Free 156-915.80 Exam Braindumps (page: 28)

Page 27 of 76

Your primary Security Gateway runs on GAiA. What is the easiest way to back up your Security Gateway R80 configuration, including routing and network configuration files?

  1. Copying the directories $FWDIR/conf and $FWDIR/lib to another location.
  2. Using the native GAiA backup utility from command line or in the Web based user interface.
  3. Using the command upgrade_export.
  4. Run the pre_upgrade_verifier and save the .tgz file to the directory /temp.

Answer(s): B



The third-shift Administrator was updating Security Management Server access settings in Global Properties. He managed to lock all administrators out of their accounts. How should you unlock these accounts?

  1. Delete the file admin.lock in the Security Management Server directory $FWDIR/tmp/.
  2. Reinstall the Security Management Server and restore using upgrade_import.
  3. Type fwm lock_admin -ua from the Security Management Server command line.
  4. Login to SmartDashboard as the special cpconfig_admin user account; right-click on each administrator object and select unlock.

Answer(s): C



Suppose the Security Gateway hard drive fails and you are forced to rebuild it. You have a snapshot file stored to a TFTP server and backups of your Security Management Server. What is the correct procedure for rebuilding the Gateway quickly?

  1. Reinstall the base operating system (i.e., GAiA). Configure the Gateway interface so that the Gateway can communicate with the TFTP server. Revert to the stored snapshot image, and install the Security Policy.
  2. Run the command revert to restore the snapshot, establish SIC, and install the Policy.
  3. Run the command revert to restore the snapshot. Reinstall any necessary Check Point products.
    Establish SIC and install the Policy.
  4. Reinstall the base operating system (i.e., GAia). Configure the Gateway interface so that the Gateway can communicate with the TFTP server. Reinstall any necessary Check Point products and previously applied hotfixes. Revert to the stored snapshot image, and install the Policy.

Answer(s): A



In the Rule Base displayed, user authentication in Rule 4 is configured as fully automatic. Eric is a member of the LDAP group, MSD_Group.

What happens when Eric tries to connect to a server on the Internet?

  1. None of these things will happen.
  2. Eric will be authenticated and get access to the requested server.
  3. Eric will be blocked because LDAP is not allowed in the Rule Base.
  4. Eric will be dropped by the Stealth Rule.

Answer(s): D






Post your Comments and Discuss Checkpoint 156-915.80 exam with other Community members:

156-915.80 Discussions & Posts