ExamGecko
Home Home / Checkpoint / 156-215.81

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 36

Question list
Search
Search

Which of the completed statements is NOT true? The WebUI can be used to manage Operating System user accounts and

A.
add users to your Gaia system.
A.
add users to your Gaia system.
Answers
B.
assign privileges to users.
B.
assign privileges to users.
Answers
C.
assign user rights to their home directory in the Security Management Server.
C.
assign user rights to their home directory in the Security Management Server.
Answers
D.
edit the home directory of the user.
D.
edit the home directory of the user.
Answers
Suggested answer: C

Explanation:

The WebUI can be used to manage Operating System user accounts and add users to your Gaia system, assign privileges to users, and edit the home directory of the user. However, it cannot assign user rights to their home directory in the Security Management Server.This is done by the SmartConsole1.

Fill in the blank RADIUS protocol uses_____to communicate with the gateway

A.
UDP
A.
UDP
Answers
B.
CCP
B.
CCP
Answers
C.
TDP
C.
TDP
Answers
D.
HTTP
D.
HTTP
Answers
Suggested answer: A

Explanation:

RADIUS protocol uses UDP (User Datagram Protocol) to communicate with the gateway.UDP is a connectionless protocol that does not require a handshake or acknowledgment before sending or receiving data2.

Choose what BEST describes a Session

A.
Sessions ends when policy is pushed to the Security Gateway.
A.
Sessions ends when policy is pushed to the Security Gateway.
Answers
B.
Starts when an Administrator logs in through SmartConsole and ends when the Administrator logs out.
B.
Starts when an Administrator logs in through SmartConsole and ends when the Administrator logs out.
Answers
C.
Sessions locks the policy package for editing.
C.
Sessions locks the policy package for editing.
Answers
D.
Starts when an Administrator publishes all the changes made on SmartConsole
D.
Starts when an Administrator publishes all the changes made on SmartConsole
Answers
Suggested answer: B

Explanation:

A session starts when an Administrator logs in through SmartConsole and ends when the Administrator logs out.A session allows multiple administrators to work on the same policy simultaneously, without overwriting each other's changes3.

Where can alerts be viewed?

A.
Alerts can be seen in SmartView Monitor
A.
Alerts can be seen in SmartView Monitor
Answers
B.
Alerts can be seen in the Threat Prevention policy.
B.
Alerts can be seen in the Threat Prevention policy.
Answers
C.
Alerts can be seen in SmartUpdate.
C.
Alerts can be seen in SmartUpdate.
Answers
D.
Alerts can be seen from the CLI of the gateway.
D.
Alerts can be seen from the CLI of the gateway.
Answers
Suggested answer: A

Explanation:

Alerts can be viewed in SmartView Monitor, which is a graphical tool that provides real-time information about the network and security activities, such as traffic, VPN tunnels, threats, and performance4.

If there is an Accept Implied Policy set to 'First', what is the reason Jorge cannot see any logs?

A.
Log Implied Rule was not set correctly on the track column on the rules base.
A.
Log Implied Rule was not set correctly on the track column on the rules base.
Answers
B.
Track log column is set to Log instead of Full Log.
B.
Track log column is set to Log instead of Full Log.
Answers
C.
Track log column is set to none.
C.
Track log column is set to none.
Answers
D.
Log Implied Rule was not selected on Global Properties.
D.
Log Implied Rule was not selected on Global Properties.
Answers
Suggested answer: D

Explanation:

If there is an Accept Implied Policy set to ''First'', Jorge cannot see any logs because Log Implied Rule was not selected on Global Properties. The Log Implied Rule option enables logging for all implied rules, such as DHCP, anti-spoofing, and cleanup rules.

A layer can support different combinations of blades What are the supported blades:

A.
Firewall. URLF, Content Awareness and Mobile Access
A.
Firewall. URLF, Content Awareness and Mobile Access
Answers
B.
Firewall (Network Access Control). Application & URL Filtering. Content Awareness and Mobile Access
B.
Firewall (Network Access Control). Application & URL Filtering. Content Awareness and Mobile Access
Answers
C.
Firewall. NAT, Content Awareness and Mobile Access
C.
Firewall. NAT, Content Awareness and Mobile Access
Answers
D.
Firewall (Network Access Control). Application & URL Filtering and Content Awareness
D.
Firewall (Network Access Control). Application & URL Filtering and Content Awareness
Answers
Suggested answer: D

Explanation:

A layer can support different combinations of blades, but the supported blades are Firewall (Network Access Control), Application & URL Filtering, and Content Awareness.These blades provide granular control over network traffic based on applications, users, content, and risk1.Mobile Access is not a supported blade in a layer2.

Fill in the blank Once a license is activated, a___________should be installed.

A.
Security Gateway Contract file
A.
Security Gateway Contract file
Answers
B.
Service Contract file
B.
Service Contract file
Answers
C.
License Management file
C.
License Management file
Answers
D.
License Contract file
D.
License Contract file
Answers
Suggested answer: B

Explanation:

Once a license is activated, a Service Contract file should be installed.This file contains information about the license expiration date, support level, and other details3. The other options are not valid file names.

When you upload a package or license to the appropriate repository in SmartUpdate. where is the package or license stored?

A.
SmartConsole installed device
A.
SmartConsole installed device
Answers
B.
Check Point user center
B.
Check Point user center
Answers
C.
Security Management Server
C.
Security Management Server
Answers
D.
Security Gateway
D.
Security Gateway
Answers
Suggested answer: C

Explanation:

When you upload a package or license to the appropriate repository in SmartUpdate, the package or license is stored on the Security Management Server. SmartUpdate is a tool that allows you to centrally manage software updates and licenses for all Check Point products on your network.

What technologies are used to deny or permit network traffic?

A.
Stateful Inspection. Firewall Blade, and URL'Application Blade
A.
Stateful Inspection. Firewall Blade, and URL'Application Blade
Answers
B.
Packet Filtenng. Stateful Inspection, and Application Layer Firewall
B.
Packet Filtenng. Stateful Inspection, and Application Layer Firewall
Answers
C.
Firewall Blade. URL/Application Blade and IPS
C.
Firewall Blade. URL/Application Blade and IPS
Answers
D.
Stateful Inspection. URL/Application Blade, and Threat Prevention
D.
Stateful Inspection. URL/Application Blade, and Threat Prevention
Answers
Suggested answer: A

Explanation:

The technologies that are used to deny or permit network traffic are Stateful Inspection, Firewall Blade, and URL/Application Blade. Stateful Inspection is a technology that inspects network traffic at the packet level and maintains the state and context of each connection. Firewall Blade is a software blade that enforces security policy and prevents unauthorized access to protected resources. URL/Application Blade is a software blade that enables administrators to control access to millions of websites and applications based on users, groups, and machines.

Fill in the blanks: A Check Point software license consists of a__________ and _______.

A.
Software blade; software container
A.
Software blade; software container
Answers
B.
Software package: signature
B.
Software package: signature
Answers
C.
Signature; software blade
C.
Signature; software blade
Answers
D.
Software container software package
D.
Software container software package
Answers
Suggested answer: A

Explanation:

A Check Point software license consists of a Software blade and a Software container. A Software blade is a modular security feature that delivers security functionality to the gateway or management server. A Software container is a set of Software blades that can be purchased as a bundle.

Total 401 questions
Go to page: of 41