ExamGecko
Home Home / Checkpoint / 156-215.81

Checkpoint 156-215.81 Practice Test - Questions Answers, Page 38

Question list
Search
Search

Application Control/URL filtering database library is known as:

A.
Application database
A.
Application database
Answers
B.
AppWiki
B.
AppWiki
Answers
C.
Application-Forensic Database
C.
Application-Forensic Database
Answers
D.
Application Library
D.
Application Library
Answers
Suggested answer: B

Explanation:

Application Control/URL filtering database library is known asAppWiki. AppWiki is an application classification and identification database that enables administrators to control access to thousands of applications and millions of websites.

Reference: [Check Point R81 Application Control Administration Guide], [Check Point AppWiki]

What kind of NAT enables Source Port Address Translation by default?

A.
Automatic Static NAT
A.
Automatic Static NAT
Answers
B.
Manual Hide NAT
B.
Manual Hide NAT
Answers
C.
Automatic Hide NAT
C.
Automatic Hide NAT
Answers
D.
Manual Static NAT
D.
Manual Static NAT
Answers
Suggested answer: C

Explanation:

Automatic Hide NAT enables Source Port Address Translation by default1. This means that the source IP address and port number are translated to a different IP address and port number. This allows multiple hosts to share a single IP address for outbound connections.

Reference:Check Point R81 Firewall Administration Guide

Name the authentication method that requires token authenticator.

A.
SecureID
A.
SecureID
Answers
B.
Radius
B.
Radius
Answers
C.
DynamicID
C.
DynamicID
Answers
D.
TACACS
D.
TACACS
Answers
Suggested answer: A

Explanation:

SecureID is the authentication method that requires token authenticator2. SecureID is a two-factor authentication method that uses a hardware or software token to generate a one-time password. The user must enter the token code along with their username and password to authenticate.

Reference:Check Point R81 Identity Awareness Administration Guide

Secure Internal Communication (SIC) is handled by what process?

A.
CPM
A.
CPM
Answers
B.
HTTPS
B.
HTTPS
Answers
C.
FWD
C.
FWD
Answers
D.
CPD
D.
CPD
Answers
Suggested answer: D

Explanation:

Secure Internal Communication (SIC) is handled by the CPD process3. CPD is the Check Point Daemon that runs on all Check Point modules and handles internal licensing and SIC operations. SIC is a mechanism that ensures secure communication between Check Point components using certificates and encryption.

Reference:Check Point R81 Security Management Administration Guide

Which Security Blade needs to be enabled in order to sanitize and remove potentially malicious content from files, before those files enter the network?

A.
Threat Emulation
A.
Threat Emulation
Answers
B.
Anti-Malware
B.
Anti-Malware
Answers
C.
Anti-Virus
C.
Anti-Virus
Answers
D.
Threat Extraction
D.
Threat Extraction
Answers
Suggested answer: D

Explanation:

Threat Extraction is the Security Blade that needs to be enabled in order to sanitize and remove potentially malicious content from files, before those files enter the network. It can strip out active content, embedded objects, and other risky elements from documents and deliver a safe version of the file to the user.Reference:Remote Access VPN R81.20 Administration Guide, page 18.

Which Security Blade needs to be enabled in order to sanitize and remove potentially malicious content from files, before those files enter the network?

A.
Threat Emulation
A.
Threat Emulation
Answers
B.
Anti-Malware
B.
Anti-Malware
Answers
C.
Anti-Virus
C.
Anti-Virus
Answers
D.
Threat Extraction
D.
Threat Extraction
Answers
Suggested answer: D

Explanation:

Threat Extraction is the Security Blade that needs to be enabled in order to sanitize and remove potentially malicious content from files, before those files enter the network. It can strip out active content, embedded objects, and other risky elements from documents and deliver a safe version of the file to the user.Reference:Remote Access VPN R81.20 Administration Guide, page 18.

Fill in the blank: A(n)_____rule is created by an administrator and configured to allow or block traffic based on specified criteria.

A.
Inline
A.
Inline
Answers
B.
Explicit
B.
Explicit
Answers
C.
Implicit drop
C.
Implicit drop
Answers
D.
Implicit accept
D.
Implicit accept
Answers
Suggested answer: B

Explanation:

An explicit rule is created by an administrator and configured to allow or block traffic based on specified criteria. Explicit rules are displayed in the Rule Base and can be modified by the administrator.Reference:Certified Security Administrator (CCSA) R81.20 Course Overview, page 12.

Which of the following is true about Stateful Inspection?

A.
Stateful Inspection tracks state using two tables, one for incoming traffic and one for outgoing traffic
A.
Stateful Inspection tracks state using two tables, one for incoming traffic and one for outgoing traffic
Answers
B.
Stateful Inspection looks at both the headers of packets, as well as deeply examining their content.
B.
Stateful Inspection looks at both the headers of packets, as well as deeply examining their content.
Answers
C.
Stateful Inspection requires that a server reply to a request, in order to track a connection's state
C.
Stateful Inspection requires that a server reply to a request, in order to track a connection's state
Answers
D.
Stateful Inspection requires two rules, one for outgoing traffic and one for incoming traffic.
D.
Stateful Inspection requires two rules, one for outgoing traffic and one for incoming traffic.
Answers
Suggested answer: B

Explanation:

Stateful Inspection is true about looking at both the headers of packets, as well as deeply examining their content. Stateful Inspection inspects packets at all layers of the OSI model and maintains information about the state and context of each connection in a state table.Reference:Certified Security Administrator (CCSA) R81.20 Course Overview, page 6.

Which option in tracking allows you to see the amount of data passed in the connection?

A.
Data
A.
Data
Answers
B.
Accounting
B.
Accounting
Answers
C.
Logs
C.
Logs
Answers
D.
Advanced
D.
Advanced
Answers
Suggested answer: B

Explanation:

Accounting is the option in tracking that allows you to see the amount of data passed in the connection. Accounting tracks the number of bytes and packets for each connection and generates reports based on the collected data.Reference:Certified Security Administrator (CCSA) R81.20 Course Overview, page 14.

Fill in the blank: An identity server uses a______________to trust a Terminal Server Identity Agent.

A.
One-time password
A.
One-time password
Answers
B.
Shared secret
B.
Shared secret
Answers
C.
Certificate
C.
Certificate
Answers
D.
Token
D.
Token
Answers
Suggested answer: B
Total 401 questions
Go to page: of 41