PrepAway - Latest Free Exam Questions & Answers

Category: 156-210

Exam 156-210: Check Point NG with Application Intelligence – Management I

Choose the one phrase below that best describes Jason’s proposal.

Omanan Enterprises has the premier reclamation system for scrap aluminum in the western
hemisphere. Then phenomenal growth over the last 10 years has led to the decision to establish a
presence in the Internet in order to their customers. To that end, Omanan Enterprise network

administrator, Jason has acquired a Web Server, and email server and 14 IP addresses from their
ISP. Jason also purchased a Checkpoint VPN-1/FireWall-1 stand alone gateway module, with
these interfaces, to protect Omanan enterprises’ corporate data their ISP will be providing DNS
services. The Web Server and email server must have Static routable IP addresses. The eight
member executive counsel of Omanan Enterprises would to have routable IP addresses also, so
that they can video-conference with the company’s suppliers. Omanan Enterprises’ remaining 200
employees would like to have access to Internet, and the executive counsel believe that granting
them access might improve company morale.
Jason installs and configured Checkpoint VPN-1/FireWall1 stand alone Gateway module at the
perimeter of Omanan Enterprises corporate LAN. He uses the 3rd NIC in the stand alone firewall
gateway module to create DMZ. Jason installs the Web server and the email server on the DMZ.
He creates tools and objects on the checkpoint VPN-1/FireWall-1 stand alone gateway module to
allow HTTP, POP3 and SMTP from the Internet to the DMZ. He Creates objects to represent the
web and email server and configures them for Static NAT.
Jason reconfigures his DHCP server so that each of the members of the executive counsel has
reserved IP address. He then sues those reservations co create Statically NAT-ed objects on the
Checkpoint VPN/Firewall-1 Standalone Gateway module. Jason creates another object represents
the internal network he configures this object for Dynamic NAT. He adds a rule allowing HTTP
traffic from the internal network to any destination. Jason created an additional rule to allow POP3
and SMTP traffic between the internal networks and DMZ.
Choose the one phrase below that best describes Jason’s proposal.

What actions from the choices below would you perform to find out why you cannot see logs?

You have set up a firewall and management module on one NT box and a remote module on a
different location. You receive only sporadic logs from the local firewall and only and control
message from remote firewall. All rules on both firewalls are logging and you know the traffic is
flowing through the firewall using these rules. All the firewall related services are running and you
are using NAT and you receive few logs from the local firewall.

What actions from the choices below would you perform to find out why you cannot see logs?


Page 13 of 25« First...1112131415...20...Last »