PrepAway - Latest Free Exam Questions & Answers

Category: 156-315.75

Exam 156-315.75: Check Point Security Expert R75

How do you configure the FTP resource object and the action column in the rule to achieve this goal?

You have an internal FTP server, and you allow downloading, but not uploading. Assume Network Address Translation is set up correctly, and you want to add an inbound rule with:

Source: Any

Destination: FTP server

Service: FTP resources object.

How do you configure the FTP resource object and the action column in the rule to achieve this goal?

After creating the Madrid gateway object with the proper VPN Domain, what are Barak’s remaining steps?

Barak is a Security Administrator for an organization that has two sites using prE. shared secrets in its VPN. The two sites are Oslo and London. Barak has just been informed that a new office is opening in Madrid, and he must enable all three sites to connect via the VPN to each other. Three Security Gateways are managed by the same SmartCenter Server, behind the Oslo Security Gateway. Barak decides to switch from prE. shared secrets to Certificates issued by the Internal Certificate Authority (ICA). After creating the Madrid gateway object with the proper VPN Domain, what are Barak’s remaining steps?

1. Disable “PrE. Shared Secret” on the London and Oslo gateway objects

2. Add the Madrid gateway object into the Oslo and London’s mesh VPN Community

3. Manually generate ICA Certificates for all three Security Gateways.

4. Configure “Traditional mode VPN configuration” in the Madrid gateway object’s VPN screen

5. Reinstall the Security Policy on all three Security Gateways.

What is the correct order of the steps below to successfully complete this procedure?

Typically, when you upgrade the Security Management Server, you install and configure a fresh R75 installation on a new computer and then migrate the database from the original machine. What is the correct order of the steps below to successfully complete this procedure?

1) Export databases from source.

2) Connect target to network.

3) Prepare the source machine for export.

4) Import databases to target.

5) Install new version on target.

6) Test target deployment.


Page 51 of 61« First...102030...4950515253...60...Last »