ExamGecko

156-215.81: Check Point Certified Security Administrator R81

Check Point Certified Security Administrator R81
Vendor:

Checkpoint

Check Point Certified Security Administrator R81 Exam Questions: 401
Check Point Certified Security Administrator R81   2.371 Learners
Take Practice Tests
Comming soon
PDF | VPLUS

Exam Number: 156-215.81

Exam Name: Check Point Certified Security Administrator R81

Length of test: 90 mins

Exam Format: Multiple-choice questions.

Exam Language: English

Number of questions in the actual exam: 90

Passing Score: around 70%

This study guide should help you understand what to expect on the 156-215.81 exam and includes a summary of the topics the exam might cover and links to additional resources. The information and materials in this document should help you focus your studies as you prepare for the exam.

Related questions

Which Check Point software blade provides Application Security and identity control?

A.
Identity Awareness
A.
Identity Awareness
Answers
B.
Data Loss Prevention
B.
Data Loss Prevention
Answers
C.
URL Filtering
C.
URL Filtering
Answers
D.
Application Control
D.
Application Control
Answers
Suggested answer: D

Explanation:

The Check Point software blade that provides Application Security and identity control is Application Control3.Application Control enables network administrators to identify, allow, block, or limit usage of thousands of applications and millions of websites3. Therefore, the correct answer is D.Application Control

asked 16/09/2024
55 Cantera Ct. Johnson
38 questions

How are the backups stored in Check Point appliances?

A.
Saved as*.tar under /var/log/CPbackup/backups
A.
Saved as*.tar under /var/log/CPbackup/backups
Answers
B.
Saved as*tgz under /var/CPbackup
B.
Saved as*tgz under /var/CPbackup
Answers
C.
Saved as*tar under /var/CPbackup
C.
Saved as*tar under /var/CPbackup
Answers
D.
Saved as*tgz under /var/log/CPbackup/backups
D.
Saved as*tgz under /var/log/CPbackup/backups
Answers
Suggested answer: B

Explanation:

The backups are stored in Check Point appliances as *.tgz files under /var/CPbackup. This is the default location for backup files created by the backup command. Therefore, the correct answer is B. Saved as *.tgz under /var/CPbackup

asked 16/09/2024
George Sanchez
40 questions

What needs to be configured if the NAT property 'Translate destination on client side' is not enabled in Global properties?

A.
A host route to route to the destination IP
A.
A host route to route to the destination IP
Answers
B.
Use the file local.arp to add the ARP entries for NAT to work
B.
Use the file local.arp to add the ARP entries for NAT to work
Answers
C.
Nothing, the Gateway takes care of all details necessary
C.
Nothing, the Gateway takes care of all details necessary
Answers
D.
Enabling 'Allow bi-directional NAT' for NAT to work correctly
D.
Enabling 'Allow bi-directional NAT' for NAT to work correctly
Answers
Suggested answer: C

Explanation:

If the NAT property 'Translate destination on client side' is not enabled in Global properties, nothing needs to be configured on the client side, because the Gateway takes care of all details necessary. The Gateway translates the destination IP address before sending the packet to the client, so the client does not need to know about the NAT rule or add any host route or ARP entry.

asked 16/09/2024
Higher System Consultancy
41 questions

Fill in the blank: The position of an implied rule is manipulated in the __________________ window.

A.
NAT
A.
NAT
Answers
B.
Firewall
B.
Firewall
Answers
C.
Global Properties
C.
Global Properties
Answers
D.
Object Explorer
D.
Object Explorer
Answers
Suggested answer: C

Explanation:

The position of an implied rule is manipulated in the Global Properties window. Implied rules are predefined rules that are not displayed in the rule base. They allow or block traffic for essential services such as communication with Check Point servers, logging, and VPN traffic.The position of an implied rule can be changed in the Global Properties > Firewall > Implied Rules section56.

Reference:How to view Implied Rules in R80.x / R81.x SmartConsole,Implied Rules

asked 16/09/2024
DANNY GARCIA
32 questions

Which is a suitable command to check whether Drop Templates are activated or not?

A.
fw ctl get int activate_drop_templates
A.
fw ctl get int activate_drop_templates
Answers
B.
fwaccel stat
B.
fwaccel stat
Answers
C.
fwaccel stats
C.
fwaccel stats
Answers
D.
fw ctl templates --d
D.
fw ctl templates --d
Answers
Suggested answer: B

Explanation:

The commandfwaccel statshows the status of SecureXL, including whether Drop Templates are enabled or not1.

Reference:Check Point SecureXL R81 Administration Guide

asked 16/09/2024
Adriano Costa
36 questions

When should you generate new licenses?

A.
Before installing contract files.
A.
Before installing contract files.
Answers
B.
After an RMA procedure when the MAC address or serial number of the appliance changes.
B.
After an RMA procedure when the MAC address or serial number of the appliance changes.
Answers
C.
When the existing license expires, license is upgraded or the IP-address where the license is tied changes.
C.
When the existing license expires, license is upgraded or the IP-address where the license is tied changes.
Answers
D.
Only when the license is upgraded.
D.
Only when the license is upgraded.
Answers
Suggested answer: C

Explanation:

You should generate new licenses when the existing license expires, license is upgraded or the IP-address where the license is tied changes13.These scenarios require a new license to be generated and activated on the Security Gateway or Management Server13. Therefore, the correct answer is C.When the existing license expires, license is upgraded or the IP-address where the license is tied changes

asked 16/09/2024
David Aquino
41 questions

Which of the following is true about Stateful Inspection?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

One of major features in R80.x SmartConsole is concurrent administration. Which of the following is NOT possible considering that AdminA, AdminB, and AdminC are editing the same Security Policy?

A.
AdminC sees a lock icon which indicates that the rule is locked for editing by another administrator.
A.
AdminC sees a lock icon which indicates that the rule is locked for editing by another administrator.
Answers
B.
AdminA and AdminB are editing the same rule at the same time.
B.
AdminA and AdminB are editing the same rule at the same time.
Answers
C.
AdminB sees a pencil icon next the rule that AdminB is currently editing.
C.
AdminB sees a pencil icon next the rule that AdminB is currently editing.
Answers
D.
AdminA, AdminB and AdminC are editing three different rules at the same time.
D.
AdminA, AdminB and AdminC are editing three different rules at the same time.
Answers
Suggested answer: B

Explanation:

One of the major features in R80.x SmartConsole is concurrent administration, which allows multiple administrators to work on the same Security Policy at the same time12. However, only one administrator can edit a rule at a time.If AdminA and AdminB are editing the same rule at the same time, it will cause a conflict and prevent them from saving their changes12. Therefore, the correct answer is B.AdminA and AdminB are editing the same rule at the same time.

asked 16/09/2024
chris bezuidenhout
35 questions

In the Check Point Security Management Architecture, which component(s) can store logs?

A.
SmartConsole
A.
SmartConsole
Answers
B.
Security Management Server and Security Gateway
B.
Security Management Server and Security Gateway
Answers
C.
Security Management Server
C.
Security Management Server
Answers
D.
SmartConsole and Security Management Server
D.
SmartConsole and Security Management Server
Answers
Suggested answer: B

Explanation:

The Security Management Server and the Security Gateway are the components that can store logs in the Check Point Security Management Architecture. The Security Management Server stores logs in a database and can also forward them to external log servers. The Security Gateway can store logs locally in a buffer or a local log file, and can also send them to the Security Management Server or a log server.

asked 16/09/2024
B Erol
57 questions

Which of the following statements about Site-to-Site VPN Domain-based is NOT true?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member