PrepAway - Latest Free Exam Questions & Answers

Category: 156-215.1

Exam 156-215.1: Check Point Certified Security Administrator NGX

Does Mary’s proposed solution meet the required and desired results?

Mary is recently hired as the Security Administrator for a public relations company. Mary’s manager has asked her to investigate ways to improve the performance of the firm’s perimeter Security Gateway. Mary must propose a plan based on the following required and desired results:
Required Result #1:Do not purchase new hardware.
Required Result #2:Use configuration changes that do not reduce security.
Desired Result #1:Reduce the number of explicit rules in the Rule Base.
Desired Result #2:Reduce the volume of logs.
Desired Result #3:Improve the Gateway’s performance.
Proposed Solution:
Mary recommends the following changes to the Gateway’s configuration:
?Replace all domain objects with network and group objects.
?Check "Log implied rules" and "Accept ICMP requests" in Global Properties.
?Use Global Properties, instead of explicit rules, to control ICMP, VRRP, and RIP.
Does Mary’s proposed solution meet the required and desired results?

Which two SmartConsole applications should Jeremy use, to create his report and outline?

Jeremy manages sites in Tokyo, Calcutta and Dallas, from his office in Chicago. He is trying to create a report for management, detailing the current software level of each Security Gateway. He also wants to create a proposal outline, listing the most cost-effective way to upgrade his Gateways. Which two SmartConsole applications should Jeremy use, to create his report and outline?

Does Katie’s solution meet the required and desired results?

Katie is the Security Administrator for an insurance company. Her manager gives Katie the following requirements for controlling DNS traffic:
Required Result #1: Accept domain-name-over-TCP traffic (zone-transfer traffic).
Required Result #2: Log domain-name-over-TCP traffic (zone-transfer traffic).
Desired Result #1: Accept domain-name-over-UDP traffic (queries traffic).
Desired Result #2: Do not log domain-name-over-UDP traffic (queries traffic).
Desired Result #3: Do not clutter the Rule Base by creating explicit rules for traffic that can be controlled using Global Properties.
Katie makes the following configuration changes, and installs the Security Policy:
1. She selects the box "Accept Domain Name over TCP (Zone Transfer)" in Global Properties.
2. She selects the box "Accept Domain Name over UDP (Queries)" in Global Properties.
3. She selects the box "Log Implied Rules" in Global Properties.
Does Katie’s solution meet the required and desired results?


Page 3 of 1412345...10...Last »