Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
 

Checkpoint 156-915.77 Exam Actual Questions

The questions for 156-915.77 were last updated on Nov. 13, 2024.
  • Viewing page 1 out of 85 pages.
  • Viewing questions 1-10 out of 846 questions

Topic 1 - Volume A

Question #1 Topic 1

Control connections between the Security Management Server and the Gateway are not encrypted by the VPN Community. How are these connections secured?

  • A. They are encrypted and authenticated using SIC.
  • B. They are not encrypted, but are authenticated by the Gateway
  • C. They are secured by PPTP
  • D. They are not secured.
Reveal Solution Hide Solution   Discussion   2

Correct Answer: D 🗳️

Question #2 Topic 1

If Bob wanted to create a Management High Availability configuration, what is the minimum number of Security Management servers required in order to achieve his goal?

  • A. Three
  • B. Two
  • C. Four
  • D. One
Reveal Solution Hide Solution   Discussion   2

Correct Answer: D 🗳️

Question #3 Topic 1

David wants to manage hundreds of gateways using a central management tool.
What tool would David use to accomplish his goal?

  • A. Smart Provisioning
  • B. Smart Blade
  • C. Smart Dashboard
  • D. Smart LSM
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️

Question #4 Topic 1

From the following output of cphaprob state, which Cluster XL mode is this?

  • A. New mode
  • B. Multicast mode
  • C. Legacy mode
  • D. Unicast mode
Reveal Solution Hide Solution   Discussion  

Correct Answer: D 🗳️

Question #5 Topic 1

Which of the following is NOT a feature of Cluster XL?

  • A. Enhanced throughput in all Cluster XL modes (2 gateway cluster compared with 1 gateway)
  • B. Transparent failover in case of device failures
  • C. Zero downtime for mission-critical environments with State Synchronization
  • D. Transparent upgrades
Reveal Solution Hide Solution   Discussion  

Correct Answer: C 🗳️

Question #6 Topic 1

In which case is a Sticky Decision Function relevant?

  • A. Load Sharing - Unicast
  • B. Load Balancing - Forward
  • C. High Availability
  • D. Load Sharing - Multicast
Reveal Solution Hide Solution   Discussion  

Correct Answer: C 🗳️

Question #7 Topic 1

You configure a Check Point QoS Rule Base with two rules: an HTTP rule with a weight of 40, and the Default Rule with a weight of 10. If the only traffic passing through your QoS Module is HTTP traffic, what percent of bandwidth will be allocated to the HTTP traffic?

  • A. 80%
  • B. 40%
  • C. 100%
  • D. 50%
Reveal Solution Hide Solution   Discussion  

Correct Answer: C 🗳️

Question #8 Topic 1

You have pushed a policy to your firewall and you are not able to access the firewall. What command will allow you to remove the current policy from the machine?

  • A. fw purge policy
  • B. fw fetch policy
  • C. fw purge active
  • D. fw unload local
Reveal Solution Hide Solution   Discussion  

Correct Answer: D 🗳️

Question #9 Topic 1

How do you verify the Check Point kernel running on a firewall?

  • A. fw ctl get kernel
  • B. fw ctl pstat
  • C. fw kernel
  • D. fw ver -k
Reveal Solution Hide Solution   Discussion  

Correct Answer: D 🗳️

Question #10 Topic 1

The process ________________ compiles $FWDIR/conf/*.W files into machine language.

  • A. fw gen
  • B. cpd
  • C. fwd
  • D. fwm
Reveal Solution Hide Solution   Discussion  

Correct Answer: A 🗳️

Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...