Top Up to the minute 156-315.77 torrent Reviews!
Testking offers free demo for 156-315.77 exam. "Check Point Security Expert R77", also known as 156-315.77 exam, is a Check Point Certification. This set of posts, Passing the Check Point 156-315.77 exam, will help you answer those questions. The 156-315.77 Questions & Answers covers all the knowledge points of the real exam. 100% real Check Point 156-315.77 exams and revised by experts!
Q431. - (Topic 5)
You must set up SIP with a proxy for your network. IP phones are in the 172.16.100.0 network. The Registrar and proxy are installed on host 172.16.100.100. To allow handover enforcement for outbound calls from SIP-net to network Net_B on the Internet, you have defined the following objects:
Network object: SIP-net: 172.16.100.0/24
VoIP Domain object: VolP_domain_A
1.Endpoint domain: SIP-net
2.VoIP gateway installed at: SIP-gateway host object
How would you configure the rule?
A. SIP- G ateway/N et_B/s i p_a ny/a c c e pt
D. VolP_domain_A/Net_B/sip_any, and sip/accept
Q432. - (Topic 1)
Check Point support has asked Tony for a firewall capture of accepted packets. What would be the correct syntax to create a capture file to a filename calledmonitor. out?
A. Run fw monitor -e "accept;" -f monitor.out
B. Run fw monitor -e "accept;" -c monitor.out
C. Run fw monitor -e "accept;" -o monitor.out
D. Run fw monitor -e "accept;" -m monitor.out
Q433. - (Topic 5)
Regarding QoS guarantees and limits, which of the following statements is FALSE?
A. If both a limit and a guarantee per rule are defined in a QoS rule, then the limit must be smaller than the guarantee.
B. If both a rule limit and a per connection limit are defined for a rule, the per connection limit must not be greater than the rule limit.
C. A rule guarantee must not be less than the sum the guarantees defined in its sub-rules.
D. If a guarantee is defined in a sub-rule, then a guarantee must be defined for the rule above it.
Q434. - (Topic 7)
When a packet is flowing through the security gateway, which one of the following is a valid inspection path?
A. Acceleration Path
B. Small Path
C. Firewall Path
D. Medium Path
Q435. - (Topic 2)
While authorization for users managed bySmart Directoryis performed by the gateway, the authentication is mostly performed by the infrastructure in which of the following?
Q436. - (Topic 5)
The following rule contains an FTP resource object in the Service field:
Service: FTP-resource object
How do you define the FTP Resource Properties > Match tab to prevent internal users from receiving corporate files from external FTP servers, while allowing users to send files?
A. Enable "Put" and "Get" methods.
B. Disable the "Put" method globally.
C. Enable the "Put" method only on the Match tab.
D. Enable the "Get" method on the Match tab.
E. Disable "Get" and "Put" methods on the Match tab.
Q437. - (Topic 7)
Using IPS, how do you notify the Security Administrator that malware is scanning specific ports? By enabling:
A. Malware Scan protection
B. Sweep Scan protection
C. Host Port Scan
D. Malicious Code Protector
Q438. - (Topic 3)
There are times when you want to use Link Selection to manage high-traffic VPN connections. With Link Selection you can:
A. Probe links for availability.
B. Use links based on Day/Time.
C. Assign links to specific VPN communities.
D. Use links based on authentication method.