최신 CheckPoint Certification 156-315 무료샘플문제:
1. Your company has two headquarters, one in London, one in New York. Each headquarters includes several branch offices. The branch offices only need to communicate with the headquarters in their country, not with each other, and only the headquarters need to communicate directly. What is the BEST configuration for VPN Communities among the branch offices and their headquarters, and between the two headquarters? VPN Communities comprised of:
A) two mesh Communities, one for each headquarters and their branch offices; and one star Community, in which London is the center of the Community and New York is the satellite.
B) two star and one mesh Community; each star Community is set up for each site, with headquarters as the center of the Community, and branches as satellites. The mesh Communities are between the New York and London headquarters.
C) two mesh Communities, one for each headquarters and their branch offices; and one star Community, where New York is the center of the Community and London is the satellite.
D) three mesh Communities: one for London headquarters and its branches, one for New York headquarters and its branches, and one for London and New York headquarters.
2. When Load Sharing Multicast mode is defined in a ClusterXL cluster object, how are packets being handled by cluster members?
A) All members receive all packets. The SmartCenter Server decides which member will process the packets. Other members simply drop the packets.
B) All cluster members process all packets, and members synchronize with each other.
C) Only one member at a time is active. The active cluster member processes all packets.
D) All members receive all packets. An algorithm determines which member processes packets, and which member drops packets.
3. Your VPN Community includes three Security Gateways. Each Gateway has its own internal network defined as a VPN Domain. You must test the VPN-1 NGX route-based VPN feature, without stopping the VPN. What is the correct order of steps?
A) 1. Add a new interface on each Gateway.
2. Add the newly added network into the existing VPN Domain for each Gateway.
3. Create VTIs on each gateway object, to point to the other two peers.
4. Enable advanced routing on all three Gateways.
B) 1. Add a new interface on each Gateway.
2. Remove the newly added network from the current VPN Domain for each Gateway.
3. Create VTIs on each Gateway, to point to the other two peers
4. Enable advanced routing on all three Gateways.
C) 1. Add a new interface on each Gateway.
2. Remove the newly added network from the current VPN Domain in each gateway object.
3. Create VPN Tunnel Interfaces (VTI) on each gateway object, to point to the other two peers.
4. Add static routes on three Gateways, to route the new network to each peer's VTI interface.
D) 1. Add a new interface on each Gateway.
2. Add the newly added network into the existing VPN Domain for each gateway object.
3. Create VTIs on each gateway object, to point to the other two peers.
4. Add static routes on three Gateways, to route the new networks to each peer's VTI interface.
4. Jacob is using a mesh VPN Community to create a site-to-site VPN. The VPN properties in this mesh Community display in this graphic:Which of the following statements is TRUE?
A) If Jacob changes the setting, "Perform key exchange encryption with" from "3DES" to
"DES", he will enhance the VPN Community's security and reduce encryption overhead.
B) Jacob's VPN Community will perform IKE Phase 1 key-exchange encryption, using the longest key VPN-1 NGX supports.
C) Jacob must change the data-integrity settings for this VPN Community. MD5 is incompatible with AES.
D) If Jacob changes the setting "Perform IPSec data encryption with" from "AES-128" to
"3DES", he will increase the encryption overhead.
5. Assume an intruder has compromised your current IKE Phase 1 and Phase 2 keys. Which of the following options will end the intruder's access, after the next Phase 2 exchange occurs?
A) DES Key Reset
B) Perfect Forward Secrecy
C) MD5 Hash Completion
D) SHA1 Hash Completion
E) Phase 3 Key Revocation
질문과 대답:
질문 # 1 정답: B | 질문 # 2 정답: D | 질문 # 3 정답: C | 질문 # 4 정답: D | 질문 # 5 정답: B |