显示标签为“156-310”的博文。显示所有博文
显示标签为“156-310”的博文。显示所有博文

2014年1月2日星期四

CheckPoint 156-310 questions and answers

The CheckPoint 156-310 certification exam is not only validate your skills but also prove your expertise. It can prove to your boss that he did not hire you in vain. The current IT industry needs a reliable source of CheckPoint 156-310 certification exam, Pass4Test is a good choice. Select Pass4Test 156-310 exam material, so that you do not need yo waste your money and effort. And it will also allow you to have a better future.

Pass4Test have a professional IT team to do research for practice questions and answers of the CheckPoint 156-310 exam certification exam. They provide a very effective training tools and online services for your. If you want to buy Pass4Test products, Pass4Test will provide you with the latest, the best quality and very detailed training materials as well as a very accurate exam practice questions and answers to be fully prepared for you to participate in the CheckPoint certification 156-310 exam. Safely use the questions provided by Pass4Test's products. Selecting the Pass4Test is equal to be 100% passing the exam.

Pass4Test's products can not only help customers 100% pass their first time to attend CheckPoint certification 156-310 exam, but also provide a one-year of free online update service for them, which will delivery the latest exam materials to customers at the first time to let them know the latest certification exam information. So Pass4Test is a very good website which not only provide good quality products, but also a good after-sales service.

Pass4Test's training product for CheckPoint certification 156-310 exam includes simulation test and the current examination. On Internet you can also see a few websites to provide you the relevant training, but after compare them with us, you will find that Pass4Test's training about CheckPoint certification 156-310 exam not only have more pertinence for the exam and higher quality, but also more comprehensive content.

If you are an IT staff, do you want a promotion? Do you want to become a professional IT technical experts? Then please enroll in the CheckPoint 156-310 exam quickly. You know how important this certification to you. Do not worry about that you can't pass the exam, and do not doubt your ability. Join the CheckPoint 156-310 exam, then Pass4Test help you to solve the all the problem to prepare for the exam. It is a professional IT exam training site. With it, your exam problems will be solved. Pass4Test CheckPoint 156-310 exam training materials can help you to pass the exam easily. It has helped numerous candidates, and to ensure 100% success. Act quickly, to click the website of Pass4Test, come true you IT dream early.

Exam Code: 156-310
Exam Name: CheckPoint (Check Point CCSE NG)
One year free update, No help, Full refund!
Total Q&A: 398 Questions and Answers
Last Update: 2014-01-02

CheckPoint certification 156-310 exam is the first step for the IT employees to set foot on the road to improve their job. Passing CheckPoint certification 156-310 exam is the stepping stone towards your career peak. Pass4Test can help you pass CheckPoint certification 156-310 exam successfully.

156-310 Free Demo Download: http://www.pass4test.com/156-310.html

NO.1 Static passwords such as VPN-1 & FirwWall-1 and operating system passwords are cached on the
desktop and users are not required to re-authenticate. Which of the following does NOT clear the
password cache?
A. Receives a policy update.
B. Perform a disconnect from a connect mode.
C. Selects the Stop VPN 1 SecuRemote option from the File menu.
D. Selects the Erase Passwords option from the Passwords menu.
E. Reboots the computer.
Answer: A

CheckPoint test   156-310   156-310   156-310   156-310 exam   156-310

NO.2 Dr Bill is setting up a new VPN-1/FireWall-1 Enforcement Module. The Rule Base
is configured to allow all traffic, and the Enforcement Module is set up as shown in
the screen capture below. Dr bill cannot get the new system to pass any traffic.
What is the MOST likely cause of the problem?
System specifications:
1. Processor: 2.2 GHz
2. RAM: 256 MB
3. Hard Disk: 10 GB
4. OS: Windows 2000 Server
Results of ipconfig/all
View the following exhibit for the results of ipconfig/all.
A. Routing is not properly configured.
B. The machine does not have enough RAM.
C. The processor is not fast enough.
D. The operating system is not supported.
E. The Rule Base is blocking traffic.
Answer: A

CheckPoint exam prep   156-310   156-310 dumps torrent   156-310

NO.3 Which of the following FTP Content Security settings prevents internal users from sending corporate
files to external FTP Servers, while allowing users to retrieve files?
A. Use an FTP resource, and enable the GET and PUT methods.
B. Use an FTP resource and enable the GET method.
C. Use an FTP resource and enable the PUT method.
D. Block FTP_PASV.
E. Block all FTP traffic.
Answer: B

CheckPoint   156-310 original questions   156-310

NO.4 Mark is preparing to install VPN-1/FireWall-1 and has created the installation plan below.
1. Perform the following operations below in sequential order.
2. Install the operating system.
3. Configure routing and IP forwarding.
4. Configure name resolution.
5. Patch the operating system.
6. Set $FWDIR and $CPDIR environment variables.
7. Install VPN-1/FireWall-1.
8. Patch VPN-1/FireWall-1,
Which step in Mark's installation plan is NOT necessary?
A. Operating-system patches should not be applied, until after VPN-1/FireWall-1 is installed. Applying
operating-system patches before VPN-1/FireWall-1 is installed will result in an unsecured system.
B. VPN-1/FireWall-1 configures name resolution automatically. Name resolution should not be part of the
installation plan.
C. There is nothing wrong with Mark's installation plan.
D.
Routing and IP Forwarding should be configured after VPN-1/FireWall-1 is installed. Configuring routing
and
IP forwarding before VPN-1/FireWall-1 is installed will result in an unstable system.
E. VPN-1/FireWall-1 configures environment variables automatically. Configure environment variables
should
not be part of the installation plan.
Answer: E

CheckPoint   156-310 braindump   156-310   156-310 certification

NO.5 Which of the following is NOT a valid VPN configuration option available in the
VPN Manager of the Simplified Rule Base?
A. Point-to-Point
B. Mesh
C. Remote Access
D. Star with Meshed Center
E. Star
Answer: A

CheckPoint   156-310 dumps   156-310   156-310 exam simulations

NO.6 Which of the following statements BEST explains the difference between VPN-1/FireWall-1 logs and
alerts?
The difference between VPN-1/FireWall-1 logs and alerts is that:
A. Log entries contain detailed information about traffic. Alerts contain only brief descriptions of problems.
And links to the appropriate log entries.
B. Log entries are recorded in SmartView Tracker, and are persistent. Alerts appear only in SmartView
Status,
and are not persistent.
C. Logs are recorded sequentially, by date and time received. Alerts are arranged by priority and
magnitude.
D. Logging allows a Security Administrator to view historical connection information. Alerts are real-time
and
can be applied to a Security Policy's predefined tracking properties.
E. Logs are generated for explicit rules, defined by Security Administrators in the Security Policy. Alerts
are
automatically generated by implicit rules, created as a result of Global Properties settings.
Answer: D

CheckPoint   156-310   156-310 questions   156-310   156-310

NO.7 Which of the following is NOT a function of the Internal Certificate Authority (ICA)?
A. Provides certificates for users and Security Administrators.
B. Generated certificates for HTTPS Web server.
C. Establishes SIC between OPSEC applications and Check Point products.
D. Authentications SecureClient traffic to Enforcement Modules for VPNs.
E. Establishes SIC between Check Point products.
Answer: B

CheckPoint test   156-310   156-310   156-310 answers real questions

NO.8 All of the following are steps for implementing UFP, EXCEPT:
A. While the UFP Server is analyzing the requests, the Enforcement Module HTTP Proxy Server initiates
a
request to the destination. The HTTP Proxy server then waits for a response from the UFP Server before
allowing the request.
B. The client invokes a connection through the VPN-1/FireWall-1 Enforcement Module.
C. The Content Server inspects the URLs and returns the validation result message to the Enforcement
Module.
D. The Enforcement Module takes the action defined in the Rule Base for the resource.
E. The Security Server uses UFP to send the URL to a third-party UFP Server categorization.
Answer: A

CheckPoint   156-310   156-310   156-310 test

NO.9 Vered is a Security Administrator preparing to migrate her organization's IKE VPNs from pre-shared
secrets to PKI with certificates. Vered's organization has client-to-site VPNs between SecureClients and
Enforcement Modules, and site-to-site VPNs between Enforcement Modules. Vered will use the
VPN-1/FireWall-1 Internal Certificate Authority (ICA), to generate and maintain certificates. Which of
the following statements is TRUE?
Vered can:
A. Install and configure an OPSEC-certified Certificate Authority product. Vered cannot use the Internal
Certificate Authority (ICA) to accomplish this task.
B. Migrate the organization's site-to-site VPNs, but she cannot migrate the organization's client-to-site
VPNs.
C. Either migrate the PKI with certificates for her VPNs, or use the ICA for certificate generation and
maintenance. Vered cannot do both.
D. Migrate both the site-to-site VPNs and the client-to-site VPNs. She can use the ICA to generate and
maintain
certificates.
E. Migrate the organization's client-to-site VPNs, if she moves from SecureClient to SecuRemote. She
cannot
migrate the site-to-site VPNs.
Answer: D

CheckPoint   156-310 test answers   156-310 test questions

NO.10 Which of the following statements about IKE Encryption are TRUE? (Choose three
)
A. The final packet size is increased after it is encrypted.
B. TCP and IP headers are encrypted, along with the payload.
C. IKE uses in-place encryption.
D. IKE can use the FWZ1 encryption algorithm.
E. IKE uses tunneling encryption.
Answer: A, B, E

CheckPoint   156-310   156-310 original questions   156-310 original questions

NO.11 Ann is a VPN-1/FireWall-1 Security Administrator. Her organization's solution for remote-access
security is SecureClient. Ann's organization is undergoing a security audit. The auditor is concerned,
because static passwords, such as VPN-1 & FireWall-1 and operating system passwords are cached on
the desktop, and users are not required to re-authenticate. Which of the following explanations addresses
the auditor's concerns?
A. The auditor has incorrect information. SecureClient caches all passwords. A strong encryption
algorithm
protects the proprietary database used for password caching, so there is never a need to purge cached
passwords.
B. The auditor has incorrect information. SecureClient never cached passwords. SecureClient users are
forced
to re-authenticate for each new connection, regardless of the type of password used.
C. Cached passwords are purged when SecureClient receives Policy and Topology updates. Most
installation
update Security Policies frequently, so cached passwords are rarely stored for longer than six to eight
hours.
Renaming the userc.C file to userc.old will also purge the password cache.
D. Cached passwords are purged at an interval specified in the Desktop Security Policy. As long as the
user.C
file is encrypted, users cannot tamper with the interval setting. The interval time is in seconds from the
time to
SecureClient software is launched.
E. Cached passwords are purged when SecureClient is stopped, when a connect mode is disconnected,
and
when the computer is rebooted. SecureClient users can manually purge the cache, by choosing the Erase
Passwords option from the Passwords menu.
Answer: E

CheckPoint   156-310   156-310

NO.12 Which of the following is NOT a method used to configure SIP?
A. With SIP Proxies.
B. With a SIP Gatekeeper to a network without a proxy.
C. From a network without a proxy to a network with a proxy.
D. With a proxy for internal communications.
E. Without SIP Proxies.
Answer: B

CheckPoint   156-310 questions   156-310 test   156-310   156-310

NO.13 Diffie-Hellman uses which type of key exchange?
A. Static
B. Dynamic
C. Symmetric
D. Asymmetric
E. Adaptive
Answer: D

CheckPoint test   156-310 study guide   156-310 certification   156-310 pdf   156-310 dumps torrent   156-310 test answers

NO.14 When upgrading a configuration to NG with Application Intelligence: (Choose the
FALSE answer)
A. Upgrade the SmartConsole.
B. Upgrade each module's version in SmartDashboard manually.
C. Upgrade the VPN-1/Firewall-1 Enforcement Modules.
D. Copy $FWDIR/state from one version of VPN-1/FireWall-1 to another version of
VPN-1/FireWall-1.
E. Upgrade the SmartCenter server. The version is set during the upgrade.
Answer: D

CheckPoint   156-310 demo   156-310 certification   156-310   156-310   156-310 exam simulations

NO.15 Which of the following encryption algorithms supports a key length from 128-bits to 256-bits and is
outlined in the new Federal Information Processing Standard publication?
A. AES (Ridndael)
B. CAST Cipher
C. 3DES
D. DES
E. Blowfish
Answer: A

CheckPoint dumps   156-310   156-310 certification training   156-310   156-310 dumps

NO.16 Which of the following does NOT require definition for a Voice over IP (VoIP)
Domain SIP object?
A. SIP Proxy
B. IP Address Range
C. VoIP Gateway
D. Related Endpoint Domain
E. Name
Answer: A

CheckPoint   156-310   156-310

NO.17 If you are using SIP or SIP_ANY, and the Source or Destination is Any, which of the following
statements are TRUE concerning SIP Services? (Choose two)
If the Service is:
A. SIP_Any, and the Source is Any, the object represented by Any (internal or external) is SIP Proxy.
B. SIP_Any, and the Destination is Any, the object represented by Any (external only) is not a SIP Proxy.
C. SIP, and the Source is Any, the object represented by Any is allowed to redirect the connection, unless
it is a
SIP Proxy.
D. SIP, and the Destination is ANY, the object represented by Any is allowed to redirect the connection, so
it
must be a SIP Proxy.
E. SIP_Any, and the Source or Destination is Any, the object represented by Any (internal or external) is
always a SIP Proxy.
Answer: B, C

CheckPoint questions   156-310 braindump   156-310 answers real questions   156-310 dumps   156-310 dumps   156-310

NO.18 If the Use Aggressive Mode check box in the IKE Properties dialogue box is
enabled:
A. The standard six-packet IKE Phase 1 exchange is replaced by a three-packet
exchange.
B. The standard three-packet IKE Phase 2 exchange is replaced by a six-packet
exchange.
C. The standard three-packet IKE Phase 1 exchange is replaced by a six-packet
exchange.
D. The standard six-packet IKE Phase 2 exchange is replaced by a three-packet
exchange.
E. The standard three-packet IKE Phase 3 exchange is replaced by a six-packet exchange.
Answer: A

CheckPoint dumps   156-310 answers real questions   156-310   156-310

NO.19 Ann would like to deploy H.323 with a gatekeeper and gateway on her internal network. This network
is
behind a VPN-1/FireWall-1 Enforcement Module. Which of the following objects is NOT required to
configure VPN-1/FireWall-1 for H.323 in this scenario?
A. Address Range representing internal IP-addressed phones
B. Gatekeeper Node Object
C. Address range of external IP-addressed phones
D. Voice over IP (VoIP) Gateway Node Object
E. Voice over IP (VoIP) Domain Object
Answer: C

CheckPoint   156-310   156-310   156-310 exam   156-310

NO.20 Which of the following is NOT a method of Load Balancing with
VPN-1/FireWall-1?
A. Domain Load Balancing
B. Round Robin
C. Server Load
D. Round Trip
E. Quantum Load Balancing
Answer: E

CheckPoint pdf   156-310   156-310   156-310   156-310 exam simulations

NO.21 VPN-1/FireWall-1 can be configured to enable Voice over IP (VoIP) traffic in which
of the following environments? (Choose two)
A. SIP
B. Q.931
C. G.723
D. DiffServ QOS
E. H.323
Answer: A, E

CheckPoint   156-310 certification   156-310 exam prep   156-310 original questions

NO.22 The
_______ algorithm determines the load of each physical server and requires a Load Measuring
Agent be installed on each server.
A. Server Load
B. Server Relay
C. Round Robin
D. Domain
E. Round Trip
Answer: A

CheckPoint   156-310 answers real questions   156-310   156-310 exam dumps

NO.23 You are importing a URI specification file from the Match tab on the URI Resource Properties screen.
Where is the editable URI specification file stored?
A. Policy Server
B. SmartView Monitor
C. Enforcement Module
D. SmartCenter Server
E. Enterprise Log Module
Answer: D

CheckPoint   156-310 exam   156-310 exam simulations   156-310 answers real questions

NO.24 Ken us assisting a user whose SecurityClient password has expired. The SecureClient user can no
longer
access resources in the VPN Domain. Which of the following solutions is likely to resolve the issue?
A. Ken must ask the VPN-1/FireWall-1 Security Administrator to change the setting Password Expires to a
date
in the future. Users cannot adjust their SecureClient passwords.
B. Ken should as the user to change his password, using the New Password option on SecureClient's
Passwords
menu. The user can change his password, then stop and start SecureClient.
C. If the SecureClient password is allowed to expire, the software will no longer function. Ken should help
the
user uninstall and reinstall SecureClient. The user will be prompted to supply a new password during
installation.
D. When the SecureClient password expires while a session is in progress, the session will not exit
properly.
Ken should ask the user to shut down and restart his computer. The user will be prompted to supply a
new
password after login.
E. The user must edit the userc.C file, to change the expiration date on his password. Ken should help the
user
make the necessary modifications to the userc.C file, using a text editor that does not insert Unicode
characters.
Answer: A

CheckPoint   156-310 pdf   156-310 test answers

NO.25 You are using Hybrid IKE for Client Authentication. SecureClient produces the error Certifcation is
badly signed. Which of the following is the MOST likely cause of the problem and the appropriate
solution?
A. Under the firewall object > VPN > IKE Properties > Support Authentication Methods, Hybrid Mode is
not
selected. Select the Hybrid Mode option, and stop and restart the Enforcement Module.
B. The Distinguished Name used is too long. Change it to a shorter name in the Manage Certificate
Properties screen.
C. The certificate created by the Internal Certificate Authority (ICA) is corrupt. Create a new certificate.
D. The SecureClient and VPN-1/FireWall-1 Enforcement Module to which it is attempting to connect are
running incompatible versions. Upgrade the SecureClient to NG with Application Intelligence.
E. The digital signature is missing. Add the digital signature to the certificate in the Manage Certificate
Properties screen.
Answer: A

CheckPoint   156-310 braindump   156-310 certification   156-310   156-310

NO.26 Which of the following is TRUE of the relationship between the RemoteAccess VPN
Community and the Security Policy Rule Base?
A. The RemoteAccess VPN Community defines VPN connection parameters for
SecuRemote connections. The Security Policy Rule Base is used to allow access to
protected resources.
B. The RemoteAccess VPN Community is used to allow access to protected resources.
The Security Policy Rule Base is used to define VPN connection parameters for
SecuRemote connections.
C. The Security Policy Rule Base is used to define VPN connection parameters for
SecuRemote connections and is used to allow access to protected resources. The
RemoteAccess VPN Community applies only SecureClient.
D. The RemoteAccess VPN Community defines VPN connection parameters for
SecuRemote connections and is used to allow access to protected resources. Security
Policy Rules are not defined for SecuRemote.
Answer: A

CheckPoint   156-310   156-310 study guide   156-310

NO.27 Exhibit
Jacob configured a meshed VPN Community, with VPN properties set as shown below. Which of the
following statements are TRUE? (Choose two)
A. Jacob is using the default VPN property settings for a VPN-1/FireWall-1 meshed VPN Community.
B. Jacob's community will perform IKE Phase 1 key-exchange encryption, using the longest key
VPN-1/FireWall-1 supports.
C. Jacob must change the data-integrity settings for this VPN Community. MD5 is incompatible with AES.
D. If Jacob changes the setting Perform IPsec data encryption with: from AES-128 to 3DES, he will
increase
the encryption overhead.
E. If Jacob changes the setting, Perform key exchange encryption with: from 3DES to DES, he will
enhance the
VPN Community's security and reduce encryption overhead.
Answer: A, B

CheckPoint braindump   156-310   156-310 demo   156-310

NO.28 Which of the following is NOT a feature or quality of a hash function?
A. It is mathematically infeasible to derive the original message from the message digest.
B. The hash function is irreversible.
C. It is mathematically infeasible for two different messages to produce the same message digest.
D. The hash function forms a two-way, secure communication.
E. Encrypted with the sender's RSA private key, the hash function forms the digital signature.
Answer: D

CheckPoint dumps   156-310   156-310

NO.29 Which of the following statements BEST describes the difference between VPN Domains and VPN
Communities?
A. A VPN Domain is a network, or group of networks, protected by and Enforcement Module. A VPN
Community is a collection of VPN Domains and the VPN tunnels between them.
B.
A VPN Domain is a remote-access VPN, consisting of a group of SecureClients and their associated
Enforcement Module. A VPN Community is a collection of Enforcement Module-to-Enforcement Module
VPNSs.
C. VPN Domains are used in Microsoft environments, and allow VPN-1/FireWall1- to communicate with
Domain Controllers. VPN Communities are used in Unix environments, to allow VPN-1/FireWall-1 to
communicate with authentication servers.
D. VPN Domains specify encryption properties and access restrictions for users. VPN Communities detail
encryption properties and access restrictions, for machines and processes.
E. VPN Domains are used for Security Policies created in traditional mode. VPN Communities are used in
simplified mode. VPN Domains are not available, if simplified mode is used.
Answer: A

CheckPoint   156-310 dumps   156-310 test questions   156-310 test answers   156-310 certification training   156-310 pdf

NO.30 When you upgrade VPN-1/FireWall-1, what components are carried over to the new
version? (Choose two)
A. Licenses
B. VPN-1/FireWall-1 database
C. OPSEC database
D. Backward Compatibility
E. Rule Base
Answer: A, B

CheckPoint   156-310 study guide   156-310

Pass4Test offer the latest MB7-702 exam material and high-quality 1Y0-400 pdf questions & answers. Our HP3-C29 VCE testing engine and 000-277 study guide can help you pass the real exam. High-quality 00M-663 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.pass4test.com/156-310.html

2013年9月9日星期一

The best of CheckPoint certification 156-310 exam training methods

When you click into Pass4Test's site, you will see so many people daily enter the website. You can not help but be surprised. In fact, this is normal. Pass4Test is provide different training materials for alot of candidates. They are using our training materials tto pass the exam. This shows that our CheckPoint 156-310 exam training materials can really play a role. If you want to buy, then do not miss Pass4Test website, you will be very satisfied.

You can first download Pass4Test's free exercises and answers about CheckPoint certification 156-310 exam as a try, then you will feel that Pass4Test give you a reassurance for passing the exam. If you choose Pass4Test to provide you with the pertinence training, you can easily pass the CheckPoint certification 156-310 exam.

Exam Code: 156-310
Exam Name: CheckPoint (Check Point CCSE NG)
One year free update, No help, Full refund!
Total Q&A: 398 Questions and Answers
Last Update: 2013-09-09

Pass4Test provide training tools included CheckPoint certification 156-310 exam study materials and simulation training questions and more importantly, we will provide you practice questions and answers which are very close with real certification exam. Selecting Pass4Test can guarantee that you can in a short period of time to learn and to strengthen the professional knowledge of IT and pass CheckPoint certification 156-310 exam with high score.

Pass4Test is a professional website. It focuses on the most advanced CheckPoint 156-310 for the majority of candidates. With Pass4Test, you no longer need to worry about the CheckPoint 156-310 exam. Pass4Test exam questions have good quality and good service. As long as you choose Pass4Test, Pass4Test will be able to help you pass the exam, and allow you to achieve a high level of efficiency in a short time.

Pass4Test's practice questions and answers about the CheckPoint certification 156-310 exam is developed by our expert team's wealth of knowledge and experience, and can fully meet the demand of CheckPoint certification 156-310 exam's candidates. From related websites or books, you might also see some of the training materials, but Pass4Test's information about CheckPoint certification 156-310 exam is the most comprehensive, and can give you the best protection. Candidates who participate in the CheckPoint certification 156-310 exam should select exam practice questions and answers of Pass4Test, because Pass4Test is the best choice for you.

156-310 Free Demo Download: http://www.pass4test.com/156-310.html

NO.1 Which of the following statements BEST describes the difference between VPN Domains and VPN
Communities?
A. A VPN Domain is a network, or group of networks, protected by and Enforcement Module. A VPN
Community is a collection of VPN Domains and the VPN tunnels between them.
B.
A VPN Domain is a remote-access VPN, consisting of a group of SecureClients and their associated
Enforcement Module. A VPN Community is a collection of Enforcement Module-to-Enforcement Module
VPNSs.
C. VPN Domains are used in Microsoft environments, and allow VPN-1/FireWall1- to communicate with
Domain Controllers. VPN Communities are used in Unix environments, to allow VPN-1/FireWall-1 to
communicate with authentication servers.
D. VPN Domains specify encryption properties and access restrictions for users. VPN Communities detail
encryption properties and access restrictions, for machines and processes.
E. VPN Domains are used for Security Policies created in traditional mode. VPN Communities are used in
simplified mode. VPN Domains are not available, if simplified mode is used.
Answer: A

CheckPoint exam   156-310   156-310   156-310   156-310   156-310

NO.2 The
_______ algorithm determines the load of each physical server and requires a Load Measuring
Agent be installed on each server.
A. Server Load
B. Server Relay
C. Round Robin
D. Domain
E. Round Trip
Answer: A

CheckPoint test questions   156-310   156-310 practice test   156-310 study guide

NO.3 Which of the following is TRUE of the relationship between the RemoteAccess VPN
Community and the Security Policy Rule Base?
A. The RemoteAccess VPN Community defines VPN connection parameters for
SecuRemote connections. The Security Policy Rule Base is used to allow access to
protected resources.
B. The RemoteAccess VPN Community is used to allow access to protected resources.
The Security Policy Rule Base is used to define VPN connection parameters for
SecuRemote connections.
C. The Security Policy Rule Base is used to define VPN connection parameters for
SecuRemote connections and is used to allow access to protected resources. The
RemoteAccess VPN Community applies only SecureClient.
D. The RemoteAccess VPN Community defines VPN connection parameters for
SecuRemote connections and is used to allow access to protected resources. Security
Policy Rules are not defined for SecuRemote.
Answer: A

CheckPoint pdf   156-310 questions   156-310   156-310   156-310 exam

NO.4 Exhibit
Jacob configured a meshed VPN Community, with VPN properties set as shown below. Which of the
following statements are TRUE? (Choose two)
A. Jacob is using the default VPN property settings for a VPN-1/FireWall-1 meshed VPN Community.
B. Jacob's community will perform IKE Phase 1 key-exchange encryption, using the longest key
VPN-1/FireWall-1 supports.
C. Jacob must change the data-integrity settings for this VPN Community. MD5 is incompatible with AES.
D. If Jacob changes the setting Perform IPsec data encryption with: from AES-128 to 3DES, he will
increase
the encryption overhead.
E. If Jacob changes the setting, Perform key exchange encryption with: from 3DES to DES, he will
enhance the
VPN Community's security and reduce encryption overhead.
Answer: A, B

CheckPoint braindump   156-310   156-310 certification   156-310   156-310 exam

NO.5 Which of the following statements BEST explains the difference between VPN-1/FireWall-1 logs and
alerts?
The difference between VPN-1/FireWall-1 logs and alerts is that:
A. Log entries contain detailed information about traffic. Alerts contain only brief descriptions of problems.
And links to the appropriate log entries.
B. Log entries are recorded in SmartView Tracker, and are persistent. Alerts appear only in SmartView
Status,
and are not persistent.
C. Logs are recorded sequentially, by date and time received. Alerts are arranged by priority and
magnitude.
D. Logging allows a Security Administrator to view historical connection information. Alerts are real-time
and
can be applied to a Security Policy's predefined tracking properties.
E. Logs are generated for explicit rules, defined by Security Administrators in the Security Policy. Alerts
are
automatically generated by implicit rules, created as a result of Global Properties settings.
Answer: D

CheckPoint   156-310   156-310 original questions   156-310   156-310 dumps torrent   156-310 dumps torrent

NO.6 Which of the following does NOT require definition for a Voice over IP (VoIP)
Domain SIP object?
A. SIP Proxy
B. IP Address Range
C. VoIP Gateway
D. Related Endpoint Domain
E. Name
Answer: A

CheckPoint   156-310   156-310 exam prep

NO.7 When you upgrade VPN-1/FireWall-1, what components are carried over to the new
version? (Choose two)
A. Licenses
B. VPN-1/FireWall-1 database
C. OPSEC database
D. Backward Compatibility
E. Rule Base
Answer: A, B

CheckPoint   156-310 braindump   156-310 exam prep

NO.8 Which of the following is NOT a feature or quality of a hash function?
A. It is mathematically infeasible to derive the original message from the message digest.
B. The hash function is irreversible.
C. It is mathematically infeasible for two different messages to produce the same message digest.
D. The hash function forms a two-way, secure communication.
E. Encrypted with the sender's RSA private key, the hash function forms the digital signature.
Answer: D

CheckPoint   156-310   156-310   156-310 certification training

NO.9 Which of the following is NOT a method of Load Balancing with
VPN-1/FireWall-1?
A. Domain Load Balancing
B. Round Robin
C. Server Load
D. Round Trip
E. Quantum Load Balancing
Answer: E

CheckPoint original questions   156-310 study guide   156-310 dumps torrent   156-310   156-310 test

NO.10 Which of the following is NOT a valid VPN configuration option available in the
VPN Manager of the Simplified Rule Base?
A. Point-to-Point
B. Mesh
C. Remote Access
D. Star with Meshed Center
E. Star
Answer: A

CheckPoint   156-310   156-310 questions   156-310 dumps torrent   156-310

NO.11 Diffie-Hellman uses which type of key exchange?
A. Static
B. Dynamic
C. Symmetric
D. Asymmetric
E. Adaptive
Answer: D

CheckPoint   156-310 exam prep   156-310 demo   156-310 practice test   156-310   156-310

NO.12 Which of the following is NOT a function of the Internal Certificate Authority (ICA)?
A. Provides certificates for users and Security Administrators.
B. Generated certificates for HTTPS Web server.
C. Establishes SIC between OPSEC applications and Check Point products.
D. Authentications SecureClient traffic to Enforcement Modules for VPNs.
E. Establishes SIC between Check Point products.
Answer: B

CheckPoint exam   156-310 practice test   156-310 dumps torrent

NO.13 Ann would like to deploy H.323 with a gatekeeper and gateway on her internal network. This network
is
behind a VPN-1/FireWall-1 Enforcement Module. Which of the following objects is NOT required to
configure VPN-1/FireWall-1 for H.323 in this scenario?
A. Address Range representing internal IP-addressed phones
B. Gatekeeper Node Object
C. Address range of external IP-addressed phones
D. Voice over IP (VoIP) Gateway Node Object
E. Voice over IP (VoIP) Domain Object
Answer: C

CheckPoint   156-310   156-310   156-310 test

NO.14 Ann is a VPN-1/FireWall-1 Security Administrator. Her organization's solution for remote-access
security is SecureClient. Ann's organization is undergoing a security audit. The auditor is concerned,
because static passwords, such as VPN-1 & FireWall-1 and operating system passwords are cached on
the desktop, and users are not required to re-authenticate. Which of the following explanations addresses
the auditor's concerns?
A. The auditor has incorrect information. SecureClient caches all passwords. A strong encryption
algorithm
protects the proprietary database used for password caching, so there is never a need to purge cached
passwords.
B. The auditor has incorrect information. SecureClient never cached passwords. SecureClient users are
forced
to re-authenticate for each new connection, regardless of the type of password used.
C. Cached passwords are purged when SecureClient receives Policy and Topology updates. Most
installation
update Security Policies frequently, so cached passwords are rarely stored for longer than six to eight
hours.
Renaming the userc.C file to userc.old will also purge the password cache.
D. Cached passwords are purged at an interval specified in the Desktop Security Policy. As long as the
user.C
file is encrypted, users cannot tamper with the interval setting. The interval time is in seconds from the
time to
SecureClient software is launched.
E. Cached passwords are purged when SecureClient is stopped, when a connect mode is disconnected,
and
when the computer is rebooted. SecureClient users can manually purge the cache, by choosing the Erase
Passwords option from the Passwords menu.
Answer: E

CheckPoint dumps   156-310   156-310 pdf   156-310 test

NO.15 Static passwords such as VPN-1 & FirwWall-1 and operating system passwords are cached on the
desktop and users are not required to re-authenticate. Which of the following does NOT clear the
password cache?
A. Receives a policy update.
B. Perform a disconnect from a connect mode.
C. Selects the Stop VPN 1 SecuRemote option from the File menu.
D. Selects the Erase Passwords option from the Passwords menu.
E. Reboots the computer.
Answer: A

CheckPoint test answers   156-310 exam dumps   156-310   156-310

NO.16 Dr Bill is setting up a new VPN-1/FireWall-1 Enforcement Module. The Rule Base
is configured to allow all traffic, and the Enforcement Module is set up as shown in
the screen capture below. Dr bill cannot get the new system to pass any traffic.
What is the MOST likely cause of the problem?
System specifications:
1. Processor: 2.2 GHz
2. RAM: 256 MB
3. Hard Disk: 10 GB
4. OS: Windows 2000 Server
Results of ipconfig/all
View the following exhibit for the results of ipconfig/all.
A. Routing is not properly configured.
B. The machine does not have enough RAM.
C. The processor is not fast enough.
D. The operating system is not supported.
E. The Rule Base is blocking traffic.
Answer: A

CheckPoint   156-310   156-310   156-310

NO.17 You are importing a URI specification file from the Match tab on the URI Resource Properties screen.
Where is the editable URI specification file stored?
A. Policy Server
B. SmartView Monitor
C. Enforcement Module
D. SmartCenter Server
E. Enterprise Log Module
Answer: D

CheckPoint   156-310   156-310 test   156-310   156-310 answers real questions   156-310 exam simulations

NO.18 Which of the following FTP Content Security settings prevents internal users from sending corporate
files to external FTP Servers, while allowing users to retrieve files?
A. Use an FTP resource, and enable the GET and PUT methods.
B. Use an FTP resource and enable the GET method.
C. Use an FTP resource and enable the PUT method.
D. Block FTP_PASV.
E. Block all FTP traffic.
Answer: B

CheckPoint   156-310   156-310 test questions   156-310 practice test   156-310 questions

NO.19 All of the following are steps for implementing UFP, EXCEPT:
A. While the UFP Server is analyzing the requests, the Enforcement Module HTTP Proxy Server initiates
a
request to the destination. The HTTP Proxy server then waits for a response from the UFP Server before
allowing the request.
B. The client invokes a connection through the VPN-1/FireWall-1 Enforcement Module.
C. The Content Server inspects the URLs and returns the validation result message to the Enforcement
Module.
D. The Enforcement Module takes the action defined in the Rule Base for the resource.
E. The Security Server uses UFP to send the URL to a third-party UFP Server categorization.
Answer: A

CheckPoint answers real questions   156-310 test   156-310   156-310

NO.20 Ken us assisting a user whose SecurityClient password has expired. The SecureClient user can no
longer
access resources in the VPN Domain. Which of the following solutions is likely to resolve the issue?
A. Ken must ask the VPN-1/FireWall-1 Security Administrator to change the setting Password Expires to a
date
in the future. Users cannot adjust their SecureClient passwords.
B. Ken should as the user to change his password, using the New Password option on SecureClient's
Passwords
menu. The user can change his password, then stop and start SecureClient.
C. If the SecureClient password is allowed to expire, the software will no longer function. Ken should help
the
user uninstall and reinstall SecureClient. The user will be prompted to supply a new password during
installation.
D. When the SecureClient password expires while a session is in progress, the session will not exit
properly.
Ken should ask the user to shut down and restart his computer. The user will be prompted to supply a
new
password after login.
E. The user must edit the userc.C file, to change the expiration date on his password. Ken should help the
user
make the necessary modifications to the userc.C file, using a text editor that does not insert Unicode
characters.
Answer: A

CheckPoint test   156-310   156-310   156-310   156-310   156-310 exam prep

NO.21 If the Use Aggressive Mode check box in the IKE Properties dialogue box is
enabled:
A. The standard six-packet IKE Phase 1 exchange is replaced by a three-packet
exchange.
B. The standard three-packet IKE Phase 2 exchange is replaced by a six-packet
exchange.
C. The standard three-packet IKE Phase 1 exchange is replaced by a six-packet
exchange.
D. The standard six-packet IKE Phase 2 exchange is replaced by a three-packet
exchange.
E. The standard three-packet IKE Phase 3 exchange is replaced by a six-packet exchange.
Answer: A

CheckPoint dumps   156-310   156-310 test questions   156-310 braindump   156-310 test questions

NO.22 You are using Hybrid IKE for Client Authentication. SecureClient produces the error Certifcation is
badly signed. Which of the following is the MOST likely cause of the problem and the appropriate
solution?
A. Under the firewall object > VPN > IKE Properties > Support Authentication Methods, Hybrid Mode is
not
selected. Select the Hybrid Mode option, and stop and restart the Enforcement Module.
B. The Distinguished Name used is too long. Change it to a shorter name in the Manage Certificate
Properties screen.
C. The certificate created by the Internal Certificate Authority (ICA) is corrupt. Create a new certificate.
D. The SecureClient and VPN-1/FireWall-1 Enforcement Module to which it is attempting to connect are
running incompatible versions. Upgrade the SecureClient to NG with Application Intelligence.
E. The digital signature is missing. Add the digital signature to the certificate in the Manage Certificate
Properties screen.
Answer: A

CheckPoint   156-310   156-310   156-310 demo

NO.23 Mark is preparing to install VPN-1/FireWall-1 and has created the installation plan below.
1. Perform the following operations below in sequential order.
2. Install the operating system.
3. Configure routing and IP forwarding.
4. Configure name resolution.
5. Patch the operating system.
6. Set $FWDIR and $CPDIR environment variables.
7. Install VPN-1/FireWall-1.
8. Patch VPN-1/FireWall-1,
Which step in Mark's installation plan is NOT necessary?
A. Operating-system patches should not be applied, until after VPN-1/FireWall-1 is installed. Applying
operating-system patches before VPN-1/FireWall-1 is installed will result in an unsecured system.
B. VPN-1/FireWall-1 configures name resolution automatically. Name resolution should not be part of the
installation plan.
C. There is nothing wrong with Mark's installation plan.
D.
Routing and IP Forwarding should be configured after VPN-1/FireWall-1 is installed. Configuring routing
and
IP forwarding before VPN-1/FireWall-1 is installed will result in an unstable system.
E. VPN-1/FireWall-1 configures environment variables automatically. Configure environment variables
should
not be part of the installation plan.
Answer: E

CheckPoint   156-310 original questions   156-310 braindump   156-310

NO.24 When upgrading a configuration to NG with Application Intelligence: (Choose the
FALSE answer)
A. Upgrade the SmartConsole.
B. Upgrade each module's version in SmartDashboard manually.
C. Upgrade the VPN-1/Firewall-1 Enforcement Modules.
D. Copy $FWDIR/state from one version of VPN-1/FireWall-1 to another version of
VPN-1/FireWall-1.
E. Upgrade the SmartCenter server. The version is set during the upgrade.
Answer: D

CheckPoint test   156-310   156-310

NO.25 Vered is a Security Administrator preparing to migrate her organization's IKE VPNs from pre-shared
secrets to PKI with certificates. Vered's organization has client-to-site VPNs between SecureClients and
Enforcement Modules, and site-to-site VPNs between Enforcement Modules. Vered will use the
VPN-1/FireWall-1 Internal Certificate Authority (ICA), to generate and maintain certificates. Which of
the following statements is TRUE?
Vered can:
A. Install and configure an OPSEC-certified Certificate Authority product. Vered cannot use the Internal
Certificate Authority (ICA) to accomplish this task.
B. Migrate the organization's site-to-site VPNs, but she cannot migrate the organization's client-to-site
VPNs.
C. Either migrate the PKI with certificates for her VPNs, or use the ICA for certificate generation and
maintenance. Vered cannot do both.
D. Migrate both the site-to-site VPNs and the client-to-site VPNs. She can use the ICA to generate and
maintain
certificates.
E. Migrate the organization's client-to-site VPNs, if she moves from SecureClient to SecuRemote. She
cannot
migrate the site-to-site VPNs.
Answer: D

CheckPoint test answers   156-310 exam   156-310   156-310   156-310 practice test   156-310

NO.26 If you are using SIP or SIP_ANY, and the Source or Destination is Any, which of the following
statements are TRUE concerning SIP Services? (Choose two)
If the Service is:
A. SIP_Any, and the Source is Any, the object represented by Any (internal or external) is SIP Proxy.
B. SIP_Any, and the Destination is Any, the object represented by Any (external only) is not a SIP Proxy.
C. SIP, and the Source is Any, the object represented by Any is allowed to redirect the connection, unless
it is a
SIP Proxy.
D. SIP, and the Destination is ANY, the object represented by Any is allowed to redirect the connection, so
it
must be a SIP Proxy.
E. SIP_Any, and the Source or Destination is Any, the object represented by Any (internal or external) is
always a SIP Proxy.
Answer: B, C

CheckPoint   156-310 test   156-310 pdf   156-310 certification   156-310 study guide

NO.27 Which of the following is NOT a method used to configure SIP?
A. With SIP Proxies.
B. With a SIP Gatekeeper to a network without a proxy.
C. From a network without a proxy to a network with a proxy.
D. With a proxy for internal communications.
E. Without SIP Proxies.
Answer: B

CheckPoint braindump   156-310 test   156-310   156-310 exam dumps   156-310 braindump

NO.28 VPN-1/FireWall-1 can be configured to enable Voice over IP (VoIP) traffic in which
of the following environments? (Choose two)
A. SIP
B. Q.931
C. G.723
D. DiffServ QOS
E. H.323
Answer: A, E

CheckPoint study guide   156-310   156-310   156-310 study guide   156-310   156-310

NO.29 Which of the following encryption algorithms supports a key length from 128-bits to 256-bits and is
outlined in the new Federal Information Processing Standard publication?
A. AES (Ridndael)
B. CAST Cipher
C. 3DES
D. DES
E. Blowfish
Answer: A

CheckPoint   156-310 braindump   156-310 test answers

NO.30 Which of the following statements about IKE Encryption are TRUE? (Choose three
)
A. The final packet size is increased after it is encrypted.
B. TCP and IP headers are encrypted, along with the payload.
C. IKE uses in-place encryption.
D. IKE can use the FWZ1 encryption algorithm.
E. IKE uses tunneling encryption.
Answer: A, B, E

CheckPoint answers real questions   156-310   156-310   156-310

Pass4Test offer the latest BAS-002 exam material and high-quality 1z0-559 pdf questions & answers. Our C-TFIN52-64 VCE testing engine and 70-684 study guide can help you pass the real exam. High-quality HP0-J62 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.pass4test.com/156-310.html

2013年7月31日星期三

CheckPoint 156-815 156-315 156-510 156-215 156-310 156-210 exam study materials

Pass4Test has special training tools for CheckPoint certification 156-815 156-315 156-510 156-215 156-310 156-210 exam, which can make you do not need to spend a lot of time and money but can get a lot of knowledge of IT technology to enhance your skills in a short time. And soon you will be able to prove your expertise knowledge and technology in IT industry. Pass4Test's training courses for CheckPoint certification 156-815 156-315 156-510 156-215 156-310 156-210 exam is developed by the study of Pass4Test experts team to use their knowledge and experience.


Pass4Test is a website that can provide all information about different IT certification exam. Pass4Test can provide you with the best and latest exam resources. To choose Pass4Test you can feel at ease to prepare your CheckPoint 156-815 156-315 156-510 156-215 156-310 156-210 exam. Our training materials can guarantee you 100% to pass CheckPoint certification 156-815 156-315 156-510 156-215 156-310 156-210 exam, if not, we will give you a full refund and exam practice questions and answers will be updated quickly, but this is almost impossible to happen. Pass4Test can help you pass CheckPoint certification 156-815 156-315 156-510 156-215 156-310 156-210 exam and can also help you in the future about your work. Although there are many ways to help you achieve your purpose, selecting Pass4Test is your wisest choice. Having Pass4Test can make you spend shorter time less money and with greater confidence to pass the exam, and we also provide you with a free one-year after-sales service.


In order to protect the vital interests of each IT certification exams candidate, Pass4Test provides high-quality CheckPoint 156-815 156-315 156-510 156-215 156-310 156-210 exam training materials. This exam material is specially developed according to the needs of the candidates. It is researched by the IT experts of Pass4Test. Their struggle is not just to help you pass the exam, but also in order to let you have a better tomorrow.


Exam Code: 156-815

Exam Name: CheckPoint (Check Point Certified Managed Security Expert NGX)

Exam Code: 156-315

Exam Name: CheckPoint (Check Point Security Administration NGX II (156-315.1)......)

Exam Code: 156-510

Exam Name: CheckPoint (VPN-1/FireWall-1 Management III)

Exam Code: 156-215

Exam Name: CheckPoint (Check Point Security Administration NGX)

Exam Code: 156-310

Exam Name: CheckPoint (Check Point CCSE NG)

Exam Code: 156-210

Exam Name: CheckPoint (Check Point CCSA NG)

According to the research of the past exams and answers, Pass4Test provide you the latest CheckPoint 156-815 156-315 156-510 156-215 156-310 156-210 exercises and answers, which have have a very close similarity with real exam. Pass4Test can promise that you can 100% pass your first time to attend CheckPoint certification 156-815 156-315 156-510 156-215 156-310 156-210 exam.


156-310 Free Demo Download: http://www.pass4test.com/156-310.html


NO.1 When you upgrade VPN-1/FireWall-1, what components are carried over to the new
version? (Choose two)
A. Licenses
B. VPN-1/FireWall-1 database
C. OPSEC database
D. Backward Compatibility
E. Rule Base
Answer: A, B

CheckPoint questions   156-310   156-310   156-310 test questions

NO.2 Diffie-Hellman uses which type of key exchange?
A. Static
B. Dynamic
C. Symmetric
D. Asymmetric
E. Adaptive
Answer: D

CheckPoint   156-310   156-310

NO.3 You are importing a URI specification file from the Match tab on the URI Resource Properties screen.
Where is the editable URI specification file stored?
A. Policy Server
B. SmartView Monitor
C. Enforcement Module
D. SmartCenter Server
E. Enterprise Log Module
Answer: D

CheckPoint   156-310 braindump   156-310   156-310 study guide

NO.4 Mark is preparing to install VPN-1/FireWall-1 and has created the installation plan below.
1. Perform the following operations below in sequential order.
2. Install the operating system.
3. Configure routing and IP forwarding.
4. Configure name resolution.
5. Patch the operating system.
6. Set $FWDIR and $CPDIR environment variables.
7. Install VPN-1/FireWall-1.
8. Patch VPN-1/FireWall-1,
Which step in Mark's installation plan is NOT necessary?
A. Operating-system patches should not be applied, until after VPN-1/FireWall-1 is installed. Applying
operating-system patches before VPN-1/FireWall-1 is installed will result in an unsecured system.
B. VPN-1/FireWall-1 configures name resolution automatically. Name resolution should not be part of the
installation plan.
C. There is nothing wrong with Mark's installation plan.
D.
Routing and IP Forwarding should be configured after VPN-1/FireWall-1 is installed. Configuring routing
and
IP forwarding before VPN-1/FireWall-1 is installed will result in an unstable system.
E. VPN-1/FireWall-1 configures environment variables automatically. Configure environment variables
should
not be part of the installation plan.
Answer: E

CheckPoint dumps   156-310 questions   156-310

NO.5 When upgrading a configuration to NG with Application Intelligence: (Choose the
FALSE answer)
A. Upgrade the SmartConsole.
B. Upgrade each module's version in SmartDashboard manually.
C. Upgrade the VPN-1/Firewall-1 Enforcement Modules.
D. Copy $FWDIR/state from one version of VPN-1/FireWall-1 to another version of
VPN-1/FireWall-1.
E. Upgrade the SmartCenter server. The version is set during the upgrade.
Answer: D

CheckPoint   156-310   156-310

NO.6 Which of the following is TRUE of the relationship between the RemoteAccess VPN
Community and the Security Policy Rule Base?
A. The RemoteAccess VPN Community defines VPN connection parameters for
SecuRemote connections. The Security Policy Rule Base is used to allow access to
protected resources.
B. The RemoteAccess VPN Community is used to allow access to protected resources.
The Security Policy Rule Base is used to define VPN connection parameters for
SecuRemote connections.
C. The Security Policy Rule Base is used to define VPN connection parameters for
SecuRemote connections and is used to allow access to protected resources. The
RemoteAccess VPN Community applies only SecureClient.
D. The RemoteAccess VPN Community defines VPN connection parameters for
SecuRemote connections and is used to allow access to protected resources. Security
Policy Rules are not defined for SecuRemote.
Answer: A

CheckPoint   156-310 demo   156-310 exam   156-310

NO.7 Which of the following encryption algorithms supports a key length from 128-bits to 256-bits and is
outlined in the new Federal Information Processing Standard publication?
A. AES (Ridndael)
B. CAST Cipher
C. 3DES
D. DES
E. Blowfish
Answer: A

CheckPoint exam dumps   156-310   156-310

NO.8 Which of the following statements BEST describes the difference between VPN Domains and VPN
Communities?
A. A VPN Domain is a network, or group of networks, protected by and Enforcement Module. A VPN
Community is a collection of VPN Domains and the VPN tunnels between them.
B.
A VPN Domain is a remote-access VPN, consisting of a group of SecureClients and their associated
Enforcement Module. A VPN Community is a collection of Enforcement Module-to-Enforcement Module
VPNSs.
C. VPN Domains are used in Microsoft environments, and allow VPN-1/FireWall1- to communicate with
Domain Controllers. VPN Communities are used in Unix environments, to allow VPN-1/FireWall-1 to
communicate with authentication servers.
D. VPN Domains specify encryption properties and access restrictions for users. VPN Communities detail
encryption properties and access restrictions, for machines and processes.
E. VPN Domains are used for Security Policies created in traditional mode. VPN Communities are used in
simplified mode. VPN Domains are not available, if simplified mode is used.
Answer: A

CheckPoint   156-310   156-310 exam simulations   156-310   156-310 test

NO.9 Which of the following is NOT a feature or quality of a hash function?
A. It is mathematically infeasible to derive the original message from the message digest.
B. The hash function is irreversible.
C. It is mathematically infeasible for two different messages to produce the same message digest.
D. The hash function forms a two-way, secure communication.
E. Encrypted with the sender's RSA private key, the hash function forms the digital signature.
Answer: D

CheckPoint   156-310   156-310 test answers   156-310 exam

NO.10 Dr Bill is setting up a new VPN-1/FireWall-1 Enforcement Module. The Rule Base
is configured to allow all traffic, and the Enforcement Module is set up as shown in
the screen capture below. Dr bill cannot get the new system to pass any traffic.
What is the MOST likely cause of the problem?
System specifications:
1. Processor: 2.2 GHz
2. RAM: 256 MB
3. Hard Disk: 10 GB
4. OS: Windows 2000 Server
Results of ipconfig/all
View the following exhibit for the results of ipconfig/all.
A. Routing is not properly configured.
B. The machine does not have enough RAM.
C. The processor is not fast enough.
D. The operating system is not supported.
E. The Rule Base is blocking traffic.
Answer: A

CheckPoint test   156-310   156-310   156-310

NO.11 Ken us assisting a user whose SecurityClient password has expired. The SecureClient user can no
longer
access resources in the VPN Domain. Which of the following solutions is likely to resolve the issue?
A. Ken must ask the VPN-1/FireWall-1 Security Administrator to change the setting Password Expires to a
date
in the future. Users cannot adjust their SecureClient passwords.
B. Ken should as the user to change his password, using the New Password option on SecureClient's
Passwords
menu. The user can change his password, then stop and start SecureClient.
C. If the SecureClient password is allowed to expire, the software will no longer function. Ken should help
the
user uninstall and reinstall SecureClient. The user will be prompted to supply a new password during
installation.
D. When the SecureClient password expires while a session is in progress, the session will not exit
properly.
Ken should ask the user to shut down and restart his computer. The user will be prompted to supply a
new
password after login.
E. The user must edit the userc.C file, to change the expiration date on his password. Ken should help the
user
make the necessary modifications to the userc.C file, using a text editor that does not insert Unicode
characters.
Answer: A

CheckPoint   156-310   156-310 test questions   156-310   156-310

NO.12 Which of the following is NOT a valid VPN configuration option available in the
VPN Manager of the Simplified Rule Base?
A. Point-to-Point
B. Mesh
C. Remote Access
D. Star with Meshed Center
E. Star
Answer: A

CheckPoint exam   156-310 test   156-310   156-310

NO.13 Which of the following does NOT require definition for a Voice over IP (VoIP)
Domain SIP object?
A. SIP Proxy
B. IP Address Range
C. VoIP Gateway
D. Related Endpoint Domain
E. Name
Answer: A

CheckPoint practice test   156-310   156-310   156-310 answers real questions

NO.14 Exhibit
Jacob configured a meshed VPN Community, with VPN properties set as shown below. Which of the
following statements are TRUE? (Choose two)
A. Jacob is using the default VPN property settings for a VPN-1/FireWall-1 meshed VPN Community.
B. Jacob's community will perform IKE Phase 1 key-exchange encryption, using the longest key
VPN-1/FireWall-1 supports.
C. Jacob must change the data-integrity settings for this VPN Community. MD5 is incompatible with AES.
D. If Jacob changes the setting Perform IPsec data encryption with: from AES-128 to 3DES, he will
increase
the encryption overhead.
E. If Jacob changes the setting, Perform key exchange encryption with: from 3DES to DES, he will
enhance the
VPN Community's security and reduce encryption overhead.
Answer: A, B

CheckPoint test questions   156-310   156-310

NO.15 Which of the following is NOT a method of Load Balancing with
VPN-1/FireWall-1?
A. Domain Load Balancing
B. Round Robin
C. Server Load
D. Round Trip
E. Quantum Load Balancing
Answer: E

CheckPoint   156-310   156-310   156-310 original questions

NO.16 The
_______ algorithm determines the load of each physical server and requires a Load Measuring
Agent be installed on each server.
A. Server Load
B. Server Relay
C. Round Robin
D. Domain
E. Round Trip
Answer: A

CheckPoint original questions   156-310   156-310

NO.17 Ann would like to deploy H.323 with a gatekeeper and gateway on her internal network. This network
is
behind a VPN-1/FireWall-1 Enforcement Module. Which of the following objects is NOT required to
configure VPN-1/FireWall-1 for H.323 in this scenario?
A. Address Range representing internal IP-addressed phones
B. Gatekeeper Node Object
C. Address range of external IP-addressed phones
D. Voice over IP (VoIP) Gateway Node Object
E. Voice over IP (VoIP) Domain Object
Answer: C

CheckPoint   156-310   156-310 study guide   156-310 exam   156-310

NO.18 Ann is a VPN-1/FireWall-1 Security Administrator. Her organization's solution for remote-access
security is SecureClient. Ann's organization is undergoing a security audit. The auditor is concerned,
because static passwords, such as VPN-1 & FireWall-1 and operating system passwords are cached on
the desktop, and users are not required to re-authenticate. Which of the following explanations addresses
the auditor's concerns?
A. The auditor has incorrect information. SecureClient caches all passwords. A strong encryption
algorithm
protects the proprietary database used for password caching, so there is never a need to purge cached
passwords.
B. The auditor has incorrect information. SecureClient never cached passwords. SecureClient users are
forced
to re-authenticate for each new connection, regardless of the type of password used.
C. Cached passwords are purged when SecureClient receives Policy and Topology updates. Most
installation
update Security Policies frequently, so cached passwords are rarely stored for longer than six to eight
hours.
Renaming the userc.C file to userc.old will also purge the password cache.
D. Cached passwords are purged at an interval specified in the Desktop Security Policy. As long as the
user.C
file is encrypted, users cannot tamper with the interval setting. The interval time is in seconds from the
time to
SecureClient software is launched.
E. Cached passwords are purged when SecureClient is stopped, when a connect mode is disconnected,
and
when the computer is rebooted. SecureClient users can manually purge the cache, by choosing the Erase
Passwords option from the Passwords menu.
Answer: E

CheckPoint test questions   156-310 test questions   156-310   156-310 exam

NO.19 Which of the following FTP Content Security settings prevents internal users from sending corporate
files to external FTP Servers, while allowing users to retrieve files?
A. Use an FTP resource, and enable the GET and PUT methods.
B. Use an FTP resource and enable the GET method.
C. Use an FTP resource and enable the PUT method.
D. Block FTP_PASV.
E. Block all FTP traffic.
Answer: B

CheckPoint exam simulations   156-310   156-310

NO.20 Which of the following is NOT a method used to configure SIP?
A. With SIP Proxies.
B. With a SIP Gatekeeper to a network without a proxy.
C. From a network without a proxy to a network with a proxy.
D. With a proxy for internal communications.
E. Without SIP Proxies.
Answer: B

CheckPoint   156-310 dumps   156-310   156-310

NO.21 Vered is a Security Administrator preparing to migrate her organization's IKE VPNs from pre-shared
secrets to PKI with certificates. Vered's organization has client-to-site VPNs between SecureClients and
Enforcement Modules, and site-to-site VPNs between Enforcement Modules. Vered will use the
VPN-1/FireWall-1 Internal Certificate Authority (ICA), to generate and maintain certificates. Which of
the following statements is TRUE?
Vered can:
A. Install and configure an OPSEC-certified Certificate Authority product. Vered cannot use the Internal
Certificate Authority (ICA) to accomplish this task.
B. Migrate the organization's site-to-site VPNs, but she cannot migrate the organization's client-to-site
VPNs.
C. Either migrate the PKI with certificates for her VPNs, or use the ICA for certificate generation and
maintenance. Vered cannot do both.
D. Migrate both the site-to-site VPNs and the client-to-site VPNs. She can use the ICA to generate and
maintain
certificates.
E. Migrate the organization's client-to-site VPNs, if she moves from SecureClient to SecuRemote. She
cannot
migrate the site-to-site VPNs.
Answer: D

CheckPoint certification   156-310 original questions   156-310   156-310 braindump

NO.22 You are using Hybrid IKE for Client Authentication. SecureClient produces the error Certifcation is
badly signed. Which of the following is the MOST likely cause of the problem and the appropriate
solution?
A. Under the firewall object > VPN > IKE Properties > Support Authentication Methods, Hybrid Mode is
not
selected. Select the Hybrid Mode option, and stop and restart the Enforcement Module.
B. The Distinguished Name used is too long. Change it to a shorter name in the Manage Certificate
Properties screen.
C. The certificate created by the Internal Certificate Authority (ICA) is corrupt. Create a new certificate.
D. The SecureClient and VPN-1/FireWall-1 Enforcement Module to which it is attempting to connect are
running incompatible versions. Upgrade the SecureClient to NG with Application Intelligence.
E. The digital signature is missing. Add the digital signature to the certificate in the Manage Certificate
Properties screen.
Answer: A

CheckPoint   156-310 exam simulations   156-310   156-310 practice test

NO.23 If the Use Aggressive Mode check box in the IKE Properties dialogue box is
enabled:
A. The standard six-packet IKE Phase 1 exchange is replaced by a three-packet
exchange.
B. The standard three-packet IKE Phase 2 exchange is replaced by a six-packet
exchange.
C. The standard three-packet IKE Phase 1 exchange is replaced by a six-packet
exchange.
D. The standard six-packet IKE Phase 2 exchange is replaced by a three-packet
exchange.
E. The standard three-packet IKE Phase 3 exchange is replaced by a six-packet exchange.
Answer: A

CheckPoint   156-310   156-310 certification training   156-310   156-310 questions

NO.24 Static passwords such as VPN-1 & FirwWall-1 and operating system passwords are cached on the
desktop and users are not required to re-authenticate. Which of the following does NOT clear the
password cache?
A. Receives a policy update.
B. Perform a disconnect from a connect mode.
C. Selects the Stop VPN 1 SecuRemote option from the File menu.
D. Selects the Erase Passwords option from the Passwords menu.
E. Reboots the computer.
Answer: A

CheckPoint   156-310   156-310 test   156-310 braindump

NO.25 Which of the following statements BEST explains the difference between VPN-1/FireWall-1 logs and
alerts?
The difference between VPN-1/FireWall-1 logs and alerts is that:
A. Log entries contain detailed information about traffic. Alerts contain only brief descriptions of problems.
And links to the appropriate log entries.
B. Log entries are recorded in SmartView Tracker, and are persistent. Alerts appear only in SmartView
Status,
and are not persistent.
C. Logs are recorded sequentially, by date and time received. Alerts are arranged by priority and
magnitude.
D. Logging allows a Security Administrator to view historical connection information. Alerts are real-time
and
can be applied to a Security Policy's predefined tracking properties.
E. Logs are generated for explicit rules, defined by Security Administrators in the Security Policy. Alerts
are
automatically generated by implicit rules, created as a result of Global Properties settings.
Answer: D

CheckPoint certification   156-310 study guide   156-310 study guide

NO.26 All of the following are steps for implementing UFP, EXCEPT:
A. While the UFP Server is analyzing the requests, the Enforcement Module HTTP Proxy Server initiates
a
request to the destination. The HTTP Proxy server then waits for a response from the UFP Server before
allowing the request.
B. The client invokes a connection through the VPN-1/FireWall-1 Enforcement Module.
C. The Content Server inspects the URLs and returns the validation result message to the Enforcement
Module.
D. The Enforcement Module takes the action defined in the Rule Base for the resource.
E. The Security Server uses UFP to send the URL to a third-party UFP Server categorization.
Answer: A

CheckPoint   156-310   156-310 exam   156-310

NO.27 Which of the following statements about IKE Encryption are TRUE? (Choose three
)
A. The final packet size is increased after it is encrypted.
B. TCP and IP headers are encrypted, along with the payload.
C. IKE uses in-place encryption.
D. IKE can use the FWZ1 encryption algorithm.
E. IKE uses tunneling encryption.
Answer: A, B, E

CheckPoint exam prep   156-310   156-310 questions   156-310 practice test

NO.28 VPN-1/FireWall-1 can be configured to enable Voice over IP (VoIP) traffic in which
of the following environments? (Choose two)
A. SIP
B. Q.931
C. G.723
D. DiffServ QOS
E. H.323
Answer: A, E

CheckPoint exam   156-310 questions   156-310   156-310 exam simulations   156-310

NO.29 If you are using SIP or SIP_ANY, and the Source or Destination is Any, which of the following
statements are TRUE concerning SIP Services? (Choose two)
If the Service is:
A. SIP_Any, and the Source is Any, the object represented by Any (internal or external) is SIP Proxy.
B. SIP_Any, and the Destination is Any, the object represented by Any (external only) is not a SIP Proxy.
C. SIP, and the Source is Any, the object represented by Any is allowed to redirect the connection, unless
it is a
SIP Proxy.
D. SIP, and the Destination is ANY, the object represented by Any is allowed to redirect the connection, so
it
must be a SIP Proxy.
E. SIP_Any, and the Source or Destination is Any, the object represented by Any (internal or external) is
always a SIP Proxy.
Answer: B, C

CheckPoint test   156-310   156-310 exam dumps   156-310   156-310 answers real questions   156-310

NO.30 Which of the following is NOT a function of the Internal Certificate Authority (ICA)?
A. Provides certificates for users and Security Administrators.
B. Generated certificates for HTTPS Web server.
C. Establishes SIC between OPSEC applications and Check Point products.
D. Authentications SecureClient traffic to Enforcement Modules for VPNs.
E. Establishes SIC between Check Point products.
Answer: B

CheckPoint answers real questions   156-310 demo   156-310 demo   156-310 braindump   156-310

2013年6月27日星期四

CheckPoint certification 156-310 exam best training materials

Pass4Test is website that can help a lot of IT people realize their dreams. If you have a IT dream, then quickly click the click of Pass4Test. It has the best training materials, which is Pass4Test;s CheckPoint 156-310 exam training materials. This training materials is what IT people are very wanted. Because it will make you pass the exam easily, since then rise higher and higher on your career path.


If you attend CheckPoint certification 156-310 exams, your choosing Pass4Test is to choose success! I wish you good luck.


In the such a brilliant era of IT industry in the 21st century competition is very fierce. Naturally, CheckPoint certification 156-310 exam has become a very popular exam in the IT area. More and more people register for the exam and passing the certification exam is also those ambitious IT professionals' dream.


Exam Code: 156-310

Exam Name: CheckPoint (Check Point CCSE NG)

Pass4Test's practice questions and answers about the CheckPoint certification 156-310 exam is developed by our expert team's wealth of knowledge and experience, and can fully meet the demand of CheckPoint certification 156-310 exam's candidates. From related websites or books, you might also see some of the training materials, but Pass4Test's information about CheckPoint certification 156-310 exam is the most comprehensive, and can give you the best protection. Candidates who participate in the CheckPoint certification 156-310 exam should select exam practice questions and answers of Pass4Test, because Pass4Test is the best choice for you.


156-310 Free Demo Download: http://www.pass4test.com/156-310.html


NO.1 Which of the following does NOT require definition for a Voice over IP (VoIP)
Domain SIP object?
A. SIP Proxy
B. IP Address Range
C. VoIP Gateway
D. Related Endpoint Domain
E. Name
Answer: A

CheckPoint dumps   156-310 questions   156-310   156-310 test questions   156-310 exam simulations

NO.2 When you upgrade VPN-1/FireWall-1, what components are carried over to the new
version? (Choose two)
A. Licenses
B. VPN-1/FireWall-1 database
C. OPSEC database
D. Backward Compatibility
E. Rule Base
Answer: A, B

CheckPoint   156-310   156-310   156-310 answers real questions   156-310 braindump

NO.3 Vered is a Security Administrator preparing to migrate her organization's IKE VPNs from pre-shared
secrets to PKI with certificates. Vered's organization has client-to-site VPNs between SecureClients and
Enforcement Modules, and site-to-site VPNs between Enforcement Modules. Vered will use the
VPN-1/FireWall-1 Internal Certificate Authority (ICA), to generate and maintain certificates. Which of
the following statements is TRUE?
Vered can:
A. Install and configure an OPSEC-certified Certificate Authority product. Vered cannot use the Internal
Certificate Authority (ICA) to accomplish this task.
B. Migrate the organization's site-to-site VPNs, but she cannot migrate the organization's client-to-site
VPNs.
C. Either migrate the PKI with certificates for her VPNs, or use the ICA for certificate generation and
maintenance. Vered cannot do both.
D. Migrate both the site-to-site VPNs and the client-to-site VPNs. She can use the ICA to generate and
maintain
certificates.
E. Migrate the organization's client-to-site VPNs, if she moves from SecureClient to SecuRemote. She
cannot
migrate the site-to-site VPNs.
Answer: D

CheckPoint   156-310 exam   156-310 dumps   156-310 certification training   156-310 test questions   156-310 test

NO.4 Dr Bill is setting up a new VPN-1/FireWall-1 Enforcement Module. The Rule Base
is configured to allow all traffic, and the Enforcement Module is set up as shown in
the screen capture below. Dr bill cannot get the new system to pass any traffic.
What is the MOST likely cause of the problem?
System specifications:
1. Processor: 2.2 GHz
2. RAM: 256 MB
3. Hard Disk: 10 GB
4. OS: Windows 2000 Server
Results of ipconfig/all
View the following exhibit for the results of ipconfig/all.
A. Routing is not properly configured.
B. The machine does not have enough RAM.
C. The processor is not fast enough.
D. The operating system is not supported.
E. The Rule Base is blocking traffic.
Answer: A

CheckPoint   156-310 demo   156-310

NO.5 VPN-1/FireWall-1 can be configured to enable Voice over IP (VoIP) traffic in which
of the following environments? (Choose two)
A. SIP
B. Q.931
C. G.723
D. DiffServ QOS
E. H.323
Answer: A, E

CheckPoint exam dumps   156-310   156-310   156-310   156-310

NO.6 Ann would like to deploy H.323 with a gatekeeper and gateway on her internal network. This network
is
behind a VPN-1/FireWall-1 Enforcement Module. Which of the following objects is NOT required to
configure VPN-1/FireWall-1 for H.323 in this scenario?
A. Address Range representing internal IP-addressed phones
B. Gatekeeper Node Object
C. Address range of external IP-addressed phones
D. Voice over IP (VoIP) Gateway Node Object
E. Voice over IP (VoIP) Domain Object
Answer: C

CheckPoint   156-310   156-310 questions   156-310 original questions

NO.7 Which of the following is NOT a method used to configure SIP?
A. With SIP Proxies.
B. With a SIP Gatekeeper to a network without a proxy.
C. From a network without a proxy to a network with a proxy.
D. With a proxy for internal communications.
E. Without SIP Proxies.
Answer: B

CheckPoint exam prep   156-310   156-310 exam simulations   156-310

NO.8 Which of the following is NOT a feature or quality of a hash function?
A. It is mathematically infeasible to derive the original message from the message digest.
B. The hash function is irreversible.
C. It is mathematically infeasible for two different messages to produce the same message digest.
D. The hash function forms a two-way, secure communication.
E. Encrypted with the sender's RSA private key, the hash function forms the digital signature.
Answer: D

CheckPoint original questions   156-310 braindump   156-310   156-310   156-310 exam dumps

NO.9 Which of the following encryption algorithms supports a key length from 128-bits to 256-bits and is
outlined in the new Federal Information Processing Standard publication?
A. AES (Ridndael)
B. CAST Cipher
C. 3DES
D. DES
E. Blowfish
Answer: A

CheckPoint test   156-310   156-310   156-310   156-310 test answers

NO.10 Exhibit
Jacob configured a meshed VPN Community, with VPN properties set as shown below. Which of the
following statements are TRUE? (Choose two)
A. Jacob is using the default VPN property settings for a VPN-1/FireWall-1 meshed VPN Community.
B. Jacob's community will perform IKE Phase 1 key-exchange encryption, using the longest key
VPN-1/FireWall-1 supports.
C. Jacob must change the data-integrity settings for this VPN Community. MD5 is incompatible with AES.
D. If Jacob changes the setting Perform IPsec data encryption with: from AES-128 to 3DES, he will
increase
the encryption overhead.
E. If Jacob changes the setting, Perform key exchange encryption with: from 3DES to DES, he will
enhance the
VPN Community's security and reduce encryption overhead.
Answer: A, B

CheckPoint   156-310   156-310 questions   156-310   156-310 test

NO.11 The
_______ algorithm determines the load of each physical server and requires a Load Measuring
Agent be installed on each server.
A. Server Load
B. Server Relay
C. Round Robin
D. Domain
E. Round Trip
Answer: A

CheckPoint questions   156-310 test questions   156-310   156-310 certification   156-310 test

NO.12 Static passwords such as VPN-1 & FirwWall-1 and operating system passwords are cached on the
desktop and users are not required to re-authenticate. Which of the following does NOT clear the
password cache?
A. Receives a policy update.
B. Perform a disconnect from a connect mode.
C. Selects the Stop VPN 1 SecuRemote option from the File menu.
D. Selects the Erase Passwords option from the Passwords menu.
E. Reboots the computer.
Answer: A

CheckPoint test   156-310 exam dumps   156-310   156-310 certification

NO.13 Ken us assisting a user whose SecurityClient password has expired. The SecureClient user can no
longer
access resources in the VPN Domain. Which of the following solutions is likely to resolve the issue?
A. Ken must ask the VPN-1/FireWall-1 Security Administrator to change the setting Password Expires to a
date
in the future. Users cannot adjust their SecureClient passwords.
B. Ken should as the user to change his password, using the New Password option on SecureClient's
Passwords
menu. The user can change his password, then stop and start SecureClient.
C. If the SecureClient password is allowed to expire, the software will no longer function. Ken should help
the
user uninstall and reinstall SecureClient. The user will be prompted to supply a new password during
installation.
D. When the SecureClient password expires while a session is in progress, the session will not exit
properly.
Ken should ask the user to shut down and restart his computer. The user will be prompted to supply a
new
password after login.
E. The user must edit the userc.C file, to change the expiration date on his password. Ken should help the
user
make the necessary modifications to the userc.C file, using a text editor that does not insert Unicode
characters.
Answer: A

CheckPoint   156-310 dumps   156-310

NO.14 Diffie-Hellman uses which type of key exchange?
A. Static
B. Dynamic
C. Symmetric
D. Asymmetric
E. Adaptive
Answer: D

CheckPoint   156-310   156-310 dumps   156-310 dumps   156-310 questions

NO.15 All of the following are steps for implementing UFP, EXCEPT:
A. While the UFP Server is analyzing the requests, the Enforcement Module HTTP Proxy Server initiates
a
request to the destination. The HTTP Proxy server then waits for a response from the UFP Server before
allowing the request.
B. The client invokes a connection through the VPN-1/FireWall-1 Enforcement Module.
C. The Content Server inspects the URLs and returns the validation result message to the Enforcement
Module.
D. The Enforcement Module takes the action defined in the Rule Base for the resource.
E. The Security Server uses UFP to send the URL to a third-party UFP Server categorization.
Answer: A

CheckPoint test questions   156-310   156-310 exam prep   156-310

NO.16 Which of the following statements BEST describes the difference between VPN Domains and VPN
Communities?
A. A VPN Domain is a network, or group of networks, protected by and Enforcement Module. A VPN
Community is a collection of VPN Domains and the VPN tunnels between them.
B.
A VPN Domain is a remote-access VPN, consisting of a group of SecureClients and their associated
Enforcement Module. A VPN Community is a collection of Enforcement Module-to-Enforcement Module
VPNSs.
C. VPN Domains are used in Microsoft environments, and allow VPN-1/FireWall1- to communicate with
Domain Controllers. VPN Communities are used in Unix environments, to allow VPN-1/FireWall-1 to
communicate with authentication servers.
D. VPN Domains specify encryption properties and access restrictions for users. VPN Communities detail
encryption properties and access restrictions, for machines and processes.
E. VPN Domains are used for Security Policies created in traditional mode. VPN Communities are used in
simplified mode. VPN Domains are not available, if simplified mode is used.
Answer: A

CheckPoint braindump   156-310 braindump   156-310 dumps   156-310 braindump   156-310

NO.17 If you are using SIP or SIP_ANY, and the Source or Destination is Any, which of the following
statements are TRUE concerning SIP Services? (Choose two)
If the Service is:
A. SIP_Any, and the Source is Any, the object represented by Any (internal or external) is SIP Proxy.
B. SIP_Any, and the Destination is Any, the object represented by Any (external only) is not a SIP Proxy.
C. SIP, and the Source is Any, the object represented by Any is allowed to redirect the connection, unless
it is a
SIP Proxy.
D. SIP, and the Destination is ANY, the object represented by Any is allowed to redirect the connection, so
it
must be a SIP Proxy.
E. SIP_Any, and the Source or Destination is Any, the object represented by Any (internal or external) is
always a SIP Proxy.
Answer: B, C

CheckPoint exam dumps   156-310   156-310 exam   156-310

NO.18 Which of the following is NOT a valid VPN configuration option available in the
VPN Manager of the Simplified Rule Base?
A. Point-to-Point
B. Mesh
C. Remote Access
D. Star with Meshed Center
E. Star
Answer: A

CheckPoint test answers   156-310 certification   156-310   156-310 certification

NO.19 Which of the following is NOT a method of Load Balancing with
VPN-1/FireWall-1?
A. Domain Load Balancing
B. Round Robin
C. Server Load
D. Round Trip
E. Quantum Load Balancing
Answer: E

CheckPoint   156-310   156-310 exam simulations   156-310 practice test   156-310 questions

NO.20 You are importing a URI specification file from the Match tab on the URI Resource Properties screen.
Where is the editable URI specification file stored?
A. Policy Server
B. SmartView Monitor
C. Enforcement Module
D. SmartCenter Server
E. Enterprise Log Module
Answer: D

CheckPoint exam simulations   156-310 certification training   156-310 dumps   156-310

NO.21 Which of the following statements BEST explains the difference between VPN-1/FireWall-1 logs and
alerts?
The difference between VPN-1/FireWall-1 logs and alerts is that:
A. Log entries contain detailed information about traffic. Alerts contain only brief descriptions of problems.
And links to the appropriate log entries.
B. Log entries are recorded in SmartView Tracker, and are persistent. Alerts appear only in SmartView
Status,
and are not persistent.
C. Logs are recorded sequentially, by date and time received. Alerts are arranged by priority and
magnitude.
D. Logging allows a Security Administrator to view historical connection information. Alerts are real-time
and
can be applied to a Security Policy's predefined tracking properties.
E. Logs are generated for explicit rules, defined by Security Administrators in the Security Policy. Alerts
are
automatically generated by implicit rules, created as a result of Global Properties settings.
Answer: D

CheckPoint   156-310   156-310   156-310   156-310

NO.22 Which of the following FTP Content Security settings prevents internal users from sending corporate
files to external FTP Servers, while allowing users to retrieve files?
A. Use an FTP resource, and enable the GET and PUT methods.
B. Use an FTP resource and enable the GET method.
C. Use an FTP resource and enable the PUT method.
D. Block FTP_PASV.
E. Block all FTP traffic.
Answer: B

CheckPoint   156-310   156-310   156-310

NO.23 Mark is preparing to install VPN-1/FireWall-1 and has created the installation plan below.
1. Perform the following operations below in sequential order.
2. Install the operating system.
3. Configure routing and IP forwarding.
4. Configure name resolution.
5. Patch the operating system.
6. Set $FWDIR and $CPDIR environment variables.
7. Install VPN-1/FireWall-1.
8. Patch VPN-1/FireWall-1,
Which step in Mark's installation plan is NOT necessary?
A. Operating-system patches should not be applied, until after VPN-1/FireWall-1 is installed. Applying
operating-system patches before VPN-1/FireWall-1 is installed will result in an unsecured system.
B. VPN-1/FireWall-1 configures name resolution automatically. Name resolution should not be part of the
installation plan.
C. There is nothing wrong with Mark's installation plan.
D.
Routing and IP Forwarding should be configured after VPN-1/FireWall-1 is installed. Configuring routing
and
IP forwarding before VPN-1/FireWall-1 is installed will result in an unstable system.
E. VPN-1/FireWall-1 configures environment variables automatically. Configure environment variables
should
not be part of the installation plan.
Answer: E

CheckPoint   156-310   156-310   156-310   156-310

NO.24 Which of the following statements about IKE Encryption are TRUE? (Choose three
)
A. The final packet size is increased after it is encrypted.
B. TCP and IP headers are encrypted, along with the payload.
C. IKE uses in-place encryption.
D. IKE can use the FWZ1 encryption algorithm.
E. IKE uses tunneling encryption.
Answer: A, B, E

CheckPoint exam   156-310 dumps   156-310 questions   156-310 exam simulations

NO.25 If the Use Aggressive Mode check box in the IKE Properties dialogue box is
enabled:
A. The standard six-packet IKE Phase 1 exchange is replaced by a three-packet
exchange.
B. The standard three-packet IKE Phase 2 exchange is replaced by a six-packet
exchange.
C. The standard three-packet IKE Phase 1 exchange is replaced by a six-packet
exchange.
D. The standard six-packet IKE Phase 2 exchange is replaced by a three-packet
exchange.
E. The standard three-packet IKE Phase 3 exchange is replaced by a six-packet exchange.
Answer: A

CheckPoint exam prep   156-310 dumps   156-310 exam dumps

NO.26 Ann is a VPN-1/FireWall-1 Security Administrator. Her organization's solution for remote-access
security is SecureClient. Ann's organization is undergoing a security audit. The auditor is concerned,
because static passwords, such as VPN-1 & FireWall-1 and operating system passwords are cached on
the desktop, and users are not required to re-authenticate. Which of the following explanations addresses
the auditor's concerns?
A. The auditor has incorrect information. SecureClient caches all passwords. A strong encryption
algorithm
protects the proprietary database used for password caching, so there is never a need to purge cached
passwords.
B. The auditor has incorrect information. SecureClient never cached passwords. SecureClient users are
forced
to re-authenticate for each new connection, regardless of the type of password used.
C. Cached passwords are purged when SecureClient receives Policy and Topology updates. Most
installation
update Security Policies frequently, so cached passwords are rarely stored for longer than six to eight
hours.
Renaming the userc.C file to userc.old will also purge the password cache.
D. Cached passwords are purged at an interval specified in the Desktop Security Policy. As long as the
user.C
file is encrypted, users cannot tamper with the interval setting. The interval time is in seconds from the
time to
SecureClient software is launched.
E. Cached passwords are purged when SecureClient is stopped, when a connect mode is disconnected,
and
when the computer is rebooted. SecureClient users can manually purge the cache, by choosing the Erase
Passwords option from the Passwords menu.
Answer: E

CheckPoint   156-310   156-310   156-310   156-310

NO.27 When upgrading a configuration to NG with Application Intelligence: (Choose the
FALSE answer)
A. Upgrade the SmartConsole.
B. Upgrade each module's version in SmartDashboard manually.
C. Upgrade the VPN-1/Firewall-1 Enforcement Modules.
D. Copy $FWDIR/state from one version of VPN-1/FireWall-1 to another version of
VPN-1/FireWall-1.
E. Upgrade the SmartCenter server. The version is set during the upgrade.
Answer: D

CheckPoint practice test   156-310 study guide   156-310 exam prep   156-310

NO.28 Which of the following is NOT a function of the Internal Certificate Authority (ICA)?
A. Provides certificates for users and Security Administrators.
B. Generated certificates for HTTPS Web server.
C. Establishes SIC between OPSEC applications and Check Point products.
D. Authentications SecureClient traffic to Enforcement Modules for VPNs.
E. Establishes SIC between Check Point products.
Answer: B

CheckPoint   156-310   156-310 test   156-310 test answers   156-310 test questions   156-310 exam simulations

NO.29 You are using Hybrid IKE for Client Authentication. SecureClient produces the error Certifcation is
badly signed. Which of the following is the MOST likely cause of the problem and the appropriate
solution?
A. Under the firewall object > VPN > IKE Properties > Support Authentication Methods, Hybrid Mode is
not
selected. Select the Hybrid Mode option, and stop and restart the Enforcement Module.
B. The Distinguished Name used is too long. Change it to a shorter name in the Manage Certificate
Properties screen.
C. The certificate created by the Internal Certificate Authority (ICA) is corrupt. Create a new certificate.
D. The SecureClient and VPN-1/FireWall-1 Enforcement Module to which it is attempting to connect are
running incompatible versions. Upgrade the SecureClient to NG with Application Intelligence.
E. The digital signature is missing. Add the digital signature to the certificate in the Manage Certificate
Properties screen.
Answer: A

CheckPoint test   156-310 original questions   156-310 demo   156-310

NO.30 Which of the following is TRUE of the relationship between the RemoteAccess VPN
Community and the Security Policy Rule Base?
A. The RemoteAccess VPN Community defines VPN connection parameters for
SecuRemote connections. The Security Policy Rule Base is used to allow access to
protected resources.
B. The RemoteAccess VPN Community is used to allow access to protected resources.
The Security Policy Rule Base is used to define VPN connection parameters for
SecuRemote connections.
C. The Security Policy Rule Base is used to define VPN connection parameters for
SecuRemote connections and is used to allow access to protected resources. The
RemoteAccess VPN Community applies only SecureClient.
D. The RemoteAccess VPN Community defines VPN connection parameters for
SecuRemote connections and is used to allow access to protected resources. Security
Policy Rules are not defined for SecuRemote.
Answer: A

CheckPoint original questions   156-310 exam   156-310 exam prep   156-310

More and more people choose CheckPoint 156-310 exam. Because of its popularity, you can use the Pass4Test CheckPoint 156-310 exam questions and answers to pass the exam. This will bring you great convenience and comfort. This is a practice test website. It is available on the Internet with the exam questions and answers, as we all know, Pass4Test is the professional website which provide CheckPoint 156-310 exam questions and answers.