ExamGecko
Home Home / Checkpoint / 156-215.81

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 24

Question list
Search
Search

URL Filtering employs a technology, which educates users on web usage policy in real time. What is the name of that technology?

A.
WebCheck
A.
WebCheck
Answers
B.
UserCheck
B.
UserCheck
Answers
C.
Harmony Endpoint
C.
Harmony Endpoint
Answers
D.
URL categorization
D.
URL categorization
Answers
Suggested answer: B

Explanation:

URL Filtering employs a technology called UserCheck, which educates users on web usage policy in real time. UserCheck is a feature that allows the firewall to interact with the users and inform them about the web usage policy and its violations. UserCheck can also allow users to request access to blocked websites or report false positives. UserCheck helps users understand and comply with the web usage policy and reduces the workload of the administrators.

Name one limitation of using Security Zones in the network?

A.
Security zones will not work in Automatic NAT rules
A.
Security zones will not work in Automatic NAT rules
Answers
B.
Security zone will not work in Manual NAT rules
B.
Security zone will not work in Manual NAT rules
Answers
C.
Security zones will not work in firewall policy layer
C.
Security zones will not work in firewall policy layer
Answers
D.
Security zones cannot be used in network topology
D.
Security zones cannot be used in network topology
Answers
Suggested answer: B

Explanation:

One limitation of using Security Zones in the network is that Security Zones will not work in Manual NAT rules. Manual NAT rules are rules that explicitly define how to translate the source and destination IP addresses and ports of each connection. Manual NAT rules do not support using Security Zones as objects, only network objects or groups. Automatic NAT rules are rules that automatically define how to translate the source and destination IP addresses and ports of each connection based on the network objects or groups properties. Automatic NAT rules support using Security Zones as objects. Security Zones can also work in firewall policy layer and network topology.

Reference: [Security Zones Best Practices], [NAT Methods]

Choose what BEST describes users on Gaia Platform.

A.
There are two default users and neither can be deleted.
A.
There are two default users and neither can be deleted.
Answers
B.
There are two default users and one cannot be deleted.
B.
There are two default users and one cannot be deleted.
Answers
C.
There is one default user that can be deleted.
C.
There is one default user that can be deleted.
Answers
D.
There is one default user that cannot be deleted.
D.
There is one default user that cannot be deleted.
Answers
Suggested answer: A

Explanation:

There are two default users on Gaia Platform and neither can be deleted. The two default users are admin and monitor. The admin user has full access to the Gaia configuration and management tools, such as CLI and WebUI. The monitor user has read-only access to the Gaia configuration and management tools, and can only view the system status and settings. These two users cannot be deleted, but their passwords can be changed.

Reference: [Gaia Administration Guide], [Gaia Overview]

Which type of Check Point license ties the package license to the IP address of the Security Management Server?

A.
Central
A.
Central
Answers
B.
Corporate
B.
Corporate
Answers
C.
Local
C.
Local
Answers
D.
Formal
D.
Formal
Answers
Suggested answer: A

Explanation:

The type of Check Point license that ties the package license to the IP address of the Security Management Server is Central license. A Central license is a license that is installed on the Security Management Server and applies to all the Security Gateways that are managed by it. The Central license is based on the IP address of the Security Management Server and cannot be transferred to another Security Management Server with a different IP address.

Reference: [Check Point R81 Licensing Guide], [Managing and Installing license via SmartUpdate]

Which of the following is NOT an advantage to using multiple LDAP servers?

A.
You achieve a faster access time by placing LDAP servers containing the database at remote sites
A.
You achieve a faster access time by placing LDAP servers containing the database at remote sites
Answers
B.
You achieve compartmentalization by allowing a large number of users to be distributed across several servers
B.
You achieve compartmentalization by allowing a large number of users to be distributed across several servers
Answers
C.
Information on a user is hidden, yet distributed across several servers.
C.
Information on a user is hidden, yet distributed across several servers.
Answers
D.
You gain High Availability by replicating the same information on several servers
D.
You gain High Availability by replicating the same information on several servers
Answers
Suggested answer: C

Explanation:

The statement that information on a user is hidden, yet distributed across several servers is not an advantage to using multiple LDAP servers. LDAP (Lightweight Directory Access Protocol) is a protocol that allows access to a centralized directory service that stores information about users, groups, devices, etc. Using multiple LDAP servers can provide advantages such as faster access time, compartmentalization, and high availability, but not hiding information. Information on a user is not hidden by using multiple LDAP servers, but rather replicated or partitioned across them. Replication means that the same information is copied to all LDAP servers, while partitioning means that different information is stored on different LDAP servers. Both methods aim to improve performance and reliability, not security or privacy.

Reference: [LDAP Integration], [LDAP]

When an Admin logs into SmartConsole and sees a lock icon on a gateway object and cannot edit that object, what does that indicate?

A.
The gateway is not powered on.
A.
The gateway is not powered on.
Answers
B.
Incorrect routing to reach the gateway.
B.
Incorrect routing to reach the gateway.
Answers
C.
The Admin would need to login to Read-Only mode
C.
The Admin would need to login to Read-Only mode
Answers
D.
Another Admin has made an edit to that object and has yet to publish the change.
D.
Another Admin has made an edit to that object and has yet to publish the change.
Answers
Suggested answer: D

Explanation:

When an Admin logs into SmartConsole and sees a lock icon on a gateway object and cannot edit that object, it indicates that another Admin has made an edit to that object and has yet to publish the change. SmartConsole supports concurrent administration, which means that multiple Admins can work on the same security policy at the same time. However, when one Admin edits an object, such as a gateway, a rule, or a network, that object is locked for other Admins until the change is published or discarded. The lock icon shows which objects are being edited by other Admins and prevents conflicts or overwrites. The gateway being powered off, incorrect routing to reach the gateway, or logging in to Read-Only mode do not cause the lock icon to appear.

Reference: [Concurrent Administration], [SmartConsole Overview]

In order to modify Security Policies, the administrator can use which of the following tools? (Choose the best answer.)

A.
SmartConsole and WebUI on the Security Management Server.
A.
SmartConsole and WebUI on the Security Management Server.
Answers
B.
SmartConsole or mgmt_cli (API) on any computer where SmartConsole is installed.
B.
SmartConsole or mgmt_cli (API) on any computer where SmartConsole is installed.
Answers
C.
Command line of the Security Management Server or mgmt_cli.exe on any Windows computer.
C.
Command line of the Security Management Server or mgmt_cli.exe on any Windows computer.
Answers
D.
mgmt_cli (API) or WebUI on Security Gateway and SmartConsole on the Security Management Server.
D.
mgmt_cli (API) or WebUI on Security Gateway and SmartConsole on the Security Management Server.
Answers
Suggested answer: B

Explanation:

In order to modify Security Policies, the administrator can use SmartConsole or mgmt_cli (API) on any computer where SmartConsole is installed. SmartConsole is a graphical tool that allows the administrator to create, edit, and manage security policies using a web browser. mgmt_cli (API) is a command-line tool that allows the administrator to perform the same tasks using commands and scripts. Both tools can connect to the Security Management Server remotely from any computer that has SmartConsole installed.

Reference: [SmartConsole Overview], [mgmt_cli (API)]

A SAM rule Is implemented to provide what function or benefit?

A.
Allow security audits.
A.
Allow security audits.
Answers
B.
Handle traffic as defined in the policy.
B.
Handle traffic as defined in the policy.
Answers
C.
Monitor sequence activity.
C.
Monitor sequence activity.
Answers
D.
Block suspicious activity.
D.
Block suspicious activity.
Answers
Suggested answer: D

Explanation:

A SAM (Suspicious Activity Monitoring) rule is implemented to provide the function or benefit of blocking suspicious activity. A SAM rule is a rule that defines an action to be taken by the firewall when it detects a suspicious activity, such as an attack, a scan, or a policy violation. The action can be blocking, dropping, rejecting, or logging the traffic that triggered the suspicious activity. A SAM rule can be created manually or automatically by other security features, such as IPS, Anti-Bot, or SmartEvent.

Reference: [SAM Rules], [Suspicious Activity Rules]

Is it possible to have more than one administrator connected to a Security Management Server at once?

A.
Yes, but only if all connected administrators connect with read-only permissions.
A.
Yes, but only if all connected administrators connect with read-only permissions.
Answers
B.
Yes, but objects edited by one administrator will be locked for editing by others until the session is published.
B.
Yes, but objects edited by one administrator will be locked for editing by others until the session is published.
Answers
C.
No, only one administrator at a time can connect to a Security Management Server
C.
No, only one administrator at a time can connect to a Security Management Server
Answers
D.
Yes, but only one of those administrators will have write-permissions. All others will have read-only permission.
D.
Yes, but only one of those administrators will have write-permissions. All others will have read-only permission.
Answers
Suggested answer: B

Explanation:

It is possible to have more than one administrator connected to a Security Management Server at once, but objects edited by one administrator will be locked for editing by others until the session is published. This feature is called concurrent administration and it allows multiple administrators to work on the same security policy at the same time. However, when one administrator edits an object, such as a gateway, a rule, or a network, that object is locked for other administrators until the change is published or discarded. The lock icon shows which objects are being edited by other administrators and prevents conflicts or overwrites.

Reference: [Concurrent Administration], [SmartConsole Overview]

In order to see real-time and historical graph views of Security Gateway statistics in SmartView Monitor, what feature needs to be enabled on the Security Gateway?

A.
Logging & Monitoring
A.
Logging & Monitoring
Answers
B.
None - the data is available by default
B.
None - the data is available by default
Answers
C.
Monitoring Blade
C.
Monitoring Blade
Answers
D.
SNMP
D.
SNMP
Answers
Suggested answer: C

Explanation:

In order to see real-time and historical graph views of Security Gateway statistics in SmartView Monitor, the Monitoring Blade feature needs to be enabled on the Security Gateway. The Monitoring Blade is a software blade that collects and displays network and security performance data from the Security Gateway, such as traffic, throughput, connections, CPU usage, memory usage, etc. The Monitoring Blade can be enabled or disabled on each Security Gateway from the SmartConsole.

Reference: [Monitoring Blade], [SmartView Monitor]

Total 401 questions
Go to page: of 41