Checkpoint 156-215.81 Practice Test - Questions Answers, Page 40
List of questions
Question 391

Fill in the blank: The_____is used to obtain identification and security information about network users.
Question 392

To increase security, the administrator has modified the Core protection 'Host Port Scan' from 'Medium' to 'High' Predefined Sensitivity. Which Policy should the administrator install after Publishing the changes?
Question 393

When changes are made to a Rule base, it is important to _______________ to enforce changes.
Question 394

The Online Activation method is available for Check Point manufactured appliances. How does the administrator use the Online Activation method?
Question 395

Both major kinds of NAT support Hide and Static NAT. However, one offers more flexibility. Which statement is true?
Question 396

What are the software components used by Autonomous Threat Prevention Profiles in R8I.20 and higher?
Question 397

What are valid authentication methods for mutual authenticating the VPN gateways?
Question 398

What are valid authentication methods for mutual authenticating the VPN gateways?
Question 399

Which of the following is a valid deployment option?
Question 400

Which encryption algorithm is the least secured?
Question