ExamGecko
Home Home / Checkpoint / 156-215.81

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 33

Question list
Search
Search

Which of the following is NOT an authentication scheme used for accounts created through SmartConsole?

A.
RADIUS
A.
RADIUS
Answers
B.
Check Point password
B.
Check Point password
Answers
C.
Security questions
C.
Security questions
Answers
D.
SecurID
D.
SecurID
Answers
Suggested answer: C

Explanation:

Security questions are not an authentication scheme used for accounts created through SmartConsole4. The available authentication schemes are Check Point password, RADIUS, TACACS, SecurID, LDAP, and Certificate.

Reference:Check Point R81 Security Management Administration Guide

The Gateway Status view in SmartConsole shows the overall status of Security Gateways and Software Blades. What does the Status Attention mean?

A.
Cannot reach the Security Gateway.
A.
Cannot reach the Security Gateway.
Answers
B.
The gateway and all its Software Blades are working properly.
B.
The gateway and all its Software Blades are working properly.
Answers
C.
At least one Software Blade has a minor issue, but the gateway works.
C.
At least one Software Blade has a minor issue, but the gateway works.
Answers
D.
Cannot make SIC between the Security Management Server and the Security Gateway
D.
Cannot make SIC between the Security Management Server and the Security Gateway
Answers
Suggested answer: C

Explanation:

The Status Attention means that at least one Software Blade has a minor issue, but the gateway works1.For example, this could indicate a license expiration warning, a policy installation failure, or a blade activation problem2.

Reference:Check Point R81 SmartConsole Guide,Check Point R81 Security Management Administration Guide

In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?

A.
Publish changes
A.
Publish changes
Answers
B.
Save changes
B.
Save changes
Answers
C.
Install policy
C.
Install policy
Answers
D.
Install database
D.
Install database
Answers
Suggested answer: C

Explanation:

In order for changes made to policy to be enforced by a Security Gateway, an administrator must perform Install Policy3. This action transfers the policy package from the Security Management Server to the Security Gateway and activates it.

Reference:Check Point R81 Security Management Administration Guide

What is the main objective when using Application Control?

A.
To filter out specific content.
A.
To filter out specific content.
Answers
B.
To assist the firewall blade with handling traffic.
B.
To assist the firewall blade with handling traffic.
Answers
C.
To see what users are doing.
C.
To see what users are doing.
Answers
D.
Ensure security and privacy of information.
D.
Ensure security and privacy of information.
Answers
Suggested answer: D

Explanation:

The main objective when using Application Control is to ensure security and privacy of information4. Application Control enables administrators to control access to web applications and web sites based on risk level, user identity, and other criteria. It also provides visibility into web usage and application activity.

Reference:Check Point R81 Application Control Administration Guide

What are the three main components of Check Point security management architecture?

A.
SmartConsole, Security Management, and Security Gateway
A.
SmartConsole, Security Management, and Security Gateway
Answers
B.
Smart Console, Standalone, and Security Management
B.
Smart Console, Standalone, and Security Management
Answers
C.
SmartConsole, Security policy, and Logs & Monitoring
C.
SmartConsole, Security policy, and Logs & Monitoring
Answers
D.
GUI-Client, Security Management, and Security Gateway
D.
GUI-Client, Security Management, and Security Gateway
Answers
Suggested answer: A

Explanation:

The three main components of Check Point security management architecture are SmartConsole, Security Management, and Security Gateway5. SmartConsole is the graphical user interface that allows administrators to manage and monitor Check Point products. Security Management is the server that stores the security policy and configuration data. Security Gateway is the device that enforces the security policy on the network traffic.

Reference:Check Point R81 Security Management Administration Guide

In which deployment is the security management server and Security Gateway installed on the same appliance?

A.
Standalone
A.
Standalone
Answers
B.
Remote
B.
Remote
Answers
C.
Distributed
C.
Distributed
Answers
D.
Bridge Mode
D.
Bridge Mode
Answers
Suggested answer: A

Explanation:

A standalone deployment is when the security management server and Security Gateway are installed on the same appliance.This is suitable for small or branch office environments1

Where can administrator edit a list of trusted SmartConsole clients?

A.
cpconfig on a Security Management Server, in the WebUI logged into a Security Management Server.
A.
cpconfig on a Security Management Server, in the WebUI logged into a Security Management Server.
Answers
B.
In cpconfig on a Security Management Server, in the WebUI logged into a Security Management Server, in SmartConsole: Manage and Settings > Permissions and Administrators > Advanced > Trusted Clients.
B.
In cpconfig on a Security Management Server, in the WebUI logged into a Security Management Server, in SmartConsole: Manage and Settings > Permissions and Administrators > Advanced > Trusted Clients.
Answers
C.
WebUI client logged to Security Management Server, SmartDashboard: Manage and Settings > Permissions and Administrators > Advanced > Trusted Clients, via cpconfig on a Security Gateway.
C.
WebUI client logged to Security Management Server, SmartDashboard: Manage and Settings > Permissions and Administrators > Advanced > Trusted Clients, via cpconfig on a Security Gateway.
Answers
D.
Only using SmartConsole: Manage and Settings > Permissions and Administrators > Advanced > Trusted Clients.
D.
Only using SmartConsole: Manage and Settings > Permissions and Administrators > Advanced > Trusted Clients.
Answers
Suggested answer: B

Explanation:

The administrator can edit a list of trusted SmartConsole clients in three ways: in cpconfig on a Security Management Server, in the WebUI logged into a Security Management Server, and in SmartConsole: Manage and Settings > Permissions and Administrators > Advanced > Trusted Clients

The default shell of the Gaia CLI is cli.sh. How do you change from the cli.sh shell to the advanced shell to run Linux commands?

A.
Execute the command 'enable' in the cli.sh shell
A.
Execute the command 'enable' in the cli.sh shell
Answers
B.
Execute the 'conf t' command in the cli.sh shell
B.
Execute the 'conf t' command in the cli.sh shell
Answers
C.
Execute the command 'expert' in the cli.sh shell
C.
Execute the command 'expert' in the cli.sh shell
Answers
D.
Execute the 'exit' command in the cli.sh shell
D.
Execute the 'exit' command in the cli.sh shell
Answers
Suggested answer: C

Explanation:

The default shell of the Gaia CLI is cli.sh, which provides a limited set of commands for basic configuration and troubleshooting.To change from the cli.sh shell to the advanced shell (also known as expert mode) to run Linux commands, the administrator needs to execute the command 'expert' in the cli.sh shell

Check Point licenses come in two forms. What are those forms?

A.
Central and Local.
A.
Central and Local.
Answers
B.
Access Control and Threat Prevention.
B.
Access Control and Threat Prevention.
Answers
C.
On-premise and Public Cloud.
C.
On-premise and Public Cloud.
Answers
D.
Security Gateway and Security Management.
D.
Security Gateway and Security Management.
Answers
Suggested answer: A

Explanation:

Check Point licenses come in two forms: central and local. Central licenses are attached to the Security Management Server and are distributed to managed Security Gateways. Local licenses are attached directly to a specific Security Gateway.

In SmartEvent, a correlation unit (CU) is used to do what?

A.
Collect security gateway logs, Index the logs and then compress the logs.
A.
Collect security gateway logs, Index the logs and then compress the logs.
Answers
B.
Receive firewall and other software blade logs in a region and forward them to the primary log server.
B.
Receive firewall and other software blade logs in a region and forward them to the primary log server.
Answers
C.
Analyze log entries and identify events.
C.
Analyze log entries and identify events.
Answers
D.
Send SAM block rules to the firewalls during a DOS attack.
D.
Send SAM block rules to the firewalls during a DOS attack.
Answers
Suggested answer: C

Explanation:

A correlation unit (CU) is a component of SmartEvent that analyzes log entries on log servers and identifies events based on predefined or custom rules1.A CU receives logs from one or more log servers and forwards them to the SmartEvent server, where they are stored in the events database

Total 401 questions
Go to page: of 41