Checkpoint 156-215.77 - Check Point Certified Security Administrator Exam

Page:    1 / 72   
Total 358 questions

Secure Internal Communications (SIC) is completely NAT-tolerant because it is based on:

  • A. IP addresses.
  • B. SIC is not NAT-tolerant.
  • C. SIC names.
  • D. MAC addresses.


Answer : C

You have three servers located in a DMZ, using private IP addresses. You want internal users from 10.10.10.x to access the DMZ servers by public IP addresses. Internal_net
10.10.10.x is configured for Hide NAT behind the Security Gateways external interface.


What is the best configuration for 10.10.10.x users to access the DMZ servers, using the
DMZ servers public IP addresses?

  • A. When connecting to internal network 10.10.10.x, configure Hide NAT for the DMZ network behind the Security Gateway DMZ interface.
  • B. When the source is the internal network 10.10.10.x, configure manual static NAT rules to translate the DMZ servers.
  • C. When connecting to the Internet, configure manual Static NAT rules to translate the DMZ servers.
  • D. When trying to access DMZ servers, configure Hide NAT for 10.10.10.x behind the DMZs interface.


Answer : B

Which of the following commands can provide the most complete restoration of a R77 configuration?

  • A. upgrade_import
  • B. cpinfo -recover
  • C. cpconfig
  • D. fwm dbimport -p <export file>


Answer : A

Where can you find the Check Point’s SNMP MIB file?

  • A. $CPDIR/lib/snmp/chkpt.mib
  • B. $FWDIR/conf/snmp.mib
  • C. It is obtained only by request from the TAC.
  • D. There is no specific MIB file for Check Point products.


Answer : A

You believe Phase 2 negotiations are failing while you are attempting to configure a site-to- site VPN with one of your firms business partners. Which SmartConsole application should you use to confirm your suspicions?

  • A. SmartDashboard
  • B. SmartUpdate
  • C. SmartView Status
  • D. SmartView Tracker


Answer : D

Page:    1 / 72   
Total 358 questions