Download Checkpoint.156-315.77.Train4Sure.2018-12-21.445q.vcex

Download Exam

File Info

Exam Check Point Certified Security Expert
Number 156-315.77
File Name Checkpoint.156-315.77.Train4Sure.2018-12-21.445q.vcex
Size 5 MB
Posted Dec 21, 2018
Download Checkpoint.156-315.77.Train4Sure.2018-12-21.445q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

A connection is said to be Sticky when:


  1. A copy of each packet in the connection sticks in the connection table until a corresponding reply packet is received from the other side.
  2. A connection is not terminated by either side by FIN or RST packet.
  3. All the connection packets are handled, in either direction, by a single cluster member.
  4. The connection information sticks in the connection table even after the connection has ended.
Correct answer: C



Question 2

How does a cluster member take over the VIP after a failover event?


  1. Gratuitous ARP
  2. Broadcast storm
  3. arp -s
  4. Ping the sync interface
Correct answer: A



Question 3

Check Point Clustering protocol, works on:


  1. UDP 18184
  2. TCP 8116
  3. UDP 8116
  4. TCP 18184
Correct answer: C



Question 4

A customer called to report one cluster member’s status as Down. What command should you use to identify the possible cause?


  1. tcpdump/snoop
  2. cphaprob list
  3. fw ctl pstat
  4. fw ctl debug -m cluster + forward
Correct answer: B



Question 5

A customer calls saying that a Load Sharing cluster shows drops with the error First packet is not SYN. Complete the following sentence. You will recommend:


  1. turning off SDF (Sticky Decision Function).
  2. switch to Multicast Mode.
  3. turning on SDF (Sticky Decision Function).
  4. configuring flush and ack.
Correct answer: C



Question 6

In ClusterXL, _____ is defined by default as a critical device.


  1. fwm
  2. assld
  3. cpp
  4. fwd
Correct answer: D



Question 7

When synchronizing clusters, which of the following statements is NOT true?


  1. Client Authentication or Session Authentication connections through a cluster member will be lost if the cluster member fails.
  2. In the case of a failover, accounting information on the failed member may be lost despite properly working synchronization.
  3. Only cluster members running on the same OS platform can be synchronized.
  4. The state of connections using resources is maintained by a Security Server, so these connections cannot be synchronized.
Correct answer: A



Question 8

When synchronizing clusters, which of the following statements is NOT true? 


  1. In the case of a failover, accounting information on the failed member may be lost despite a properly working synchronization.
  2. An SMTP resource connection using CVP will be maintained by the cluster.
  3. User Authentication connections will be lost by the cluster.
  4. Only cluster members running on the same OS platform can be synchronized.
Correct answer: B



Question 9

When a failed cluster member recovers, which of the following actions is NOT taken by the recovering member?


  1. It will not check for any updated policy and load the last installed policy with a warning message indicating that the Security Policy needs to be installed from the Security Management Server.
  2. It will try to take the policy from one of the other cluster members.
  3. It compares its local policy to the one on the Security Management Server.
  4. If the Security Management Server has a newer policy, it will be retrieved, else the local policy will be loaded.
Correct answer: A



Question 10

Organizations are sometimes faced with the need to locate cluster members in different geographic locations that are distant from each other. A typical example is replicated data centers whose location is widely separated for disaster recovery purposes.  What are the restrictions of this solution? 


  1. There are two restrictions: 
    1. The synchronization network must guarantee no more than 100ms latency and no more than 5% packet loss. 
    2.   The synchronization network may only include switches and hubs.
  2. There is one restriction: The synchronization network must guarantee no more than 150 ms latency (ITU Standard G.114).
  3. There is one restriction: The synchronization network must guarantee no more than 100 ms latency.
  4. There are no restrictions.
Correct answer: A



Question 11

A connection is said to be Sticky when:


  1. A copy of each packet in the connection sticks in the connection table until a corresponding reply packet is received from the other side.
  2. A connection is not terminated by either side by FIN or RST packet.
  3. All the connection packets are handled, in either direction, by a single cluster member.
  4. The connection information sticks in the connection table even after the connection has ended.
Correct answer: C



Question 12

How does a cluster member take over the VIP after a failover event?


  1. Gratuitous ARP
  2. Broadcast storm
  3. arp -s
  4. Ping the sync interface
Correct answer: A



Question 13

Check Point Clustering protocol, works on:


  1. UDP 18184
  2. TCP 8116
  3. UDP 8116
  4. TCP 18184
Correct answer: C



Question 14

A customer called to report one cluster member’s status as Down. What command should you use to identify the possible cause?


  1. tcpdump/snoop
  2. cphaprob list
  3. fw ctl pstat
  4. fw ctl debug -m cluster + forward
Correct answer: B



Question 15

A customer calls saying that a Load Sharing cluster shows drops with the error First packet is not SYN. Complete the following sentence. You will recommend:


  1. turning off SDF (Sticky Decision Function).
  2. switch to Multicast Mode.
  3. turning on SDF (Sticky Decision Function).
  4. configuring flush and ack.
Correct answer: C



Question 16

In ClusterXL, _____ is defined by default as a critical device.


  1. fwm
  2. assld
  3. cpp
  4. fwd
Correct answer: D



Question 17

When synchronizing clusters, which of the following statements is NOT true?


  1. Client Authentication or Session Authentication connections through a cluster member will be lost if the cluster member fails.
  2. In the case of a failover, accounting information on the failed member may be lost despite properly working synchronization.
  3. Only cluster members running on the same OS platform can be synchronized.
  4. The state of connections using resources is maintained by a Security Server, so these connections cannot be synchronized.
Correct answer: A



Question 18

When synchronizing clusters, which of the following statements is NOT true? 


  1. In the case of a failover, accounting information on the failed member may be lost despite a properly working synchronization.
  2. An SMTP resource connection using CVP will be maintained by the cluster.
  3. User Authentication connections will be lost by the cluster.
  4. Only cluster members running on the same OS platform can be synchronized.
Correct answer: B



Question 19

When a failed cluster member recovers, which of the following actions is NOT taken by the recovering member?


  1. It will not check for any updated policy and load the last installed policy with a warning message indicating that the Security Policy needs to be installed from the Security Management Server.
  2. It will try to take the policy from one of the other cluster members.
  3. It compares its local policy to the one on the Security Management Server.
  4. If the Security Management Server has a newer policy, it will be retrieved, else the local policy will be loaded.
Correct answer: A



Question 20

Organizations are sometimes faced with the need to locate cluster members in different geographic locations that are distant from each other. A typical example is replicated data centers whose location is widely separated for disaster recovery purposes.  What are the restrictions of this solution? 


  1. There are two restrictions: 
    1. The synchronization network must guarantee no more than 100ms latency and no more than 5% packet loss. 
    2.   The synchronization network may only include switches and hubs.
  2. There is one restriction: The synchronization network must guarantee no more than 150 ms latency (ITU Standard G.114).
  3. There is one restriction: The synchronization network must guarantee no more than 100 ms latency.
  4. There are no restrictions.
Correct answer: A



Question 21

A connection is said to be Sticky when:


  1. A copy of each packet in the connection sticks in the connection table until a corresponding reply packet is received from the other side.
  2. A connection is not terminated by either side by FIN or RST packet.
  3. All the connection packets are handled, in either direction, by a single cluster member.
  4. The connection information sticks in the connection table even after the connection has ended.
Correct answer: C



Question 22

How does a cluster member take over the VIP after a failover event?


  1. Gratuitous ARP
  2. Broadcast storm
  3. arp -s
  4. Ping the sync interface
Correct answer: A



Question 23

Check Point Clustering protocol, works on:


  1. UDP 18184
  2. TCP 8116
  3. UDP 8116
  4. TCP 18184
Correct answer: C



Question 24

A customer called to report one cluster member’s status as Down. What command should you use to identify the possible cause?


  1. tcpdump/snoop
  2. cphaprob list
  3. fw ctl pstat
  4. fw ctl debug -m cluster + forward
Correct answer: B



Question 25

A customer calls saying that a Load Sharing cluster shows drops with the error First packet is not SYN. Complete the following sentence. You will recommend:


  1. turning off SDF (Sticky Decision Function).
  2. switch to Multicast Mode.
  3. turning on SDF (Sticky Decision Function).
  4. configuring flush and ack.
Correct answer: C



Question 26

In ClusterXL, _____ is defined by default as a critical device.


  1. fwm
  2. assld
  3. cpp
  4. fwd
Correct answer: D



Question 27

When synchronizing clusters, which of the following statements is NOT true?


  1. Client Authentication or Session Authentication connections through a cluster member will be lost if the cluster member fails.
  2. In the case of a failover, accounting information on the failed member may be lost despite properly working synchronization.
  3. Only cluster members running on the same OS platform can be synchronized.
  4. The state of connections using resources is maintained by a Security Server, so these connections cannot be synchronized.
Correct answer: A



Question 28

When synchronizing clusters, which of the following statements is NOT true? 


  1. In the case of a failover, accounting information on the failed member may be lost despite a properly working synchronization.
  2. An SMTP resource connection using CVP will be maintained by the cluster.
  3. User Authentication connections will be lost by the cluster.
  4. Only cluster members running on the same OS platform can be synchronized.
Correct answer: B



Question 29

When a failed cluster member recovers, which of the following actions is NOT taken by the recovering member?


  1. It will not check for any updated policy and load the last installed policy with a warning message indicating that the Security Policy needs to be installed from the Security Management Server.
  2. It will try to take the policy from one of the other cluster members.
  3. It compares its local policy to the one on the Security Management Server.
  4. If the Security Management Server has a newer policy, it will be retrieved, else the local policy will be loaded.
Correct answer: A



Question 30

Organizations are sometimes faced with the need to locate cluster members in different geographic locations that are distant from each other. A typical example is replicated data centers whose location is widely separated for disaster recovery purposes.  What are the restrictions of this solution? 


  1. There are two restrictions: 
    1. The synchronization network must guarantee no more than 100ms latency and no more than 5% packet loss. 
    2.   The synchronization network may only include switches and hubs.
  2. There is one restriction: The synchronization network must guarantee no more than 150 ms latency (ITU Standard G.114).
  3. There is one restriction: The synchronization network must guarantee no more than 100 ms latency.
  4. There are no restrictions.
Correct answer: A









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files