Free 156-215.80 Exam Braindumps (page: 16)

Page 16 of 134

What are the three conflict resolution rules in the Threat Prevention Policy Layers?

  1. Conflict on action, conflict on exception, and conflict on settings
  2. Conflict on scope, conflict on settings, and conflict on exception
  3. Conflict on settings, conflict on address, and conflict on exception
  4. Conflict on action, conflict on destination, and conflict on settings

Answer(s): C



What does the “unknown” SIC status shown on SmartConsole mean?

  1. The SMS can contact the Security Gateway but cannot establish Secure Internal Communication.
  2. SIC activation key requires a reset.
  3. The SIC activation key is not known by any administrator.
  4. There is no connection between the Security Gateway and SMS.

Answer(s): D

Explanation:

The most typical status is Communicating. Any other status indicates that the SIC communication is problematic. For example, if the SIC status is Unknown then there is no connection between the Gateway and the Security Management server. If the SIC status is Not Communicating, the Security Management server is able to contact the gateway, but SIC communication cannot be established.


Reference:

https://sc1.checkpoint.com/documents/R76/CP_R76_SecMan_WebAdmin/html_frameset.htm?topic=documents/R76/CP_R76_SecMan_WebAdmin/118037



Kofi, the administrator of the ALPHA Corp network wishes to change the default Gaia WebUI Portal port number currently set on the default HTTPS port. Which CLISH commands are required to be able to change this TCP port?

  1. set web ssl-port <new port number>
  2. set Gaia-portal port <new port number>
  3. set Gaia-portal https-port <new port number>
  4. set web https-port <new port number>

Answer(s): A

Explanation:

In Clish
A). Connect to command line on Security Gateway / each Cluster member.
B). Log in to Clish.
C). Set the desired port (e.g., port 4434):
HostName> set web ssl-port <Port_Number>
D). Save the changes:
HostName> save config
E). Verify that the configuration was saved:
[Expert@HostName]# grep 'httpd:ssl_port' /config/db/initial


Reference:

https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk83482



Browser-based Authentication sends users to a web page to acquire identities using ______________ .

  1. User Directory
  2. Captive Portal and Transparent Kerberos Authentication
  3. Captive Portal
  4. UserCheck

Answer(s): B

Explanation:

To enable Identity Awareness:

1. Log in to SmartDashboard.
2. From the Network Objects tree, expand the Check Point branch.
3. Double-click the Security Gateway on which to enable Identity Awareness.
4. In the Software Blades section, select Identity Awareness on the Network Security tab. The Identity Awareness Configuration wizard opens.
5. Select one or more options. These options set the methods for acquiring identities of managed and unmanaged assets.
-AD Query - Lets the Security Gateway seamlessly identify Active Directory users and computers.
-Browser-Based Authentication - Sends users to a Web page to acquire identities from unidentified users. If Transparent Kerberos Authentication is configured, AD users may be identified transparently.


Reference:

https://sc1.checkpoint.com/documents/R76/CP_R76_IdentityAwareness_AdminGuide/62050.htm



Page 16 of 134



Post your Comments and Discuss Checkpoint 156-215.80 exam with other Community members:

andreito commented on May 13, 2019
very cool test, im very very ver very cool!
CHILE
upvote

Carlos commented on May 13, 2019
This is a well formatted and clean brain dumps. I had tried other sites and the images were all full of watermarks stolen from other sites. This one looks pretty original and authentic.
CHILE
upvote