Download Free VCE Files: CCNA, A+ Certification, MCSE – Cert4sure Checkpoint,CheckPoint Certification CheckPoint 156-215 Real Exam Questions And Answers, Most Popular CheckPoint 156-215 Dumps PDF Guaranteed Success

CheckPoint 156-215 Real Exam Questions And Answers, Most Popular CheckPoint 156-215 Dumps PDF Guaranteed Success

Welcome to download the newest Dumpsoon MB2-700 VCE dumps: http://www.dumpsoon.com/MB2-700.html

New VCE and PDF– You can prepare CheckPoint 156-215 exam in an easy way with Flydumps CheckPoint 156-215 questions and answers.By training our vce dumps with all CheckPoint 156-215 the latest questions,you can pass the exam in the first attempt.

QUESTION 106
What is the officially accepted diagnostic tool for IP appliance support?
A. Ipsinfo
B. Uag-diag
C. CST
D. cpinfo

Correct Answer: C
QUESTION 107
You are the Security Administrator for MegaCorp. A Check Point firewall is installed and in use on a SecurePlatform. You have trouble configuring the speed and duplex settings of your Ethernet interfaces. Which of the following commands can be used to configure the speed and duplex settings of an Ethernet interface and will survive a reboot? Give the BEST answer.
A. cthtool
B. ifconfig ?a
C. eth_set
D. mii_tool

Correct Answer: C
QUESTION 108
Which command enables IP forwarding on IPSO?
A. echo 1 > /proc/sys/net/ipv4/ip_forward
B. clish -c set routing active enable
C. echo 0 > /proc/sys/net/ipv4/ip_forward
D. ipsofwd on admin “Pass Any Exam. Any Time.” – www.actualtests.com 44 Checkpoint 156-215.75 Exam

Correct Answer: D
QUESTION 109
How many inspection capture points are shown in fw monitor?
A. 2
B. 1
C. Depends on the number of interfaces on the Gateway
D. 4

Correct Answer: D
QUESTION 110
Looking at an fw monitor capture in Wireshark, the initiating packet in Hide NAT translates on________.
A. I
B. O
C. o
D. i

Correct Answer: B
QUESTION 111
You want to create an ASCII formatted output file of the fw monitor command. What is the correct syntax to accomplish this task?
A. fw monitor -e “accept;” > /tmp/monitor.txt
B. fw monitor -e “accept;” -f > /tmp/monitor.txt
C. fw monitor -m iO -e “accept;” -o /tmp/monitor.txt
D. fw monitor -e “accept;” -w /tmp/monitor.txt “Pass Any Exam. Any Time.” – www.actualtests.com 45 Checkpoint 156-215.75 Exam
Correct Answer: A
QUESTION 112
When you run the fw monitor -e “accept;” command, what type of traffic is captured?
A. Only inbound traffic, before and after the inbound inspection.
B. All traffic coming in all directions, before and after inbound and outbound inspection.
C. All traffic accepted by the Rule Base.
D. Only outbound traffic, before and after the outbound inspection.

Correct Answer: B QUESTION 113
The button Get Address, found on the Host Node Object > General Properties page, will retrieve what?
A. The domain name
B. The fully qualified domain name
C. The Mac address
D. The IP address

Correct Answer: D QUESTION 114
You have just been hired as the Security Administrator for the Insure-It-All insurance company. Your
manager gives you the following requirements for controlling DNS traffic:
Required Result #1: Accept domain-name-over-TCP traffic (zone-transfer traffic)
Required Result #2: Log domain-name-over-TCP traffic (zone-transfer traffic)

Desired Result #1: Accept domain-name-over-UDP traffic (queries traffic)
“Pass Any Exam. Any Time.” – www.actualtests.com 46
Checkpoint 156-215.75 Exam
Desired Result #2: Do not log domain-name-over-UDP traffic (queries traffic)

Desired Result #3: Do not clutter the Rule Base try creating explicit rules for traffic that can be controlled
using Global Properties
To begin, you make the following configuration changes, and install the Security Policy


Select the box Accept Domain Name over TCP (Zone Transfer) in Global Properties


Select the box Accept Domain Name over UDP (Queries) in Global Properties


Select the box Log Implied Rules in Global Properties Do your initial actions meet the required and desired results?

A.
The actions achieve the required results, and two of the desired results.

B.
The actions achieve all required results, but none of the desired results.

C.
The actions do not achieve the required results.

D.
The actions meet all required and desired results.

Correct Answer: A QUESTION 115
When you change an implicit rule’s order from last to first in global properties, how do you make the change take effect?
A. Select save from the file menu
B. Reinstall the security policy
C. Select install database from the policy menu
D. Run fw fetch from the security gateway

Correct Answer: B QUESTION 116
You create implicit and explicit rules for the following network. The group object internal-networks includes networks 10.10.10.0 and 10.10.20.0. Assume Accept ICMP requests is enabled as Before last in Global Properties.
“Pass Any Exam. Any Time.” – www.actualtests.com 47 Checkpoint 156-215.75 Exam Based on these rules, what happens if you Ping from host 10.10.10.5 to a host on the Internet by IP address? ICMP will be:
A. dropped by rule 0.
B. dropped by rule 2, the Cleanup Rule.
C. accepted by rule 1.
D. dropped by the last Implicit rule.

Correct Answer: C QUESTION 117
How does the Get Address button, found on the Host Node Object > General Properties page retrieve the address?
A. Route Table
B. SNMP Get
C. Address resolution (ARP. RARP)
D. Name resolution (hosts file, DNS, cache)

Correct Answer: D QUESTION 118
Anti-Spoofing is typically set up on which object type?
A. Host
B. Domain
C. Network
D. Security Gateway

Correct Answer: D QUESTION 119
“Pass Any Exam. Any Time.” – www.actualtests.com 48 Checkpoint 156-215.75 Exam Spoofing is a method of:
A. Hiding your firewall from unauthorized users.
B. Disguising an illegal IP address behind an authorized IP address through port address Translation.
C. Making packets appear as if they come from an authorized IP address
D. Detecting people using false or wrong authentication logins.

Correct Answer: C QUESTION 120
Certificates for Security Gateways are created during a simple initialization from______.
A. SmartUpdate
B. sysconfig
C. The ICA management tool.
D. SmartDashboard Correct Answer: D
QUESTION 121
Which of the below is the MOST correct process to reset SIC from SmartDashboard?
A. Run cpconfig, and click Reset.
B. Click the Communication button for the firewall object, then click Reset. Run cpconfig and type a new activation key.
C. Click Communication > Reset on the Gateway object, and type a new activation key.
D. Run cpconfig, and select Secure Internal Communication > Change One Time Password.

Correct Answer: B
QUESTION 122
“Pass Any Exam. Any Time.” – www.actualtests.com 49 Checkpoint 156-215.75 Exam You installed Security Management Server on a computer using SecurePlatform in the MegaCorp home office. You use IP address 10.1.1.1. You also installed the Security Gateway on a second SecurePlatform computer, which you plan to ship to another Administrator at a MegaCorp hub office. What is the correct order for pushing SIC certificates to the Gateway before shipping it?
1) Run cpconfig on the gateway, set secure internal communication, enter the activation key and reconfirm.
2) Initialize internal certificate authority (ICA) on the security Management server.
3) Confirm the gateway object with the host name and IP address for the remote site.
4) Click the communication button in the gateway object’s general screen, enter the activation key, and click initialize and ok.
5) Install the security policy.
A. 2, 3, 4, 5, 1
B. 1, 3, 2, 4, 5
C. 2, 3, 4, 1, 5
D. 2, 1, 3, 4, 5

Correct Answer: B
QUESTION 123
Although SIC was already established and running, Joe reset SIC between the Security Management Server and a remote Gateway. He set a new activation key on the Gateway’s side with the cpconfig command and put in the same activation key in the Gateway’s object on the Security Management Server Unfortunately SIC cannot be established. What is a possible reason for the problem?
A. The installed policy blocks the communication.
B. Joe forgot to reboot the Gateway.
C. Joe forgot to exit from cpconfig.
D. The old Gateway object should have been deleted and recreated.

Correct Answer: C
QUESTION 124
“Pass Any Exam. Any Time.” – www.actualtests.com 50 Checkpoint 156-215.75 Exam You want to reset SIC between smberlin and sgosaka.
In SmartDashboard, you choose sgosaka, Communication, Reset. On sgosaka, you start cpconfig, choose Secure Internal Communication and enter the new SIC Activation Key. The screen reads The SIC was successfully initialized and jumps back to the cpconfig menu. When trying to establish a connection, instead of a working connection, you receive this error message: What is the reason for this behavior?
A. You must first initialize the Gateway object in SmartDashboard (i.e., right-click on the object, choose Basic Setup / Initialize).
B. The Gateway was not rebooted, which is necessary to change the SIC key.
C. The Check Point services on the Gateway were not restarted because you are still in the cpconfig utility.
D. The activation key contains letters that are on different keys on localized keyboards. Therefore, the activation can not be typed in a matching fashion.

Correct Answer: C QUESTION 125
Which rule should be the Cleanup Rule in the Rule Base?
A. Last. It serves a logging function before the implicit drop.
B. Last, it explicitly drops otherwise accepted traffic
C. Before last followed by the Stealth Rule.
D. First, it explicitly accepts otherwise dropped traffic.

Correct Answer: A QUESTION 126
What are the two basic rules which should be used by all Security Administrators?
A. Administrator Access and Stealth rules
B. Cleanup and Administrator Access rules
C. Network Traffic and Stealth rules “Pass Any Exam. Any Time.” – www.actualtests.com 51 Checkpoint 156-215.75 Exam
D. Cleanup and Stealth rules

Correct Answer: D QUESTION 127
Which item below in a Security Policy would be enforced first?
A. Administrator-defined Rule Base
B. Network Address Translation
C. IP spoofing/IP options
D. Security Policy “First” rule

Correct Answer: C QUESTION 128
When you hide a rule in a Rule Base, how can you then disable the rule?
A. Use the search utility in SmartDashboard to view all hidden rules Select the relevant rule and click Disable Rule(s).
B. Right-click on the hidden rule place-holder bar and select Disable Rule(s).
C. Right-click on the hidden rule place-holder bar and uncheck Hide, then right-click and select Disable Rule(s); re-hide the rule.
D. Hidden rules are already effectively disabled from Security Gateway enforcement.

Correct Answer: C QUESTION 129
A Stealth rule is used to: A. Use the Security Gateway to hide the border router from internal attacks.
B. Cloak the type of Web server in use behind the Security Gateway.
C. Prevent communication to the Security Gateway itself. “Pass Any Exam. Any Time.” – www.actualtests.com 52 Checkpoint 156-215.75 Exam
D. Prevent tracking of hosts behind the Security Gateway.

Correct Answer: C QUESTION 130
A Clean-up rule is used to:
A. Drop without logging connections that would otherwise be dropped and logged fry default
B. Log connections that would otherwise be accepted without logging by default.
C. Log connections that would otherwise be dropped without logging by default.
D. Drop without logging connections that would otherwise be accepted and logged by default

Correct Answer: C QUESTION 131
A ____________ rule is designed to log and drop all other communication that does not match another rule.
A. Stealth
B. Cleanup
C. Reject
D. Anti-Spoofing

Correct Answer: B QUESTION 132
Which statement is TRUE about implicit rules?
A. They are derived from Global Properties and explicit object properties.
B. The Gateway enforces implicit rules that enable outgoing packets only.
C. You create them in SmartDashboard.
D. Changes to the Security Gateway’s default settings do not affect implicit rules. “Pass Any Exam. Any Time.” – www.actualtests.com 53 Checkpoint 156-215.75 Exam

Correct Answer: A
QUESTION 133
You have included the Cleanup Rule in your Rule Base. Where in the Rule Base should the Accept ICMP Requests implied rule have no effect?
A. First
B. Before Last
C. Last
D. After Stealth Rule

Correct Answer: C QUESTION 134
All of the following are Security Gateway control connections defined by default implied rules, EXCEPT:
A. Acceptance of IKE and RDP traffic for communication and encryption purposes.
B. Exclusion of specific services for reporting purposes.
C. Communication with server types, such as RADIUS, CVP, UFP, TACACS, and LDAP.
D. Specific traffic that facilitates functionality, such as logging, management, and key exchange.

Correct Answer: B

Flydumps Free CheckPoint 156-215 exam dumps are audited by our certified subject matter experts and published authors for development. Passtcert CheckPoint 156-215 exam dumps are one of the highest quality CheckPoint 156-215 Q&As in the world.It covers nearly 96% real questions and answers, including the entire testing scope. Flydumps guarantees you pass CheckPoint 156-215 exam at first attempt.
Dumpsoon MB2-703 dumps with PDF + Premium VCE + VCE Simulator: http://www.dumpsoon.com/MB2-703.html