156-215.81: Check Point Certified Security Administrator R81
Checkpoint
Exam Number: 156-215.81
Exam Name: Check Point Certified Security Administrator R81
Length of test: 90 mins
Exam Format: Multiple-choice questions.
Exam Language: English
Number of questions in the actual exam: 90
Passing Score: around 70%
This study guide should help you understand what to expect on the 156-215.81 exam and includes a summary of the topics the exam might cover and links to additional resources. The information and materials in this document should help you focus your studies as you prepare for the exam.
Related questions
Which Check Point software blade provides Application Security and identity control?
Explanation:
The Check Point software blade that provides Application Security and identity control is Application Control3.Application Control enables network administrators to identify, allow, block, or limit usage of thousands of applications and millions of websites3. Therefore, the correct answer is D.Application Control
How are the backups stored in Check Point appliances?
Explanation:
The backups are stored in Check Point appliances as *.tgz files under /var/CPbackup. This is the default location for backup files created by the backup command. Therefore, the correct answer is B. Saved as *.tgz under /var/CPbackup
What needs to be configured if the NAT property 'Translate destination on client side' is not enabled in Global properties?
Explanation:
If the NAT property 'Translate destination on client side' is not enabled in Global properties, nothing needs to be configured on the client side, because the Gateway takes care of all details necessary. The Gateway translates the destination IP address before sending the packet to the client, so the client does not need to know about the NAT rule or add any host route or ARP entry.
Fill in the blank: The position of an implied rule is manipulated in the __________________ window.
Explanation:
The position of an implied rule is manipulated in the Global Properties window. Implied rules are predefined rules that are not displayed in the rule base. They allow or block traffic for essential services such as communication with Check Point servers, logging, and VPN traffic.The position of an implied rule can be changed in the Global Properties > Firewall > Implied Rules section56.
Reference:How to view Implied Rules in R80.x / R81.x SmartConsole,Implied Rules
Which is a suitable command to check whether Drop Templates are activated or not?
Explanation:
The commandfwaccel statshows the status of SecureXL, including whether Drop Templates are enabled or not1.
Reference:Check Point SecureXL R81 Administration Guide
When should you generate new licenses?
Explanation:
You should generate new licenses when the existing license expires, license is upgraded or the IP-address where the license is tied changes13.These scenarios require a new license to be generated and activated on the Security Gateway or Management Server13. Therefore, the correct answer is C.When the existing license expires, license is upgraded or the IP-address where the license is tied changes
Which of the following is true about Stateful Inspection?
One of major features in R80.x SmartConsole is concurrent administration. Which of the following is NOT possible considering that AdminA, AdminB, and AdminC are editing the same Security Policy?
Explanation:
One of the major features in R80.x SmartConsole is concurrent administration, which allows multiple administrators to work on the same Security Policy at the same time12. However, only one administrator can edit a rule at a time.If AdminA and AdminB are editing the same rule at the same time, it will cause a conflict and prevent them from saving their changes12. Therefore, the correct answer is B.AdminA and AdminB are editing the same rule at the same time.
In the Check Point Security Management Architecture, which component(s) can store logs?
Explanation:
The Security Management Server and the Security Gateway are the components that can store logs in the Check Point Security Management Architecture. The Security Management Server stores logs in a database and can also forward them to external log servers. The Security Gateway can store logs locally in a buffer or a local log file, and can also send them to the Security Management Server or a log server.
Which of the following statements about Site-to-Site VPN Domain-based is NOT true?
Question