ExamGecko
Home Home / Checkpoint / 156-215.81

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 12

Question list
Search
Search

Which two Identity Awareness commands are used to support identity sharing?

A.
Policy Decision Point (PDP) and Policy Enforcement Point (PEP)
A.
Policy Decision Point (PDP) and Policy Enforcement Point (PEP)
Answers
B.
Policy Enforcement Point (PEP) and Policy Manipulation Point (PMP)
B.
Policy Enforcement Point (PEP) and Policy Manipulation Point (PMP)
Answers
C.
Policy Manipulation Point (PMP) and Policy Activation Point (PAP)
C.
Policy Manipulation Point (PMP) and Policy Activation Point (PAP)
Answers
D.
Policy Activation Point (PAP) and Policy Decision Point (PDP)
D.
Policy Activation Point (PAP) and Policy Decision Point (PDP)
Answers
Suggested answer: A

Explanation:

The answer is A because Identity Awareness commands are used to support identity sharing between Security Gateways. Policy Decision Point (PDP) is the Security Gateway that collects identities from various sources and shares them with other gateways.Policy Enforcement Point (PEP) is the Security Gateway that enforces the policy based on the identities received from the PDP12Reference:Check Point R81 Identity Awareness Administration Guide,Check Point R81 Security Management Administration Guide

True or False: In R80, more than one administrator can login to the Security Management Server with write permission at the same time.

A.
False, this feature has to be enabled in the Global Properties.
A.
False, this feature has to be enabled in the Global Properties.
Answers
B.
True, every administrator works in a session that is independent of the other administrators.
B.
True, every administrator works in a session that is independent of the other administrators.
Answers
C.
True, every administrator works on a different database that is independent of the other administrators.
C.
True, every administrator works on a different database that is independent of the other administrators.
Answers
D.
False, only one administrator can login with write permission.
D.
False, only one administrator can login with write permission.
Answers
Suggested answer: B

Explanation:

The answer is B because in R80 and above, more than one administrator can login to the Security Management Server with write permission at the same time. Every administrator works in a session that is independent of the other administrators.This is called concurrent administration and it allows multiple administrators to work on the same policy package simultaneously34Reference:Check Point R80.10 Concurrent Administration,Check Point R80.40 Security Management Administration Guide

Which one of the following is TRUE?

A.
Ordered policy is a sub-policy within another policy
A.
Ordered policy is a sub-policy within another policy
Answers
B.
One policy can be either inline or ordered, but not both
B.
One policy can be either inline or ordered, but not both
Answers
C.
Inline layer can be defined as a rule action
C.
Inline layer can be defined as a rule action
Answers
D.
Pre-R80 Gateways do not support ordered layers
D.
Pre-R80 Gateways do not support ordered layers
Answers
Suggested answer: C

Explanation:

The answer is C because inline layer can be defined as a rule action in a policy layer. Inline layer is a sub-policy that contains additional rules that are applied only if the parent rule matches. Ordered layer is a policy layer that contains rules that are applied in order, from top to bottom. One policy can be either inline or ordered, but not both.Pre-R80 Gateways do support ordered layers, but not inline layers5Reference:Check Point R81 Policy Layers and Sub-Policies, [Check Point R81 Security Gateway Administration Guide]

Which deployment adds a Security Gateway to an existing environment without changing IP routing?

A.
Distributed
A.
Distributed
Answers
B.
Bridge Mode
B.
Bridge Mode
Answers
C.
Remote
C.
Remote
Answers
D.
Standalone
D.
Standalone
Answers
Suggested answer: B

Explanation:

The answer is B because bridge mode deployment adds a Security Gateway to an existing environment without changing IP routing. Bridge mode is a transparent mode that does not require assigning IP addresses to the Security Gateway interfaces. Distributed deployment is a deployment where the Security Management Server and the Security Gateway are installed on separate machines. Remote deployment is a deployment where the Security Gateway is installed on a remote site and connects to the Security Management Server over a VPN tunnel. Standalone deployment is a deployment where the Security Management Server and the Security Gateway are installed on the same machine.

Reference: [Check Point R81 Bridge Mode], [Check Point R81 Deployment Scenarios]

Fill in the blank: An identity server uses a ___________ for user authentication.

A.
Shared secret
A.
Shared secret
Answers
B.
Certificate
B.
Certificate
Answers
C.
One-time password
C.
One-time password
Answers
D.
Token
D.
Token
Answers
Suggested answer: A

Explanation:

The answer is A because an identity server uses a shared secret for user authentication. A shared secret is a passphrase that is known by both the identity server and the user. The identity server sends a challenge to the user, who encrypts it with the shared secret and sends it back.The identity server then verifies the response and authenticates the user12Reference:Check Point R81 Identity Awareness Administration Guide,Check Point R81 Identity Server

You can see the following graphic:

What is presented on it?

A.
Properties of personal. p12 certificate file issued for user John.
A.
Properties of personal. p12 certificate file issued for user John.
Answers
B.
Shared secret properties of John's password.
B.
Shared secret properties of John's password.
Answers
C.
VPN certificate properties of the John's gateway.
C.
VPN certificate properties of the John's gateway.
Answers
D.
Expired. p12 certificate properties for user John.
D.
Expired. p12 certificate properties for user John.
Answers
Suggested answer: A

Explanation:

The answer is A because the graphic shows the properties of a personal .p12 certificate file issued for user John. A .p12 file is a file format that contains a user's private key and public key certificate. The graphic shows that the certificate file is valid and has an expiration date of 07-Apr-2018. The graphic also shows that the certificate file is issued by an internal CA, which is a Check Point component that manages certificates for users and gateways.

Reference: Check Point R81 Certificate Management, Check Point R81 Internal CA

When configuring LDAP User Directory integration, Changes applied to a User Directory template are:

A.
Reflected immediately for all users who are using template.
A.
Reflected immediately for all users who are using template.
Answers
B.
Not reflected for any users unless the local user template is changed.
B.
Not reflected for any users unless the local user template is changed.
Answers
C.
Reflected for all users who are using that template and if the local user template is changed as well.
C.
Reflected for all users who are using that template and if the local user template is changed as well.
Answers
D.
Not reflected for any users who are using that template.
D.
Not reflected for any users who are using that template.
Answers
Suggested answer: A

Explanation:

The answer is A because changes applied to a User Directory template are reflected immediately for all users who are using that template. A User Directory template defines the settings for connecting to an LDAP server, such as the server name, port, base DN, user filter, and group filter.When a User Directory template is modified, all users who are using that template will inherit the changes without requiring any additional actions3Reference:Check Point R81 Identity Awareness Administration Guide, [Check Point R81 User Directory Templates]

Choose what BEST describes the reason why querying logs now is very fast.

A.
New Smart-1 appliances double the physical memory install
A.
New Smart-1 appliances double the physical memory install
Answers
B.
Indexing Engine indexes logs for faster search results
B.
Indexing Engine indexes logs for faster search results
Answers
C.
SmartConsole now queries results directly from the Security Gateway
C.
SmartConsole now queries results directly from the Security Gateway
Answers
D.
The amount of logs been store is less than the usual in older versions
D.
The amount of logs been store is less than the usual in older versions
Answers
Suggested answer: B

Explanation:

The answer is B because querying logs now is very fast because the Indexing Engine indexes logs for faster search results. The Indexing Engine is a component of the Smart-1 appliance that creates indexes for log fields and values, such as source, destination, action, and time. The indexes enable quick and efficient searches of large amounts of log data.

Reference: [Check Point R81 Logging and Monitoring Administration Guide], [Check Point R81 Indexing Engine]

Check Point ClusterXL Active/Active deployment is used when:

A.
Only when there is Multicast solution set up
A.
Only when there is Multicast solution set up
Answers
B.
There is Load Sharing solution set up
B.
There is Load Sharing solution set up
Answers
C.
Only when there is Unicast solution set up
C.
Only when there is Unicast solution set up
Answers
D.
There is High Availability solution set up
D.
There is High Availability solution set up
Answers
Suggested answer: B

Explanation:

Check Point ClusterXL Active/Active deployment is used when there is Load Sharing solution set up.Load Sharing enables multiple Security Gateways to share traffic and provide high availability12.

Reference:Check Point R81,Check Point R81 ClusterXL Administration Guide

Which of the following methods can be used to update the trusted log server regarding the policy and configuration changes performed on the Security Management Server?

A.
Save Policy
A.
Save Policy
Answers
B.
Install Database
B.
Install Database
Answers
C.
Save session
C.
Save session
Answers
D.
Install Policy
D.
Install Policy
Answers
Suggested answer: A

Explanation:

The method to update the trusted log server regarding the policy and configuration changes performed on the Security Management Server is Save Policy.Saving a policy updates the trusted log server with the latest policy and configuration changes3.

Reference:Check Point R81 Logging and Monitoring Administration Guide

Total 401 questions
Go to page: of 41