Day: July 13, 2016

CheckPoint 156-510 Exam Dumps, Provides Best CheckPoint 156-510 Certification Material On SaleCheckPoint 156-510 Exam Dumps, Provides Best CheckPoint 156-510 Certification Material On Sale

Flydumps CheckPoint 156-510 exam questions which contain almost 100% correct answers are tested and approved by senior Microsoft lecturers and experts.They have been devoting themselves to providing candidates with the best study materials to make sure what they get are valuable.Get a complete hold on CheckPoint 156-510 exam dumps on Flydumps, you will pass the exam absolutely.

QUESTION 63
Which three files can be generated by a Unix core dump?
A. vmunix.
B. vmcore.
C. unixdump
D. core

Correct Answer: ABD QUESTION 64
What is NOT true when using MEP encryption topologies?
A. Gateways must use the same FW-1 build level
B. Gateways must use the same management module
C. You must use a distributed installation of VPN-1/FW-1
D. Gateways must run identical policies

Correct Answer: D QUESTION 65
What is another name for an LDAP server?
A. Account server
B. DN Unit
C. User server
D. Account unit

Correct Answer: D QUESTION 66
Exhibit missing.
Please look at the exhibit, which is a sample output from a “fw ctl pstat” command. How many NAT
operations have there been in an outgoing direction?

A. 20760405
B. 340
C. 312
D. 523

Correct Answer: C QUESTION 67
Which file would you modify in order to enable and configure CPMAD?
A. $FWDIR/bin/cpmad_config.conf
B. $FWDIR/conf/cpmad.conf
C. $FWDIR/conf/cpmad_config.conf
D. $FWDIR//cpmad/config.conf

Correct Answer: C QUESTION 68
For most efficient rulebase operation, which of the following objects would it be preferable to use if you have many contiguous addresses to translate using static NAT? Assume you could validly use any of them.
A. Network
B. Workstation
C. Range

Correct Answer: A QUESTION 69
Where would it be best to locate a CVP server?
A. On an internal user lan network
B. On a firewalled gateway
C. On a separate isolated segment or DMZ
D. On a remote network

Correct Answer: C QUESTION 70
What is the result of not configuring CPMAD with enough memory?
A. Some attacks will not be detected
B. It will automatically grab more memory
C. It will automatically flush out old events to create more memory
D. It will exit

Correct Answer: D QUESTION 71
In a SEP HA environment not using load sharing, the external interfaces of each cluster member must have the same IP address. True or false?
A. False
B. True

Correct Answer: B QUESTION 72
Which command would you use to copy a user database file into VPN-1/FW-1?
A. dbimport <filename>
B. fwm dbimport -s “o=city,c=country”
C. fwm dbexport <filename>
D. fwm dbimport -f <filename>

Correct Answer: D QUESTION 73
When would you need to import the Checkpoint schema into an LDAP server?
A. If you use the severs management interface to update the LDAP database
B. Never, the LDAP standard caters for it
C. If you use Policy Editor to update the LDAP database
D. Always, when you use an LDAP server

Correct Answer: C QUESTION 74
Which is designated the primary management module?
A. It is selected by priority numbers (1 is the highest priority)
B. The last management module installed
C. The first management module installed
D. It is chosen at random

Correct Answer: C QUESTION 75
You do not need LDAP schema checking enabled if you want to use policy editor user manager to add a new LDAP user. True or false?
A. False
B. True

Correct Answer: A QUESTION 76
On a Windows NT FW-1 system, how would you increase the amount of memory allocated to the kernel to 5MBytes?
A. Set the value of HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Service\FW1\Parameters\Memory to 5000000
B. Type “# zap -s _fwhmem $FWDIR/modules/fwmod.o 5000000”
C. Type “set fw:fwhmem=5000000”
D. Type”# echo “fwhmem?W500000″ | adb -w /stand/vmnt”

Correct Answer: A QUESTION 77
A collection of gateways that are synchronized in a VPN topology are called a ___________?
A. MEP
B. Gateway group
C. Gateway cluster
D. Gateway pool

Correct Answer: C QUESTION 78
When using LDAP what may be a reason for a users password to be rejected?
A. The password does not contain a numeric character
B. The user is defined differently in the VPN-1/FW-1 user database
C. than in the LDAP server
D. The user is defined in both VPN-1/FW-1 and the LDAP server
E. The password is also used by someone else

Correct Answer: B QUESTION 79
Which API is used by applications to write to the VPN-1/FW-1 log database?
A. ELA
B. EAL
C. LEA
D. LAA

Correct Answer: A QUESTION 80
When are the statistics provided by the fw ctl pstat command reset?
A. After restarting FW-1
B. Whenever you purge the log file
C. On a reboot
D. On entering the command “fw ctl clear”

Correct Answer: AC QUESTION 81
You need to set the environment variable $FWDIR before running cpifno. True or false?
A. True
B. False

Correct Answer: A QUESTION 82
FW-1 does not support multi level proper subset encryption domains. True or false?
A. False
B. True

Correct Answer: A QUESTION 83
What is true about conflicting configuration parameters between a gateway cluster and a gateway defined as a member of that cluster?
A. Some gateway parameters override cluster parameters
B. Some cluster parameters override gateway parameters
C. The cluster configuration is overridden by the primary gateway parameters
D. All the gateway parameters remain intact

Correct Answer: B QUESTION 84
If you are troubleshooting a SMTP security server problem, which file could be useful?
A. smtp.dmp
B. smtpd.log
C. asmtpd.log
D. cvp.conf

Correct Answer: C QUESTION 85
Please look at the exhibit, which is a sample output from a “fw ctl pstat” command. There is a memory utilization problem here. True or false?
A. False
B. True

Correct Answer: A QUESTION 86
Which is NOT a group of files that can be synchronized in a HA management environment?
A. Configuration database files
B. Install files
C. Fetch files
D. log files

Correct Answer: D QUESTION 87
When SEP gateways are said to be synchronized, what exactly is synchronized between them?
A. Rulebase
B. User database
C. Objects database
D. State tables

Correct Answer: D QUESTION 88
On which module(s) does CPMAD run?
A. An external server
B. The management module
C. The Checkpoint GUI
D. The enforcement module

Correct Answer: B QUESTION 89
How many LDAP servers are supported by VPN-1/FW-1?
A. 1
B. 2, one primary and one backup
C. Unlimited
D. Up to 4

Correct Answer: C QUESTION 90
When debugging a Unix based management server you could use the fwd -d command. True or false?
A. False
B. True

Correct Answer: A
QUESTION 91
Asymmetric routing can be a problem in which type of encryption domain topology?
A. Partial overlapping
B. Fully overlapping domains in gateways using hide mode NAT for all connections
C. none overlapped backup domains with internal links between the two
D. Proper subset

Correct Answer: C
QUESTION 92
What is the function of the “fw hastat <target>” command?
A. It forces failover of high availability gateways
B. It starts HA on high availability capable gateways
C. It provides operational status of high availability gateways
D. It is an invalid command, you should use cphaprob instead

Correct Answer: C
QUESTION 93
When you are logged into the active management server and viewing the high availability management screen, what icon is displayed if there is a recommendation or error that FW-1 wishes to bring to your attention?
A. A lightbulb
B. A red question mark
C. A red hash
D. A green tick

Correct Answer: A
QUESTION 94
Which of the following platforms cannot support CPMAD?
A. Win2000
B. None of these
C. Nokia IP530
D. Solaris
E. Win NT
F. Linux
Correct Answer: B
QUESTION 95
How would you perform a manual synchronization in a HA management module environment?
A. On the primary login and click on the “synchronize me” button of the HA management manager window
B. Perform the “fw hamansync” command
C. On the secondary login and click on the “synchronize me” button of the HA management manager window
D. On the primary use Policy editor > Policy > Management high availability > click on the “synchronize”
button Correct Answer: CD QUESTION 96 When starting FW-1 debugging, you may want to send all the output to a buffer, what command(s) would you use to do this?
A. fw ctl buffer -debug
B. fw ctl buf fw ctl debug
C. fw ctl -b debug
D. fw ctl debug -buf

Correct Answer: D QUESTION 97
On a Windows NT platform, the specified state of the OS memory strategy can impact the performance of FW-1. What is the default state for this?
A. Maximize throughput for network applications
B. Maximize throughput for file sharing
C. Maximize throughput for video applications
D. Maximize throughput for disk access

Correct Answer: B QUESTION 98
In an LDAP database two entries cannot have the same common name (CN). True or false?
A. False
B. True

Correct Answer: A QUESTION 99
If you want to receive debug information for HTTP or FTP security servers when debugging the firewall daemon, you must use the “fw debug fwd on” command. True or false?
A. True
B. False

Correct Answer: B QUESTION 100
What are the three types of overlapping encryption domains?
A. Partial overlap
B. Proper subset
C. Partial subset
D. Full overlap

Correct Answer: ABD
This volume is part of the Exam Certification Guide Series from CheckPoint 156-510 exam. CheckPoint 156-510 exam in this series provide officially developed exam preparation materials that offer assessment, review, and practice to help CheckPoint 156-510 Certification candidates identify weaknesses,concentrate their study efforts,and enhance their confidence as CheckPoint 156-510 exam day nears.

CheckPoint 156-315 Study Guides, Discount CheckPoint 156-315 Exam Download For DownloadCheckPoint 156-315 Study Guides, Discount CheckPoint 156-315 Exam Download For Download

Flydumps Cisco Certification CheckPoint 156-315 exam questions which contain almost 100% correct answers are tested and approved by senior Cisco lecturers and experts. They have been devoting themselves to providing candidates with the best study materials to make sure what they get are valuable.

QUESTION 77
In NGX, what happens if a Distinguished Name (ON) is NOT found in LADP?
A. NGX takes the common-name value from the Certificate subject, and searches the LADP account unit for a matching user id
B. NGX searches the internal database for the username
C. If the first request fails or if branches do not match, NGX tries to map the identity to the user id attribute
D. When users authenticate with valid Certificates, the Security Gateway tries to map the identities with users registered in the extemal LADP user database
E. The Security Gateway uses the subject of the Certificate as the ON for the initial lookup
Correct Answer: C
QUESTION 78
Which command allows you to view the contents of an NGX table?
A. fw tab -s <tablename>-
B. fw tab -t <tablename>-
C. fw tab -u <tablename>-
D. fw tab -a <tablename>-
E. fw tab -x <tablename>-
Correct Answer: C
QUESTION 79
Jack’s project is to define the backup and restore section of his organization’s disaster recovery plan for his organization’s distributed NGX installation. Jack must meet the following required and desired objectives.
*
Required Objective The security policy repository must be backed up no less frequent~ than every 24 hours

*
Desired Objective The NGX components that enforce the Security Policies should be backed up no less frequently than once a week

*
Desired Objective Back up NGX logs no less frequently than once a week Jack’s disaster recovery plan is as follows. See exhibit.

Jack’s plan:
A. Meets the required objective but does not meet either desired objective
B. Does not meet the required objective
C. Meets the required objective and only one desired objective
D. Meets the required objective and both desired objectives
Correct Answer: D QUESTION 80
The following is cphaprobstate command output from a New Mode High Availability cluster member:

Which machine has the highest priority?
A. 192.168.1.2,since its number is 2
B. 192.168.1.1,because its number is 1
C. This output does not indicate which machine has the highest priority
D. 192.168.1.2, because its state is active

Correct Answer: B
QUESTION 81
What do you use to view an NGX Security Gateway’s status, including CPU use, amount of virtual memory, percent of free hard-disk space, and version?
A. SmartLSM
B. SmartViewTracker
C. SmartUpdate
D. SmartViewMonitor
E. SmartViewStatus

Correct Answer: D
QUESTION 82
Which of the following commands is used to restore NGX configuration information?
A. cpcontig
B. cpinfo-i
C. restore
D. fwm dbimport
E. upgrade_import

Correct Answer: E
QUESTION 83
Eric wants to see all URLs’ ful destination path in the SmartView Tracker logs, not just the fully qualified domain name of the web servers. For Example, the information field of a log entry displays the URL http://hp.msn.com/css/home/hpcl1012.css. How can Eric best customize SmartView Tracker to see the logs he wants? Configure the URl resource, and select
A. “transparent” asthe connection method
B. “tunneling”as the connection method
C. “optimize URL logging”; use the URI resource in the rule, with action “accept”
D. “Enforce URI capability”; use the URI resource in the rule,with action “accept”
Correct Answer: C
QUESTION 84
Which of the following commands shows full synchronizalion status?
A. cphaprob -i list
B. cphastop
C. fw ctl pstat
D. cphaprob -a if
E. fw hastat

Correct Answer: C
QUESTION 85
Which VPN Community object is used to configure VPN routing within the SmartDashboard?
A. Star
B. Mesh
C. Remote Access
D. Map

Correct Answer: A
QUESTION 86
If you are experiencing LDAP issues, which of the following should you check?
A. Secure lnternal Cornrnunicalions(SIC)
B. VPN tunneling
C. Overlapping VPN Domains
D. NGX connectivity
E. VPN Load Balancing

Correct Answer: E
QUESTION 87
How can you reset the password of the Security Administrator, which was created during initial installation of the SmartCenter Server on SecurePlattform?
A. Launch cpcontig and select “Administrators”
B. Launch SmartDashboard, click the admin user account, and overwrite the existing Check Point Password
C. Type cpm -a, and provide the existing administration account name. Reset the Security Administrator’s password
D. Export the user database into an ASCII file with fwm dbexport. Open this file with an editor, and delete the “Password” portion of the file Then log in to the account withthout password. You will be prompted to assign a new password
E. Launch cpconfig and delete the Administrator’s account. Recreate the account with the same name
Correct Answer: E
QUESTION 88
Which operating system is not supported byVPN-1 SecureClient?
A. IPS0 3.9
B. Windows XP SP2
C. Windows 2000 Professional
D. RedHat Linux 7 0
E. MacOS X
Correct Answer: A QUESTION 89
Which Check Point QoS feature issued to dynamically allocate relative portions of available bandwidth?
A. Guarantees
B. Differentiated Services
C. Limits
D. Weighted Fair Queueing
E. Low Latency Queueinq

Correct Answer: D
QUESTION 90
You are running a VPN-1 NG with Application Intelligence R54 SecurePlatform VPN-1 Pro Gateway. The Gateway also serves as a Policy Server. When you run patch add cd from the NGX CD, what does this command allow you to upgrade?
A. Only VPN-1 Pro Security Gateway
B. Both the operating system (OS) and all Check Point products
C. All products, except the Policy Server
D. On~ the patch utility is upgraded using this command
E. Only the OS

Correct Answer: B
QUESTION 91
Amanda is compiling traffic statistics for Certkiller.com’s Internet activity during production hours. How could she use SmartView Monitor to find this information? By
A. Using the “Traffic Counters” settings and SmartView Monitor to generate a graph showing the total HTTP traffic for the day
B. Monitoring each specific user’s Web traffic use.
C. Viewing total packets passed through the Security Gateway
D. Selecting the “Tunnels” view, and generating a report on the statistics
E. Configuring a Suspicious Activity Rule which triggers an alert when HTTP traffic passes through the Gateway

Correct Answer: A
QUESTION 92
ASecurity Administrator is notified that some long-lasting Telnet connections to a mainframe are dropped every time after an hour. The Administrator suspect that the the Security Gateway might be blocking these connections. As she reviews the Smart Tracker the Administrator sees the packet is dropped with the error “Unknown established connection”. How can she resolve this problem without causing other security issues? Choose the BEST answer. She can:
A. Increase the session time-out in the mainframe’s Object Properties
B. Create a new TCP service object on port 23, and increase the session time-out for this object She only uses this new object in the rule that allows the Telnet connections to the mainframe
C. Increase the session time-out in the Service Properties of the Telnet service
D. Increase the session time-out in the Global Properties
E. Ask the mainframe users to reconnect every time this error occurs
Correct Answer: B QUESTION 93
Certkiller is the Security Administrator for a software-development company. To isolate the corporate network from the developer’s network, Certkiller installs an internal Security Gateway. Jack wants to optimize the performance of this Gateway. Which of the following actions is most likely to improve the Gateway’s performance?
A. Remove unused Security Policies from Policy Packages
B. Clear all Global Properties check boxes, and use explicit rules
C. Use groups within groups in the manual NAT Rule Base
D. Put the least-used rules at the top of the Rule Base
E. Use domain objects in rules, where possible

Correct Answer: A
QUESTION 94
Certkiller is the Security Administrator for a chain of grocery stores. Each grocery store is protected by a Security Gateway. Certkiller is generating a report for the information-technology audit department. The report must include the name of the Security Policy installed on each remote Security Gateway, the date and time the Security Policy was installed, and general performance statistics (CPU Use, average CPU time, active real memory, etc.). Which SmartConsole application should Certkiller use to gather this information?
A. SmartUpdate
B. SmartView Status
C. SmartView Tracker
D. SmartLSM
E. SmartView Monitor

Correct Answer:
QUESTION 95
How can you reset Secure Internal Communications (SIC) between a SmartCenter Server and Security Gateway?
A. Run the command fwm sicreset to reinitialize the Internal Certificate Authority (ICA) of the SmartCenter Server. Then retype the activation key on the Security-Gateway from SmartDashboard
B. From cpconfig on the SmartCenter Server, choose the Secure Internal Communication option and retype the actrvation key Next, retype the same key in the gateway object in SmartDashboard and reinitialize Secure Internal Communications (SIC)
C. From the SmartCenter Server’s command line type fw putkey -p <shared key>- <IP Address of SmartCenter Server>-.
D. From the SmartCenter Server’s command line type fw putkey -p <shared key>- <IP Address of security Gateway>-.
E. Re-install the Security Gateway

Correct Answer: B
QUESTION 96
Which NGX feature or command allows Security Administrators to revert to earlier versions of the Security Policy without changing object configurations?
A. upgrade_export/upgrade_import
B. Policy Package management
C. fwm dbexport/fwm dbimport
D. cpconfig
E. Database Revision Control
Correct Answer: B QUESTION 97

CheckPoint 156-315 Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques.“Do I Know This Already?”quizzes open each chapter and allow you to decide how much time you need to spend on each section.CheckPoint 156-315 lists and Foundation Summary tables make referencing easy and give you a quick refresher whenever you need it.Challenging CheckPoint 156-315 review questions help you assess your knowledge and reinforce key concepts.CheckPoint 156-315 exercises help you think about exam objectives in real-world situations,thus increasing recall during exam time.

Checkpoint 156-215 PDF, Most Reliable Checkpoint 156-215 Testing Are Based On The Real ExamCheckpoint 156-215 PDF, Most Reliable Checkpoint 156-215 Testing Are Based On The Real Exam

Do not worry about your Checkpoint 156-215 exam, Flydumps now has published the new veriosn Checkpoint 156-215 exam exam dumps with more new added questions and answers,also you can free download Checkpoint 156-215 exam vce test software and pdf dumps on Flydumps.com.

QUESTION 50
Jordan’s company is streaming training videos provided by a third party on the Internet. Jordan configures VPN-1 NGX, so that each department ONLY views webcasts specific to its department. Jordan created and configured the multicast groups for all interfaces, and configures them to “Drop all multicast packets except those whose destination is in the list”. But no multicast transmissions are coming from the Internet. What is possible causes fro the connection problem?
A. Multicast groups are configured improperly on the external interface properties of the Security Gateway object.
B. Anti-spoofing is enabled. VPN-1 NGX cannot pass multicast traffic, if anti-spoofing is enabled.
C. Jordan did not create the necessary “to and through” rules, defining how VPN-1 NGX will handle the multicast traffic.
D. VPN-1 NGX does not support multicast routing protocols and streaming media through the Security Gateway.
E. The Multicast Rule is below the Stealth Rule. VPN-1 NGX can only pass multicast traffic, if the Multicast Rule is above the Stealth Rule.
Correct Answer: A
QUESTION 51
Your SmartCenter Server fails and does not reboot. One of your remote Security Gateways, managed by the SmartCenter Server, reboots. What happens to that remote Gateway after reboot?
A. Since the SmartCenter Server is not available, the remote Gateway cannot fetch the Security Policy. Therefore, all traffic is allowed through the Gateway.
B. Since the SmartCenter Server is not available, the remote Gateway uses the local Security Policy, but does not log traffic.
C. Since the SmartCenter Server is not available, the remote Gateway cannot fetch the Security Policy. Therefore, no traffic is allowed through the Gateway.
D. Since the SmartCenter Server is not available to the remote Gateway, fetching the Security Policy and logging will both fail.
E. The remote Gateway fetches the last installed Security Policy locally, and passes traffic normally. The Gateway will log locally, since the SmartCenter Server is not available.

Correct Answer: E
QUESTION 52
Which component functions as the Internal Certificate Authority for VPN-1 NGX?
A. SmartConsole
B. SmartCenter Server
C. Policy Server
D. SmartLSM
E. Security Gateway

Correct Answer: B
QUESTION 53
Robert has configured a CIFS resource to allow access to the public partition of his company’s file server,
on \\erisco\goldenapple\files\public. Robert receives reports that users are unable to access the share,
unless they use the file server’s IP address.
Which of the following is a possible cause?

A. the CIFS resource is not configured to use Windows name resolution
B. Mapped shares are not configured to log.
C. Null CIFS sessions are configured to be blocked
D. Remote registry access is configured to be blocked.
E. Access violations are not configured to log.

Correct Answer: A
QUESTION 54
Barak is a Security Administrator for an organization that has two sites using pre-shared secrets in its VPN. The two sites are Oslo and London. Barak has just been informed that a new office is opening in Madrid, and he must enable all three sites to connect via the VPN to each other. Three Security Gateways are managed by the same SmartCenter Server, behind the Oslo Security Gateway. Barak decides to switch from pre-shared secrets to Certificates issued by the Internal Certificate Authority (ICA). After creating the Madrid gateway object with the proper VPN Domain, what are Barak’s remaining steps?

A. 1, 2, 3, 4
B. 1, 2, 5
C. 1, 2, 3, 5
D. 1, 3, 4, 5
E. 1, 2, 3, 4, 5

Correct Answer: E
QUESTION 55
You want to establish a VPN, using Certificates. Your VPN will exchange Certificates with an external partner. Which of the following activities should you do first?
A. Exchange a shared secret, before importing Certificates.
B. Create a new logical-server object, to represent your partner’s CA.
C. Create a new server object, to represent your partner’s Certificate Authority (CA)
D. Manually import your partner’s Certificate Revocation List.
E. Manually import your partner’s Access Control list.

Correct Answer: C
QUESTION 56
There is a Web server behind your perimeter Security Gateway. You need to protect the server from network attackers, who creates scripts that force your Web server to send user credentials or identities to other Web servers. Which box do you check in the Web Intelligence tab in SmartDashboard?
A. Command Injection protection
B. SQL Injection protection
C. HTTP header format checking
D. HTTP protocol inspection protection
E. Cross Site Scripting protection

Correct Answer: E
QUESTION 57
How do you control the maximum mail messages in a spool directory?
A. In the SMTP resource object
B. In the smtp.conf file on the SmartCenter Server
C. In the gateway object’s SMTP settings in the Advanced window
D. In SmartDefense SMTP settings
E. In the Security Server window in Global Properties

Correct Answer: C
QUESTION 58
Quinton is the Security Administrator for a chain of retail stores. In a recent security newsletter, Quinton read about an attack where a client fools a server into sending large amount of data, using small packets. Quinton is concerned that this company’s servers might be vulnerable to this type of attack. Which smartDefense option should Quinton use to protect the servers?
A. Application Intelligence > DNS > Cache poisoning
B. Network Security > Successive events > DoS
C. Network Security > TCP > Small PMTU
D. Application Intelligence > Microsoft Networks > File and Print Sharing
E. Network Security > Denial of Service > LAND
Correct Answer: C QUESTION 59
In SmartView Tracker, which rule shows when a packet is dropped due to anti-spoofing?
A. Rule 999
B. Rule 0
C. Rule 1
D. Cleanup Rule
E. Stealth Rule

Correct Answer: B
QUESTION 60
Sonny is the Security Administrator for a company with a large call center. The management team in the center is concerned that employees may be installing and attempting to use peer-to-peer file-sharing utilities, during their lunch breaks. The call center’s network is protected by an internal Security Gateway, configured to drop peer-to-peer file-sharing traffic. The call-center management team wants to know if the Security Gateway protecting the call center drops more packets than other internal Security Gateways in the corporate network. Which application should Sonny use, determine the number of packets dropped by each Gateway?
A. SmartView Status
B. SmartView Monitor
C. SmartDashboad
D. SmartView Tracker
E. SmartUpdate

Correct Answer: B
QUESTION 61
Katie is the Security Administrator for an insurance company. Her manager gives Katie the following requirements for controlling DNS traffic:
*
Required Result #1: Accept domain name-over-TCP traffic (zone-transfer traffic).

*
Required Result #2: Log domain name-over-TCP traffic (zone-transfer traffic).

*
Desired Result #1: Accept domain name-over-UDP traffic (queries traffic)

*
Desired Result #2: Do not log domain name-over-UDP traffic (queries traffic)

*
Desired Result #3: Do not clutter the Rule Base, by creating explicit rules for traffic that can be controlled using Global Properties. Katie makes the following configuration changes, and installs the Security Policy:
1.
She selects the box “Accept Domain Name over TCP (Zone transfer)” in Global Properties.

2.
She selects the box “Accept Domain Name over UDP (Queries)” in Global Properties.

3.
She selects the box “Log Implied Rules” in Global Properties Does Katie’s solution meet the required and desired results?
A. The solution meets all required results, and none of the desired results.
B. The solution does not meet the required results.
C. The solution meets all required and desired results.
D. The solution meets the required results, and one of the desired results.
E. The solution meets the required results, and two of the desired results.

Correct Answer: E
QUESTION 62
David is a consultant for a software-deployment company. David is working at a customer’s site this week. David’s ask is to create a map of the customer’s VPN tunnels, including down and destroyed tunnels. Which SmartConsole application will provide David with the information needed to create this map?
A. SmartView Tracker
B. SmartLSM
C. SmartView Monitor
D. SmartView Status
E. SmartUpdate

Correct Answer: C
QUESTION 63
Gail is the Security Administrator for a marketing firm. Gail is working with the networking team, to troubleshoot user complaints regarding access to audio-streaming material from the Internet. The networking team asks Gail to check he configuration settings for the perimeter Security Gateway. Which SmartConsole application should Gail use to check the configuration settings?
A. SmartView Tracker
B. SmartView Monitor
C. SmartUpdate
D. SmartDashboard
E. SmartView Status

Correct Answer: D
QUESTION 64
One of your remote Security Gateways suddenly stops sending logs, and you cannot install the Security Policy on the Gateway. All other remote Security Gateways are logging normally to the SmartCenter Server, and Policy installation is not affected. When you click the Test SIC status button in the problematic gateway object, you receive an error message “unknown”. What is the problem?
A. The time on the SmartCenter Server’s clock has changed, which invalidates the remote Gateway’s Certificate.
B. The remote Gateway’s IP address has changed, which invalidates the SIC Certificate.
C. The Security Gateway is NG with Application Intelligence, and the SmartCenter Server is NGX.
D. The Internal Certificate Authority for the SmartCenter object has been removed from objects_5_0.c.
E. There is no connection between the SmartCenter Server and the remote Gateway. Rules or routing may block the connection.

Correct Answer: E
QUESTION 65
Frank wants to know why users on the corporate network cannot receive multicast transmissions from the Internet. A VPN-1 NGX Security Gateway protects the corporate network from the Internet. Which of the following is a possible cause for the connection problem?
A. VPN-1 NGX does not support multicast routing protocols and streaming media through the Security Gateway.
B. The Multicast Rule is below the Stealth Rule. VPN-1 NGX can only pass multicast traffic, it the Multicast Rule is above the Stealth Rule.
C. Multicast restrictions are configured improperly on the external interface properties of the Security Gateway object.
D. Anti-spoofing is enabled. VPN-1 NGX cannot pass multicast traffic, if anti-spoofing is enabled.
E. Frank did not install the necessary multicast license with SmartUpdate, when upgrading the VPN-1 NGX.

Correct Answer: C
QUESTION 66
You are concerned that a message may have been intercepted and retransmitted, thus compromising the security of the communications. You attach a code to the electronically transmitted message that uniquely identifies the sender. This code is known as a:
A. Digital signature
B. Tag
C. Private key
D. AES flag
E. Diffie-Helman verification

Correct Answer: A
QUESTION 67
A user attempts authentication using SecureClient. The user’s password is rejected, even though it is
correctly defined in the LDAP directory.
Which of the following is a valid cause?

A. The LDAP server has insufficient memory
B. The LDAP and Security Gateway databases are not synchronized.
C. The SmartCenter Server cannot communicate with the LDAP server.
D. The user has defined the wrong encryption scheme.
E. The user is defined in both the NGX user database and the LDAP directory

Correct Answer: B
QUESTION 68
Select the correct statement about Secure Internal Communications (SIC) Certificates? SIC Certificates:
A. for NGX Security Gateways are created during the SmartCenter Server installation.
B. For the SmartCenter Server are created during the SmartCenter Server installation.
C. Are used for securing internal network communications between the SmartView Tracker and an OPSEC device
D. Decrease network security by securing administrative communication among the SmartCenter Servers and the Security Gateway
E. Uniquely identify Check Point enabled machines; they have the same function as Authentication Certificates

Correct Answer: E
QUESTION 69
Exhibit: *** MISSING ***
Review the following rules and note the Client Authentication Action properties screen as displayed in the
exhibit,
After being authenticated by the Security Gateway, when a user starts an HPPT connection to a Web site,
the user tries to FTP antother site using the command line.
What happens to the user?
The…

A. FTP session is dropped by the implicit Cleanup Rule.
B. User is prompted from that FTP site only, and does not need to enter username and password for Client Authentication.
C. FTP connection is dropped by rule 2.
D. FTP data connection is dropped, after the user is authenticated successfully.
E. User is prompted for authentication bye the Security Gateway again.
Correct Answer:
QUESTION 70
Diffie-Hellman uses which type of key exchange?
A. Adaptive
B. Asymmetric
C. Symmetric
D. Static
E. Dynamic

Correct Answer: B
QUESTION 71
Certkiller’s main internal network 10.10.10.0/24 allows all traffic to the Internet using Hide NAT. Certkiller
also has a small network 10.10-.20.0/24 behind the internal router. Jack wants to configure the kernel to
translate the source address only when network 10.10.20.0 tries to access the Internet for HTTP, SMTP,
and FTP services.
Which of the following configurations will allow this network to access Internet?

A. Automatic Static NAT on network 10.10.20.0/24
B. Manual Hide NAT rules for HTTP, FTP, and SMTP services for network 10.10.20.0/24.
C. Manual Static NAT rules for network 10.10.20.0/24,
D. Automatic Hide NAT for network 10.10.20.0/24.
E. No change is necessarey.

Correct Answer: A
QUESTION 72
With SmartDashboard′s Smart Directory, you can create NGX user definitions on a(n) _____________ Server.
A. NT Domain
B. LDAP
C. Provider-1
D. SecureID
E. Radius

Correct Answer: B
QUESTION 73
Jens notices a large amount of traffic from a specific internal IP address. He needs to verify if it is a network attack, or a user’s system infected with a worm. He has enabled Sweep Scan Protection and Host port scan in SmartDefense. Will Jens get all the information he needs from these actions?
A. No. SmartDefense will only block the traffic, but it will not provide a detailed analysis of the traffic.
B. No. SmartDefense will not block the traffic. The logs and alert can provide a further level information, but determining whether the attack is intentional or a worm requires further research by Jens.
C. No. Jens also should set SmartDefense to quarantine the traffic from the suspicious IP address.
D. Yes. SmartDefense will limit the traffic impact from the scans, and identify if the pattern of the traffic matches any known worms.
E. No. To verify if this is a worm or an active attack, Jens should also enable TCP attack defenses.

Correct Answer: B
QUESTION 74
Which NGX feature or command provides the easiest path for Security Administrators to revert to earlier versions of the same Security Policy and objects configuration?
A. cpconfig
B. upgrade_export/upgrade_import
C. Database Revision Control
D. Dbexport/dbimport
E. Policy Package management

Correct Answer: C
QUESTION 75
How do you configure an NGX Security Gateway’s kernel memory settings, without manually modifying the configuration files in $FWDIR\lib? By configuring:
A. the settings on the Gateway object’s Capacity Optimization screen
B. the settings on the Global Properties Capacity Optimization screen
C. the Settings on the Gateway object’s Advanced screen
D. the settings on the SmartCenter Server object’s Advanced screen
E. SmartDefense Kernel Defender options

Correct Answer: A
QUESTION 76
Which of the following is NOT a feature or quality of a hash function?
A. Encrypted with the sender’s RSA private key, the hash function forms the digital signature.
B. It is mathematically infeasible to derive the original message from the message digest.
C. The hash function forms a two-way, secure communication.
D. The hash function is irreversible.
E. It is mathematically infeasible for two different messages to produce the same message digest.

Correct Answer: C
QUESTION 77
You are a Security Administrator configuring Static NAT on an internal host-node object. You clear the box “Translate destination on client side”, accessed from Global Properties > NAT settings > Automatic NAT. Assuming all other Global Properties NAT settings are selected, what else must be configured for automatic Static NAT to work?
A. The NAT IP address must be added to the anti-spoofing group of the external Gateway interface
B. Two address-translation rules in the Rule Base
C. No extra configuring needed
D. A proxy ARP entry, to ensure packets destined for the public IP address will reach the Security Gateway’s external interface
E. A static route, to ensure packets destined for the public NAT IP address will reach the Gateway’s internal interface
Correct Answer: E
QUESTION 78
Which encryption scheme provides “In-place” encryption?
A. IKE
B. Manual IPSec
C. DES
D. SKIP
E. AES
Correct Answer: C
QUESTION 79
After importing the NGX schema into an LDAP server, what should you enable?
A. Schema checking
B. Encryption
C. UserAuthority
D. ConnectControl
E. Secure Internal Communications

Correct Answer: A
QUESTION 80
Which ldif file must you modify to extend the schema of a Windows 2000 domain?
A. In NGX you do not need to modify any .ldif file
B. The appropriate .ldif file is located in the Security Gateway: $FWDIR/conf/ldif/Microsoft_ad_schema.ldif
C. The appropriate .ldif file is located in the SmartCenter Server: $FWDIR/lib/ldap/schema_microsoft_ad.ldif
D. The appropriate .ldif file is located in the Security Gateway: $FWDIR/lib/ldif/Microsoft_ad_schema.ldif
E. The appropriate .ldif file is located in the SmartCenter Server: $FWDIR/conf/ldif/Microsoft_ad_schema.ldif
Correct Answer: C
QUESTION 81
What is the reason for the Critical Problem notification in this SmartView Monitor example?

A. Active real memory shortage on the Gateway
B. No Security Policy installed on the Security Gateway
C. Version mismatch between the SmartCenter Server and Security Gateway
D. Time not synchronized between the SmartCenter Server and Security Gateway
E. No Secure Internal Communications established between the SmartCenter Server and Security
Gateway

Correct Answer: B
QUESTION 82
Your standby SmartCenter Server’s status is collision. What does that mean, and how do you synchronize the Server and its peer?
A. The standby and active Servers have two Internal Certificate Authority (ICA) Certificates. Uninstall and reinstall the standby Server.
B. The active Server detected a keep-alive packet from the standby Server.
C. The peer Server has not been properly synchronized. Manually synchronize both Servers again.
D. The peer Server is more up-to-date. Manually synchronize both Servers again.
E. The active SmartCenter Server and its peer have different Security Policies and databases. Manually synchronize the Servers, and decide which Server’s configuration to overwrite.

Correct Answer: E
QUESTION 83
Sarah is the Security Administrator for Certkiller . Sarah has configured SmartDefense to block the CWD and FIND commands. Sarah installs the Security Policy, but the Security Gateway continues to pass the commands. Which of the following could be the cause of the problem?
A. The Rule Base includes a rule accepting FTP to any source, from any destination.
B. The SmartDefense > Application Intelligence > FTP Security Server screen does not have the radio button set to “Configurations apply to all connections”.
C. The FTP Service Object > Advanced > Blocked FTP Commands list does not include CWD and FIND.
D. The Web Intelligence > Application Layer > FTP Settings list is configured to allow, rather than exlude, CW and FIND commands.
E. The Global Properties > Security Server > “Control FTP Commands” box is not checked.

Correct Answer: B
QUESTION 84
Your NGX enterprise SmartCenter Server is working normally. However, you must reinstall the SmartCenter Server, but keep the SmartCenter Server configuration (for example, all Security Policies, databases, etc.) How would you reinstall the Server and keep its configuration?
A. 1. Run the latest upgrade_export utility to export the configuration.
2.
Keep the exported file in the same location.

3.
Use SmartUpdate to reinstall the SmartCenter Server.

4.
Run upgrade_import to import the configuration.
B. 1. Run the latest upgrade_export utility to export the configuration.
2.
Leave the exported .tgz file in $FWDIR.

3.
Install the primary SmartCenter Server on top of the current installation.

4.
Run upgrade_import to import the configuration.
C. 1. Insert the NGX CD-ROM, and select the option to export the configuration into a .tgz file.
2.
Transfer the .tgz file to another networked machine.

3.
Uninstall all NGX packages, and reboot.

4.
Use the NGX CD-ROM to select the upgrade_import option to import the configuration.
D. 1. Download the latest upgrade_export utility, and run it from $FWDIR\bin to export the configuration into a .tgz file.
2.
Transfer the .tgz file to another networked machine.

3.
Uninstall all NGX packages, and reboot.

4.
Install a new primary SmartCenter Server.

5.
Run upgrade_import to import the configuration.
Correct Answer: D QUESTION 85
How can you reset Secure Internal Communications (SIC) between a SmartCenter and Security Gateway?
A. Run the command fwm sic_reset to reinitialize the Internal Certificate Authority (ICA) of the SmartCenter Server. Then retype the activation key on the Security Gateway from SmartDashboard.
B. From cpconfig on the SmartCenter Server, choose the Secure Internal Communication option and retype the activation key. Next, retype the same key in the gateway object in SmartDashboard and reinitialize Secure Internal Communications (SIC).
C. From the SmartCenter Server’s command line type fw putkey -p <IP Address of SmartCenter Server>.
D. From the SmartCenter Server’s command line type fw putkey -p <IP Address of Security Gateway>.
E. Reinstall the Security Gateway.

Correct Answer: B
QUESTION 86
You have locked yourself out of SmartDashoard with the rules you just installed on your stand alone Security Gateway. Now you cannot access the SmartCenter Server or any SmartConsole tools via SmartDashboard. How can you reconnect to SmartDashboard?
A. Run cpstop on the SmartCenter Server.
B. Run fw unlocklocal on the SmartCenter Server.
C. Run fw unloadlocal on the Security Gatewawy.
D. Delete the $fwdir/database/manage.lock file and run cprestart.
E. Run fw uninstall localhost on the Security Gateway.

Correct Answer: C
QUESTION 87
Ellen is performing penetration tests against SmartDefense for her Web server farm. She needs to verify that the Web servers are secure against traffic hijacks. She has activated the Cross-Site Scripting property. What other settings would be appropriate? Ellen:
A. should also enable the Web intelligence > SQL injection setting.
B. must select the “Products > Web Server” box on each of the node objects.
C. should enable all settings in Web Intelligence.
D. needs to configure TCP defenses such as “Small PMTU” size.
E. needs to create resource objects for the web farm servers and configure rules for the web farm.

Correct Answer: B
QUESTION 88
William is a Security Administrator who has added address translation for his internal Web server to be accessible by external clients. Due to poor network design by his predecessor, William sets up manual NAT rules for this server, while his FTP server and SMTP server are both using automatic NAT rules. All traffic from his FTP and SMTP servers are passing through the Security Gateway without a problem, but traffic from the Web server is dropped because of anti-spoofing settings. What is causing this?
A. “Allow bi-directional NAT” is not checked in Global Properties.
B. “Translate destination on client side” is not checked in Global Properties under “Manual NAT Rules”.
C. “Translate destination on client side” is not checked in Global Properties > Automatic NAT Rules.
D. Routing is not configured correctly.
E. Manual NAT rules are not configured correctly.

Correct Answer: B
QUESTION 89
You are a security consultant for a hospital. You are asked to create some type of authentication rule on the NGX Security Gateway, to allow doctors to update patients’ records via HTTP from various workstations. Which authentication method should you use?
A. Client Authentication
B. LDAP Authentication
C. SecureID Authentication
D. TACAS Authentication
E. User Authentication

Correct Answer: E

The Cisco contains more than 400 practice questions for the Checkpoint 156-215 exams,including simulation-based questions.Also contains hands-on exercises and a customized copy of the Checkpoint 156-215 exam network simulation software.