156-215.76試験無料問題集「CheckPoint Check Point Certified Security Administrator - GAiA 認定」

Which tool CANNOT be launched from SmartUpdate R76?

You have included the Cleanup Rule in your Rule Base. Where in the Rule Base should the Accept ICMP Requests implied rule have no effect?

What is a possible reason for the IKE failure shown in this screenshot?

Which port must be allowed to pass through enforcement points in order to allow packet logging to operate correctly?

How many packets does the IKE exchange use for Phase 1 Aggressive Mode?

By default, when you click File > Switch Active File in SmartView Tracker, the Security Management Server:

How do you use SmartView Monitor to compile traffic statistics for your company's Internet Web activity during production hours?

解説: (GoShiken メンバーにのみ表示されます)
You have just installed your Gateway and want to analyze the packet size distribution of your traffic with SmartView Monitor.
Unfortunately, you get the message.

"There are no machines that contain Firewall Blade and SmartView Monitor." What should you do to analyze the packet size distribution of your traffic?

Give the BEST answer.

When using SecurePlatform, it might be necessary to temporarily change the MAC address of the interface eth 0 to 00:0C:29:12:34:56. After restarting the network the old MAC address should be active. How do you configure this change?

Which of the following authentication methods can be configured in the Identity Awareness setup wizard?

Installing a policy usually has no impact on currently existing connections. Which statement is TRUE?

When configuring the Check Point Gateway network interfaces, you can define the direction as Internal or External.

What does the option Interface leads to DMZ mean?

A Security Policy has several database versions. What configuration remains the same no matter which version is used?

Where can an administrator specify the notification action to be taken by the firewall in the
event that available disk space drops below 15%?

Where do you verify that SmartDirectory is enabled?

Where is the fingerprint generated, based on the output display?

Your organization's disaster recovery plan needs an update to the backup and restore section to reap the new distributed R76 installation benefits. Your plan must meet the following required and desired objectives: Required ObjectivE. The Security Policy repository must be backed up no less frequently than every 24 hours.
Desired ObjectivE. The R76 components that enforce the Security Policies should be backed up at least once a week.
Desired ObjectivE. Back up R76 logs at least once a week.
Your disaster recovery plan is as follows:
-Use the cron utility to run the command upgrade_export each night on the Security Management Servers.
-
Configure the organization's routine back up software to back up the files created by the command upgrade_export.
-
Configure the GAiA back up utility to back up the Security Gateways every Saturday night.
-Use the cron utility to run the command upgrade_export each Saturday night on the log servers.
-
Configure an automatic, nightly logswitch.
-
Configure the organization's routine back up software to back up the switched logs every night.
Upon evaluation, your plan:

Your R76 primary Security Management Server is installed on GAiA. You plan to schedule the Security Management Server to run fw logswitch automatically every 48 hours. How do you create this schedule?

Which Check Point address translation method allows an administrator to use fewer ISP-assigned IP addresses than the number of internal hosts requiring Internet connectivity?

What mechanism does a gateway configured with Identity Awareness and LDAP initially use to communicate with a Windows 2003 or 2008 server?