Free 156-215.80 Exam Braindumps (page: 22)

Page 22 of 134

What are the two high availability modes?

  1. Load Sharing and Legacy
  2. Traditional and New
  3. Active and Standby
  4. New and Legacy

Answer(s): D

Explanation:

ClusterXL has four working modes. This section briefly describes each mode and its relative advantages and disadvantages.
-Load Sharing Multicast Mode
-Load Sharing Unicast Mode
-New High Availability Mode
-High Availability Legacy Mode


Reference:

https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7292.htm#o7363



The R80 feature ____________ permits blocking specific IP addresses for a specified time period.

  1. Block Port Overflow
  2. Local Interface Spoofing
  3. Suspicious Activity Monitoring
  4. Adaptive Threat Prevention

Answer(s): C

Explanation:

Suspicious Activity Rules Solution
Suspicious Activity Rules is a utility integrated into SmartView Monitor that is used to modify access privileges upon detection of any suspicious network activity (for example, several attempts to gain unauthorized access). The detection of suspicious activity is based on the creation of Suspicious Activity rules. Suspicious Activity rules are Firewall rules that enable the system administrator to instantly block suspicious connections that are not restricted by the currently enforced security policy. These rules, once set (usually with an expiration date), can be applied immediately without the need to perform an Install Policy operation


Reference:

https://sc1.checkpoint.com/documents/R76/CP_R76_SmartViewMonitor_AdminGuide/17670.htm



Which Threat Prevention Software Blade provides comprehensive against malicious and unwanted network traffic, focusing on application and server vulnerabilities?

  1. Anti-Virus
  2. IPS
  3. Anti-Spam
  4. Anti-bot

Answer(s): B

Explanation:

The IPS Software Blade provides a complete Intrusion Prevention System security solution, providing comprehensive network protection against malicious and unwanted network traffic, including:
-Malware attacks
-Dos and DDoS attacks
-Application and server vulnerabilities
-Insider threats
-Unwanted application traffic, including IM and P2P


Reference:

https://www.checkpoint.com/products/ips-software-blade/



What is the purpose of Captive Portal?

  1. It provides remote access to SmartConsole
  2. It manages user permission in SmartConsole
  3. It authenticates users, allowing them access to the Internet and corporate resources
  4. It authenticates users, allowing them access to the Gaia OS

Answer(s): C

Explanation:

Captive Portal – a simple method that authenticates users through a web interface before granting them access to Intranet resources. When users try to access a protected resource, they get a web page that must be filled out to continue.


Reference:

https://www.checkpoint.com/products/identity-awareness-software-blade/



Page 22 of 134



Post your Comments and Discuss Checkpoint 156-215.80 exam with other Community members:

andreito commented on May 13, 2019
very cool test, im very very ver very cool!
CHILE
upvote

Carlos commented on May 13, 2019
This is a well formatted and clean brain dumps. I had tried other sites and the images were all full of watermarks stolen from other sites. This one looks pretty original and authentic.
CHILE
upvote