Checkpoint 156-315.81 Practice Test - Questions Answers, Page 36
 Add to Whishlist
 
                            Add to Whishlist
                        List of questions
Question 351
 
                            
                            
                                Which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?
Question 352
 
                            
                            
                                When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?
Question 353
 
                            
                            
                                True or False: In R81, more than one administrator can login to the Security Management Server with write permission at the same time.
Question 354
 
                            
                            
                                Which utility allows you to configure the DHCP service on Gaia from the command line?
Question 355
 
                            
                            
                                There are two R77.30 Security Gateways in the Firewall Cluster. They are named FW_A and FW_B. The cluster is configured to work as HA (High availability) with default cluster configuration. FW_A is configured to have higher priority than FW_B. FW_A was active and processing the traffic in the morning. FW_B was standby. Around 1100 am, its interfaces went down and this caused a failover. FW_B became active. After an hour, FW_A's interface issues were resolved and it became operational.
When it re-joins the cluster, will it become active automatically?
Question 356
 
                            
                            
                                DLP and Geo Policy are examples of what type of Policy?
Question 357
 
                            
                            
                                Fill in the blank: The IPS policy for pre-R81 gateways is installed during the _______ .
Question 358
 
                            
                            
                                How many users can have read/write access in Gaia at one time?
Question 359
 
                            
                            
                                Which software blade does NOT accompany the Threat Prevention policy?
Question 360
 
                            
                            
                                Check Point ClusterXL Active/Active deployment is used when:
 
         Unlock Premium Member
  Unlock Premium Member
                                    


 
  
                                            
Question