Free 156-215.80 Exam Braindumps (page: 21)

Page 21 of 134

What are the two types of address translation rules?

  1. Translated packet and untranslated packet
  2. Untranslated packet and manipulated packet
  3. Manipulated packet and original packet
  4. Original packet and translated packet

Answer(s): D

Explanation:

NAT Rule Base
The NAT Rule Base has two sections that specify how the IP addresses are translated:
-Original Packet
-Translated Packet


Reference:

https://sc1.checkpoint.com/documents/R76/CP_R76_Firewall_WebAdmin/6724.htm



You are unable to login to SmartConsole. You login to the management server and run #cpwd_admin list with the following output:


What reason could possibly BEST explain why you are unable to connect to SmartConsole?

  1. CPD is down
  2. SVR is down
  3. CPM and FWM are down
  4. CPSM is down

Answer(s): C

Explanation:

The correct answer would be FWM (is the process making available communication between SmartConsole applications and Security Management Server.). STATE is T (Terminate = Down)

Symptoms
SmartDashboard fails to connect to the Security Management server.
1. Verify if the FWM process is running. To do this, run the command:
[Expert@HostName:0]# ps -aux | grep fwm
2. If the FWM process is not running, then try force-starting the process with the following command:
[Expert@HostName:0]# cpwd_admin start -name FWM -path "$FWDIR/bin/fwm" -command "fwm"


Reference:

https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk97638 https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk12120



What does ExternalZone represent in the presented rule?

  1. The Internet.
  2. Interfaces that administrator has defined to be part of External Security Zone.
  3. External interfaces on all security gateways.
  4. External interfaces of specific gateways.

Answer(s): B

Explanation:

Configuring Interfaces
Configure the Security Gateway 80 interfaces in the Interfaces tab in the Security Gateway window.
To configure the interfaces:
1. From the Devices window, double-click the Security Gateway 80. The Security Gateway window opens.
2. Select the Interfaces tab.
3. Select Use the following settings. The interface settings open.
4. Select the interface and click Edit. The Edit window opens.
5. From the IP Assignment section, configure the IP address of the interface:
1. Select Static IP.
2. Enter the IP address and subnet mask for the interface.
6. In Security Zone, select Wireless, DMS, External, or Internal. Security zone is a type of zone, created by a bridge to easily create segments, while maintaining IP addresses and router configurations. Security zones let you choose if to enable or not the firewall between segments.


Reference:

https://sc1.checkpoint.com/documents/R76/CP_R76_SmartProvisioning_WebAdmin/16741.htm



The R80 utility fw monitor is used to troubleshoot ______________

  1. User data base corruption
  2. LDAP conflicts
  3. Traffic issues
  4. Phase two key negotiation

Answer(s): C

Explanation:

Check Point's FW Monitor is a powerful built-in tool for capturing network traffic at the packet level. The FW Monitor utility captures network packets at multiple capture points along the FireWall inspection chains. These captured packets can be inspected later using the WireShark


Reference:

https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk30583



Page 21 of 134



Post your Comments and Discuss Checkpoint 156-215.80 exam with other Community members:

andreito commented on May 13, 2019
very cool test, im very very ver very cool!
CHILE
upvote

Carlos commented on May 13, 2019
This is a well formatted and clean brain dumps. I had tried other sites and the images were all full of watermarks stolen from other sites. This one looks pretty original and authentic.
CHILE
upvote