★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 156-315.77 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/156-315.77-dumps.html


Virtual of 156-315.77 exam question materials and braindump for Check Point certification for IT professionals, Real Success Guaranteed with Updated 156-315.77 pdf dumps vce Materials. 100% PASS Check Point Security Expert R77 exam Today!

2021 Feb 156-315.77 vce

Q21. - (Topic 5) 

Which network port does PPTP use for communication? 

A. 1723/tcp 

B. 1723/udp 

C. 25/udp 

D. 25/tco 

Answer:


Q22. - (Topic 7) 

You have selected the event Port Scan from Internal Network in SmartEvent, to detect an event when 30 port scans have occurred within 60 seconds. You also want to detect two port scans from a host within 10 seconds of each other. How would you accomplish this? 

A. Select the two port-scan detections as a sub-event. 

B. Define the two port-scan detections as an exception. 

C. You cannot set SmartEvent to detect two port scans from a host within 10 seconds of each other. 

D. Select the two port-scan detections as a new event. 

Answer:


Q23. - (Topic 7) 

What is a task of theSmart EventServer? 

A. Assign a severity level to an event. 

B. Display the received events. 

C. Analyze each IPS log entry as it enters the Log server. 

D. Forward what is known as an event to theSmart EventServer. 

Answer:

664. - (Topic 7) 

What is Check Point's CoreXL? 

A. A way to synchronize connections across cluster members 

B. TCP-18190 

C. Multiple core interfaces on the device to accelerate traffic 

D. Multi Core support for Firewall Inspection 

Answer:

Explanation: 

QUESTIONNO: 668 Fill in the blank. What is the correct command and syntax used to view a connection table summary on a Check Point Firewall? 

Answer: fw tab -t connections–s 


Q24. - (Topic 2) 

While authorization for users managed bySmart Directoryis performed by the gateway, the authentication is mostly performed by the infrastructure in which of the following? 

A. ldapd 

B. cpauth 

C. cpShared 

D. ldapauth 

Answer:


Q25. - (Topic 7) 

In R76, My Organization e-mail addresses or domains are used for: 

A. Scanning e-mails only if its sender e-mail address is part of this definition, by default. 

B. Defining the e-mail address of the SMTP relay server. 

C. FTP traffic sent from a user where his e-mail is part of this definition scanned by DLP, by default. 

D. HTTP traffic sent from a user where his e-mail is part of this definition scanned by DLP, by default. 

Answer:


Refresh 156-315.77 exam engine:

Q26. - (Topic 2) 

If ClusterXL Load Sharing is enabled with state synchronization enabled, what will happen if one member goes down? 

A. The connections are dropped as Load Sharing does not support High Availability. 

B. The processing of all connections handled by the faulty machine is dropped, so all connections need to be re-established through the other machine(s). 

C. There is no state synchronization on Load Sharing, only on High Availability. 

D. The processing of all connections handled by the faulty machine is immediately taken over by the other member(s). 

Answer:


Q27. - (Topic 2) 

Match the Best Management High Availability synchronization-status descriptions for your Security Management Server (SMS): 

A. A - 3, B - 1, C - 2, D - 4 

B. A - 3, B - 1, C - 4, D - 2 

C. A - 4, B - 3, C - 1, D - 2 

D. A - 3, B - 2, C - 1, D - 4 

Answer:


Q28. - (Topic 2) 

A customer calls saying that a Load Sharing cluster shows drops with the error First packet is not SYN. Complete the following sentence. I will recommend: 

A. turning on SDF (Sticky Decision Function) 

B. turning off SDF (Sticky Decision Function) 

C. changing the load on each member 

D. configuring flush and ack 

Answer:


Q29. - (Topic 2) 

When distributing IPSec packets to gateways in a Load Sharing Multicast mode cluster, which valid Load Sharing method will consider VPN information? 

A. Load Sharing based on IP addresses, ports, and serial peripheral interfaces 

B. Load Sharing based on SPIs 

C. Load Sharing based on ports, VTI, and IP addresses 

D. Load Sharing based on IP addresses, ports, and security parameter indexes 

Answer:


Q30. - (Topic 1) 

Identity Agent is a lightweight endpoint agent that authenticates securely with Single Sign-On (SSO). Which of the following is NOT a recommended use for this method? 

A. When accuracy in detecting identity is crucial 

B. Identity based enforcement for non-AD users (non-Windows and guest users) 

C. Protecting highly sensitive servers 

D. Leveraging identity for Data Center protection 

Answer: