Check Point 156-915.77 Check Point Certified Security Expert Update Blade Online Training
Check Point 156-915.77 Online Training
The questions for 156-915.77 were last updated at Aug 19,2025.
- Exam Code: 156-915.77
- Exam Name: Check Point Certified Security Expert Update Blade
- Certification Provider: Check Point
- Latest update: Aug 19,2025
When you check Web Server in a host-node object, what happens to the host?
- A . The Web server daemon is enabled on the host.
- B . More granular controls are added to the host, in addition to Web Intelligence tab settings.
- C . You can specify allowed ports in the Web server’s node-object properties. You then do not need to list all allowed ports in the Rule Base.
- D . IPS Web Intelligence is enabled to check on the host.
Which external user authentication protocols are supported in SSL VPN?
- A . LDAP, Active Directory, SecurID
- B . DAP, SecurID, Check Point Password, OS Password, RADIUS, TACACS
- C . LDAP, RADIUS, Active Directory, SecurID
- D . LDAP, RADIUS, TACACS, SecurID
Which of the following commands can be used to stop Management portal services?
- A . fw stopportal
- B . cpportalstop
- C . cpstop / portal
- D . smartportalstop
Which of the following manages Standard Reports and allows the administrator to specify automatic uploads of reports to a central FTP server?
- A . Smart Dashboard Log Consolidator
- B . Security Management Server
- C . Smart Reporter Database
- D . Smart Reporter
What is a task of the Smart Event Correlation Unit?
- A . Add events to the events database.
- B . Look for patterns according to the installed Event Policy.
- C . Assign a severity level to an event
- D . Display the received events.
Based on the following information, which of the statements below is FALSE?
A DLP Rule Base has the following conditions:
Data Type =Password Protected File
Source=My Organization
Destination=Outside My Organization
Protocol=Any
Action=Ask User
Exception: Data Type=Any,
– Source=Research and Development (R&D)
– Destination=Pratner1.com
– Protocol=Any
All other rules are set to Detect. User Check is enabled and installed on all client machines.
- A . When a user from R&D sends an e-mail with a password protected PDF file as an attachment to xyz@partner1 .com, he will be prompted by User Check.
- B . When a user from Finance sends an e-mail with an encrypted ZIP file as an attachment to. He will be prompted by User Check.
- C . Another rule is added: Source = R&D, Destination = partner1.com, Protocol = Any, Action = Inform. When a user from R&D sends an e-mail with an encrypted ZIP file as an attachment to, he will be prompted by User Check.
- D . When a user from R&D sends an e-mail with an encrypted ZIP file as an attachment to , he will NOT be prompted by User Check.
You use the snapshot feature to store your Connecter SSL VPN configuration.
What do you expect to find?
- A . Nothing; snapshot is not supported in Connector SSL VPN.
- B . The management configuration of the current product, on a management or stand-alone machine
- C . A complete image of the local file system
- D . Specified directories of the local file system.
When running DLP Wizard for the first time, which of the following is a mandatory configuration?
- A . Mail Server
- B . E-mail Domain in My Organization
- C . DLP Portal URL
- D . Active Directory
When using Connecter with Endpoint Security Policies, what option is not available when configuring DAT enforcement?
- A . Maximum DAT file version
- B . Maximum DAT file age
- C . Minimum DAT file version
- D . Oldest DAT file timestamp
Which specific R76 GUI would you use to view the length of time a TCP connection was open?
- A . Smart Reporter
- B . Smart View Monitor
- C . Smart View Status
- D . Smart View Tracker