AllExam Dumps

DUMPS, FREE DUMPS, VCP5 DUMPS| VMWARE DUMPS, VCP DUMPS, VCP4 DUMPS, VCAP DUMPS, VCDX DUMPS, CISCO DUMPS, CCNA, CCNA DUMPS, CCNP DUMPS, CCIE DUMPS, ITIL, EXIN DUMPS,


READ Free Dumps For Checkpoint- 156-215





Question ID 18725

Your internal network is using 10.1.1.0/24. This network is behind your perimeter NGX
VPN-1 Gateway, which connects to your ISP provider. How do you configure the Gateway
to allow this network to go out to the Internet?

Option A

Use automatic Static NAT for network 10.1.1.0/24.

Option B

Use Hide NAT for network 10.1.1.0/24 behind the internal interface of your perimeter Gateway.

Option C

 Use manual Static NAT on the client side for network 10.1.1.0/24.

Option D

Use Hide NAT for network 10.1.1.0/24 behind the external IP address of your perimeter Gateway.

Option E

Do nothing, as long as 10.1.1.0 network has the correct default Gateway.

Correct Answer D
Explanation


Question ID 18726

Your internal Web server in the DMZ has IP address 172.16.10.1/24. A particular network
from the Internet tries to access this Web server. You need to set up some type of Network
Address Translation (NAT), so that NAT occurs only for the HTTP service, and only from
the remote network as the source. The public IP address for the Web server is
200.200.200.1. All properties in the NAT screen of Global Properties are enabled.
Select the correct NAT rules, so NAT happens ONLY between "web_dallas" and the
remote network.

Option A

1. Create another node object named "web_dallas_valid", and enter "200.200.200.1" in the General Properties screen. 2. Create two manual NAT rules above the automatic Hide NAT rules for the 172.16.10.0 network. 3. Select "HTTP" in the Service column of both manual NAT rules. 4. Enter an ARP entry and route on the Security Gateway's OS.

Option B

1. Enable NAT on the web_dallas object, select "static", and enter "200.200.200.1" in the General Properties screen. 2. Specify "HTTP" in the automatic Static Address Translation rules. 3. Create incoming and outgoing rules for the web_dallas server, for the HTTP service only.

Option C

 1. Enable NAT on the web_dallas object, select "hide", and enter "200.200.200.1" for the Hide NAT IP address. 2. Specify "HTTP" in the Address Translation rules that are generated automatically. 3. Create incoming and outgoing rules for the web_dallas server, for the HTTP service only.

Option D

 1. Create another node object named "web_dallas_valid", and enter "200.200.200.1" in the General Properties screen. 2. Create two manual NAT rules below the Automatic Hide NAT rule for network 172.16.10.0 , in the Address Translation Rule Base. 3. Select "HTTP" in the Service column of both manual NAT rules. 4. Enter an ARP entry and route on the Security Gateway's OS.

Correct Answer A
Explanation

Send email to admin@getfreedumps for new dumps request!!!