PrepAway - Latest Free Exam Questions & Answers

Tag: Exam 156-310.4

Exam 156-310.4: Check Point NG with
Application Intelligence – Management II CCSE

Which of the following should he choose?

Dr Billis a Security Administrator for a financial firm with very strict policies for remote access.
Preventing users from modifying settings is a priority. Dr Billhas selected SecureClient as his firm’s
remote access solution. Dr Billis reviewing site definition solutions and attempting to decide which
is appropriate for his environment. Which of the following should he choose?

Which authentication method should Dr Billchoose?

Dr Billis preparing to implement remote-access VPNs, using VPN-1/FireWall-1 and SecureClient.
When Dr Billselects an authentication method, it must meet the following requirements:
The authentication method must support existing authentication methods, including OS passwords
and RADIUS, for ClientAuthentication.The Enforcement Module must use certificates, to
authenticate itself to the client.The authentication method must be flexible, allowing other
authentication solutions to be added, including SecureID and TACACS.

Which authentication method should Dr Billchoose?

Which of the following solutions could Dr Billsuggest to his client, to help the client achieve regulatory com

Dr Billis a security consultant. Dr King’s client uses a 56-bit DES encryption key for its VPN-1/FireWall-1 VPNs. Dr Billinforms his client that as a banking concern, the client is not using a long
enough key to comply with new industry regulations. New industry regulations require a key length
of no less then 120 bits. The new industry standards expressly prohibit the use of proprietary
algorithms. Which of the following solutions could Dr Billsuggest to his client, to help the client
achieve regulatory compliance? (Choose two)

Which of the following tasks does Arne NOT need to perform to configure the IKE VPN?

Arne is a Security Administrator for a small company in Oslo. He has just been informed that a
new office is opening in Madrid, and he must configure each site’s Enforcement Module to encrypt
all data being passed between the offices. Because Arne controls both sites, he decides to use a
shared-secret key to configure an IKE VPN. Which of the following tasks does Arne NOT need to
perform to configure the IKE VPN?


Page 8 of 40« First...678910...203040...Last »