Free 156-215.80 Exam Braindumps (page: 20)

Page 20 of 134

Which feature is NOT provided by all Check Point Mobile Access solutions?

  1. Support for IPv6
  2. Granular access control
  3. Strong user authentication
  4. Secure connectivity

Answer(s): A

Explanation:

Types of Solutions
All of Check Point's Remote Access solutions provide:
-Enterprise-grade, secure connectivity to corporate resources.
-Strong user authentication.
-Granular access control.


Reference:

https://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/83586.htm



You work as a security administrator for a large company. CSO of your company has attended a security conference where he has learnt how hackers constantly modify their strategies and techniques to evade detection and reach corporate resources. He wants to make sure that his company has the right protections in place. Check Point has been selected for the security vendor. Which Check Point products protects BEST against malware and zero-day attacks while ensuring quick delivery of safe content to your users?

  1. IPS and Application Control
  2. IPS, anti-virus and anti-bot
  3. IPS, anti-virus and e-mail security
  4. SandBlast

Answer(s): D

Explanation:

SandBlast Zero-Day Protection
Hackers constantly modify their strategies and techniques to evade detection and reach corporate resources. Zero-day exploit protection from Check Point provides a deeper level of inspection so you can prevent more malware and zero-day attacks, while ensuring quick delivery of safe content to your users.


Reference:

https://www.checkpoint.com/products-solutions/zero-day-protection/



Each cluster has ____________interfaces.

  1. Five
  2. Two
  3. Three
  4. Four

Answer(s): C

Explanation:

Each cluster member has three interfaces: one external interface, one internal interface, and one for synchronization. Cluster member interfaces facing in each direction are connected via a switch, router, or VLAN switch.


Reference:

https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7292.htm



What are the three essential components of the Check Point Security Management Architecture?

  1. SmartConsole, Security Management Server, Security Gateway
  2. SmartConsole, SmartUpdate, Security Gateway
  3. Security Management Server, Security Gateway, Command Line Interface
  4. WebUI, SmartConsole, Security Gateway

Answer(s): A

Explanation:

Deployments
Basic deployments:
-Standalone deployment - Security Gateway and the Security Management server are installed on the same machine.
-Distributed deployment - Security Gateway and the Security Management server are installed on different machines.


Assume an environment with gateways on different sites. Each Security Gateway connects to the Internet on one side, and to a LAN on the other.
You can create a Virtual Private Network (VPN) between the two Security Gateways, to secure all communication between them.
The Security Management server is installed in the LAN, and is protected by a Security Gateway. The Security Management server manages the Security Gateways and lets remote users connect securely to the corporate network. SmartDashboard can be installed on the Security Management server or another computer.
There can be other OPSEC-partner modules (for example, an Anti-Virus Server) to complete the network security with the Security Management server and its Security Gateways.


Reference:

https://sc1.checkpoint.com/documents/R77/CP_R77_SecurityManagement_WebAdminGuide/html_frameset.htm?topic=documents/R77/CP_R77_SecurityManagement_WebAdminGuide/118037



Page 20 of 134



Post your Comments and Discuss Checkpoint 156-215.80 exam with other Community members:

andreito commented on May 13, 2019
very cool test, im very very ver very cool!
CHILE
upvote

Carlos commented on May 13, 2019
This is a well formatted and clean brain dumps. I had tried other sites and the images were all full of watermarks stolen from other sites. This one looks pretty original and authentic.
CHILE
upvote