Proper study guides for Most up-to-date Check Point Check Point Certified Security Administrator certified begins with Check Point 156-215.75 preparation products which designed to deliver the Actual 156-215.75 questions by making you pass the 156-215.75 test at your first time. Try the free 156-215.75 demo right now.
2016 Jun 156-215.75 vce
Q211. NAT can be implemented on which of the following lists of objects?
A. Host, Network
B. Host, User
C. Domain, Network
D. Network, Dynamic Object
Q212. After filtering a fw monitor trace by port and IP, a packet is displayed three times; in the i, I, and o inspection points, but not in the O inspection point. Which is the likely source of the issue?
A. The packet has been sent out through a VPN tunnel unencrypted.
B. An IPSO ACL has blocked the outbound passage of the packet.
C. A SmartDefense module has blocked the packet
D. It is an issue with NAT
Q213. John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned a static IP address 10.0.0.19.
John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop with a static IP (10.0.0.19). He wants to move around the organization and continue to have access to the HR Web Server.
To make this scenario work, the IT administrator:
1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the policy.
2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.
What should John do when he cannot access the web server from a different personal computer?
A. John should lock and unlock his computer
B. John should install the Identity Awareness Agent
C. Investigate this as a network connectivity issue
D. The access should be changed to authenticate the user instead of the PC
Q214. Which feature or command provides the easiest path for Security Administrators to revert to earlier versions of the same Security Policy and objects configuration?
A. Policy Package management
C. Database Revision Control
Q215. When using LDAP as an authentication method for Identity Awareness, the query:
A. Prompts the user to enter credentials.
B. Requires administrators to specifically allow LDAP traffic to and from the LDAP Server and the Security Gateway.
C. Requires client and server side software.
D. Is transparent, requiring no client or server side software.
Down to date 156-215.75 real exam:
Q216. What is the purpose of a Stealth Rule?
A. To permit implied rules
B. To permit management traffic
C. To prevent users from connecting directly to the gateway
D. To drop all traffic to the management server that is not explicitly permitted
Q217. Which operating system is not supported by SecureClient?
A. MacOS X
B. Windows XP SP2
C. Windows Vista
D. IPSO 3.9
Q218. You are using SmartUpdate to fetch data and perform a remote upgrade to a R75 Security Gateway. Which of the following statements is FALSE?
A. A remote installation can be performed without the SVN Foundation package installed on a remote NG with Application Intelligence Security Gateway.
B. If SmartDashboard is open during package upload and upgrade, the upgrade will fail.
C. SmartUpdate can query the Security Management Server and Gateway for product information.
D. SmartUpdate can query license information running locally on the Gateway.
Q219. You wish to view the current state of the customer's VPN tunnels, including those that are down and destroyed. Which SmartConsole application will provide you with this information?
A. SmartView Monitor
B. SmartView Status
C. SmartView Tracker
Q220. The R75 fw monitor utility is used to troubleshoot which of the following problems?
A. Phase two key negotiation
B. User data base corruption
C. Log Consolidation Engine
D. Traffic issues
see more Check Point Certified Security Administrator