PrepAway - Latest Free Exam Questions & Answers

Category: 156-915.77

Exam 156-915.77: Check Point Certified Security Expert Update

What is the next BEST troubleshooting step?

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers
to a set of designated IP addresses to minimize malware infection and unauthorized access risks.
Thus, the gateway policy permits access only from John’s desktop which is assigned a static IP
address 10.0.0.19.
He has received a new laptop and wants to access the HR Web Server from anywhere in the
organization. The IT department gave the laptop a static IP address, but that limits him to operating
it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web
Server from his laptop with a static IP (10.0.0.19).
He wants to move around the organization and continue to have access to the HR Web Server. To
make this scenario work, the IT administrator:
1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources, and
installs the policy.
2) Adds an access role object to the Firewall Rule Base that lets John Adams access the HR Web
Server from any machine and from any location and installs policy.
John plugged in his laptop to the network on a different network segment and was not able to
connect to the HR Web server. What is the next BEST troubleshooting step?

How does he solve this problem?

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers
to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the

gateway policy permits access only from John’s desktop which is assigned a static IP address
10.0.0.19.
John received a laptop and wants to access the HR Web Server from anywhere in the organization.
The IT department gave the laptop a static IP address, but that limits him to operating it only from
his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from
his laptop with a static IP (10.0.0.19). He wants to move around the organization and continue to
have access to the HR Web Server.
To make this scenario work, the IT administrator:
1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs
the policy.
2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web
Server from any machine and from any location.
John plugged in his laptop to the network on a different network segment and he is not able to
connect. How does he solve this problem?

What should John do when he cannot access the web server from a different personal computer?

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers
to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the
gateway policy permits access only from John’s desktop which is assigned a static IP address
10.0.0.19.
John received a laptop and wants to access the HR Web Server from anywhere in the organization.
The IT department gave the laptop a static IP address, but that limits him tooperating it only from his
desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his
laptop with a static IP (10.0.0.19). He wants to move around the organization and continue to have
access to the HR Web Server.
To make this scenario work, the IT administrator:
1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs
the policy.
2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web
Server from any machine and from any location.
What should John do when he cannot access the web server from a different personal computer?

What should she do?

Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use her
iPad to access the internal Finance Web server. Because the iPad is not a member of the Active
Directory domain, she cannot identify seamlessly with AD Query. However, she can enter her AD
credentials in the Captive Portal and then get the same access as on her office computer. Her access
to resources is based on rules in the R76 Firewall Rule Base.
To make this scenario work, the IT administrator must:
1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity Sources.
2) In the Portal Settings window in the User Access section, make sure that Name and password
login is selected.
3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network destinations.
Select accept as the Action.
Ms. McHanry tries to access the resource but is unable. What should she do?


Page 80 of 84« First...102030...7879808182...Last »