New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

156-215.77 Questions Bank

Page: 10 / 15
Total 388 questions

Check Point Certified Security Administrator Questions and Answers

Question 37

Which of the following actions take place in IKE Phase 2 with Perfect Forward Secrecy disabled?

Options:

A.

Symmetric IPsec keys are generated.

B.

Each Security Gateway generates a private Diffie-Hellman (DH) key from random pools.

C.

The DH public keys are exchanged.

D.

Peers authenticate using certificates or preshared secrets.

Question 38

How many packets does the IKE exchange use for Phase 1 Main Mode?

Options:

A.

12

B.

1

C.

3

D.

6

Question 39

Which of the following is a viable consideration when determining Rule Base order?

Options:

A.

Grouping IPS rules with dynamic drop rules

B.

Placing more restrictive rules before more permissive rules

C.

Grouping authentication rules with QOS rules

D.

Grouping reject and drop rules after the Cleanup Rule

Question 40

Certificates for Security Gateways are created during a simple initialization from _____________.

Options:

A.

sysconfig

B.

The ICA management tool

C.

SmartUpdate

D.

SmartDashboard

Page: 10 / 15
Total 388 questions