Check Point 156-915.77 Check Point Certified Security Expert Update Blade Online Training
Check Point 156-915.77 Online Training
The questions for 156-915.77 were last updated at Aug 18,2025.
- Exam Code: 156-915.77
- Exam Name: Check Point Certified Security Expert Update Blade
- Certification Provider: Check Point
- Latest update: Aug 18,2025
Which of the following would be a result of having more than one active Security Management Server in a Management High Availability (HA) configuration?
- A . The need to manually synchronize the secondary Security Management Server with the Primary Security Management Server is eliminated.
- B . Allows for faster seamless failover: from active-to-active instead of standby-to-active.
- C . An error notification will popup during Smart Dashboard login if the two machines can communicate indicating Collision status.
- D . Creates a High Availability implementation between the Gateways installed on the Security Management Servers.
You want to verify that your Check Point cluster is working correctly.
Which command line tool can you use?
- A . cphastart -status
- B . cphainfo -s
- C . cphaprob state
- D . cphaconf state
How can you view the virtual cluster interfaces of a Cluster XL environment?
- A . cphaprob -ia if
- B . cphaprob -a if
- C . cphaprob -a list
- D . cphaprob -ia list
How can you view the critical devices on a cluster member in a Cluster XL environment?
- A . cphaprob -ia list
- B . cphaprob -a if
- C . cphaprob -a list
- D . cphaprob -ia if
When Load Sharing Multicast mode is defined in a Cluster XL cluster object, how are packets being handled by cluster members?
- A . All members receive all packets. The Security Management Server decides which member will process the packets. Other members delete the packets from memory.
- B . All cluster members process all packets and members synchronize with each other.
- C . All members receive all packets. All members run an algorithm which determines which member processes packets further and which members delete the packet from memory.
- D . Only one member at a time is active. The active cluster member processes all packets.
Which of the following does NOT happen when using Pivot Mode in Cluster XL?
- A . The Security Gateway analyzes the packet and forwards it to the Pivot.
- B . The packet is forwarded through the same physical interface from which it originally came, not on the sync interface.
- C . The Pivot’s Load Sharing decision function decides which cluster member should handle the packet.
- D . The Pivot forwards the packet to the appropriate cluster member.
When distributing IPSec packets to gateways in a Load Sharing Multicast mode cluster, which valid Load Sharing method will consider VPN information?
- A . Load Sharing based on IP addresses, ports, and serial peripheral interfaces
- B . Load Sharing based on SPIs
- C . Load Sharing based on ports, VTI, and IP addresses
- D . Load Sharing based on IP addresses, ports, and security parameter indexes
By default, the Cluster Control Protocol (CCP) uses this to send delta sync messages to other cluster members.
- A . Broadcast
- B . Unicast
- C . Multicast
- D . Shout cast
To configure the Cluster Control Protocol (CCP) to use Broadcast, the following command is run:
- A . set_ccp cpcluster broadcast
- B . ccp broadcast
- C . clusterconfig set_ccp broadcast
- D . cphaconf set_ccp broadcast
What cluster mode is represented in this case?
- A . Load Sharing (multicast mode)
- B . HA (New mode).
- C . 3rd party cluster
- D . Load Sharing Unicast (Pivot) mode