You intend to upgrade a Check Point Gateway from R71 to R75. Prior to upgrading, you want to back up the Gateway should there be any problems with the upgrade. Which of the following allows for the Gateway configuration to be completely backed up into a manageable size in the least amount of time?
A. upgrade_export
B. snapshot
C. backup
D. database revision
When restoring R75 using the command upgrade_import, which of the following items is NOT restored?
A. Licenses
B. SIC Certificates
C. Global properties
D. Route tables
When using the Captive Portal to authenticate users for Identity Awareness, the Security Gateway sends unidentified users to a Web Portal for authentication. What is not a recommended usage of this method?
A. Leveraging identity in Internet application control
B. Basic identity enforcement in the internal network
C. Identity based enforcement for non-AD users (non-Windows and guest users)
D. For deployment of Identity Agents
Which of the following is NOT defined by an Access Role object?
A. Source Server
B. Source Machine
C. Source Network
D. Source User
Once an Access Role is configured, in which Rule Bases can it be implemented?
A. DLP
B. Mobile Access
C. IPS
D. Application Control
The Check Point Security Gateway's virtual machine (kernel) exists between which two OSI model layers?
A. Application and Presentation layers
B. Network and Datalink layers
C. Session and Network layers
D. Physical and Datalink layers
Once installed, the R75 kernel resides directly below which OSI model layer? NotE. Application is the top and Physical is the bottom of the IP stack.
A. Data Link
B. Transport
C. Session
D. Network
R75's INSPECT engine inserts itself into the kernel between which two OSI model layers?
A. Physical and Data
B. Session and Transport
C. Data and Network
D. Presentation and Application
The customer has a small Check Point installation which includes one Windows 7 workstation as the SmartConsole, one Solaris server working as Security Management Server, and a third server running SecurePlatform as Security Gateway. This is an example of a(n):
A. Unsupported configuration
B. Stand-Alone Installation
C. Hybrid Installation
D. Distributed Installation
The customer has a small Check Point installation which includes one Windows 2003 R2 server as SmartConsole and Security Management Server with a second server running SecurePlatform as Security Gateway. This is an example of a(n):
A. Stand-Alone Installation.
B. Distributed Installation.
C. Hybrid Installation.
D. Unsupported configuration.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CheckPoint exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 156-215.75 exam preparations and CheckPoint certification application, do not hesitate to visit our Vcedump.com to find your solutions here.