. (8) Delete all IPsec+IKE SAs for a given User (Client)

Answer: BSection: (none)

Page 156: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation/Reference:Explanation:

QUESTION 431Which of the following statements about file­type recognition in Content Inspection is TRUE?

A. Antivirus status is monitored using SmartView Tracker.

B. A scan failure will only occur if the antivirus engine fails to initialize.

C. All file types are considered "at risk", and are not configurable by the Administrator or the Security Policy.

D. The antivirus engine acts as a proxy, caching the scanned file before delivering it to the client.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 432Which antivirus scanning method does not work if the Gateway is connected as a node in proxy mode?

A. Scan by Direction

B. Scan by File Type

C. Scan by Server"Pass Any Exam. Any Time." ­ www.actualtests.com 172Checkpoint 156­215.75 Exam

D. Scan by IP Address

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 433Which OPSEC server can be used to prevent users from accessing certain Web sites?

A. LEA

B. AMON

C. UFP

D. CVP

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 434How do you control the maximum number of mail messages in a spool directory?

Page 157: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. In the Gateway object's SMTP settings under the Advanced window

B. in the smtp.conf file on the Security Management Server

C. In the Security Server window in Global Properties

D. In IPS SMTP settings

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 435If you experience unwanted traffic from a specific IP address, how can you stop it most quickly?

A. Check anti­spoofing settings

B. Configure a rule to block the address

C. Create a SAM rule

D. Activate an IPS protection"Pass Any Exam. Any Time." ­ www.actualtests.com 173Checkpoint 156­215.75 Exam

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 436URL filtering policy can make exceptions for specific sites by being enforced:

A. Only for specific sources and destinations.

B. For all traffic, except on specific sources and destinations.

C. For alt traffic, except blocked sites.

D. For all traffic. There are no exceptions.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 437The URL Filtering Policy can be configured to monitor URLs in order to:

A. Log sites from blocked categories.

B. Redirect users to a new URL.

C. Block sites only once.

D. Alert the Administrator to block a suspicious site.

Page 158: Checkpoint.Actualtests.156-215.75.v2012-04-08

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 438Which type of resource could a Security Administrator use to control access to specific file shares on targetmachines?

A. URI

B. CIFS

C. Telnet

D. FTP

Answer: BSection: (none)

Explanation/Reference:"Pass Any Exam. Any Time." ­ www.actualtests.com 174Checkpoint 156­215.75 Exam

Explanation:

QUESTION 439What rules send log information to Dshield.org when Storm Center is configured?

A. Determined in IPS, Dshield Storm Center configuration: Security Management Server sends logs from ruleswith tracking set to either Alert or one of the specific User Defined Alerts

B. Determined by the Global Properties configuration: Log defined in the Log and Alerts section, rules withtracking sent to Account or SNMP trap.

C. Determined in Web Intelligence, configuration: Information Disclosure is configured; rules with tracking set toUser Defined Alerts or SNMP trap.

D. Determined by the Dshield Storm Center Logging setting in Logs and Master of the Security ManagementServer object rules with tracking set to Log or None.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 440A security audit has determined that your unpatched Web application server is accessing a SQL server. WhichIPS setting will allow the Security Gateway to prevent this error page from displaying information about the SQLserver in your DMZ?

A. In Web Intelligence / General / HTTP Protocol Inspection, enables ASCII only response headers.

B. In web intelligence / HTTP Protocol Inspection, select the box Enforce Strict HTTP response parsing.

C. In application intelligence / FingerPrint Scrambling / WEB Apps, Select the Scramble error messagecheckbox.

D. In Web Intelligence / Information Disclosure / Error Concealment

Page 159: Checkpoint.Actualtests.156-215.75.v2012-04-08

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 441Antivirus protection on a Check Point Gateway is available for all of the following protocols,

"Pass Any Exam. Any Time." ­ www.actualtests.com 175Checkpoint 156­215.75 ExamEXCEPT:

A. FTP

B. SMTP

C. HTTP

D. TELNET

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 442Which Security Servers can perform authentication tasks, but CANNOT perform content security tasks?

A. RHV HTTPS

B. FTP

C. RLOGIN

D. HTTP

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 443Which Security Servers can perform authentication tasks, but CANNOT perform content security tasks?

A. HTTPS

B. Telnet

C. FTP

D. HTTP

Answer: BSection: (none)

Explanation/Reference:

Page 160: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation:

QUESTION 444"Pass Any Exam. Any Time." ­ www.actualtests.com 176Checkpoint 156­215.75 ExamWhen using the Anti­Virus Content Security, how are different file types analyzed?

A. They are analyzed by their un­encoded format.

B. They are analyzed by their magic number.

C. They are analyzed by the MIME header.

D. They are analyzed by their file extension (i.e. .bat, .exe. .doc)

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 445For which protocol is anti­virus not available?

A. SMTP

B. FTP

C. HTTPS

D. HTTP

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 446Where can you view anti­spam status?

A. SmartView Monitor

B. SmartDashboard

C. SmartView Tracker

D. SmartUpdate

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 447Where can you view the anti­virus status?

"Pass Any Exam. Any Time." ­ www.actualtests.com 177Checkpoint 156­215.75 Exam

Page 161: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. SmartDashboard

B. SmartView Tracking

C. SmartView Monitor

D. SmartUpdate

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 448How would you create a temporary user bypass to the URL Filtering policy in Security Gateway?

A. By adding an exception in URL Filtering / Advanced I Network Exceptions

B. By enabling it in URL Filtering /Advanced / Bypass

C. By creating an authentication rule in the Firewall

D. It is not possible

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 449You manage a global network extending from your base in Chicago to Tokyo, Calcutta and Dallas. Managementwants to report detailing the current software level of each Enterprise class Security Gateway. You plan to takethe opportunity to create a proposal outline listing the most cost­ effective way to upgrade your Gateways.Which two SmartConsole applications will you use to create this report and outline?

A. SmartLSM and SmartUpdate

B. SmartView Tracker and SmartView Monitor

C. SmartView Monitor and SmartUpdate

D. SmartDashboard and SmartView Tracker

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 450Message digests use which of the following?

"Pass Any Exam. Any Time." ­ www.actualtests.com 178Checkpoint 156­215.75 Exam

A. SHA­1 and MD5

B. IDEA and RC4

Page 162: Checkpoint.Actualtests.156-215.75.v2012-04-08

C. SSL and MD4

D. DES and RC4

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 451Which of the following is a hash algorithm?

A. DES

B. IDEA

C. MD5

D. 3DES

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 452Which of the following uses the same key to decrypt as it does to encrypt?

A. Asymmetric encryption

B. Symmetric encryption

C. Certificate­based encryption

D. Dynamic encryption

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 453You believe Phase 2 negotiations are failing while you are attempting to configure a site­to­site VPN with one ofyour firm's business partners. Which SmartConsole application should you use to confirm your suspicions?

A. SmartDashboard"Pass Any Exam. Any Time." ­ www.actualtests.com 179Checkpoint 156­215.75 Exam

B. SmartView Tracker

C. SmartUpdate

D. SmartView Status

Answer: BSection: (none)

Page 163: Checkpoint.Actualtests.156-215.75.v2012-04-08

Explanation/Reference:Explanation:

QUESTION 454A digital signature:

A. Provides a secure key exchange mechanism over the Internet

B. Automatically exchanges shared keys.

C. Guarantees the authenticity and integrity of a message.

D. Decrypts data to its original form.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 455Your bank's distributed R75 installation has Security Gateways up for renewal. Which SmartConsole applicationwill tell you which Security Gateways have licenses that will expire within the next 30 days?

A. SmartView Tracker

B. Smart Portal

C. SmartUpdate

D. SmartDashboard

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 456When launching SmartDashboard, what information is required to log into R75?

A. User Name, Management Server IP, certificate fingerprint file "Pass Any Exam. Any Time." ­ www.actualtests.com 180Checkpoint 156­215.75 Exam

B. User Name, Password. Management Server IP

C. Password. Management Server IP

D. Password, Management Server IP, LDAP Server IP

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 457Which component functions as the Internal Certificate Authority for R75?

Page 164: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. Security Gateway

B. Management Server

C. Policy Server

D. SmartLSM

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 458To reduce the information given to you in SmartView Tracker, what can you do to find information about databeing sent between pcosaka and pctokyo?

A. Double­click an entry representing a connection between both endpoints.

B. Press CTRL+F in order to open the find dialog, and then search the corresponding IP addresses.

C. Apply a source filter by adding both endpoint IP addresses with the equal option set.

D. Use a regular expression to filter out relevant logging entries."Pass Any Exam. Any Time." ­ www.actualtests.com 181Checkpoint 156­215.75 Exam

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 459A third­shift Security Administrator configured and installed a new Security Policy early this morning. When youarrive, he tells you that he has been receiving complaints that Internet access is very slow. You suspect theSecurity Gateway virtual memory might be the problem. Which SmartConsole component would you use toverify this?

A. SmartView Tracker

B. SmartView Monitor

C. This information can only be viewed with fw ctl pstat command from the CLI.

D. Eventia Analyzer

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 460You wish to analyze the packet size distribution of your traffic with SmartView Monitor.

Unfortunately, the message, There are no machines that contain Firewall Blade and SmartView Monitorappears.

Page 165: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. What should you do to analyze the packet size distribution of your traffic? Give the BEST answer.

B. Purchase the SmartView Monitor license for your Security Management Server.

C. Purchase the SmartView Monitor license for your Security Gateway.

D. Enable Monitoring on your Security Gateway.

E. Enable Monitoring on your Security Management Server.

Answer: CSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 182Checkpoint 156­215.75 Exam

QUESTION 461When troubleshooting NAT entries in SmartView Tracker, which column do we need to check to view the newsource IP when using NAT?

A. XlateSrc

B. XlateSPort

C. XlateDst

D. XlateDPort

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 462When troubleshooting NAT entries in SmartView Tracker, which column do we need to check to view the NAT'dsource port when using source NAT?

A. XlateDst

B. XlateDPort

C. XlateSPort

D. XlateSrc

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 463Which Client Authentication sign­on method requires the user to first authenticate via the User Authenticationmechanism when logging in to a remote server with Telnet?

A. Standard Sign On

B. Manual Sign On

Page 166: Checkpoint.Actualtests.156-215.75.v2012-04-08

C. Agent Automatic Sign On

D. Partially Automatic Sign On

Answer: DSection: (none)

Explanation/Reference:Explanation:

"Pass Any Exam. Any Time." ­ www.actualtests.com 183Checkpoint 156­215.75 Exam

QUESTION 464Your company has two headquarters, one in London, one in New York. Each of the headquarters includesseveral branch offices. The branch offices only need to communicate with the headquarters in their country, notwith each other, and the headquarters need to communicate directly. What is the BEST configuration forestablishing VPN Communities among the branch offices and their headquarters, and between the twoheadquarters? VPN Communities comprisedof:

A. Three mesh Communities: one for London headquarters and its branches; one for New York headquartersand its branches; and one for London and New York headquarters.

B. Three star Communities: The first one is between New York headquarters and its branches.The second star Community is between London headquarters and its branches. The third star Community isbetween New York and London headquarters but it is irrelevant which site is "center" and which "satellite".

C. Two mesh and one star Community: Each mesh Community is set up for each site between headquarterstheir branches. The star Community has New York as the center and London as its satellite.

D. One star Community with the option to mesh the center of the star: New York and London Gateways addedto the center of the star with the "mesh center Gateways" option checked; all London branch offices definedin one satellite window; but, all New York branch offices defined in another satellite window.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 465Phase 2 uses ___________, if not using Perfect Forward Secrecy.

A. Symmetric

B. Conditional

C. Sequential

D. Asymmetric

Answer: ASection: (none)

Explanation/Reference:"Pass Any Exam. Any Time." ­ www.actualtests.com 184Checkpoint 156­215.75 Exam

Explanation:

Page 167: Checkpoint.Actualtests.156-215.75.v2012-04-08

New Questions

QUESTION 466The SIC certificate is stored in the directory______________.

A. $CPDIR/conf

B. $FWDIR/database

C. $CPDIR/registry

D. $FWDIR/conf

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 467Access Role objects define users, machines, and network locations as:

A. One object

B. Credentialed objects

C. Separate objects

D. Linked objects

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 468What command syntax would you use to see accounts the gateway suspects are service accounts?

A. pdp check_log

B. adlog check__acoounts

C. pdp show service

D. adlog service_accounts"Pass Any Exam. Any Time." ­ www.actualtests.com 185Checkpoint 156­215.75 ExamExplanation:

Answer: Section: (none)

Explanation/Reference:

QUESTION 469If a security gateway enforces three protections, LDAP injection, Malicious Code Protector Rejection, whichcheckpoint license is required in SmartPhone?

Page 168: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. SmallEvent intro

B. IPS

C. SSL VPN

D. Data Loss Prevention

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 470Using Captive Portal, unidentified users may be blocked, allowed to enter required credentials, or required todownload:

A. ICA Certificate

B. SecureClient

C. Full Endpoint Client

D. Identity Awareness AgentExplanation:

Answer: Section: (none)

Explanation/Reference:

QUESTION 471What is true about the Rule Base shown?

Page 169: Checkpoint.Actualtests.156-215.75.v2012-04-08

"Pass Any Exam. Any Time." ­ www.actualtests.com 186Checkpoint 156­215.75 Exam(i). HTTP traffic from webrome to websingapore will be encrypted

(ii). HTTP traffic from websingapore to webrome will be encrypted

(iii). HTTP traffic from webrome ro websingapore will be encrypted

(iv). HTTP traffic from websingapore to webromw will be blocked

A. (ii) and (iii)

B. (iii) and (iv)

C. (i), (ii) and (iii)

D. (iii) onlyExplanation:

Answer: Section: (none)

Explanation/Reference:

QUESTION 472The third­shift Administrator was updating Security Management Server Access settings in Global Propertiesand testing. He managed to lock himself out of his account. How can you unlock this account?

A. Delete the file sdmin.lock in the Security Management Server directory $PWDIR/tmp/

B. The fwn lock_admin ­u <account name> from Security Management Server command line

C. Type fwn unlock_admin ­ u from the Security Gateway command line

D. Type fwn unlock_admin from the Security Management Server Command line

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 473What command syntax would you use to turn on PDP logging in a distributed environment?

A. pdp tracker on

B. pdp log = l

C. pdp track = l

D. pdp logging onExplanation:"Pass Any Exam. Any Time." ­ www.actualtests.com 187Checkpoint 156­215.75 Exam

Answer: Section: (none)

Explanation/Reference:

Page 170: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 474Once an Access Role is configured, in which Rule Bases can it be implemented?

A. DLP

B. Mobile Access

C. Firewall

D. IPSExplanation:

Answer: Section: (none)

Explanation/Reference:

QUESTION 475Identity Awareness is implemented to manage access to protected resources based on a user's_____________.

A. Location

B. Application requirement

C. Computer MAC address

D. Time of connectionExplanation:

Answer: Section: (none)

Explanation/Reference:

QUESTION 476Which of the following is NOT defined by an Access Role object?

A. Source Network

B. Source Logging and/or Alerting Rule

C. Source Machine

Page 171: Checkpoint.Actualtests.156-215.75.v2012-04-08

D. Source ServerExplanation:QUESTIONNO: 477Which rule is responsible for installation feature?"Pass Any Exam. Any Time." ­ www.actualtests.com 188Checkpoint 156­215.75 Exam

C:\Documents and Settings\user­nwz\Desktop\1.JPG

E. Rule 4

F. Rule 8

G. Rule 7

H. Rule 5

Answer: Section: (none)

Explanation/Reference:

QUESTION 477What information is found in the SmartView Tracker Management log?

A. Administrator SmartDashboard logout event

B. SecurePlatform expert login event

C. Creation of an administrator using cpconfig

Page 172: Checkpoint.Actualtests.156-215.75.v2012-04-08

D. FTP username authentication failureExplanation:

Answer: Section: (none)

Explanation/Reference:

QUESTION 478Captive Portal is a _____________ that allows the gateway to request login information from the user.

A. LDAP server add­on

B. Transparent network inspection tool

C. Separately licensed feature

D. Pre­configured and customizable web­based tool"Pass Any Exam. Any Time." ­ www.actualtests.com 189Checkpoint 156­215.75 ExamExplanation:

Answer: Section: (none)

Explanation/Reference:

QUESTION 479Which of the following items should be configured for the Security Management Server to authenticate viaLDAP?

A. Windows logon password

B. Active Directory Server object

C. WMI object

D. Check Point PasswordExplanation:

Answer: Section: (none)

Explanation/Reference:

QUESTION 480You plan to create a backup of the rules, objects, policies, and global properties from an R75 SecurityManagement Server. Which of the following backup and restore solution can you use?

1. Upgrade_export and upgrade_import utilities

2. Database revision control

3. SecurePlatform backup utilities

Page 173: Checkpoint.Actualtests.156-215.75.v2012-04-08

4. Policy package management

5. Manual copies of the $CPDIR/conf directory

A. 2, 4, 5

B. 1, 3, 4

C. 1, 2, 3

D. 1, 2, 3, 4, 5Explanation:

Answer: Section: (none)

Explanation/Reference:

QUESTION 481You install and deploy SecurePlatform with default settings. You allow visitor Mode in the Gateway object'sRemote Access properties and install policy, but SecureClient refuses to connect. What is the cause of this?

"Pass Any Exam. Any Time." ­ www.actualtests.com 190Checkpoint 156­215.75 Exam

A. Set the Visitor Mode Policy > Global Properties > Remote­Access > VPN ­ Advanced

B. Offline mode is not configured

C. You need to start SSL Network Extended first, then use Visitor Mode

D. The WebUI on SecurePlatform runs on port 443 (HTTPS). When you configure Visitor Mode it cannot bindto default port 443, because it's used by another program (WebUI). You need to change the WebUI port, orrun Visitor Mode on a different port.Explanation:

Answer: Section: (none)

Explanation/Reference:

QUESTION 482Which of the following allows administrators to allow or deny traffic to or from a specific network based on theuser's credentials?

A. Access Role

B. Access Rule

C. Access Policy

D. Access CertificateExplanation:

Answer: Section: (none)

Explanation/Reference:

Page 174: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 483What are you required to do before running the command upgrade_export?

A. Run a cpatop on the Security Management Server

B. Run a cpstop on the Security Gateway

C. Close all GUI clients

D. Run cpconfig and set yourself up as a GUI clientExplanation:

Answer: Section: (none)

Explanation/Reference:

QUESTION 484What action CANNOT be run from SmartUpdate R75?

A. Reboot Gateway

B. Fetch sync status

C. Get all Gateway Data

D. Preinstall verifier"Pass Any Exam. Any Time." ­ www.actualtests.com 191Checkpoint 156­215.75 ExamExplanation:

Answer: Section: (none)

Explanation/Reference:

QUESTION 485What happens if the identity of a user is known?

A. If the user credentials do not match an Access Role, the gateway moves onto the next rule.

B. If the user credentials do not match an Access Role, the system displays the Captive Portal

C. If the user credentials do not match an Access Role, the traffic is automatically dropped

D. If the user credentials do not match an Access Role, the system displays a sandbox.Explanation:

Answer: Section: (none)

Explanation/Reference:

QUESTION 486My Awareness is implemented to manage access to protected resources based on a user's _____________.

Page 175: Checkpoint.Actualtests.156-215.75.v2012-04-08

A. Time of connection

B. Application requirement

C. Identity

D. Computer MAC addressExplanation:

Answer: Section: (none)

Explanation/Reference:

QUESTION 487You are the Security Administrator for MegaCorp and would like to view network activity using SmartReporter.You select a standard report as you can see here, you can select the London Gateway.

"Pass Any Exam. Any Time." ­ www.actualtests.com 192Checkpoint 156­215.75 Exam

When you attempt to configure the Express Report, you are unable to select Gateway.

Page 176: Checkpoint.Actualtests.156-215.75.v2012-04-08

What is the reason for this behavior? Give the BEST answer

A. You must enable the Eventia Express Mode on the London Gateway

B. You must enable Monitoring in the London Gateway object's General Properties

C. You have the license for Eventia Reporter in Standard mode only

D. You must enable the Express Mode inside Eventia Reporter.Explanation:"Pass Any Exam. Any Time." ­ www.actualtests.com 193Checkpoint 156­215.75 Exam

Answer: Section: (none)

Explanation/Reference:

QUESTION 488The identity is a lightweight endpoint agent that authenticates securely with Single Sign­On (SSO).What is not recommended usage of this method?

A. Leveraging identity for Data Center protection

B. Protecting highly sensitive identity is crucial

C. Identity based enforcement for non­AD users (non­windows and guest users) Explanation:

Answer: Section: (none)

Explanation/Reference:

Page 177: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 489Certificates for Security Gateways are created during a simple initialization from ___________.

A. The ICA management tool

B. SmartUpdate

C. Sysconfig

D. SmartDashboardExplanation:

Answer: Section: (none)

Explanation/Reference:

QUESTION 490What mechanism does a gateway configured with Identity Awareness and LDAP initially use to communicatewith a Windows 2003 or 2008 server?

A. RCP

B. LDAP

C. WMI

D. CIFSExplanation:

Answer: Section: (none)

Explanation/Reference:

QUESTION 491Which of the following are available SmartConsole clients which can be installed from the R75

"Pass Any Exam. Any Time." ­ www.actualtests.com 194Checkpoint 156­215.75 ExamWindows CD? Read all answer and select the most complete and valid list.

A. SmartView Tracker, CPINFO, SmartUpdate

B. SmartView Tracker, SmartDashboard, SmartLSM, SmartView Monitor

C. SmartView Tracker, SmartDashboard, CPINFO, SmartUpdate, SmartView Status

D. Security Policy Editor, Log viewer, Real Time Monitor GUI Explanation:

Answer: Section: (none)

Explanation/Reference:

Page 178: Checkpoint.Actualtests.156-215.75.v2012-04-08

QUESTION 492Which of the following items should be configured for the Security Management Server to authenticate usingLDAP?

A. Domain Admin password

B. Check Point Password

C. Windows logon password

D. WM1 objectExplanation:

Answer: Section: (none)

Explanation/Reference:

QUESTION 493The Captive Portal tool

A. Allows access to users already identified

B. Acquires identities from unidentified users

C. Is deployed from the Identity Awareness page in the Global Properties settings

D. Is only used for guest user authenticationExplanation:"Pass Any Exam. Any Time." ­ www.actualtests.com 195

Answer: Section: (none)

Explanation/Reference: