2013年7月23日星期二

CheckPoint certification 156-215 exam training methods

Never say you can not do it. This is my advice to everyone. Even if you think that you can not pass the demanding CheckPoint 156-215 exam. You can find a quick and convenient training tool to help you. IT-Tests.com's CheckPoint 156-215 exam training materials is a very good training materials. It can help you to pass the exam successfully. And its price is very reasonable, you will benefit from it. So do not say you can't. If you do not give up, the next second is hope. Quickly grab your hope, itis in the IT-Tests.com's CheckPoint 156-215 exam training materials.


The community has a lot of talent, people constantly improve their own knowledge to reach a higher level. But the country's demand for high-end IT staff is still expanding, internationally as well. So many people want to pass CheckPoint 156-215 certification exam. But it is not easy to pass the exam. However, in fact, as long as you choose a good training materials to pass the exam is not impossible. We IT-Tests.com CheckPoint 156-215 exam training materials in full possession of the ability to help you through the certification. IT-Tests.com website training materials are proved by many candidates, and has been far ahead in the international arena. . If you want to through CheckPoint 156-215 certification exam, add the IT-Tests.com CheckPoint 156-215 exam training to Shopping Cart quickly!


IT-Tests.com CheckPoint 156-215 exam study guide can be a lighthouse in your career. Because it contains all 156-215 exam information. Select IT-Tests.com, it can help you to pass the exam. This is absolutely a wise decision. IT-Tests.com is your helper, you can get double the result, only need to pay half the effort.


CheckPoint certification 156-215 exams has a pivotal position in the IT industry, and I believe that a lot of IT professionals agree with it. Passing CheckPoint certification 156-215 exam has much difficulty and needs to have perfect IT knowledge and experience. Because after all, CheckPoint certification 156-215 exam is an authoritative test to inspect examinees' IT professional knowledge. If you have got a CheckPoint 156-215 certification, your IT professional ability will be approved by a lot of IT company. IT-Tests.com also has a pivotal position in IT training industry. Many IT personnels who have passed CheckPoint certification 156-215 exam used IT-Tests's help to pass the exam. This explains why IT-Tests's pertinence training program is very effective. If you use the training material we provide, you can 100% pass the exam.


You can free download part of IT-Tests's practice questions and answers about CheckPoint certification 156-215 exam online. Once you decide to select IT-Tests, IT-Tests.com will make every effort to help you pass the exam. If you find that our exam practice questions and answers is very different form the actual exam questions and answers and can not help you pass the exam, we will immediately 100% full refund.


Exam Code: 156-215

Exam Name: CheckPoint (Check Point Security Administration NGX)

Choosing to participate in CheckPoint certification 156-215 exam is a wise choice, because if you have a CheckPoint 156-215 authentication certificate, your salary and job position will be improved quickly and then your living standard will provide at the same time. But passing CheckPoint certification 156-215 exam is not very easy, it need to spend a lot of time and energy to master relevant IT professional knowledge. IT-Tests.com is a professional IT training website to make the training scheme for CheckPoint certification 156-215 exam. At first you can free download part of exercises questions and answers about CheckPoint certification 156-215 exam on www.IT-Tests.com as a try, so that you can check the reliability of our product. Generally, if you have tried IT-Tests's products, you'll very confident of our products.


IT-Tests.com is a good website for CheckPoint certification 156-215 exams to provide short-term effective training. And IT-Tests.com can guarantee your CheckPoint certification 156-215 exam to be qualified. If you don't pass the exam, we will take a full refund to you. Before you choose to buy the IT-Tests.com products before, you can free download part of the exercises and answers about CheckPoint certification 156-215 exam as a try, then you will be more confident to choose IT-Tests's products to prepare your CheckPoint certification 156-215 exam.


156-215 (Check Point Security Administration NGX) Free Demo Download: http://www.it-tests.com/156-215.html


NO.1 . VPN-1 NGX uses ___________ to retrieve the Interface Name, IP Address, and Network Mask when
an administrator clicks the GET button in the Interfaces tab of an Externally Managed VPN Gateway
object.
A . ioctl
B . Control Connection
C . SNMP
D . URI
Answer : C

CheckPoint   156-215 pdf   156-215   156-215

NO.2 . You are working in a large hospital, together with three other Security Administrators. How do you
use SmartConsole to check changes to rules or object properties other administrators made?:
A . Eventia Monitor
B . Eventia Tracker
C . SmartView Tracker
D . SmartView Monitor
Answer : C

CheckPoint   156-215 pdf   156-215   156-215

NO.3 . What is an alternative configuration if proxy ARP cannot be used on your Security Gateway?
A . Create a Suspicious Activity Rule in SmartView Monitor.
B . Publish a proxy ARP entry on the ISP router instead of the firewall for the valid IP address.
C . Publish a proxy ARP entry on the internal web server instead of the firewall for the valid IP address.
D . Place a static route on the firewall from the valid IP address to the internal web server.
Answer : A

CheckPoint   156-215 pdf   156-215   156-215

NO.4 . There is a Web server behind your perimeter Security Gateway. You need to protect the server from
network attackers, who create scripts that force your Web server to send user credentials or identities to
other Web servers. Which box do you check in the SmartDashboard Web Intelligence tab?
A . Command Injection protection
B . SQL Injection protection
C . HTTP protocol inspection protection
D . Cross Site Scripting protection
Answer : D

CheckPoint   156-215 pdf   156-215   156-215

NO.5 . You create implicit and explicit rules for the following network. The group object "internal-networks"
includes networks 10.10.10.0 and 10.10.20.0. Assume "Accept ICMP requests" is enabled as before last
in the Global Properties.
A . dropped by rule 2, the Cleanup Rule.
B . dropped by the last implicit rule.
C . dropped by rule 0.
D . accepted by rule 1.
Answer : D

CheckPoint   156-215 pdf   156-215   156-215

NO.6 . When you find a suspicious connection from a problematic host, you want to block everything from
that whole network, not just the host. You want to block this for an hour, but you do not want to add any
rules to the Rule Base. How do you achieve this?
A . Create a "FW SAM" rule in SmartView Monitor.
B . Create a "FW SAM" rule in SmartView Tracker > Tools menu.
C . Select "block intruder" from the Tools menu in the SmartView Tracker.
D . Create a Suspicious Activity Rule in SmartView Monitor.
Answer : D

CheckPoint   156-215 pdf   156-215   156-215

NO.7 You are a security consultant for a hospital. You are asked to create some type of authentication rule on
the VPN-1 NGX Security Gateway, to allow doctors to update patients' records via HTTP from various
workstations. Which authentication method should you use?
A . User Authentication
B . SecureID Authentication
C . Client Authentication
D . LDAP Authentication
Answer : A

CheckPoint   156-215 pdf   156-215   156-215

NO.8 . Users are not prompted for authentication when they access their Web servers, even though you have
created an HTTP rule via User Authentication. Why?
A . Anna has forgotten to place the User Authentication Rule before the Stealth Rule.
B . Users must use SecuRemote Client, to use the User Authentication Rule.
C . Another rule that accepts HTTP without authentication exists in the Rule Base.
D . Anna checked the "cache password on desktop" option in Global Properties.
Answer : C

CheckPoint   156-215 pdf   156-215   156-215

NO.9 Which type of VPN-1 NGX Security Server does not provide User Authentication?
A . HTTP Security Server
B . SMTP Security Server
C . HTTPS Security Server
D . NNTP Security Server
Answer : B

CheckPoint   156-215 pdf   156-215   156-215

NO.10 . What do you use to view a VPN-1 NGX Security Gateway's status, including CPU use, amount of
virtual memory, percent of free hard-disk space, and version?
A . SmartUpdate
B . SmartView Monitor
C . SmartView Tracker
D . SmartView Status
Answer : B

CheckPoint   156-215 pdf   156-215   156-215

NO.11 . All VPN-1 NGX Security Servers can perform User authentication with the exception of one. Which of
the Security Servers cannot perform User authentication?
A . FTP
B . HTTP
C . SMTP
D . RLOGIN
Answer : C

CheckPoint   156-215 pdf   156-215   156-215

NO.12 . What do you configure to launch an application when certain traffic goes through certain rules?
A . SNMP trap alert script
B . User-defined alert script
C . Custom scripts cannot be executed through alert scripts.
D . Pop-up alert script
Answer : B

CheckPoint   156-215 pdf   156-215   156-215

NO.13 . Which VPN-1 NGX feature or command allows Security Administrators to revert to earlier versions of
the Security Policy without changing object configurations?
A . fwm dbexport/fwm dbimport
B . Database Revision Control
C . Policy Package management
D . upgrade_export/upgrade_import
Answer : C

CheckPoint   156-215 pdf   156-215   156-215

NO.14 . Assuming the appropriate SmartView Monitor settings have been selected in SmartDashboard, how
do you use SmartView Monitor to compile data for packet size distribution for your company's Internet
activity during production hours? By:
A . selecting the "Traffic" view in SmartView Monitor to generate graphs showing the packet sizes.
B . selecting the "Tunnels" view, and generating a report on the statistics
C . configuring a Suspicious Activity Rule which triggers an alert when large packets pass through the
Gateway
D . viewing total packets passed through the Security Gateway
Answer : A

CheckPoint   156-215 pdf   156-215   156-215

NO.15 . In SmartDashboard, you configure 45 MB as the required free hard-disk space to accommodate logs.
What can you do to keep old log files, when free space falls below 45 MB?
A . Do nothing. The SmartCenter Server archives old logs to another directory.
B . Use FTP to send the logs to another server.
C . Use the fwm logexport command to export the old log files to other location.
D . Define a secondary SmartCenter Server as a log server, to transfer the old logs.
Answer : B

CheckPoint   156-215 pdf   156-215   156-215

NO.16 . MegaCorp's security infrastructure separates Security Gateways geographically. You must request a
central license for one remote Security Gateway. You must request a central license:
A . using the remote Gateway's IP address. Attach the license to the remote Gateway via SmartUpdate.
B . using your SmartCenter Server's IP address. Attach the license to the remote Gateway via
SmartUpdate.
C . using the remote Gateway's IP address. Apply the license locally with the cplic put command.
D . for the Gateways' IP addresses. Apply the licenses on the SmartCenter Server with the cprlic put
command.
Answer : B

CheckPoint   156-215 pdf   156-215   156-215

NO.17 . You have blocked an IP address via the Block Intruder feature of SmartView Tracker. How can you
see the addresses you have blocked?
A . Run fw sam M ij all on the gateway.
B . Run fwm blocked_view.
C . In SmartView Status click the Blocked Intruder tab.
D . In SmartView Tracker, click the Active tab, and the actively blocked connections display.
Answer : A

CheckPoint   156-215 pdf   156-215   156-215

NO.18 . Larry is the Security Administrator for the CodeMore software-development company. To isolate the
corporate network from the developers' network, Larry installs an internal Security Gateway. Larry wants
to optimize the performance of this Gateway.
Which of the following actions is most likely to improve the Gateway's performance?
A . Remove unused Security Policies from Policy Packages.
B . Use domain objects in rules, where possible.
C . Clear all Global Properties check boxes, and use explicit rules.
D . Put the least-used rules at the top of the Rule Base.
Answer : A

CheckPoint   156-215 pdf   156-215   156-215

NO.19 . After implementing Static Address Translation to allow Internet traffic to an internal Web Server on
your DMZ, you notice that any NATed connections to that machine are being dropped in the due
anti-spoofing protections.
Which of the following is the most likely cause
A . The Global Properties setting "Translate destination on client side" is checked. The topology on the
DMZ interface is set to "Internal Network defined by IP and Mask". Uncheck the Global Properties setting
"Translate destination on client side".
B . The Global Properties setting "Translate destination on client side" is unchecked. The topology on the
DMZ interface is set to "Internal Network defined by IP and Mask". Check the Global Properties setting
"Translate destination on client side".
C . The Global Properties setting "Translate destination on client side" is unchecked. The topology on the
external interface is set to "Others +". Change topology to "External"
D . The Global Properties setting "Translate destination on client side" is checked. The topology on the
external interface is set to "External". Change topology to "Others +".
Answer : B

CheckPoint   156-215 pdf   156-215   156-215

NO.20 . Your online bookstore has customers connecting to a variety of Web servers to place or change
orders, and check order status.
You ran penetration tests through the Security Gateway, to determine if the Web servers were protected
from a recent series of cross-site scripting attacks.
The penetration testing indicated the Web servers were still vulnerable.
You have enabled every protection in the Web Intelligence branch, configured the protections to apply to
all HTTP traffic, and installed the Security Policy.
What else might you do to reduce the vulnerability?
A . Check the "Products > Web Server" box on the host node objects representing your Web servers.
B . The penetration software you are using is malfunctioning and is reporting a false-positive.
C . Configure a URI to strip Script tags from HTTP requests, and use it in a rule allowing HTTP traffic to
the web servers.
D . Configure the Security Gateway protecting the Web servers as a Web server.
Answer : C

CheckPoint   156-215 pdf   156-215   156-215

Now CheckPoint 156-215 is a hot certification exam in the IT industry, and a lot of IT professionals all want to get CheckPoint 156-215 certification. So CheckPoint certification 156-215 exam is also a very popular IT certification exam. CheckPoint 156-215 certificate is very helpful to your work in the IT industry, which can help promote your position and salary a lot and let your life have more security.


没有评论:

发表评论