Free 156-215.80 Exam Braindumps (page: 25)

Page 25 of 134

Web Control Layer has been set up using the settings in the following dialogue:


Consider the following policy and select the BEST answer.

  1. Traffic that does not match any rule in the subpolicy is dropped.
  2. All employees can access only Youtube and Vimeo.
  3. Access to Youtube and Vimeo is allowed only once a day.
  4. Anyone from internal network can access the internet, expect the traffic defined in drop rules 5.2, 5.5 and 5.6.

Answer(s): D

Explanation:

Policy Layers and Sub-Policies
R80 introduces the concept of layers and sub-policies, allowing you to segment your policy according to your network segments or business units/functions. In addition, you can also assign granular privileges by layer or sub-policy to distribute workload and tasks to the most qualified administrators
-With layers, the rule base is organized into a set of security rules. These set of rules or layers, are inspected in the order in which they are defined, allowing control over the rule base flow and the security functionalities that take precedence. If an “accept” action is performed across a layer, the inspection will continue to the next layer. For example, a compliance layer can be created to overlay across a cross- section of rules.
-Sub-policies are sets of rules that are created for a specific network segment, branch office or business unit, so if a rule is matched, inspection will continue through this subset of rules before it moves on to the next rule.
-Sub-policies and layers can be managed by specific administrators, according to their permissions profiles. This facilitates task delegation and workload distribution.


Reference:

https://community.checkpoint.com/docs/DOC-1065



To enforce the Security Policy correctly, a Security Gateway requires:

  1. a routing table
  2. that each Security Gateway enforces at least one rule
  3. a Demilitarized Zone
  4. a Security Policy install

Answer(s): B



RADIUS protocol uses ___________ to communicate with the gateway.

  1. UDP
  2. TDP
  3. CCP
  4. HTTP

Answer(s): A

Explanation:

Parameters:


Reference:

https://sc1.checkpoint.com/documents/R76SP/CP_R76SP_Security_System_WebAdminGuide/105209.htm



When a packet arrives at the gateway, the gateway checks it against the rules in the top Policy Layer, sequentially from top to bottom, and enforces the first rule that matches a packet. Which of the following statements about the order of rule enforcement is true?

  1. If the Action is Accept, the gateway allows the packet to pass through the gateway.
  2. If the Action is Drop, the gateway continues to check rules in the next Policy Layer down.
  3. If the Action is Accept, the gateway continues to check rules in the next Policy Layer down.
  4. If the Action is Drop, the gateway applies the Implicit Clean-up Rule for that Policy Layer.

Answer(s): C



Page 25 of 134



Post your Comments and Discuss Checkpoint 156-215.80 exam with other Community members:

andreito commented on May 13, 2019
very cool test, im very very ver very cool!
CHILE
upvote

Carlos commented on May 13, 2019
This is a well formatted and clean brain dumps. I had tried other sites and the images were all full of watermarks stolen from other sites. This one looks pretty original and authentic.
CHILE
upvote