Exam Questions 156-215.81: Check Point Certified Security Administrator R81
Exam Questions 156-215.81: Check Point Certified Security Administrator R81
81 dumps
https://www.2passeasy.com/dumps/156-215.81/ (369 New Questions)
https://www.2passeasy.com/dumps/156-215.81/
NEW QUESTION 1
With URL Filtering, what portion of the traffic is sent to the Check Point Online Web Service for analysis?
Answer: D
Explanation:
"A local cache that gives answers to 99% of URL categorization requests. When the cache does not have an answer, only the host name is sent to the Check
Point Online Web Service for categorization. " https://downloads.checkpoint.com/fileserver/SOURCE/direct/ID/24853/FILE/CP_R77_ApplicationControlURL
NEW QUESTION 2
What is the purpose of the Stealth Rule?
Answer: A
NEW QUESTION 3
What does it mean if Deyra sees the gateway status:
Answer: B
Explanation:
NEW QUESTION 4
The default shell of the Gaia CLI is cli.sh. How do you change from the cli.sh shell to the advanced shell to run Linux commands?
Answer: C
NEW QUESTION 5
In a Distributed deployment, the Security Gateway and the Security Management software are installed on what platforms?
Answer: A
Explanation:
"The Security Management ServerClosed (1) and the Security GatewayClosed (3) are installed on different computers, with a network connection (2)."
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Installation_and_Upgrade_Guide/T
NEW QUESTION 6
Under which file is the proxy arp configuration stored?
Answer: D
NEW QUESTION 7
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU.
After installation, is the administrator required to perform any additional tasks?
Answer: B
NEW QUESTION 8
The Network Operations Center administrator needs access to Check Point Security devices mostly for troubleshooting purposes. You do not want to give her
access to the expert mode, but she still should be able to run tcpdump. How can you achieve this requirement?
A. Add tcpdump to CLISH using add command.Create a new access role.Add tcpdump to the role.Create new user with any UID and assign role to the user.
B. Add tcpdump to CLISH using add command.Create a new access role.Add tcpdump to the role.Createnew user with UID 0 and assign role to the user.
C. Create a new access role.Add expert-mode access to the role.Create new user with UID 0 and assign role to the user.
D. Create a new access role.Add expert-mode access to the role.Create new user with any UID and assign role to the user.
Answer: A
NEW QUESTION 9
Administrator Dave logs into R80 Management Server to review and makes some rule changes. He notices that there is a padlock sign next to the DNS rule in the
Rule Base.
A. DNS Rule is using one of the new feature of R80 where an administrator can mark a rule with the padlock icon to let other administrators know it is important.
B. Another administrator is logged into the Management and currently editing the DNS Rule.
C. DNS Rule is a placeholder rule for a rule that existed in the past but was deleted.
D. This is normal behavior in R80 when there are duplicate rules in the Rule Base.
Answer: B
NEW QUESTION 10
URL Filtering employs a technology, which educates users on web usage policy in real time. What is the name of that technology?
A. WebCheck
B. UserCheck
C. Harmony Endpoint
D. URL categorization
Answer: B
Explanation:
UserCheck alerts users while attemping to browse a suspicious/blocked or otherwise policy-limited website through a message in their web browsers shown before
the actual page loads.
NEW QUESTION 10
You can see the following graphic:
Answer: A
NEW QUESTION 14
Which tool allows you to monitor the top bandwidth on smart console?
Answer: D
Explanation:
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGu
NEW QUESTION 16
Fill in the blank: When LDAP is integrated with Check Point Security Management, it is then referred to as ________.
A. User Center
B. User Administration
C. User Directory
D. UserCheck
Answer: C
Explanation:
User Directory lets you configure:
High Availability, to duplicate user data across multiple servers for backup. See Account Units and High
Availability.
Multiple Account Units, for distributed databases.
Define LDAP Account Units, for encrypted User Directory connections. See Modifying the LDAP Server. Profiles, to support multiple LDAP vendors. See User
Directory Profiles. https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide
NEW QUESTION 18
Which path below is available only when CoreXL is enabled?
A. Slow path
B. Firewall path
C. Medium path
D. Accelerated path
Answer: C
NEW QUESTION 21
Which of the following is an authentication method used for Identity Awareness?
A. SSL
B. Captive Portal
C. PKI
D. RSA
Answer: B
NEW QUESTION 24
From the Gaia web interface, which of the following operations CANNOT be performed on a Security Management Server?
Answer: B
NEW QUESTION 26
Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?
Answer: D
NEW QUESTION 30
Of all the Check Point components in your network, which one changes most often and should be backed up most frequently?
A. SmartManager
B. SmartConsole
C. Security Gateway
D. Security Management Server
Answer: D
NEW QUESTION 35
John is the administrator of a R80 Security Management server managing r R77.30 Check Point Security Gateway. John is currently updating the network objects
and amending the rules using SmartConsole. To make John’s changes available to other administrators, and to save the database before installing a policy, what
must John do?
Answer: D
Explanation:
Installing and Publishing
It is important to understand the differences between publishing and installing. You must do this:
After you did this: Publish
Opened a session in SmartConsole and made changes.
The Publish operation sends all SmartConsole modifications to other administrators, and makes the changes you made in a private session public.
Install the database
Modified network objects, such as servers, users, services, or IPS profiles, but not the Rule Base. Updates are installed on management servers and log servers.
Install a policy Changed the Rule Base.
The Security Management Server installs the updated policy and the entire database on Security Gateways (even if you did not modify any network objects).
NEW QUESTION 39
When a SAM rule is required on Security Gateway to quickly block suspicious connections which are not restricted by the Security Policy, what actions does the
administrator need to take?
A. SmartView Monitor should be opened and then the SAM rule/s can be applied immediatel
B. Installing policy is not required.
C. The policy type SAM must be added to the Policy Package and a new SAM rule must be applied.Simply Publishing the changes applies the SAM rule on the
firewall.
D. The administrator must work on the firewall CLI (for example with SSH and PuTTY) and the command 'sam block' must be used with the right parameters.
E. The administrator should open the LOGS & MONITOR view and find the relevant lo
F. Right clicking on the log entry will show the Create New SAM rule option.
Answer: A
Explanation:
A Security GatewayClosed with SAM enabled has Firewall rules to block suspicious connections that are not restricted by the security policyClosed. These rules
are applied immediately (policy installation is not required).
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGu
NEW QUESTION 41
Using ClusterXL, what statement is true about the Sticky Decision Function?
Answer: A
NEW QUESTION 45
Which single Security Blade can be turned on to block both malicious files from being downloaded as well as block websites known to host malware?
A. Anti-Bot
B. None - both Anti-Virus and Anti-Bot are required for this
C. Anti-Virus
D. None - both URL Filtering and Anti-Virus are required for this.
Answer: C
Explanation:
Prevent Access to Malicious Websites
The Antivirus Software Blade scans outbound URL requests and ensures users do not visit websites that are known to distribute malware.
Stop Incoming Malicious Files
Check Point Antivirus Software Blade prevents and stops threats such as malware, viruses, and Trojans from entering and infecting a network.
https://www.checkpoint.com/downloads/products/antivirus-datasheet.pdf
NEW QUESTION 47
Identify the ports to which the Client Authentication daemon listens on by default?
A. 259, 900
B. 256, 257
C. 8080, 529
D. 80, 256
Answer: A
NEW QUESTION 49
In Unified SmartConsole Gateways and Servers tab you can perform the following functions EXCEPT _________.
Answer: C
NEW QUESTION 52
What is the main difference between Static NAT and Hide NAT?
Answer: B
Explanation:
Hide NAT only translates the source address to hide it behind a gateway.
NEW QUESTION 53
Which command shows the installed licenses?
A. cplic print
B. print cplic
C. fwlic print
D. show licenses
Answer: A
NEW QUESTION 54
Fill in the blanks: The _______ collects logs and sends them to the _______.
Answer: D
Explanation:
Gateways send their logs to the log server.
NEW QUESTION 57
What is the SOLR database for?
A. Used for full text search and enables powerful matching capabilities
B. Writes data to the database and full text search
C. Serves GUI responsible to transfer request to the DLE server
D. Enables powerful matching capabilities and writes data to the database
Answer: A
NEW QUESTION 59
Which two Identity Awareness daemons are used to support identity sharing?
Answer: D
Explanation:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=
NEW QUESTION 63
In R80 Management, apart from using SmartConsole, objects or rules can also be modified using:
A. 3rd Party integration of CLI and API for Gateways prior to R80.
B. A complete CLI and API interface using SSH and custom CPCode integration.
C. 3rd Party integration of CLI and API for Management prior to R80.
D. A complete CLI and API interface for Management with 3rd Party integration.
Answer: B
NEW QUESTION 65
Both major kinds of NAT support Hide and Static NAT. However, one offers more flexibility. Which statement is true?
C. Dynamic NAT with Port Address Translation can offer more flexibility than Network Address Translation (NAT) Overloading.
D. Automatic NAT can offer more flexibility than Manual NAT.
Answer: A
Explanation:
"An Auto-NAT rule only uses the source address and port when matching and translating. Manual NAT can match and translate source and destination addresses
and ports." https://networkdirection.net/articles/firewalls/firepowermanagementcentre/fmcnatpolicies/
NEW QUESTION 68
You have successfully backed up your Check Point configurations without the OS information. What command would you use to restore this backup?
A. restore_backup
B. import backup
C. cp_merge
D. migrate import
Answer: A
NEW QUESTION 70
Consider the Global Properties following settings:
The selected option “Accept Domain Name over UDP (Queries)” means:
A. UDP Queries will be accepted by the traffic allowed only through interfaces with external anti-spoofing topology and this will be done before first explicit rule
written by Administrator in a Security Policy.
B. All UDP Queries will be accepted by the traffic allowed through all interfaces and this will be done before first explicit rule written by Administrator in a Security
Policy.
C. No UDP Queries will be accepted by the traffic allowed through all interfaces and this will be done before first explicit rule written by Administrator in a Security
Policy.
D. All UDP Queries will be accepted by the traffic allowed by first explicit rule written by Administrator in a Security Policy.
Answer: A
NEW QUESTION 73
Fill in the blank: Back up and restores can be accomplished through ______.
Answer: A
Explanation:
Backup and RestoreThese options let you: To back up a configuration:
The Backup window opens.
NEW QUESTION 77
In HTTPS Inspection policy, what actions are available in the "Actions" column of a rule?
A. "Inspect", "Bypass"
B. "Inspect", "Bypass", "Categorize"
C. "Inspect", "Bypass", "Block"
D. "Detect", "Bypass"
Answer: A
Explanation:
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide
NEW QUESTION 81
What is the BEST method to deploy Identity Awareness for roaming users?
Answer: B
Explanation:
Using Endpoint Identity Agents give you:
NEW QUESTION 85
Tom has connected to the Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses
connectivity. Connectivity is restored shortly afterward. What will happen to the changes already made?
A. Tom will have to reboot his SmartConsole computer, clear the cache, and restore changes.
B. Tom will have to reboot his SmartConsole computer, and access the Management cache store on that computer, which is only accessible after a reboot.
C. Tom's changes will be lost since he lost connectivity and he will have to start again.
D. Tom's changes will have been stored on the Management when he reconnects and he will not lose any of his work.
Answer: D
NEW QUESTION 88
What is the default tracking option of a rule?
A. Tracking
B. Log
C. None
D. Alert
Answer: B
Explanation:
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGu
NEW QUESTION 92
Stateful Inspection compiles and registers connections where?
A. Connection Cache
B. State Cache
C. State Table
D. Network Table
Answer: C
NEW QUESTION 97
What is the default shell for the command line interface?
A. Clish
B. Admin
C. Normal
D. Expert
Answer: A
Explanation:
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Gaia_AdminGuide/Topics-GAG/G
NEW QUESTION 98
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware
upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?
Answer: C
A. SmartEvent
B. SmartView Tracker
C. SmartLog
D. SmartView Monitor
Answer: A
Explanation:
https://www.checkpoint.com/downloads/products/smartevent-datasheet.pdf
A. Identity Awareness
B. Data Loss Prevention
C. URL Filtering
D. Application Control
Answer: D
Explanation:
Check Point Application Control provides the industry’s strongest application security and identity control to organizations of all sizes.
Answer: B
Answer: B
Explanation:
Identity Agent Description Full
Default Identity AgentClosed that includes packet tagging and computer authentication. It applies to all users on the computer on which it is installed.
Administrator permissions are required to use the Full Identity Agent type. For the Full Identity Agent, you can enforce IP spoofing protection. In addition, you can
leverage computer authentication if you specify computers in Access Roles.
Light
Default Identity Agent that does not include packet tagging and computer authentication. You can install this Identity Agent individually for each user on the target
computer. Light Identity Agent type does not require Administrator permissions.
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/T
A. The rule base can be built of layers, each containing a set of the security rule
B. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.
C. Limits the upload and download throughput for streaming media in the company to 1 Gbps.
D. Time object to a rule to make the rule active only during specified times.
E. Sub Policies are sets of rules that can be created and attached to specific rule
F. If the rule is matched, inspection will continue in the sub policy attached to it rather than in the next rule.
Answer: D
Answer: B
A. All-in-one (stand-alone)
B. CloudGuard
C. Distributed
D. Bridge Mode
Answer: B
Answer: B
Answer: C
Explanation:
These are basic access control rules we recommend for all Rule Bases:
There is also an implied rule that drops all traffic, but you can use the Cleanup rule to log the traffic.
Answer: A
Explanation:
The users and user groups are arranged on the Account Unit in the tree structure of the LDAP server. User management in User Directory is external, not local.
You can change the User Directory templates. Users associated with this template get the changes immediately. You can change user definitions manually in
SmartDashboard, and the changes are immediate on the server.
A. Central
B. Corporate
C. Local
D. Formal
Answer: A
Explanation:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=
A. Windows only
B. Gaia only
C. Gaia, SecurePlatform, and Windows
D. SecurePlatform only
Answer: B
A. 2
B. 7
C. 6
D. 4
Answer: D
A. NAT
B. Firewall
C. Global Properties
D. Object Explorer
Answer: C
Explanation:
"Note - In addition, users can access the Implied Rules configurations through Global Properties and use the implied policy view below Configuration."
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=
Answer: D
Answer: B
Answer: D
Explanation:
https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&eventSubm
Answer: B
A. Object Browser
B. Object Editor
C. Object Navigator
D. Object Explorer
Answer: D
A. Eliminate unknown and unwanted applications in your network to reduce IT complexity and application risk.
B. Identify and control which applications are in your IT environment and which to add to the IT environment.
C. Scans the content of files being downloaded by users in order to make policy decisions.
D. Automatically identify trusted software that has authorization to run
Answer: C
Explanation:
File scanning is a job for ThreatCloud and it sandboxes/scrubs files.
A. Password
B. Certificate
C. MD5
D. Pre-shared secret
Answer: B
Explanation:
References:
Answer: B
Explanation:
The information stored in the state tables provides cumulative data that can be used to evaluate future connections......
https://www.checkpoint.com/cyber-hub/network-security/what-is-firewall/what-is-a-stateful-firewall/
A. fw ver
B. fw stat
C. fw monitor
D. cpinfo
Answer: A
Answer: B
A. AdminC sees a lock icon which indicates that the rule is locked for editing by another administrator.
B. AdminA and AdminB are editing the same rule at the same time.
C. AdminB sees a pencil icon next the rule that AdminB is currently editing.
D. AdminA, AdminB and AdminC are editing three different rules at the same time.
Answer: B
A. ifconfig -a
B. show interfaces
C. show interfaces detail
D. show configuration interface
Answer: D
A. STATE Engine
B. TRACK Engine
C. RECORD Engine
D. INSPECT Engine
Answer: D
Explanation:
Stateful Inspection, the packet is intercepted at the network layer, but then the INSPECT Engine takes over.
It extracts state-related information required for the security decision from all application layers and maintains this information in dynamic state tables for evaluating
subsequent connection attempts.
A. Microsoft Publisher
B. JSON
C. Microsoft Word
D. RC4 Encryption
Answer: B
Answer: A
A. Server Units
B. Administrator Units
C. Account Units
D. Account Servers
Answer: C
A. cphaprob state
B. cphaprob status
C. cphaprob
D. cluster state
Answer: A
A. Publish database
B. Save changes
C. Install policy
D. Activate policy
Answer: A
A. Not reflected for any users unless the local user template is changed.
B. Not reflected for any users who are using that template.
C. Reflected for ail users who are using that template and if the local user template is changed as well.
D. Reflected immediately for all users who are using that template.
Answer: D
Explanation:
You can change the User Directory templates. Users associated with this template get the changes immediately. If you change user definitions manually in
SmartConsole, the changes are immediate on the server.
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide
Answer: C
Explanation:
Configure Spoof Tracking - select the tracking action that is done when spoofed packets are detected:
Answer: A
Answer: C
Explanation:
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide
Answer: B
A. SmartUpdate
B. cpconfig
C. SmartConsole
D. sysconfig
Answer: B
Answer: A
A. SmartDashboard
B. SmartEvent
C. SmartView Monitor
D. SmartUpdate
Answer: B
Explanation:
SmartEvent correlates logs from all Check Point enforcement points, including end-points, to identify suspicious activity from the clutter. Rapid data analysis and
custom event logs immediately alert administrators to anomalous behavior such as someone attempting to use the same credential in multiple geographies
simultaneously. Ref: https://www.checkpoint.com/products/smartevent/
A. Distributed
B. Standalone
C. Bridge
Answer: A
A. Slow Path
B. Medium Path
C. Fast Path
D. Accelerated Path
Answer: A
A. set interface Mgmt ipv4-address 192.168.80.200 mask-length 24set static-route default nexthop gateway address 192.168.80.1 onsave config
B. add interface Mgmt ipv4-address 192.168.80.200 255.255.255.0add static-route 0.0.0.0.0.0.0.0 gw 192.168.80.1 onsave config
C. set interface Mgmt ipv4-address 192.168.80.200 255.255.255.0add static-route 0.0.0.0.0.0.0.0 gw 192.168.80.1 onsave config
D. add interface Mgmt ipv4-address 192.168.80.200 mask-length 24add static-route default nexthop gateway address 192.168.80.1 onsave config
Answer: A
Answer: D
Answer: C
Explanation:
To establish the initial trust, a gateway and a Security Management Server use a one-time password. After the initial trust is established, further communication is
based on security certificates.
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide
Answer: A
Explanation:
Inform User Inform
Shows when the action for the ruleClosed is inform. It informs users what the company policy is for that site. Blocked Message
Block
Shows when a request is blocked. Ask User
Ask
Shows when the action for the rule is ask. It informs users what the company policy is for that site and they must click OK to continue to the site.
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_DataLossPrevention_AdminGuide/
A. backup
B. logswitch
C. Database Revision
D. snapshot
Answer: D
Explanation:
The snapshot creates a binary image of the entire root (lv_current) disk partition. This includes Check Point products, configuration, and operating system.
Starting in R77.10, exporting an image from one machine and importing that image on another machine of the same type is supported.
The log partition is not included in the snapshot. Therefore, any locally stored FireWall logs will not be save
A. Security policy
B. Inbound chain
C. Outbound chain
D. Decryption is not supported
Answer: A
A. Pencil
B. Padlock
C. Book
D. Eyeglasses
Answer: A
Answer: C
Explanation:
Section titles are only for visual categorization of rules.
A. Cloud/data Center
B. perimeter
C. Sandbox
D. Guest Network
Answer: B
Explanation:
Strict Security for Perimeter Profile & Perimeter Profile use sanitization as a technology in Threat prevention profile
A. Pre-shared secret
B. Diffie-Hellman Public Key
C. Symmetrical IPSec key
D. Diffie-Hellman Private Key
Answer: C
A. Protections
B. IPS Protections
C. Profiles
D. ThreatWiki
Answer: B
Answer: D
A. SmartConsole
B. Security Management Server and Security Gateway
C. Security Management Server
D. SmartConsole and Security Management Server
Answer: B
Answer: A
A. False, log servers are configured on the Log Server General Properties
B. True, all Security Gateways will only forward logs with a SmartCenter Server configuration
C. True, all Security Gateways forward logs automatically to the Security Management Server
D. False, log servers are enabled on the Security Gateway General Properties
Answer: B
A. Accounting
B. Suppression
C. Accounting/Suppression
D. Accounting/Extended
Answer: C
A. Yes, but only if all connected administrators connect with read-only permissions.
B. Yes, but objects edited by one administrator will be locked for editing by others until the session is published.
C. No, only one administrator at a time can connect to a Security Management Server
D. Yes, but only one of those administrators will have write-permission
E. All others will have read-only permission.
Answer: B
Answer: C
Answer: B
Answer: D
Answer: D
Explanation:
Check Point Update Service Engine (CPUSE), also known as Deployment Agent [DA], is an advanced and intuitive mechanism for software deployment on Gaia
OS, which supports deployments of single HotFixes (HF), of HotFix Accumulators (Jumbo), and of Major Versions.
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=
A. Check Point R80 SmartConsole authentication is more secure than in previous versions and Vanessa requires a special authentication key for R80
SmartConsol
B. Check that the correct key details are used.
C. Check Point Management software authentication details are not automatically the same as the Operating System authentication detail
D. Check that she is using the correct details.
E. SmartConsole Authentication is not allowed for Vanessa until a Super administrator has logged in first and cleared any other administrator sessions.
F. Authentication failed because Vanessa’s username is not allowed in the new Threat Prevention console update checks even though these checks passed with
Gaia.
Answer: B
Answer: C
Answer: C
Explanation:
There are three types of Software Containers: Security Management, Security Gateway, and Endpoint Security. Ref:
https://downloads.checkpoint.com/dc/download.htm?ID=11608
A. The Security Gateway (SG) and Security Management Server (SMS) software and the CPUSE engine.
B. Licensed Check Point products for the Gala operating system and the Gaia operating system itself.
C. The CPUSE engine and the Gaia operating system.
D. The Gaia operating system only.
Answer: B
Explanation:
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Gaia_AdminGuide/Topics-GAG/C
Answer: B
Answer: A
Explanation:
Hiding multiple IP addresses behind one, gateway, IP address requires PAT to differentiate between traffic.
A. ThreatWiki
B. Whitelist Files
C. AppWiki
D. IPS Protections
Answer: A
Answer: A
Answer: B
A. Distributed
B. Standalone
C. Bridge Mode
D. Targeted
Answer: A
Answer: B
A. Access Role
B. User Group
C. SmartDirectory Group
D. Group Template
Answer: B
Answer: D
Answer: D
Explanation:
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide
A. Down
B. No Response
C. Inactive
D. Failed
Answer: A
Answer: A
A. a routing table
B. awareness of the network topology
C. a Demilitarized Zone
D. a Security Policy install
Answer: B
Explanation:
The network topology represents the internal network (both the LAN and the DMZ) protected by the gateway. The gateway must be aware of the layout of the
network topology to:
Answer: C
A. By using IPSEC
B. By using SIC
C. By using ICA
D. By using 3DES
Answer: B
A. S
B. W
C. C
D. Space bar
Answer: C
A. SmartProvisioning
B. SmartLicense
C. SmartUpdate
D. Deployment Agent
Answer: C
Answer: C
Answer: A
Explanation:
"The SmartEvent Software Blade is a unified security event management and analysis solution that delivers real-time, graphical threat management information.
SmartConsole, SmartView Web Application, and the SmartEvent GUI client consolidate billions of logs and show them as prioritized security events so you can
immediately respond to security incidents"
https://sc1.checkpoint.com/documents/R80/CP_R80_LoggingAndMonitoring/html_frameset.htm?topic=docume
Answer: A
Explanation:
https://www.checkpoint.com/cyber-hub/network-security/what-is-application-control/
Answer: A
Explanation:
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/T
Fill in the blank: An identity server uses a _____ for user authentication.
A. Shared secret
B. Certificate
C. One-time password
D. Token
Answer: A
A. Password
B. Certificate
C. Token
D. Pre-shared secret
Answer: B
A. AD Query
B. Terminal Servers Endpoint Identity Agent
C. Endpoint Identity Agent and Browser-Based Authentication
D. RADIUS and Account Logon
Answer: C
Explanation:
Endpoint Identity Agents and Browser-Based Authentication - When a high level of security is necessary.
Captive Portal is used for distributing the Endpoint Identity Agent. IP Spoofing protection can be set to prevent packets from being IP spoofed.
A. Standalone
B. Remote
C. Distributed
D. Bridge Mode
Answer: A
Explanation:
https://www.youtube.com/watch?v=BFNnBKQz5HA
A. Publish changes
B. Save changes
C. Install policy
D. Install database
Answer: C
A. User Center
B. Package repository
C. Download Center Web site
D. License and Contract repository
Answer: B
A. There is connection between the gateway and Security Management Server but it is not trusted.
B. The secure communication is established.
C. There is no connection between the gateway and Security Management Server.
D. The Security Management Server can contact the gateway, but cannot establish SIC.
Answer: C
Explanation:
SIC Status
After the gateway receives the certificate issued by the ICA, the SIC status shows if the Security Management Server can communicate securely with this gateway:
A. Save Policy
B. Install Database
C. Save session
D. Install Policy
Answer: D
A. SmartUpdate
B. cpconfig
C. SmartConsole
D. sysconfig
Answer: B
Explanation:
References:
A. When they configure an "Automatic Static NAT" which translates to an IP address that does not belong to one of the firewall's interfaces.
B. When they configure an "Automatic Hide NAT" which translates to an IP address that does not belong to one of the firewall's interfaces.
C. When they configure a "Manual Static NAT" which translates to an IP address that does not belong to one of the firewall's interfaces.
D. When they configure a "Manual Hide NAT" which translates to an IP address that belongs to one of the firewall's interfaces.
Answer: C
A. Static; source
B. Simple; source
C. Hide; destination
D. Hide; source
Answer: D
Explanation:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=
A. Remote Access
B. UserCheck
C. AD Query
D. RADIUS
Answer: B
A. Detects and blocks malware by correlating multiple detection engines before users are affected.
B. Configure rules to limit the available network bandwidth for specified users or groups.
C. Use UserCheck to help users understand that certain websites are against the company’s security policy.
D. Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.
Answer: A
A. You achieve a faster access time by placing LDAP servers containing the database at remote sites
B. You achieve compartmentalization by allowing a large number of users to be distributed across several servers
C. Information on a user is hidden, yet distributed across several servers.
D. You gain High Availability by replicating the same information on several servers
Answer: C
Answer: A
A. Formal; corporate
B. Local; formal
C. Local; central
D. Central; local
Answer: D
Answer: D
A. Shared secret
B. Token
C. Username/password or Kerberos Ticket
D. Certificate
Answer: C
Explanation:
Two ways of auth: Username/Password in Captive Portal or Transparent Kerberos Auth through Kerberos Ticket.
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/T
Answer: A
Explanation:
A. Penalty Box
B. Drop Rule in the rulebase
C. Suspicious Activity Monitoring (SAM)
D. Stealth rule
Answer: C
Explanation:
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_CLI_ReferenceGuide/Topics-CLIG
Answer: A
Answer: A
Explanation:
Configure Spoof Tracking - select the tracking action that is done when spoofed packets are detected: Log - Create a log entry (default)
Alert - Show an alert None - Do not log or alert
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide
A. No errors or Warnings
B. Verification Erro
C. Empty Source-List in Rule 5 (Mail Inbound)
D. Verification Erro
E. Rule 4 (Web Inbound) hides Rule 6 (Webmaster access)
F. Verification Erro
G. Rule 7 (Clean-Up Rule) hides Implicit Clean-up Rule
Answer: C
Answer: A
Answer: B
A. Threat Emulation never delivers a file and takes more than 3 minutes to complete
B. Threat Extraction always delivers a file and takes less than a second to complete
C. Threat Emulation never delivers a file that takes less than a second to complete
D. Threat Extraction never delivers a file and takes more than 3 minutes to complete
Answer: B
A. Collect security gateway logs, Index the logs and then compress the logs.
B. Receive firewall and other software blade logs in a region and forward them to the primary log server.
C. Analyze log entries and identify events.
D. Send SAM block rules to the firewalls during a DOS attack.
Answer: C
Explanation:
https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_LoggingAndMonitoring_Ad
Answer: B
Explanation:
Shared Policies
The Shared Policies section in the Security Policies shows the policies that are not in a Policy package. T are shared between all Policy packages.
Shared policies are installed with the Access Control Policy. Software Blade
Description Mobile Access
Launch Mobile Access policy in a SmartConsole. Configure how your remote users access internal resources, such as their email accounts, when they are mobile.
DLP
Launch Data Loss Prevention policy in a SmartConsole. Configure advanced tools to automatically identify data that must not go outside the network, to block the
leak, and to educate users.
Geo Policy
Create a policy for traffic to or from specific geographical or political locations.
A. Right click Accept in the rule, select “More”, and then check “Enable Identity Captive Portal”
B. On the firewall object, Legacy Authentication screen, check “Enable Identity Captive Portal”
C. In the Captive Portal screen of Global Properties, check “Enable Identity Captive Portal”
D. On the Security Management Server object, check the box “Identity Logging”
Answer: A
A. The Publish operation sends the modifications made via SmartConsole in the private session and makes them public
B. The Security Management Server installs the updated policy and the entire database on Security Gateways
C. The Security Management Server installs the updated session and the entire Rule Base on Security Gateways
D. Modifies network objects, such as servers, users, services, or IPS profiles, but not the Rule Base
Answer: A
Answer: B
Explanation:
The first rule is the automatic rule for the Accept All Encrypted Traffic feature. The Firewalls for the Security Gateways in the BranchOffices and LondonOffices
VPN communities allow all VPN traffic from hosts in clients in these communities. Traffic to the Security Gateways is dropped. This rule is installed on all Security
Gateways in these communities.
* 2. Site to site VPN - Connections between hosts in the VPN domains of all Site to Site VPN communities are allowed. These are the only protocols that are
allowed: FTP, HTTP, HTTPS and SMTP.
* 3. Remote access - Connections between hosts in the VPN domains of RemoteAccess VPN community are allowed. These are the only protocols that are
allowed: HTTP, HTTPS, and IMAP.
A. Name of the application, identity of the user, and identity of the machine
B. Identity of the machine, username, and certificate
C. Network location, identity of a user, and identity of a machine
D. Browser-Based Authentication, identity of a user, and network location
Answer: C
Answer: B
Explanation:
Backup configurations are stored in: /var/CPbackup/backups/
Answer: D
A. clish
B. Monitor
C. Read-only
D. Bash
Answer: A
Explanation:
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Gaia_AdminGuide/Topics-GAG/C
Answer: B
A. True, every administrator works on a different database that Is independent of the other administrators
B. False, this feature has to be enabled in the Global Properties.
C. True, every administrator works in a session that is independent of the other administrators
D. False, only one administrator can login with write permission
Answer: C
Explanation:
Multiple R/W admins can log into SmartConsole and edit rules but they can't edit a rule that is being worked on by another admin.
A. show unsaved
B. show save-state
C. show configuration diff
D. show config-state
Answer: D
A. Any size
B. Less than 20GB
C. More than 10GB and less than 20 GB
D. At least 20GB
Answer: D
Answer: D
Answer: C
Visit Our Site to Purchase the Full Set of Actual 156-215.81 Exam Questions With Answers.
We Also Provide Practice Exam Software That Simulates Real Exam Environment And Has Many Self-Assessment Features. Order the
156-215.81 Product From:
https://www.2passeasy.com/dumps/156-215.81/
* 156-215.81 Most Realistic Questions that Guarantee you a Pass on Your FirstTry
* 156-215.81 Practice Test Questions in Multiple Choice Formats and Updatesfor 1 Year