Pass4itsure > CheckPoint > CCSA > 156-215.81 > 156-215.81 Online Practice Questions and Answers

156-215.81 Online Practice Questions and Answers

Questions 4

Which option, when applied to a rule, allows all encrypted and non-VPN traffic that matches the rule?

A. All Site-to-Site VPN Communities

B. Accept all encrypted traffic

C. All Connections (Clear or Encrypted)

D. Specific VPN Communities

Buy Now
Questions 5

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, gateway policy permits access only from Join's desktop which is assigned an IP address 10.0.0.19 via DHCP.

John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but the limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop. He wants to move around the organization and continue to have access to the HR Web Server. To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources. 2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.

John plugged in his laptop to the network on a different network segment and he is not able to connect. How does he solve this problem?

A. John should install the identity Awareness Agent

B. The firewall admin should install the Security Policy

C. John should lock and unlock the computer

D. Investigate this as a network connectivity issue

Buy Now
Questions 6

The Captive Portal tool:

A. Acquires identities from unidentified users.

B. Is only used for guest user authentication.

C. Allows access to users already identified.

D. Is deployed from the Identity Awareness page in the Global Properties settings.

Buy Now
Questions 7

You find that Users are not prompted for authentication when they access their Web servers, even though you have created an HTTP rule via User Authentication. Choose the BEST reason why.

A. You checked the cache password on desktop option in Global Properties.

B. Another rule that accepts HTTP without authentication exists in the Rule Base.

C. You have forgotten to place the User Authentication Rule before the Stealth Rule.

D. Users must use the SecuRemote Client, to use the User Authentication Rule.

Buy Now
Questions 8

Check Point APIs allow system engineers and developers to make changes to their organization's security policy with CLI tools and Web Services for all of the following except:

A. Create new dashboards to manage 3rd party task

B. Create products that use and enhance 3rd party solutions

C. Execute automated scripts to perform common tasks

D. Create products that use and enhance the Check Point Solution

Buy Now
Questions 9

Which limitation of CoreXL is overcome by using (mitigated by) Multi-Queue?

A. There is no traffic queue to be handled

B. Several NICs can use one traffic queue by one CPU

C. Each NIC has several traffic queues that are handled by multiple CPU cores

D. Each NIC has one traffic queue that is handled by one CPU

Buy Now
Questions 10

Packet acceleration (SecureXL) identifies connections by several attributes. Which of the attributes is NOT used for identifying connection?

A. Source Address

B. Destination Address

C. TCP Acknowledgment Number

D. Source Port

Buy Now
Questions 11

What is the default time length that Hit Count Data is kept?

A. 3 month

B. 4 weeks

C. 12 months

D. 6 months

Buy Now
Questions 12

View the rule below. What does the lock-symbol in the left column mean? Select the BEST answer.

A. The current administrator has read-only permissions to Threat Prevention Policy.

B. Another user has locked the rule for editing.

C. Configuration lock is present. Click the lock symbol to gain read-write access.

D. The current administrator is logged in as read-only because someone else is editing the policy.

Buy Now
Questions 13

Which software blade does NOT accompany the Threat Prevention policy?

A. Anti-virus

B. IPS

C. Threat Emulation

D. Application Control and URL Filtering

Buy Now
Exam Code: 156-215.81
Exam Name: Check Point Certified Security Administrator R81
Last Update: Apr 13, 2024
Questions: 400
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99