With the User Directory Software Blade, you can create R77 user definitions on a(n) _________ Server.
A. RSA ACE/Authentication Manager
B. Radius
C. NT Domain
D. LDAP
Fill in the blank. To remove site-to-site IKE and IPSEC keys you would enter command ____ ___ and select the option to delete all IKE and IPSec SA's.
A. vpn tu
B.
C.
D.
In a zero downtime scenario, which command do you run manually after all cluster members are upgraded?
A. cphaconf set_ccp multicast
B.
C.
D.
Which method of load balancing describes "Round Robin"?
A. Assigns service requests to servers at random.
B. Ensures that incoming requests are handled by the server with the fastest response time.
C. Measures the load on each server to determine which server has the most available resources.
D. Assigns service requests to the next server in a series.
When configuring an LDAP Group object, select option _______________ if you want the gateway to reference a specific group defined on the LDAP server for authentication purposes.
A. Group Agnostic
B. All Account-Unit's Users
C. Only Sub Tree
D. Only Group in Branch
To bind a NIC to a single processor when using CoreXL on GAiA, you would use the command
A. sim affinity
B.
C.
D.
Fill in the blank with a numeric value. The default port number for standard TCP connections with the LDAP server is
A. 389
B.
C.
D.
The User Directory Software Blade is used to integrate which of the following with a R77 Security Gateway?
A. User Authorityserver
B. RADIUS server
C. Account Management Client server
D. LDAP server
What is a requirement for setting up R77 Management High Availability?
A. All Security Management Servers must reside in the same LAN.
B. State synchronization must be enabled on the secondary Security Management Server.
C. All Security Management Servers must have the same operating system.
D. All Security Management Servers must have the same number of NICs.
An administrator has installed the latest HFA on the system for fixing traffic problems after creating a backup file. A large number of routes were added or modified, causing network problems. The Check Point configuration has not been changed. What would be the most efficient way to revert to a working configuration?
A. A back up cannot be restored, because the binary files are missing.
B. The restore is not possible because the backup file does not have the same build number (version).
C. Select Snapshot Management from the SecurePlatform boot menu.
D. Use the command restore and select the appropriate backup file.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CheckPoint exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 156-315.77 exam preparations and CheckPoint certification application, do not hesitate to visit our Vcedump.com to find your solutions here.