Checkpoint 156-215.81 Practice Test - Questions Answers, Page 39
 Add to Whishlist
 
                            Add to Whishlist
                        List of questions
Question 381
 
                            
                            
                                Bob and Joe both have Administrator Roles on their Gaia Platform. Bob logs in on the WebUI and then Joe logs in through CLI. Choose what BEST describes the following scenario, where Bob and Joe are both logged in:
Question 382
 
                            
                            
                                Fill in the blank: A(n)_____rule is created by an administrator and configured to allow or block traffic based on specified criteria.
Question 383
 
                            
                            
                                Check Point licenses come in two forms. What are those forms?
Question 384
 
                            
                            
                                Which of the following statements about Site-to-Site VPN Domain-based is NOT true?
Question 385
 
                            
                            
                                You had setup the VPN Community NPN-Stores' with 3 gateways. There are some issues with one remote gateway(l .1.1.1) and an your local gateway. What will be the best log filter to see only the IKE Phase 2 agreed networks for both gateways.
Question 386
 
                            
                            
                                Aggressive Mode in IKEv1 uses how many packages for negotiation?
Question 387
 
                            
                            
                                AdminA and AdminB are both logged in on SmartConsole What does it mean if AdmmB sees a lock icon on a rule? Choose the BEST answer.
Question 388
 
                            
                            
                                Fill in the blank When LDAP is integrated with Check Point Security Management it is then referred to as_____
Question 389
 
                            
                            
                                Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?
Question 390
 
                            
                            
                                In the Check Point three-tiered architecture, which of the following is NOT a function of the Security Management Server?
 
         Unlock Premium Member
  Unlock Premium Member
                                    


 
  
                                            
Question