Checkpoint 156-315.81 Practice Test - Questions Answers, Page 36
List of questions
Related questions
Which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?
When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?
True or False: In R81, more than one administrator can login to the Security Management Server with write permission at the same time.
Which utility allows you to configure the DHCP service on Gaia from the command line?
There are two R77.30 Security Gateways in the Firewall Cluster. They are named FW_A and FW_B. The cluster is configured to work as HA (High availability) with default cluster configuration. FW_A is configured to have higher priority than FW_B. FW_A was active and processing the traffic in the morning. FW_B was standby. Around 1100 am, its interfaces went down and this caused a failover. FW_B became active. After an hour, FW_A's interface issues were resolved and it became operational.
When it re-joins the cluster, will it become active automatically?
DLP and Geo Policy are examples of what type of Policy?
Fill in the blank: The IPS policy for pre-R81 gateways is installed during the _______ .
How many users can have read/write access in Gaia at one time?
Which software blade does NOT accompany the Threat Prevention policy?
Check Point ClusterXL Active/Active deployment is used when:
Question