ExamGecko
Home / Checkpoint / 156-215.81 / List of questions
Ask Question

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 21

Add to Whishlist

List of questions

Question 201

Report Export Collapse

An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office. Both offices are protected by Check Point Security Gateway managed by the same Security Management Server (SMS). While configuring the VPN community to specify the pre-shared secret, the administrator did not find a box to input the pre-shared secret. Why does it not allow him to specify the pre-shared secret?

Become a Premium Member for full access
  Unlock Premium Member

Question 202

Report Export Collapse

Which of the following technologies extracts detailed information from packets and stores that information in state tables?

Become a Premium Member for full access
  Unlock Premium Member

Question 203

Report Export Collapse

What object type would you use to grant network access to an LDAP user group?

Become a Premium Member for full access
  Unlock Premium Member

Question 204

Report Export Collapse

View the rule below. What does the pen-symbol in the left column mean?

Checkpoint 156-215.81 image Question 204 11211 09162024015504000000

Become a Premium Member for full access
  Unlock Premium Member

Question 205

Report Export Collapse

What data MUST be supplied to the SmartConsole System Restore window to restore a backup?

Become a Premium Member for full access
  Unlock Premium Member

Question 206

Report Export Collapse

Which repositories are installed on the Security Management Server by SmartUpdate?

Become a Premium Member for full access
  Unlock Premium Member

Question 207

Report Export Collapse

Which back up method uses the command line to create an image of the OS?

Become a Premium Member for full access
  Unlock Premium Member

Question 208

Report Export Collapse

To quickly review when Threat Prevention signatures were last updated, which Threat Tool would an administrator use?

Become a Premium Member for full access
  Unlock Premium Member

Question 209

Report Export Collapse

Which of the following is considered to be the more secure and preferred VPN authentication method?

Become a Premium Member for full access
  Unlock Premium Member

Question 210

Report Export Collapse

When a Security Gateway sends its logs to an IP address other than its own, which deployment option is installed?

Become a Premium Member for full access
  Unlock Premium Member
Total 401 questions
Go to page: of 41