Free 156-915.80 Exam Braindumps (page: 37)

Page 36 of 76

You are running a R80 Security Gateway on GAiA. In case of a hardware failure, you have a server with the exact same hardware and firewall version installed. What back up method could be used to quickly put the secondary firewall into production?

  1. manual backup
  2. upgrade_export
  3. backup
  4. snapshot

Answer(s): D



You want to implement Static Destination NAT in order to provide external, Internet users access to an internal Web Server that has a reserved (RFC 1918) IP address. You have an unused valid IP address on the network between your Security Gateway and ISP router. You control the router that sits between the firewall external interface and the Internet.
What is an alternative configuration if proxy ARP cannot be used on your Security Gateway?

  1. Publish a proxy ARP entry on the ISP router instead of the firewall for the valid IP address.
  2. Place a static ARP entry on the ISP router for the valid IP address to the firewall's external address.
  3. Publish a proxy ARP entry on the internal Web server instead of the firewall for the valid IP address.
  4. Place a static host route on the firewall for the valid IP address to the internal Web server.

Answer(s): B



You intend to upgrade a Check Point Gateway from R71 to R80. Prior to upgrading, you want to back up the Gateway should there be any problems with the upgrade. Which of the following allows for the Gateway configuration to be completely backed up into a manageable size in the least amount of time?

  1. database revision
  2. snapshot
  3. upgrade_export
  4. backup

Answer(s): D



Several Security Policies can be used for different installation targets. The Firewall protecting Human Resources' servers should have its own Policy Package. These rules must be installed on this machine and not on the Internet Firewall. How can this be accomplished?

  1. A Rule Base is always installed on all possible targets. The rules to be installed on a Firewall are defined by the selection in the Rule Base row Install On.
  2. When selecting the correct Firewall in each line of the Rule Base row Install On, only this Firewall is shown in the list of possible installation targets after selecting Policy > Install on Target.
  3. In the menu of SmartDashboard, go to Policy > Policy Installation Targets and select the correct firewall via Specific Targets.
  4. A Rule Base can always be installed on any Check Point Firewall object. It is necessary to select the appropriate target directly after selecting Policy > Install on Target.

Answer(s): C






Post your Comments and Discuss Checkpoint 156-915.80 exam with other Community members:

156-915.80 Exam Discussions & Posts