ExamGecko
Home Home / Checkpoint / 156-215.81

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 30

Question list
Search
Search

Fill in the blanks: In _____ NAT, Only the ________ is translated.

A.
Static; source
A.
Static; source
Answers
B.
Simple; source
B.
Simple; source
Answers
C.
Hide; destination
C.
Hide; destination
Answers
D.
Hide; source
D.
Hide; source
Answers
Suggested answer: D

Explanation:

In Hide NAT, only the source IP address is translated to a different IP address4. This is used to hide a group of hosts behind a single IP address, usually the external interface of the Security Gateway.

Reference:Check Point R81 Firewall Administration Guide

Fill in the blank: SmartConsole, SmartEvent GUI client, and ___________ allow viewing of billions of consolidated logs and shows them as prioritized security events.

A.
SmartView Web Application
A.
SmartView Web Application
Answers
B.
SmartTracker
B.
SmartTracker
Answers
C.
SmartMonitor
C.
SmartMonitor
Answers
D.
SmartReporter
D.
SmartReporter
Answers
Suggested answer: A

Explanation:

SmartConsole, SmartEvent GUI client, andSmartView Web Applicationallow viewing of billions of consolidated logs and shows them as prioritized security events1.SmartView Web Application is a web-based interface that provides access to SmartEvent reports and dashboards2.

Reference:Check Point R81 Security Management Administration Guide,Check Point R81 SmartEvent Administration Guide

What is the main difference between Static NAT and Hide NAT?

A.
Static NAT only allows incoming connections to protect your network.
A.
Static NAT only allows incoming connections to protect your network.
Answers
B.
Static NAT allow incoming and outgoing connections. Hide NAT only allows outgoing connections.
B.
Static NAT allow incoming and outgoing connections. Hide NAT only allows outgoing connections.
Answers
C.
Static NAT only allows outgoing connections. Hide NAT allows incoming and outgoing connections.
C.
Static NAT only allows outgoing connections. Hide NAT allows incoming and outgoing connections.
Answers
D.
Hide NAT only allows incoming connections to protect your network.
D.
Hide NAT only allows incoming connections to protect your network.
Answers
Suggested answer: B

Explanation:

The main difference between Static NAT and Hide NAT is that Static NAT allows incoming and outgoing connections, while Hide NAT only allows outgoing connections4. Static NAT translates a single IP address to another single IP address, while Hide NAT translates a group of IP addresses to a single IP address. Static NAT is used to expose internal servers to external networks, while Hide NAT is used to hide internal hosts from external networks.

Reference:Check Point R81 Firewall Administration Guide

A Check Point Software license consists of two components, the Software Blade and the Software Container. There are ______ types of Software Containers: ________.

A.
Two; Security Management and Endpoint Security
A.
Two; Security Management and Endpoint Security
Answers
B.
Two; Endpoint Security and Security Gateway
B.
Two; Endpoint Security and Security Gateway
Answers
C.
Three; Security Management, Security Gateway, and Endpoint Security
C.
Three; Security Management, Security Gateway, and Endpoint Security
Answers
D.
Three; Security Gateway, Endpoint Security, and Gateway Management
D.
Three; Security Gateway, Endpoint Security, and Gateway Management
Answers
Suggested answer: C

Explanation:

A Check Point Software license consists of two components, the Software Blade and the Software Container.There arethreetypes of Software Containers:Security Management, Security Gateway, and Endpoint Security1. A Software Blade is a specific security function that can be enabled or disabled on a Software Container. A Software Container is a platform that runs one or more Software Blades. Security Management is a container that manages the security policy and configuration of Security Gateways. Security Gateway is a container that enforces the security policy on network traffic. Endpoint Security is a container that protects endpoints from threats and data loss.

Reference:Check Point Licensing and Contract Operations User Guide

Fill in the blank: With the User Directory Software Blade, you can create user definitions on a(n) ___________ Server.

A.
SecurID
A.
SecurID
Answers
B.
LDAP
B.
LDAP
Answers
C.
NT domain
C.
NT domain
Answers
D.
SMTP
D.
SMTP
Answers
Suggested answer: B

Explanation:

With the User Directory Software Blade, you can create user definitions on a(n)LDAPServer2. LDAP stands for Lightweight Directory Access Protocol and is a protocol for accessing and managing user information stored in a directory service. The User Directory Software Blade enables integration with LDAP servers such as Microsoft Active Directory, Novell eDirectory, and OpenLDAP.

Reference:Check Point R81 Identity Awareness Administration Guide

What is the default tracking option of a rule?

A.
Tracking
A.
Tracking
Answers
B.
Log
B.
Log
Answers
C.
None
C.
None
Answers
D.
Alert
D.
Alert
Answers
Suggested answer: B

Explanation:

The default tracking option of a rule isLog3. This means that the Security Gateway will generate a log entry for every connection that matches the rule. The log entry will contain information such as source, destination, service, action, and time. Other tracking options include None, Alert, Mail, SNMP Trap, User Alert, and Accounting.

Reference:Check Point R81 Firewall Administration Guide

Which of the following cannot be configured in an Access Role Object?

A.
Networks
A.
Networks
Answers
B.
Users
B.
Users
Answers
C.
Time
C.
Time
Answers
D.
Machines
D.
Machines
Answers
Suggested answer: C

Explanation:

The following cannot be configured in an Access Role Object:Time4.An Access Role Object is a way to define a group of users based on four criteria: Networks, Users, Machines, and Locations5. Networks are IP addresses or network objects that represent the source or destination of the traffic. Users are user accounts or user groups from an identity source such as LDAP or RADIUS. Machines are endpoints that are identified by MAC addresses or certificates. Locations are geographical regions based on IP addresses.

Reference:Check Point R81 Firewall Administration Guide,Check Point R81 Identity Awareness Administration Guide

When using Automatic Hide NAT, what is enabled by default?

A.
Source Port Address Translation (PAT)
A.
Source Port Address Translation (PAT)
Answers
B.
Static NAT
B.
Static NAT
Answers
C.
Static Route
C.
Static Route
Answers
D.
HTTPS Inspection
D.
HTTPS Inspection
Answers
Suggested answer: A

Explanation:

When using Automatic Hide NAT,Source Port Address Translation (PAT)is enabled by default1. This means that the source IP address and port number are translated to a different IP address and port number. This allows multiple hosts to share a single IP address for outbound connections.

Reference:Check Point R81 Firewall Administration Guide

Which is a main component of the Check Point security management architecture?

A.
Identity Collector
A.
Identity Collector
Answers
B.
Endpoint VPN client
B.
Endpoint VPN client
Answers
C.
SmartConsole
C.
SmartConsole
Answers
D.
Proxy Server
D.
Proxy Server
Answers
Suggested answer: C

Explanation:

A main component of the Check Point security management architecture isSmartConsole2. SmartConsole is a unified graphical user interface that allows administrators to manage multiple security functions such as firewall, VPN, IPS, application control, URL filtering, identity awareness, and more. SmartConsole connects to the Security Management Server and interacts with other Check Point components such as Security Gateways and Endpoint Security Servers.

Reference:Check Point R81 Security Management Administration Guide

Which default Gaia user has full read/write access?

A.
admin
A.
admin
Answers
B.
superuser
B.
superuser
Answers
C.
monitor
C.
monitor
Answers
D.
altuser
D.
altuser
Answers
Suggested answer: A

Explanation:

The default Gaia user that has full read/write access isadmin3. The admin user is the superuser that can perform any administrative task on the Gaia system, such as configuring network settings, installing software updates, managing licenses, creating snapshots, and more. The admin user can also access the Gaia Portal, which is a web-based interface for managing Gaia settings and features.

Reference:Check Point R81 Gaia Administration Guide

Total 401 questions
Go to page: of 41