Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Checkpoint 156-310 Exam - Cheat-Test.com

Free 156-310 Sample Questions:

1. SecureClient supports desktop policies.
A. True
B. False
Answer: A

2. When a SecuRemote Client and Server key exchange occurs, the user will be re-authenticated if the password has been erased.
A. True
B. False
Answer: A

3. Which of the following selections lists the three security components essential to guaranteeing the security of network connections?
A. Encryption, inspection, routing
B. NAT, traffic control, topology
C. Static addressing, cryptosystems, spoofing
D. Encryption, authentication, integrity
E. DHCP, quality of service, IP pools
Answer: D

4. How do you enable connection logging to the Policy Server when using SecureClient?
A. Go to the registry and add key EnableLogging=1
B. Create the file st.log in the log directory
C. Set logging to Alert in the Tracking field of the Rule Base
D. Enable logging in the Policy server
E. Select 'Enable Logging' under options in the tool menu of the SecureClient GUI.
Answer: A

5. The encryption key for SecuRemote connections, for two phase key exchange, remains valid by default for ____________.
A. about 15 minutes
B. about 30 minutes
C. about 45 minutes
D. about 60 minutes
E. the entire remote user operating session
Answer: A

6. An external UFP server, can perform which of the following?
A. Find out java, JavaScript, Active X
D. Deny or allow access to URLs using categories
C. Integrate Firewall-1 with an external user database
D. Check for viruses and malicious contents.
E. All of the above.
Answer: B

7. Which of the following statements is FALSE?
A. A Policy Server extends security to the desktop by allowing administrators to enforce a Security Policy on desktops –both inside a LAN and connecting from the Internet -this preventing authorized connections from being compromised.
B. A Policy Server must be on a firewalled machine with CP shared installed.
C. A policy server supports all platforms.
D. To use Policy Server in a network, you must have Policy Server from which ScureClient obtains its Desktop Policy.
E. To use Policy Server in a network, you must have SecureClient software.
Answer: C

8. To reduce the effectiveness of traffic sniffing inside the LAN, internal users should have the ________installed on their desktop.
A. Management
B. Real Secure
C. Enforcement
D. Policy Server
E. SecureClient
Answer: E

9. Which of the following selections lists the three security components essential to guaranteeing the security of network connections?
A. Encryption, inspection, routing
B. NAT, traffic control, topology
C. Static addressing, cryptosystems, spoofing
D. Encryption, authentication, integrity
E. DHCP, quality of service, IP pools
Answer: D

10. If you wish to move any SecureClient files to another directory
A. Uninstall and reinstall SecureClient first, an back up the original files.
B. Uninstall and reinstall SecureClient first.
C. Restore the original files before uninstalling SecureClient
D. Upgrade SecureClient, then uninstall and reinstall
E. None of the above.
Answer: A


© 2014 Cheat-Test.com, All Rights Reserved