Free 156-215.80 Exam Braindumps (page: 15)

Page 15 of 134

Which of the following technologies extracts detailed information from packets and stores that information in state tables?

  1. INSPECT Engine
  2. Stateful Inspection
  3. Packet Filtering
  4. Application Layer Firewall

Answer(s): B


Reference:

https://www.checkpoint.com/smb/help/utm1/8.2/7080.htm



On the following graphic, you will find layers of policies.


What is a precedence of traffic inspection for the defined polices?

  1. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and then if Implicit Drop Rule drops the packet, it comes next to IPS layer and then after accepting the packet it passes to Threat Prevention layer.
  2. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and then if there is any rule which accepts the packet, it comes next to IPS layer and then after accepting the packet it passes to Threat Prevention layer
  3. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and then if there is any rule which accepts the packet, it comes next to Threat Prevention layer and then after accepting the packet it passes to IPS layer.
  4. A packet arrives at the gateway, it is checked against the rules in IPS policy layer and then if it is accepted then it comes next to the Network policy layer and then after accepting the packet it passes to Threat Prevention layer.

Answer(s): B

Explanation:

To simplify Policy management, R80 organizes the policy into Policy Layers. A layer is a set of rules, or a Rule Base.
For example, when you upgrade to R80 from earlier versions:
-Gateways that have the Firewall and the Application Control Software Blades enabled will have their Access Control Policy split into two ordered layers: Network and Applications.
When the gateway matches a rule in a layer, it starts to evaluate the rules in the next layer. Gateways that have the IPS and Threat Emulation Software Blades enabled will have their Threat Prevention policies split into two parallel layers: IPS and Threat Prevention.
-All layers are evaluated in parallel


Reference:

https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/CP_R80_SecMGMT/126197



Tina is a new administrator who is currently reviewing the new Check Point R80 Management console interface. In the Gateways view, she is reviewing the Summary screen as in the screenshot below. What as an 'Open Server'?

  1. Check Point software deployed on a non-Check Point appliance.
  2. The Open Server Consortium approved Server Hardware used for the purpose of Security and Availability.
  3. A Check Point Management Server deployed using the Open Systems Interconnection (OSI) Server and Security deployment model.
  4. A Check Point Management Server software using the Open SSL.

Answer(s): A

Explanation:


Reference:

https://sc1.checkpoint.com/documents/R76/CP_R76_Installation_and_Upgrade_Guide-webAdmin/ index.html



Choose what BEST describes the Policy Layer Traffic Inspection.

  1. If a packet does not match any of the inline layers, the matching continues to the next Layer.
  2. If a packet matches an inline layer, it will continue matching the next layer.
  3. If a packet does not match any of the inline layers, the packet will be matched against the Implicit Clean-up Rule.
  4. If a packet does not match a Network Policy Layer, the matching continues to its inline layer.

Answer(s): B


Reference:

https://community.checkpoint.com/thread/1092



Page 15 of 134



Post your Comments and Discuss Checkpoint 156-215.80 exam with other Community members:

andreito commented on May 13, 2019
very cool test, im very very ver very cool!
CHILE
upvote

Carlos commented on May 13, 2019
This is a well formatted and clean brain dumps. I had tried other sites and the images were all full of watermarks stolen from other sites. This one looks pretty original and authentic.
CHILE
upvote