ExamGecko
Home Home / Checkpoint / 156-215.81

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 19

Question list
Search
Search

The ''Hit count'' feature allows tracking the number of connections that each rule matches. Will the Hit count feature work independently from logging and Track the hits even if the Track option is set to ''None''?

A.
No, it will not work independently. Hit Count will be shown only for rules with Track options set as Log or alert
A.
No, it will not work independently. Hit Count will be shown only for rules with Track options set as Log or alert
Answers
B.
Yes, it will work independently as long as ''analyze all rules'' tick box is enabled on the Security Gateway
B.
Yes, it will work independently as long as ''analyze all rules'' tick box is enabled on the Security Gateway
Answers
C.
No, it will not work independently because hit count requires all rules to be logged
C.
No, it will not work independently because hit count requires all rules to be logged
Answers
D.
Yes, it will work independently because when you enable Hit Count, the SMS collects the data from supported Security Gateways
D.
Yes, it will work independently because when you enable Hit Count, the SMS collects the data from supported Security Gateways
Answers
Suggested answer: D

Explanation:

The Hit count feature will work independently from logging and track the hits even if the Track option is set to ''None''1, p. 23.When you enable Hit Count, the Security Management Server collects the data from supported Security Gateways and displays the number of connections that each rule matches in SmartConsole3.

Reference:Check Point CCSA - R81: Practice Test & Explanation,Check Point Security Management Administration Guide R81

Which SmartConsole tab shows logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?

A.
Gateway and Servers
A.
Gateway and Servers
Answers
B.
Logs and Monitor
B.
Logs and Monitor
Answers
C.
Manage Seeting
C.
Manage Seeting
Answers
D.
Security Policies
D.
Security Policies
Answers
Suggested answer: B

Explanation:

The SmartConsole tab that shows logs and detects security threats, providing a centralized display of potential attack patterns from all network devices, is Logs and Monitor1, p. 24. The Logs and Monitor tab allows administrators to view logs from various sources, such as Security Gateways, SmartEvent servers, and SmartReporter servers. Gateway and Servers, Manage Setting, and Security Policies are other tabs in SmartConsole that have different functions.

Reference:Check Point CCSA - R81: Practice Test & Explanation, [Check Point SmartConsole R81 Help]

Which of the following is NOT a valid deployment option for R80?

A.
All-in-one (stand-alone)
A.
All-in-one (stand-alone)
Answers
B.
Log server
B.
Log server
Answers
C.
SmartEvent
C.
SmartEvent
Answers
D.
Multi-domain management server
D.
Multi-domain management server
Answers
Suggested answer: D

Explanation:

Multi-domain management server is a valid deployment option for R81, not R80.R80 supports multi-domain security management, which is a centralized management solution for large-scale, distributed environments with many different domain networks1.

Reference:Multi-Domain Security Management Administration Guide R80

You have created a rule at the top of your Rule Base to permit Guest Wireless access to the Internet. However, when guest users attempt to reach the Internet, they are not seeing the splash page to accept your Terms of Service, and cannot access the Internet. How can you fix this?

A.
Right click Accept in the rule, select ''More'', and then check ''Enable Identity Captive Portal''
A.
Right click Accept in the rule, select ''More'', and then check ''Enable Identity Captive Portal''
Answers
B.
On the firewall object, Legacy Authentication screen, check ''Enable Identity Captive Portal''
B.
On the firewall object, Legacy Authentication screen, check ''Enable Identity Captive Portal''
Answers
C.
In the Captive Portal screen of Global Properties, check ''Enable Identity Captive Portal''
C.
In the Captive Portal screen of Global Properties, check ''Enable Identity Captive Portal''
Answers
D.
On the Security Management Server object, check the box ''Identity Logging''
D.
On the Security Management Server object, check the box ''Identity Logging''
Answers
Suggested answer: A

Explanation:

Identity Captive Portal is a Check Point Identity Awareness web portal, to which users connect with their web browser to log in and authenticate, when using Browser-Based Authentication2.To enable Identity Captive Portal for a specific rule, you need to right click Accept in the rule, select ''More'', and then check ''Enable Identity Captive Portal''3.

Reference:Identity Awareness Administration Guide R80,Identity awareness with captive portal in Checkpoint R80

Identity Awareness allows the Security Administrator to configure network access based on which of the following?

A.
Name of the application, identity of the user, and identity of the machine
A.
Name of the application, identity of the user, and identity of the machine
Answers
B.
Identity of the machine, username, and certificate
B.
Identity of the machine, username, and certificate
Answers
C.
Network location, identity of a user, and identity of a machine
C.
Network location, identity of a user, and identity of a machine
Answers
D.
Browser-Based Authentication, identity of a user, and network location
D.
Browser-Based Authentication, identity of a user, and network location
Answers
Suggested answer: C

Explanation:

Identity Awareness allows the Security Administrator to configure network access based on network location, identity of a user, and identity of a machine1.These are the three main identity sources that Identity Awareness supports1.

Reference:Identity Awareness R80.40 Administration Guide

Which option will match a connection regardless of its association with a VPN community?

A.
All Site-to-Site VPN Communities
A.
All Site-to-Site VPN Communities
Answers
B.
Accept all encrypted traffic
B.
Accept all encrypted traffic
Answers
C.
All Connections (Clear or Encrypted)
C.
All Connections (Clear or Encrypted)
Answers
D.
Specific VPN Communities
D.
Specific VPN Communities
Answers
Suggested answer: B

Explanation:

Accept all encrypted traffic is the option that will match a connection regardless of its association with a VPN community2.This option allows encrypted traffic from any VPN peer, even if it is not defined in a VPN community2.

Reference:Site to Site VPN in R80.x - Tutorial for Beginners

Which of the following is NOT a tracking log option in R80.x?

A.
Log
A.
Log
Answers
B.
Full Log
B.
Full Log
Answers
C.
Detailed Log
C.
Detailed Log
Answers
D.
Extended Log
D.
Extended Log
Answers
Suggested answer: C

Explanation:

Detailed Log is not a valid tracking log option in R80.x3.The tracking log options in R80.x are Log, Full Log, and Extended Log45.

Reference:Where is 'full log' option in track column,LOGGINGAND MONITORING R80,Logging and Monitoring Administration Guide R80.20

Which information is included in the ''Extended Log'' tracking option, but is not included in the ''Log'' tracking option?

A.
file attributes
A.
file attributes
Answers
B.
application information
B.
application information
Answers
C.
destination port
C.
destination port
Answers
D.
data type information
D.
data type information
Answers
Suggested answer: B

Explanation:

Application information is included in the ''Extended Log'' tracking option, but is not included in the ''Log'' tracking option4.The ''Extended Log'' option provides additional information about the application, such as name, category, risk, and technology4.

Reference:LOGGINGAND MONITORING R80

Where is the ''Hit Count'' feature enabled or disabled in SmartConsole?

A.
On the Policy Package
A.
On the Policy Package
Answers
B.
On each Security Gateway
B.
On each Security Gateway
Answers
C.
On the Policy layer
C.
On the Policy layer
Answers
D.
In Global Properties for the Security Management Server
D.
In Global Properties for the Security Management Server
Answers
Suggested answer: C

Explanation:

The ''Hit Count'' feature is enabled or disabled on the Policy layer in SmartConsole1. To enable or disable the ''Hit Count'' feature, right-click on the Policy layer and select ''Edit Layer''.Then, check or uncheck the ''Enable Hit Count'' option1.

Reference:Solved: Hit Count in R80.x

Which tool is used to enable cluster membership on a Gateway?

A.
SmartUpdate
A.
SmartUpdate
Answers
B.
cpconfig
B.
cpconfig
Answers
C.
SmartConsole
C.
SmartConsole
Answers
D.
sysconfig
D.
sysconfig
Answers
Suggested answer: B

Explanation:

The tool used to enable cluster membership on a Gateway is cpconfig2.This tool allows you to configure basic settings of Check Point products, such as cluster membership, administrator name and password, GUI clients, and Secure Internal Communication (SIC)2.

Reference:Next Generation Security Gateway Guide R80

Total 401 questions
Go to page: of 41