ExamGecko
Home Home / Checkpoint / 156-215.81

Checkpoint 156-215.81 Practice Test - Questions Answers

Question list
Search
Search

What needs to be configured if the NAT property 'Translate destination on client side' is not enabled in Global properties?

A.
A host route to route to the destination IP
A.
A host route to route to the destination IP
Answers
B.
Use the file local.arp to add the ARP entries for NAT to work
B.
Use the file local.arp to add the ARP entries for NAT to work
Answers
C.
Nothing, the Gateway takes care of all details necessary
C.
Nothing, the Gateway takes care of all details necessary
Answers
D.
Enabling 'Allow bi-directional NAT' for NAT to work correctly
D.
Enabling 'Allow bi-directional NAT' for NAT to work correctly
Answers
Suggested answer: C

Explanation:

If the NAT property 'Translate destination on client side' is not enabled in Global properties, nothing needs to be configured on the client side, because the Gateway takes care of all details necessary. The Gateway translates the destination IP address before sending the packet to the client, so the client does not need to know about the NAT rule or add any host route or ARP entry.

In the Check Point Security Management Architecture, which component(s) can store logs?

A.
SmartConsole
A.
SmartConsole
Answers
B.
Security Management Server and Security Gateway
B.
Security Management Server and Security Gateway
Answers
C.
Security Management Server
C.
Security Management Server
Answers
D.
SmartConsole and Security Management Server
D.
SmartConsole and Security Management Server
Answers
Suggested answer: B

Explanation:

The Security Management Server and the Security Gateway are the components that can store logs in the Check Point Security Management Architecture. The Security Management Server stores logs in a database and can also forward them to external log servers. The Security Gateway can store logs locally in a buffer or a local log file, and can also send them to the Security Management Server or a log server.

Fill in the blank: In order to install a license, it must first be added to the ____________.

A.
User Center
A.
User Center
Answers
B.
Package repository
B.
Package repository
Answers
C.
Download Center Web site
C.
Download Center Web site
Answers
D.
License and Contract repository
D.
License and Contract repository
Answers
Suggested answer: D

Explanation:

In order to install a license, it must first be added to the License and Contract repository. The License and Contract repository is a centralized database that stores all the licenses and contracts for Check Point products. It allows you to manage, activate, and attach licenses to your Check Point products.

What are the three deployment considerations for a secure network?

A.
Distributed, Bridge Mode, and Remote
A.
Distributed, Bridge Mode, and Remote
Answers
B.
Bridge Mode, Remote, and Standalone
B.
Bridge Mode, Remote, and Standalone
Answers
C.
Remote, Standalone, and Distributed
C.
Remote, Standalone, and Distributed
Answers
D.
Standalone, Distributed, and Bridge Mode
D.
Standalone, Distributed, and Bridge Mode
Answers
Suggested answer: C

Explanation:

The three deployment considerations for a secure network are Remote, Standalone, and Distributed3. Remote deployment means that the Security Management Server and Security Gateway are installed on different machines. Standalone deployment means that the Security Management Server and Security Gateway are installed on the same machine.Distributed deployment means that there are multiple Security Gateways managed by one or more Security Management Servers3. Therefore, the correct answer is C.Remote, Standalone, and Distributed.

Which option, when applied to a rule, allows traffic to VPN gateways in specific VPN communities?

A.
All Connections (Clear or Encrypted)
A.
All Connections (Clear or Encrypted)
Answers
B.
Accept all encrypted traffic
B.
Accept all encrypted traffic
Answers
C.
Specific VPN Communities
C.
Specific VPN Communities
Answers
D.
All Site-to-Site VPN Communities
D.
All Site-to-Site VPN Communities
Answers
Suggested answer: C

Explanation:

The option that allows traffic to VPN gateways in specific VPN communities is Specific VPN Communities4. This option enables you to define which VPN communities are allowed in the rule. All Connections (Clear or Encrypted) allows traffic to any destination, regardless of whether it is encrypted or not. Accept all encrypted traffic allows traffic to any encrypted destination, regardless of the VPN community.All Site-to-Site VPN Communities allows traffic to any site-to-site VPN gateway, regardless of the VPN community4. Therefore, the correct answer is C.Specific VPN Communities.

When a Security Gateways sends its logs to an IP address other than its own, which deployment option is installed?

A.
Distributed
A.
Distributed
Answers
B.
Standalone
B.
Standalone
Answers
C.
Bridge
C.
Bridge
Answers
Suggested answer: A

Explanation:

When a Security Gateway sends its logs to an IP address other than its own, it means that the Security Gateway and the Log Server are installed on different machines.This is a characteristic of a Distributed deployment3. Therefore, the correct answer is A

One of major features in R80.x SmartConsole is concurrent administration. Which of the following is NOT possible considering that AdminA, AdminB, and AdminC are editing the same Security Policy?

A.
AdminC sees a lock icon which indicates that the rule is locked for editing by another administrator.
A.
AdminC sees a lock icon which indicates that the rule is locked for editing by another administrator.
Answers
B.
AdminA and AdminB are editing the same rule at the same time.
B.
AdminA and AdminB are editing the same rule at the same time.
Answers
C.
AdminB sees a pencil icon next the rule that AdminB is currently editing.
C.
AdminB sees a pencil icon next the rule that AdminB is currently editing.
Answers
D.
AdminA, AdminB and AdminC are editing three different rules at the same time.
D.
AdminA, AdminB and AdminC are editing three different rules at the same time.
Answers
Suggested answer: B

Explanation:

One of the major features in R80.x SmartConsole is concurrent administration, which allows multiple administrators to work on the same Security Policy at the same time12. However, only one administrator can edit a rule at a time.If AdminA and AdminB are editing the same rule at the same time, it will cause a conflict and prevent them from saving their changes12. Therefore, the correct answer is B.AdminA and AdminB are editing the same rule at the same time.

When should you generate new licenses?

A.
Before installing contract files.
A.
Before installing contract files.
Answers
B.
After an RMA procedure when the MAC address or serial number of the appliance changes.
B.
After an RMA procedure when the MAC address or serial number of the appliance changes.
Answers
C.
When the existing license expires, license is upgraded or the IP-address where the license is tied changes.
C.
When the existing license expires, license is upgraded or the IP-address where the license is tied changes.
Answers
D.
Only when the license is upgraded.
D.
Only when the license is upgraded.
Answers
Suggested answer: C

Explanation:

You should generate new licenses when the existing license expires, license is upgraded or the IP-address where the license is tied changes13.These scenarios require a new license to be generated and activated on the Security Gateway or Management Server13. Therefore, the correct answer is C.When the existing license expires, license is upgraded or the IP-address where the license is tied changes

Fill in the blank: When a policy package is installed, ________ are also distributed to the target installation Security Gateways.

A.
User and objects databases
A.
User and objects databases
Answers
B.
Network databases
B.
Network databases
Answers
C.
SmartConsole databases
C.
SmartConsole databases
Answers
D.
User databases
D.
User databases
Answers
Suggested answer: A

Explanation:

When a policy package is installed, user and objects databases are also distributed to the target installation Security Gateways14.The user and objects databases contain information about network objects, users, groups, services, VPN domains, and more14. Therefore, the correct answer is A.User and objects databases.

Which of the following is NOT a method used by Identity Awareness for acquiring identity?

A.
Remote Access
A.
Remote Access
Answers
B.
Cloud IdP (Identity Provider)
B.
Cloud IdP (Identity Provider)
Answers
C.
Active Directory Query
C.
Active Directory Query
Answers
D.
RADIUS
D.
RADIUS
Answers
Suggested answer: B

Explanation:

Identity Awareness uses several methods for acquiring identity, such as Active Directory Query, Identity Agent, Browser-Based Authentication, Terminal Servers, Captive Portal, and RADIUS12.Cloud IdP (Identity Provider) is not a method used by Identity Awareness12. Therefore, the correct answer is B.Cloud IdP (Identity Provider).

Total 401 questions
Go to page: of 41