ExamGecko
Home Home / Checkpoint / 156-215.81

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 18

Question list
Search
Search

What key is used to save the current CPView page in a filename format cpview_''cpview process ID''. cap''number of captures''?

A.
S
A.
S
Answers
B.
W
B.
W
Answers
C.
C
C.
C
Answers
D.
Space bar
D.
Space bar
Answers
Suggested answer: C

Explanation:

The key C is used to save the current CPView page in a filename format cpview_''cpview process ID''.cap''number of captures''2.

Reference:Free Check Point CCSA Sample Questions and Study Guide

Fill in the blank: It is Best Practice to have a _____ rule at the end of each policy layer.

A.
Explicit Drop
A.
Explicit Drop
Answers
B.
Implied Drop
B.
Implied Drop
Answers
C.
Explicit Cleanup
C.
Explicit Cleanup
Answers
D.
Implicit Drop
D.
Implicit Drop
Answers
Suggested answer: C

Explanation:

It is Best Practice to have an Explicit CleanUp rule at the end of each policy layer.This rule will log and drop any traffic that does not match any of the preceding rules in the layer1, p. 23.

Reference:Check Point CCSA - R81: Practice Test & Explanation

When defining group-based access in an LDAP environment with Identity Awareness, what is the BEST object type to represent an LDAP group in a Security Policy?

A.
Access Role
A.
Access Role
Answers
B.
User Group
B.
User Group
Answers
C.
SmartDirectory Group
C.
SmartDirectory Group
Answers
D.
Group Template
D.
Group Template
Answers
Suggested answer: A

Explanation:

The BEST object type to represent an LDAP group in a Security Policy is an Access Role.An Access Role object defines a set of users, machines, or networks that can access a resource or service1, p. 27.An Access Role object can include LDAP groups as one of its components2, p. 10.

Reference:Check Point CCSA - R81: Practice Test & Explanation,Check Point Identity Awareness Administration Guide R81

The ______ software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware.

A.
Next Generation Threat Prevention
A.
Next Generation Threat Prevention
Answers
B.
Next Generation Threat Emulation
B.
Next Generation Threat Emulation
Answers
C.
Next Generation Threat Extraction
C.
Next Generation Threat Extraction
Answers
D.
Next Generation Firewall
D.
Next Generation Firewall
Answers
Suggested answer: B

Explanation:

The Next Generation Threat Emulation software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware1, p. 41.It emulates files in a virtual environment and inspects their behavior for malicious activity3.

Reference:Check Point CCSA - R81: Practice Test & Explanation,Check Point Threat Emulation Administration Guide R81

Fill in the blank: Once a certificate is revoked from the Security GateWay by the Security Management Server, the certificate information is _______.

A.
Sent to the Internal Certificate Authority.
A.
Sent to the Internal Certificate Authority.
Answers
B.
Sent to the Security Administrator.
B.
Sent to the Security Administrator.
Answers
C.
Stored on the Security Management Server.
C.
Stored on the Security Management Server.
Answers
D.
Stored on the Certificate Revocation List.
D.
Stored on the Certificate Revocation List.
Answers
Suggested answer: D

Explanation:

Once a certificate is revoked from the Security Gateway by the Security Management Server, the certificate information is stored on the Certificate Revocation List (CRL)1, p. 47.The CRL is a list of certificates that have been revoked before their expiration date4.

Reference:Check Point CCSA - R81: Practice Test & Explanation,Free Check Point CCSA Sample Questions and Study Guide

Which type of attack can a firewall NOT prevent?

A.
Network Bandwidth Saturation
A.
Network Bandwidth Saturation
Answers
B.
Buffer Overflow
B.
Buffer Overflow
Answers
C.
SYN Flood
C.
SYN Flood
Answers
D.
SQL Injection
D.
SQL Injection
Answers
Suggested answer: A

Explanation:

A firewall can NOT prevent a network bandwidth saturation attack, which is a type of denial-of-service (DoS) attack that aims to consume all the available bandwidth of a target network or device1, p. 9.A firewall can prevent other types of attacks, such as buffer overflow, SYN flood, and SQL injection, by inspecting packets and applying security rules2, p. 11-12.

Reference:Check Point CCSA - R81: Practice Test & Explanation,156-315.81 Checkpoint Exam Info and Free Practice Test

R80 is supported by which of the following operating systems:

A.
Windows only
A.
Windows only
Answers
B.
Gaia only
B.
Gaia only
Answers
C.
Gaia, SecurePlatform, and Windows
C.
Gaia, SecurePlatform, and Windows
Answers
D.
SecurePlatform only
D.
SecurePlatform only
Answers
Suggested answer: B

Explanation:

R80 is supported by Gaia only, which is Check Point's unified security operating system for all Check Point appliances, open servers, and virtualized gateways1, p. 14. Windows and SecurePlatform are not supported by R80.

Reference:Check Point CCSA - R81: Practice Test & Explanation, [Check Point Learning and Training Frequently Asked Questions (FAQs)]

What Check Point technologies deny or permit network traffic?

A.
Application Control, DLP
A.
Application Control, DLP
Answers
B.
Packet Filtering, Stateful Inspection, Application Layer Firewall.
B.
Packet Filtering, Stateful Inspection, Application Layer Firewall.
Answers
C.
ACL, SandBlast, MPT
C.
ACL, SandBlast, MPT
Answers
D.
IPS, Mobile Threat Protection
D.
IPS, Mobile Threat Protection
Answers
Suggested answer: B

Explanation:

Check Point technologies that deny or permit network traffic are packet filtering, stateful inspection, and application layer firewall1, p. 15-16.Packet filtering is a basic firewall technique that examines packets based on their source and destination addresses and ports2, p. 13.Stateful inspection is an advanced firewall technique that tracks the state and context of network connections and inspects packets based on their content and sequence2, p. 13.Application layer firewall is a firewall technique that operates at the application layer of the OSI model and inspects packets based on their application protocols and data2, p. 14.

Reference:Check Point CCSA - R81: Practice Test & Explanation,156-315.81 Checkpoint Exam Info and Free Practice Test

How do you manage Gaia?

A.
Through CLI and WebUI
A.
Through CLI and WebUI
Answers
B.
Through CLI only
B.
Through CLI only
Answers
C.
Through SmartDashboard only
C.
Through SmartDashboard only
Answers
D.
Through CLI, WebUI, and SmartDashboard
D.
Through CLI, WebUI, and SmartDashboard
Answers
Suggested answer: D

Explanation:

Gaia can be managed through CLI, WebUI, and SmartDashboard1, p. 17-18. CLI is a command-line interface that allows administrators to configure and monitor Gaia using commands and scripts. WebUI is a web-based interface that allows administrators to configure and monitor Gaia using a browser. SmartDashboard is a graphical user interface that allows administrators to manage security policies and objects for Gaia devices.

Reference:Check Point CCSA - R81: Practice Test & Explanation, [Check Point Gaia Administration Guide R81], [Check Point Security Management Administration Guide R81]

What licensing feature is used to verify licenses and activate new licenses added to the License and Contracts repository?

A.
Verification tool
A.
Verification tool
Answers
B.
Verification licensing
B.
Verification licensing
Answers
C.
Automatic licensing
C.
Automatic licensing
Answers
D.
Automatic licensing and Verification tool
D.
Automatic licensing and Verification tool
Answers
Suggested answer: D

Explanation:

The licensing feature that is used to verify licenses and activate new licenses added to the License and Contracts repository is Automatic licensing and Verification tool1, p. 8. Automatic licensing is a feature that allows the Security Management Server to automatically attach licenses to Security Gateways.Verification tool is a feature that allows the Security Management Server to verify the validity of licenses and contracts2.

Reference:Check Point CCSA - R81: Practice Test & Explanation,Check Point Licensing and Contract Administration Guide R81

Total 401 questions
Go to page: of 41