ExamGecko
Home Home / Checkpoint / 156-215.81

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 14

Question list
Search
Search

What is the purpose of a Clean-up Rule?

A.
Clean-up Rules do not server any purpose.
A.
Clean-up Rules do not server any purpose.
Answers
B.
Provide a metric for determining unnecessary rules.
B.
Provide a metric for determining unnecessary rules.
Answers
C.
To drop any traffic that is not explicitly allowed.
C.
To drop any traffic that is not explicitly allowed.
Answers
D.
Used to better optimize a policy.
D.
Used to better optimize a policy.
Answers
Suggested answer: C

Explanation:

A clean-up rule is a rule that is placed at the end of the security policy to drop any traffic that is not explicitly allowed by the previous rules.It is a best practice to have a clean-up rule to prevent unauthorized access and log the dropped packets for analysis12. The other options are not the purpose of a clean-up rule.

Reference:Clean-up Rule,Check Point CCSA - R81: Practice Test & Explanation

What are the two types of NAT supported by the Security Gateway?

A.
Destination and Hide
A.
Destination and Hide
Answers
B.
Hide and Static
B.
Hide and Static
Answers
C.
Static and Source
C.
Static and Source
Answers
D.
Source and Destination
D.
Source and Destination
Answers
Suggested answer: B

Explanation:

The two types of NAT supported by the Security Gateway are hide NAT and static NAT. Hide NAT translates many source IP addresses into one IP address, usually the external interface of the gateway.Static NAT translates one source IP address into another IP address, usually a public IP address34. The other options are not valid types of NAT.

Reference:Network Address Translation (NAT),Check Point CCSA - R81: Practice Test & Explanation

Vanessa is attempting to log into the Gaia Web Portal. She is able to login successfully. Then she tries the same username and password for SmartConsole but gets the message in the screenshot image below. She has checked that the IP address of the Server is correct and the username and password she used to login into Gaia is also correct.

What is the most likely reason?

A.
Check Point R80 SmartConsole authentication is more secure than in previous versions and Vanessa requires a special authentication key for R80 SmartConsole. Check that the correct key details are used.
A.
Check Point R80 SmartConsole authentication is more secure than in previous versions and Vanessa requires a special authentication key for R80 SmartConsole. Check that the correct key details are used.
Answers
B.
Check Point Management software authentication details are not automatically the same as the Operating System authentication details. Check that she is using the correct details.
B.
Check Point Management software authentication details are not automatically the same as the Operating System authentication details. Check that she is using the correct details.
Answers
C.
SmartConsole Authentication is not allowed for Vanessa until a Super administrator has logged in first and cleared any other administrator sessions.
C.
SmartConsole Authentication is not allowed for Vanessa until a Super administrator has logged in first and cleared any other administrator sessions.
Answers
D.
Authentication failed because Vanessa's username is not allowed in the new Threat Prevention console update checks even though these checks passed with Gaia.
D.
Authentication failed because Vanessa's username is not allowed in the new Threat Prevention console update checks even though these checks passed with Gaia.
Answers
Suggested answer: B

Explanation:

The most likely reason for Vanessa's authentication failure is that she is using the wrong details for SmartConsole. Check Point Management software authentication details are not automatically the same as the Operating System authentication details.She needs to use the credentials that were defined during the initial configuration of the Security Management Server, or the ones that were assigned to her by the administrator12. The other options are not valid reasons for this error.

Reference:SmartConsole Login,Check Point CCSA - R81: Practice Test & Explanation

What is the most complete definition of the difference between the Install Policy button on the SmartConsole's tab, and the Install Policy within a specific policy?

A.
The Global one also saves and published the session before installation.
A.
The Global one also saves and published the session before installation.
Answers
B.
The Global one can install multiple selected policies at the same time.
B.
The Global one can install multiple selected policies at the same time.
Answers
C.
The local one does not install the Anti-Malware policy along with the Network policy.
C.
The local one does not install the Anti-Malware policy along with the Network policy.
Answers
D.
The second one pre-select the installation for only the current policy and for the applicable gateways.
D.
The second one pre-select the installation for only the current policy and for the applicable gateways.
Answers
Suggested answer: D

Explanation:

The difference between the Install Policy button on the SmartConsole's tab and the Install Policy within a specific policy is that the former installs all the policies that are selected in the Install Policy window, while the latter pre-selects the installation for only the current policy and for the applicable gateways5. The other options are not accurate differences.

Reference:Installing Policies, [Check Point CCSA - R81: Practice Test & Explanation]

Which of the following is used to initially create trust between a Gateway and Security Management Server?

A.
Internal Certificate Authority
A.
Internal Certificate Authority
Answers
B.
Token
B.
Token
Answers
C.
One-time Password
C.
One-time Password
Answers
D.
Certificate
D.
Certificate
Answers
Suggested answer: C

Explanation:

A one-time password is used to initially create trust between a Gateway and Security Management Server. The administrator generates a one-time password from SmartConsole and enters it on the gateway command line interface using the cpconfig command. This establishes a Secure Internal Communication (SIC) between the gateway and the server . The other options are not used for this purpose.

Reference: [Configuring Secure Internal Communication (SIC)], [Check Point CCSA - R81: Practice Test & Explanation]

John is the administrator of a R80 Security Management server managing r R77.30 Check Point Security Gateway. John is currently updating the network objects and amending the rules using SmartConsole. To make John's changes available to other administrators, and to save the database before installing a policy, what must John do?

A.
Logout of the session
A.
Logout of the session
Answers
B.
File > Save
B.
File > Save
Answers
C.
Install database
C.
Install database
Answers
D.
Publish the session
D.
Publish the session
Answers
Suggested answer: D

Explanation:

To make John's changes available to other administrators, and to save the database before installing a policy, John must publish the session.Publishing the session saves the changes to the database and makes them visible to other administrators1. The other options do not achieve this goal.

Reference:Publishing a Session

Fill in the blanks: There are ________ types of software containers ________.

A.
Three; security management, Security Gateway, and endpoint security
A.
Three; security management, Security Gateway, and endpoint security
Answers
B.
Three; Security gateway, endpoint security, and gateway management
B.
Three; Security gateway, endpoint security, and gateway management
Answers
C.
Two; security management and endpoint security
C.
Two; security management and endpoint security
Answers
D.
Two; endpoint security and Security Gateway
D.
Two; endpoint security and Security Gateway
Answers
Suggested answer: A

Explanation:

There are three types of software containers: security management, Security Gateway, and endpoint security. A software container is a set of software blades that provide specific functionality. A security management container manages the security policy and configuration for one or more Security Gateways. A Security Gateway container enforces the security policy on the network traffic.An endpoint security container protects the data and network access of an endpoint device2. The other options are not valid types of software containers.

Reference:Software Containers

Fill in the bank: In Office mode, a Security Gateway assigns a remote client to an IP address once___________.

A.
the user connects and authenticates
A.
the user connects and authenticates
Answers
B.
office mode is initiated
B.
office mode is initiated
Answers
C.
the user requests a connection
C.
the user requests a connection
Answers
D.
the user connects
D.
the user connects
Answers
Suggested answer: A

Explanation:

In Office mode, a Security Gateway assigns a remote client to an IP address once the user connects and authenticates. Office mode allows a remote client to get an IP address from the internal network of the organization.The IP address is assigned during the IKE negotiation, after the user has successfully authenticated with the Security Gateway3. The other options are not correct timings for assigning an IP address in Office mode.

Reference:Office Mode

Which Identity Source(s) should be selected in Identity Awareness for when there is a requirement for a higher level of security for sensitive servers?

A.
AD Query
A.
AD Query
Answers
B.
Terminal Servers Endpoint Identity Agent
B.
Terminal Servers Endpoint Identity Agent
Answers
C.
Endpoint Identity Agent and Browser-Based Authentication
C.
Endpoint Identity Agent and Browser-Based Authentication
Answers
D.
RADIUS and Account Logon
D.
RADIUS and Account Logon
Answers
Suggested answer: C

Explanation:

Endpoint Identity Agent and Browser-Based Authentication are the identity sources that provide the highest level of security for sensitive servers, as they require user authentication and can enforce granular access rules based on user identity.AD Query, Terminal Servers Endpoint Identity Agent, and RADIUS and Account Logon are less secure, as they rely on passive methods of identity acquisition or do not support identity-based access control12.

Which statement describes what Identity Sharing is in Identity Awareness?

A.
Management servers can acquire and share identities with Security Gateways
A.
Management servers can acquire and share identities with Security Gateways
Answers
B.
Users can share identities with other users
B.
Users can share identities with other users
Answers
C.
Security Gateways can acquire and share identities with other Security Gateways
C.
Security Gateways can acquire and share identities with other Security Gateways
Answers
D.
Administrators can share identifies with other administrators
D.
Administrators can share identifies with other administrators
Answers
Suggested answer: C

Explanation:

Identity Sharing is a feature that allows Security Gateways to acquire and share identities with other Security Gateways, enabling identity-based access control across different network segments or domains13. Management servers, users, and administrators do not share identities with Security Gateways.

Total 401 questions
Go to page: of 41