New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Note! Following 156-215.77 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

Verified By IT Certified Experts

CertsTopics.com Certified Safe Files

Up-To-Date Exam Study Material

99.5% High Success Pass Rate

100% Accurate Answers

Instant Downloads

Exam Questions And Answers PDF

Try Demo Before You Buy

Certification Exams with Helpful Questions And Answers

Check Point Certified Security Administrator Questions and Answers

Question 1

Which type of R77 Security Server does not provide User Authentication?

Options:

A.

SMTP Security Server

B.

HTTP Security Server

C.

FTP Security Server

D.

HTTPS Security Server

Buy Now
Question 2

Which statement below describes the most correct strategy for implementing a Rule Base?

Options:

A.

Limit grouping to rules regarding specific access.

B.

Place the most frequently used rules at the top of the Policy and the ones that are not frequently used further down.

C.

Place a network-traffic rule above the administrator access rule.

D.

Add the Stealth Rule before the last rule.

Question 3

You find a suspicious connection from a problematic host. You decide that you want to block everything from that whole network, not just the problematic host. You want to block this for an hour while you investigate further, but you do not want to add any rules to the Rule Base.

How do you achieve this?

Options:

A.

Use dbedit to script the addition of a rule directly into the Rule Bases_5_0.fws configuration file.

B.

Select Block intruder from the Tools menu in SmartView Tracker.

C.

Create a Suspicious Activity Rule in SmartView Monitor.

D.

Add a temporary rule using SmartDashboard and select hide rule.