ExamGecko
Home / Checkpoint / 156-215.81 / List of questions
Ask Question

Checkpoint 156-215.81 Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

What needs to be configured if the NAT property 'Translate destination on client side' is not enabled in Global properties?

A host route to route to the destination IP
A host route to route to the destination IP
Use the file local.arp to add the ARP entries for NAT to work
Use the file local.arp to add the ARP entries for NAT to work
Nothing, the Gateway takes care of all details necessary
Nothing, the Gateway takes care of all details necessary
Enabling 'Allow bi-directional NAT' for NAT to work correctly
Enabling 'Allow bi-directional NAT' for NAT to work correctly
Suggested answer: C
Explanation:

If the NAT property 'Translate destination on client side' is not enabled in Global properties, nothing needs to be configured on the client side, because the Gateway takes care of all details necessary. The Gateway translates the destination IP address before sending the packet to the client, so the client does not need to know about the NAT rule or add any host route or ARP entry.

asked 16/09/2024
Higher System Consultancy
41 questions

Question 2

Report Export Collapse

In the Check Point Security Management Architecture, which component(s) can store logs?

SmartConsole
SmartConsole
Security Management Server and Security Gateway
Security Management Server and Security Gateway
Security Management Server
Security Management Server
SmartConsole and Security Management Server
SmartConsole and Security Management Server
Suggested answer: B
Explanation:

The Security Management Server and the Security Gateway are the components that can store logs in the Check Point Security Management Architecture. The Security Management Server stores logs in a database and can also forward them to external log servers. The Security Gateway can store logs locally in a buffer or a local log file, and can also send them to the Security Management Server or a log server.

asked 16/09/2024
B Erol
57 questions

Question 3

Report Export Collapse

Fill in the blank: In order to install a license, it must first be added to the ____________.

User Center
User Center
Package repository
Package repository
Download Center Web site
Download Center Web site
License and Contract repository
License and Contract repository
Suggested answer: D
Explanation:

In order to install a license, it must first be added to the License and Contract repository. The License and Contract repository is a centralized database that stores all the licenses and contracts for Check Point products. It allows you to manage, activate, and attach licenses to your Check Point products.

asked 16/09/2024
TJOE INKAWATI
29 questions

Question 4

Report Export Collapse

What are the three deployment considerations for a secure network?

Distributed, Bridge Mode, and Remote
Distributed, Bridge Mode, and Remote
Bridge Mode, Remote, and Standalone
Bridge Mode, Remote, and Standalone
Remote, Standalone, and Distributed
Remote, Standalone, and Distributed
Standalone, Distributed, and Bridge Mode
Standalone, Distributed, and Bridge Mode
Suggested answer: C
Explanation:

The three deployment considerations for a secure network are Remote, Standalone, and Distributed3. Remote deployment means that the Security Management Server and Security Gateway are installed on different machines. Standalone deployment means that the Security Management Server and Security Gateway are installed on the same machine.Distributed deployment means that there are multiple Security Gateways managed by one or more Security Management Servers3. Therefore, the correct answer is C.Remote, Standalone, and Distributed.

asked 16/09/2024
Borat Kajratov
49 questions

Question 5

Report Export Collapse

Which option, when applied to a rule, allows traffic to VPN gateways in specific VPN communities?

All Connections (Clear or Encrypted)
All Connections (Clear or Encrypted)
Accept all encrypted traffic
Accept all encrypted traffic
Specific VPN Communities
Specific VPN Communities
All Site-to-Site VPN Communities
All Site-to-Site VPN Communities
Suggested answer: C
Explanation:

The option that allows traffic to VPN gateways in specific VPN communities is Specific VPN Communities4. This option enables you to define which VPN communities are allowed in the rule. All Connections (Clear or Encrypted) allows traffic to any destination, regardless of whether it is encrypted or not. Accept all encrypted traffic allows traffic to any encrypted destination, regardless of the VPN community.All Site-to-Site VPN Communities allows traffic to any site-to-site VPN gateway, regardless of the VPN community4. Therefore, the correct answer is C.Specific VPN Communities.

asked 16/09/2024
Ben Pike
33 questions

Question 6

Report Export Collapse

When a Security Gateways sends its logs to an IP address other than its own, which deployment option is installed?

Distributed
Distributed
Standalone
Standalone
Bridge
Bridge
Suggested answer: A
Explanation:

When a Security Gateway sends its logs to an IP address other than its own, it means that the Security Gateway and the Log Server are installed on different machines.This is a characteristic of a Distributed deployment3. Therefore, the correct answer is A

asked 16/09/2024
mr yosh
37 questions

Question 7

Report Export Collapse

One of major features in R80.x SmartConsole is concurrent administration. Which of the following is NOT possible considering that AdminA, AdminB, and AdminC are editing the same Security Policy?

AdminC sees a lock icon which indicates that the rule is locked for editing by another administrator.
AdminC sees a lock icon which indicates that the rule is locked for editing by another administrator.
AdminA and AdminB are editing the same rule at the same time.
AdminA and AdminB are editing the same rule at the same time.
AdminB sees a pencil icon next the rule that AdminB is currently editing.
AdminB sees a pencil icon next the rule that AdminB is currently editing.
AdminA, AdminB and AdminC are editing three different rules at the same time.
AdminA, AdminB and AdminC are editing three different rules at the same time.
Suggested answer: B
Explanation:

One of the major features in R80.x SmartConsole is concurrent administration, which allows multiple administrators to work on the same Security Policy at the same time12. However, only one administrator can edit a rule at a time.If AdminA and AdminB are editing the same rule at the same time, it will cause a conflict and prevent them from saving their changes12. Therefore, the correct answer is B.AdminA and AdminB are editing the same rule at the same time.

asked 16/09/2024
chris bezuidenhout
35 questions

Question 8

Report Export Collapse

When should you generate new licenses?

Before installing contract files.
Before installing contract files.
After an RMA procedure when the MAC address or serial number of the appliance changes.
After an RMA procedure when the MAC address or serial number of the appliance changes.
When the existing license expires, license is upgraded or the IP-address where the license is tied changes.
When the existing license expires, license is upgraded or the IP-address where the license is tied changes.
Only when the license is upgraded.
Only when the license is upgraded.
Suggested answer: C
Explanation:

You should generate new licenses when the existing license expires, license is upgraded or the IP-address where the license is tied changes13.These scenarios require a new license to be generated and activated on the Security Gateway or Management Server13. Therefore, the correct answer is C.When the existing license expires, license is upgraded or the IP-address where the license is tied changes

asked 16/09/2024
David Aquino
41 questions

Question 9

Report Export Collapse

Fill in the blank: When a policy package is installed, ________ are also distributed to the target installation Security Gateways.

User and objects databases
User and objects databases
Network databases
Network databases
SmartConsole databases
SmartConsole databases
User databases
User databases
Suggested answer: A
Explanation:

When a policy package is installed, user and objects databases are also distributed to the target installation Security Gateways14.The user and objects databases contain information about network objects, users, groups, services, VPN domains, and more14. Therefore, the correct answer is A.User and objects databases.

asked 16/09/2024
Donald VIRMOND
32 questions

Question 10

Report Export Collapse

Which of the following is NOT a method used by Identity Awareness for acquiring identity?

Remote Access
Remote Access
Cloud IdP (Identity Provider)
Cloud IdP (Identity Provider)
Active Directory Query
Active Directory Query
RADIUS
RADIUS
Suggested answer: B
Explanation:

Identity Awareness uses several methods for acquiring identity, such as Active Directory Query, Identity Agent, Browser-Based Authentication, Terminal Servers, Captive Portal, and RADIUS12.Cloud IdP (Identity Provider) is not a method used by Identity Awareness12. Therefore, the correct answer is B.Cloud IdP (Identity Provider).

asked 16/09/2024
Sacha CONTI
43 questions
Total 401 questions
Go to page: of 41