ExamGecko
Home Home / Checkpoint / 156-215.81

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 37

Question list
Search
Search

Which one of the following is the preferred licensing model? Select the BEST answer

A.
Local licensing because it ties the package license to the IP-address of the gateway and has no dependency of the Security Management Server.
A.
Local licensing because it ties the package license to the IP-address of the gateway and has no dependency of the Security Management Server.
Answers
B.
Central licensing because it ties the package license to the IP-address of the Security Management Server and has no dependency on the gateway.
B.
Central licensing because it ties the package license to the IP-address of the Security Management Server and has no dependency on the gateway.
Answers
C.
Central licensing because it ties the package license to the MAC-address of the Security Management Server's Mgmt-interface and has no dependency on the gateway.
C.
Central licensing because it ties the package license to the MAC-address of the Security Management Server's Mgmt-interface and has no dependency on the gateway.
Answers
D.
Local licensing because it ties the package license to the MAC-address of the gateway management interface and has no Security Management Server dependency.
D.
Local licensing because it ties the package license to the MAC-address of the gateway management interface and has no Security Management Server dependency.
Answers
Suggested answer: B

Explanation:

Central licensing is the preferred licensing model because it ties the package license to the IP-address of the Security Management Server and has no dependency on the gateway.This allows for easier management and distribution of licenses across multiple gateways1.

Which command is used to add users to or from existing roles?

A.
add rba user <User Name> roles <List>
A.
add rba user <User Name> roles <List>
Answers
B.
add user <User Name>
B.
add user <User Name>
Answers
C.
add rba user <User Name>
C.
add rba user <User Name>
Answers
D.
add user <User Name> roles <List>
D.
add user <User Name> roles <List>
Answers
Suggested answer: A

Explanation:

The commandadd rba user <User Name> roles <List>is used to add users to or from existing roles.RBA stands for Role-Based Administration, which is a feature that allows administrators to assign different permissions and access levels to users based on their roles2.

If an administrator wants to restrict access to a network resource only allowing certain users to access it, and only when they are on a specific network what is the best way to accomplish this?

A.
Create an inline layer where the destination is the target network resource Define sub-rules allowing only specific sources to access the target resource
A.
Create an inline layer where the destination is the target network resource Define sub-rules allowing only specific sources to access the target resource
Answers
B.
Use a 'New Legacy User at Location', specifying the LDAP user group that the users belong to, at the desired location
B.
Use a 'New Legacy User at Location', specifying the LDAP user group that the users belong to, at the desired location
Answers
C.
Create a rule allowing only specific source IP addresses access to the target network resource.
C.
Create a rule allowing only specific source IP addresses access to the target network resource.
Answers
D.
Create an Access Role object, with specific users or user groups specified, and specific networks defined Use this access role as the 'Source' of an Access Control rule
D.
Create an Access Role object, with specific users or user groups specified, and specific networks defined Use this access role as the 'Source' of an Access Control rule
Answers
Suggested answer: D

Explanation:

The best way to restrict access to a network resource only allowing certain users to access it, and only when they are on a specific network, is to create an Access Role object, with specific users or user groups specified, and specific networks defined. Then, use this access role as the ''Source'' of an Access Control rule.This allows for granular control over network traffic based on user identity and location3.

Fill in the blanks: A Security Policy is created in_____, stored in the_____ and Distributed to the various

A.
Rule base. Security Management Server Security Gateways
A.
Rule base. Security Management Server Security Gateways
Answers
B.
The Check Point database. SmartConsole, Security Gateways
B.
The Check Point database. SmartConsole, Security Gateways
Answers
C.
SmartConsole, Security Gateway, Security Management Servers
C.
SmartConsole, Security Gateway, Security Management Servers
Answers
D.
SmartConsole, Security Management Server, Security Gateways
D.
SmartConsole, Security Management Server, Security Gateways
Answers
Suggested answer: D

Explanation:

A Security Policy is created in SmartConsole, stored in the Security Management Server, and distributed to the various Security Gateways. SmartConsole is a graphical user interface that allows administrators to create and edit security policies. The Security Management Server is a central server that stores and manages the security policies. The Security Gateways are devices that enforce the security policies on the network traffic.

What is the order of NAT priorities?

A.
IP pool NAT static NAT. hide NAT
A.
IP pool NAT static NAT. hide NAT
Answers
B.
Static NAT hide NAT, IP pool NAT
B.
Static NAT hide NAT, IP pool NAT
Answers
C.
Static NAT, IP pool NAT hide NAT
C.
Static NAT, IP pool NAT hide NAT
Answers
D.
Static NAT automatic NAT hide NAT
D.
Static NAT automatic NAT hide NAT
Answers
Suggested answer: C

Explanation:

The order of NAT priorities is Static NAT, IP pool NAT, and hide NAT. Static NAT has the highest priority because it is a one-to-one mapping of a private IP address to a public IP address. IP pool NAT has the second highest priority because it is a one-to-many mapping of a private IP address to a pool of public IP addresses.Hide NAT has the lowest priority because it is a many-to-one mapping of multiple private IP addresses to a single public IP address1.

While enabling the Identity Awareness blade the Identity Awareness wizard does not automatically detect the windows domain Why does it not detect the windows domain?

A.
SmartConsole machine is not part of the domain
A.
SmartConsole machine is not part of the domain
Answers
B.
Security Gateway is not part of the Domain
B.
Security Gateway is not part of the Domain
Answers
C.
Identity Awareness is not enabled on Global properties
C.
Identity Awareness is not enabled on Global properties
Answers
D.
Security Management Server is not part of the domain
D.
Security Management Server is not part of the domain
Answers
Suggested answer: A

Explanation:

While enabling the Identity Awareness blade, the Identity Awareness wizard does not automatically detect the Windows domain because the SmartConsole machine is not part of the domain.The SmartConsole machine needs to be a member of the Windows domain or have access to a domain controller in order to detect the domain automatically2.

If there are two administrators logged in at the same time to the SmartConsole, and there are objects locked for editing, what must be done to make them available to other administrators? Choose the BEST answer

A.
Save and install the Policy
A.
Save and install the Policy
Answers
B.
Delete older versions of database
B.
Delete older versions of database
Answers
C.
Revert the session.
C.
Revert the session.
Answers
D.
Publish or discard the session
D.
Publish or discard the session
Answers
Suggested answer: D

Explanation:

If there are two administrators logged in at the same time to the SmartConsole, and there are objects locked for editing, the administrator who locked the objects must publish or discard the session to make them available to other administrators.Publishing or discarding the session will save or discard the changes made by the administrator and unlock the objects for editing by others3.

At what point is the Internal Certificate Authority (ICA) created?

A.
During the primary Security Management Server installation process.
A.
During the primary Security Management Server installation process.
Answers
B.
Upon creation of a certificate
B.
Upon creation of a certificate
Answers
C.
When an administrator decides to create one
C.
When an administrator decides to create one
Answers
D.
When an administrator initially logs into SmartConsole.
D.
When an administrator initially logs into SmartConsole.
Answers
Suggested answer: A

Explanation:

The Internal Certificate Authority (ICA) is created during the primary Security Management Server installation process. The ICA is a component that issues and manages certificates for Check Point products. The ICA is automatically installed and initialized when installing the Security Management Server.

Fill in the blank: The _____ feature allows administrators to share a policy with other policy packages.

A.
Concurrent policy packages
A.
Concurrent policy packages
Answers
B.
Concurrent policies
B.
Concurrent policies
Answers
C.
Global Policies
C.
Global Policies
Answers
D.
Shared policies
D.
Shared policies
Answers
Suggested answer: D

Explanation:

TheShared policiesfeature allows administrators to share a policy with other policy packages3. This can save time and effort when managing multiple gateways with similar security requirements.Shared policies can be applied to Access Control, Threat Prevention, and HTTPS Inspection layers4.

Reference:Check Point R81 Security Management Administration Guide,Check Point R81 SmartConsole R81 Resolved Issues

When dealing with rule base layers, what two layer types can be utilized?

A.
Ordered Layers and Inline Layers
A.
Ordered Layers and Inline Layers
Answers
B.
Inbound Layers and Outbound Layers
B.
Inbound Layers and Outbound Layers
Answers
C.
R81.10 does not support Layers
C.
R81.10 does not support Layers
Answers
D.
Structured Layers and Overlap Layers
D.
Structured Layers and Overlap Layers
Answers
Suggested answer: A

Explanation:

When dealing with rule base layers, two layer types can be utilized: Ordered Layers and Inline Layers5. Ordered Layers are executed sequentially according to their order in the policy. Inline Layers are embedded in a parent layer and are executed only if the parent rule matches.

Reference:Check Point R81 Firewall Administration Guide, [Check Point R81 Security Management Administration Guide]

Total 401 questions
Go to page: of 41