Download Check Point Certified Security Expert.156-315.77.Train4Sure.2018-12-21.445q.vcex

Vendor: Checkpoint
Exam Code: 156-315.77
Exam Name: Check Point Certified Security Expert
Date: Dec 21, 2018
File Size: 5 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
A connection is said to be Sticky when:
  1. A copy of each packet in the connection sticks in the connection table until a corresponding reply packet is received from the other side.
  2. A connection is not terminated by either side by FIN or RST packet.
  3. All the connection packets are handled, in either direction, by a single cluster member.
  4. The connection information sticks in the connection table even after the connection has ended.
Correct answer: C
Question 2
How does a cluster member take over the VIP after a failover event?
  1. Gratuitous ARP
  2. Broadcast storm
  3. arp -s
  4. Ping the sync interface
Correct answer: A
Question 3
Check Point Clustering protocol, works on:
  1. UDP 18184
  2. TCP 8116
  3. UDP 8116
  4. TCP 18184
Correct answer: C
Question 4
A customer called to report one cluster member’s status as Down. What command should you use to identify the possible cause?
  1. tcpdump/snoop
  2. cphaprob list
  3. fw ctl pstat
  4. fw ctl debug -m cluster + forward
Correct answer: B
Question 5
A customer calls saying that a Load Sharing cluster shows drops with the error First packet is not SYN. Complete the following sentence. You will recommend:
  1. turning off SDF (Sticky Decision Function).
  2. switch to Multicast Mode.
  3. turning on SDF (Sticky Decision Function).
  4. configuring flush and ack.
Correct answer: C
Question 6
In ClusterXL, _____ is defined by default as a critical device.
  1. fwm
  2. assld
  3. cpp
  4. fwd
Correct answer: D
Question 7
When synchronizing clusters, which of the following statements is NOT true?
  1. Client Authentication or Session Authentication connections through a cluster member will be lost if the cluster member fails.
  2. In the case of a failover, accounting information on the failed member may be lost despite properly working synchronization.
  3. Only cluster members running on the same OS platform can be synchronized.
  4. The state of connections using resources is maintained by a Security Server, so these connections cannot be synchronized.
Correct answer: A
Question 8
When synchronizing clusters, which of the following statements is NOT true? 
  1. In the case of a failover, accounting information on the failed member may be lost despite a properly working synchronization.
  2. An SMTP resource connection using CVP will be maintained by the cluster.
  3. User Authentication connections will be lost by the cluster.
  4. Only cluster members running on the same OS platform can be synchronized.
Correct answer: B
Question 9
When a failed cluster member recovers, which of the following actions is NOT taken by the recovering member?
  1. It will not check for any updated policy and load the last installed policy with a warning message indicating that the Security Policy needs to be installed from the Security Management Server.
  2. It will try to take the policy from one of the other cluster members.
  3. It compares its local policy to the one on the Security Management Server.
  4. If the Security Management Server has a newer policy, it will be retrieved, else the local policy will be loaded.
Correct answer: A
Question 10
Organizations are sometimes faced with the need to locate cluster members in different geographic locations that are distant from each other. A typical example is replicated data centers whose location is widely separated for disaster recovery purposes.  What are the restrictions of this solution? 
  1. There are two restrictions: 
    1. The synchronization network must guarantee no more than 100ms latency and no more than 5% packet loss. 
    2.   The synchronization network may only include switches and hubs.
  2. There is one restriction: The synchronization network must guarantee no more than 150 ms latency (ITU Standard G.114).
  3. There is one restriction: The synchronization network must guarantee no more than 100 ms latency.
  4. There are no restrictions.
Correct answer: A
Question 11
A connection is said to be Sticky when:
  1. A copy of each packet in the connection sticks in the connection table until a corresponding reply packet is received from the other side.
  2. A connection is not terminated by either side by FIN or RST packet.
  3. All the connection packets are handled, in either direction, by a single cluster member.
  4. The connection information sticks in the connection table even after the connection has ended.
Correct answer: C
Question 12
How does a cluster member take over the VIP after a failover event?
  1. Gratuitous ARP
  2. Broadcast storm
  3. arp -s
  4. Ping the sync interface
Correct answer: A
Question 13
Check Point Clustering protocol, works on:
  1. UDP 18184
  2. TCP 8116
  3. UDP 8116
  4. TCP 18184
Correct answer: C
Question 14
A customer called to report one cluster member’s status as Down. What command should you use to identify the possible cause?
  1. tcpdump/snoop
  2. cphaprob list
  3. fw ctl pstat
  4. fw ctl debug -m cluster + forward
Correct answer: B
Question 15
A customer calls saying that a Load Sharing cluster shows drops with the error First packet is not SYN. Complete the following sentence. You will recommend:
  1. turning off SDF (Sticky Decision Function).
  2. switch to Multicast Mode.
  3. turning on SDF (Sticky Decision Function).
  4. configuring flush and ack.
Correct answer: C
Question 16
In ClusterXL, _____ is defined by default as a critical device.
  1. fwm
  2. assld
  3. cpp
  4. fwd
Correct answer: D
Question 17
When synchronizing clusters, which of the following statements is NOT true?
  1. Client Authentication or Session Authentication connections through a cluster member will be lost if the cluster member fails.
  2. In the case of a failover, accounting information on the failed member may be lost despite properly working synchronization.
  3. Only cluster members running on the same OS platform can be synchronized.
  4. The state of connections using resources is maintained by a Security Server, so these connections cannot be synchronized.
Correct answer: A
Question 18
When synchronizing clusters, which of the following statements is NOT true? 
  1. In the case of a failover, accounting information on the failed member may be lost despite a properly working synchronization.
  2. An SMTP resource connection using CVP will be maintained by the cluster.
  3. User Authentication connections will be lost by the cluster.
  4. Only cluster members running on the same OS platform can be synchronized.
Correct answer: B
Question 19
When a failed cluster member recovers, which of the following actions is NOT taken by the recovering member?
  1. It will not check for any updated policy and load the last installed policy with a warning message indicating that the Security Policy needs to be installed from the Security Management Server.
  2. It will try to take the policy from one of the other cluster members.
  3. It compares its local policy to the one on the Security Management Server.
  4. If the Security Management Server has a newer policy, it will be retrieved, else the local policy will be loaded.
Correct answer: A
Question 20
Organizations are sometimes faced with the need to locate cluster members in different geographic locations that are distant from each other. A typical example is replicated data centers whose location is widely separated for disaster recovery purposes.  What are the restrictions of this solution? 
  1. There are two restrictions: 
    1. The synchronization network must guarantee no more than 100ms latency and no more than 5% packet loss. 
    2.   The synchronization network may only include switches and hubs.
  2. There is one restriction: The synchronization network must guarantee no more than 150 ms latency (ITU Standard G.114).
  3. There is one restriction: The synchronization network must guarantee no more than 100 ms latency.
  4. There are no restrictions.
Correct answer: A
Question 21
A connection is said to be Sticky when:
  1. A copy of each packet in the connection sticks in the connection table until a corresponding reply packet is received from the other side.
  2. A connection is not terminated by either side by FIN or RST packet.
  3. All the connection packets are handled, in either direction, by a single cluster member.
  4. The connection information sticks in the connection table even after the connection has ended.
Correct answer: C
Question 22
How does a cluster member take over the VIP after a failover event?
  1. Gratuitous ARP
  2. Broadcast storm
  3. arp -s
  4. Ping the sync interface
Correct answer: A
Question 23
Check Point Clustering protocol, works on:
  1. UDP 18184
  2. TCP 8116
  3. UDP 8116
  4. TCP 18184
Correct answer: C
Question 24
A customer called to report one cluster member’s status as Down. What command should you use to identify the possible cause?
  1. tcpdump/snoop
  2. cphaprob list
  3. fw ctl pstat
  4. fw ctl debug -m cluster + forward
Correct answer: B
Question 25
A customer calls saying that a Load Sharing cluster shows drops with the error First packet is not SYN. Complete the following sentence. You will recommend:
  1. turning off SDF (Sticky Decision Function).
  2. switch to Multicast Mode.
  3. turning on SDF (Sticky Decision Function).
  4. configuring flush and ack.
Correct answer: C
Question 26
In ClusterXL, _____ is defined by default as a critical device.
  1. fwm
  2. assld
  3. cpp
  4. fwd
Correct answer: D
Question 27
When synchronizing clusters, which of the following statements is NOT true?
  1. Client Authentication or Session Authentication connections through a cluster member will be lost if the cluster member fails.
  2. In the case of a failover, accounting information on the failed member may be lost despite properly working synchronization.
  3. Only cluster members running on the same OS platform can be synchronized.
  4. The state of connections using resources is maintained by a Security Server, so these connections cannot be synchronized.
Correct answer: A
Question 28
When synchronizing clusters, which of the following statements is NOT true? 
  1. In the case of a failover, accounting information on the failed member may be lost despite a properly working synchronization.
  2. An SMTP resource connection using CVP will be maintained by the cluster.
  3. User Authentication connections will be lost by the cluster.
  4. Only cluster members running on the same OS platform can be synchronized.
Correct answer: B
Question 29
When a failed cluster member recovers, which of the following actions is NOT taken by the recovering member?
  1. It will not check for any updated policy and load the last installed policy with a warning message indicating that the Security Policy needs to be installed from the Security Management Server.
  2. It will try to take the policy from one of the other cluster members.
  3. It compares its local policy to the one on the Security Management Server.
  4. If the Security Management Server has a newer policy, it will be retrieved, else the local policy will be loaded.
Correct answer: A
Question 30
Organizations are sometimes faced with the need to locate cluster members in different geographic locations that are distant from each other. A typical example is replicated data centers whose location is widely separated for disaster recovery purposes.  What are the restrictions of this solution? 
  1. There are two restrictions: 
    1. The synchronization network must guarantee no more than 100ms latency and no more than 5% packet loss. 
    2.   The synchronization network may only include switches and hubs.
  2. There is one restriction: The synchronization network must guarantee no more than 150 ms latency (ITU Standard G.114).
  3. There is one restriction: The synchronization network must guarantee no more than 100 ms latency.
  4. There are no restrictions.
Correct answer: A
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!