Certbus > CheckPoint > CCSA > 156-215.81 > 156-215.81 Online Practice Questions and Answers

156-215.81 Online Practice Questions and Answers

Questions 4

What is the purpose of the Clean-up Rule?

A. To log all traffic that is not explicitly allowed or denied in the Rule Base

B. To clean up policies found inconsistent with the compliance blade reports

C. To remove all rules that could have a conflict with other rules in the database

D. To eliminate duplicate log entries in the Security Gateway

Browse 400 Q&As
Questions 5

Choose the SmartLog property that is TRUE.

A. SmartLog has been an option since release R71.10.

B. SmartLog is not a Check Point product.

C. SmartLog and SmartView Tracker are mutually exclusive.

D. SmartLog is a client of SmartConsole that enables enterprises to centrally track log records and security activity with Google-like search.

Browse 400 Q&As
Questions 6

You are the Security Administrator for MegaCorp. In order to see how efficient your firewall Rule Base is, you would like to see how many often the particular rules match. Where can you see it? Give the BEST answer.

A. In the SmartView Tracker, if you activate the column Matching Rate.

B. In SmartReporter, in the section Firewall Blade ?Activity>; Network Activity with information concerning Top Matched Logged Rules.

C. SmartReporter provides this information in the section Firewall Blade ?Security>; Rule Base Analysis with information concerning Top Matched Logged Rules.

D. It is not possible to see it directly. You can open SmartDashboard and select UserDefined in the Track column. Afterwards, you need to create your own program with an external counter.

Browse 400 Q&As
Questions 7

Which of the following uses the same key to decrypt as it does to encrypt?

A. Asymmetric encryption

B. Dynamic encryption

C. Certificate-based encryption

D. Symmetric encryption

Browse 400 Q&As
Questions 8

Which one of the following is true about Threat Extraction?

A. Always delivers a file to user

B. Works on all MS Office, Executables, and PDF files

C. Can take up to 3 minutes to complete

D. Delivers file only if no threats found

Browse 400 Q&As
Questions 9

Fill in the blank: The __________ is used to obtain identification and security information about network users.

A. User Directory

B. User server

C. UserCheck

D. User index

Browse 400 Q&As
Questions 10

In which deployment is the security management server and Security Gateway installed on the same appliance?

A. Bridge Mode

B. Remote

C. Standalone

D. Distributed

Browse 400 Q&As
Questions 11

What will be the effect of running the following command on the Security Management Server?

A. Remove the installed Security Policy.

B. Remove the local ACL lists.

C. No effect.

D. Reset SIC on all gateways.

Browse 400 Q&As
Questions 12

Which default user has full read/write access?

A. Monitor

B. Altuser

C. Administrator

D. Superuser

Browse 400 Q&As
Questions 13

AdminA and AdminB are both logged in on SmartConsole. What does it mean if AdminB sees a locked icon on a rule? Choose the BEST answer.

A. Rule is locked by AdminA, because the save bottom has not been press.

B. Rule is locked by AdminA, because an object on that rule is been edited.

C. Rule is locked by AdminA, and will make it available if session is published.

D. Rule is locked by AdminA, and if the session is saved, rule will be available

Browse 400 Q&As
Questions 14

Which of the following is NOT a tracking log option in R80.x?

A. Log

B. Full Log

C. Detailed Log

D. Extended Log

Browse 400 Q&As
Questions 15

Which information is included in the "Extended Log" tracking option, but is not included in the "Log" tracking option?

A. file attributes

B. application information

C. destination port

D. data type information

Browse 400 Q&As
Questions 16

Which tool is used to enable cluster membership on a Gateway?

A. SmartUpdate

B. cpconfig

C. SmartConsole

D. sysconfig

Browse 400 Q&As
Questions 17

Which key is created during Phase 2 of a site-to-site VPN?

A. Pre-shared secret

B. Diffie-Hellman Public Key

C. Symmetrical IPSec key

D. Diffie-Hellman Private Key

Browse 400 Q&As
Questions 18

What is a role of Publishing?

A. The Publish operation sends the modifications made via SmartConsole in the private session and makes them public

B. The Security Management Server installs the updated policy and the entire database on Security Gateways

C. The Security Management Server installs the updated session and the entire Rule Base on Security Gateways

D. Modifies network objects, such as servers, users, services, or IPS profiles, but not the Rule Base

Browse 400 Q&As
Exam Code: 156-215.81
Exam Name: Check Point Certified Security Administrator R81
Last Update: Apr 28, 2024
Questions: 400 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99