Exam Code: 156-215.81 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Check Point Certified Security Administrator R81
Certification Provider: CheckPoint
Free Today! Guaranteed Training- Pass 156-215.81 Exam.
Free demo questions for CheckPoint 156-215.81 Exam Dumps Below:
NEW QUESTION 1
Which path below is available only when CoreXL is enabled?
- A. Slow path
- B. Firewall path
- C. Medium path
- D. Accelerated path
Answer: C
NEW QUESTION 2
You have created a rule at the top of your Rule Base to permit Guest Wireless access to the Internet. However, when guest users attempt to reach the Internet, they are not seeing the splash page to accept your Terms of Service, and cannot access the Internet. How can you fix this?
- A. Right click Accept in the rule, select “More”, and then check “Enable Identity Captive Portal”
- B. On the firewall object, Legacy Authentication screen, check “Enable Identity Captive Portal”
- C. In the Captive Portal screen of Global Properties, check “Enable Identity Captive Portal”
- D. On the Security Management Server object, check the box “Identity Logging”
Answer: A
NEW QUESTION 3
A SAM rule Is implemented to provide what function or benefit?
- A. Allow security audits.
- B. Handle traffic as defined in the policy.
- C. Monitor sequence activity.
- D. Block suspicious activity.
Answer: D
Explanation:
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGu
NEW QUESTION 4
Fill in the blanks: In _______ NAT, Only the _______ is translated.
- A. Static; source
- B. Simple; source
- C. Hide; destination
- D. Hide; source
Answer: D
Explanation:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=
NEW QUESTION 5
Rugged appliances are small appliances with ruggedized hardware and like Quantum Spark appliance they use which operating system?
- A. Centos Linux
- B. Gaia embedded
- C. Gaia
- D. Red Hat Enterprise Linux version 5
Answer: B
Explanation:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=
NEW QUESTION 6
The competition between stateful inspection and proxies was based on performance, protocol support, and security. Considering stateful Inspections and Proxies, which statement is correct?
- A. Stateful Inspection is limited to Layer 3 visibility, with no Layer 4 to Layer 7 visibility capabilities.
- B. When it comes to performance, proxies were significantly faster than stateful inspection firewalls.
- C. Proxies offer far more security because of being able to give visibility of the payload (the data).
- D. When it comes to performance, stateful inspection was significantly faster than proxies.
Answer: C
NEW QUESTION 7
Which two of these Check Point Protocols are used by ?
- A. ELA and CPD
- B. FWD and LEA
- C. FWD and CPLOG
- D. ELA and CPLOG
Answer: B
NEW QUESTION 8
What is true about the IPS-Blade?
- A. in R80, IPS is managed by the Threat Prevention Policy
- B. in R80, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict
- C. in R80, IPS Exceptions cannot be attached to “all rules”
- D. in R80, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same
Answer: A
NEW QUESTION 9
Fill in the blank: Each cluster, at a minimum, should have at least _______ interfaces.
- A. Five
- B. Two
- C. Three
- D. Four
Answer: C
NEW QUESTION 10
Your internal networks 10.1.1.0/24, 10.2.2.0/24 and 192.168.0.0/16 are behind the Internet Security Gateway. Considering that Layer 2 and Layer 3 setup is correct, what are the steps you will need to do in SmartConsole in order to get the connection working?
- A. 1. Define an accept rule in Security Policy.2. Define Security Gateway to hide all internal networks behind the gateway’s external IP.3. Publish and install the policy.
- B. 1. Define an accept rule in Security Policy.2. Define automatic NAT for each network to NAT the networks behind a public IP.3. Publish the policy.
- C. 1. Define an accept rule in Security Policy.2. Define automatic NAT for each network to NAT the networks behind a public IP.3. Publish and install the policy.
- D. 1. Define an accept rule in Security Policy.2. Define Security Gateway to hide all internal networks behind the gateway’s external IP.3. Publish the policy.
Answer: C
NEW QUESTION 11
What are the three main components of Check Point security management architecture?
- A. SmartConsole, Security Management, and Security Gateway
- B. Smart Console, Standalone, and Security Management
- C. SmartConsole, Security policy, and Logs & Monitoring
- D. GUI-Client, Security Management, and Security Gateway
Answer: A
NEW QUESTION 12
What Check Point technologies deny or permit network traffic?
- A. Application Control, DLP
- B. Packet Filtering, Stateful Inspection, Application Layer Firewall.
- C. ACL, SandBlast, MPT
- D. IPS, Mobile Threat Protection
Answer: B
NEW QUESTION 13
Which of the following blades is NOT subscription-based and therefore does not have to be renewed on a regular basis?
- A. Application Control
- B. Threat Emulation
- C. Anti-Virus
- D. Advanced Networking Blade
Answer: B
NEW QUESTION 14
Which repositories are installed on the Security Management Server by SmartUpdate?
- A. License and Update
- B. Package Repository and Licenses
- C. Update and License & Contract
- D. License & Contract and Package Repository
Answer: D
Explanation:
References:
NEW QUESTION 15
Which of the following is NOT a tracking log option in R80.x?
- A. Log
- B. Full Log
- C. Detailed Log
- D. Extended Log
Answer: C
NEW QUESTION 16
In the Check Point Security Management Architecture, which component(s) can store logs?
- A. SmartConsole
- B. Security Management Server and Security Gateway
- C. Security Management Server
- D. SmartConsole and Security Management Server
Answer: B
NEW QUESTION 17
......
100% Valid and Newest Version 156-215.81 Questions & Answers shared by DumpSolutions.com, Get Full Dumps HERE: https://www.dumpsolutions.com/156-215.81-dumps/ (New 340 Q&As)