Free 156-215.80 Exam Braindumps (page: 29)

Page 29 of 134

Where can administrator edit a list of trusted SmartConsole clients in R80?

  1. cpconfig on a Security Management Server, in the WebUI logged into a Security Management Server.
  2. Only using SmartConsole: Manage and Settings > Permissions and Administrators > Advanced > Trusted Clients.
  3. In cpconfig on a Security Management Server, in the WebUI logged into a Security Management Server, in SmartConsole: Manage and Settings>Permissions and Administrators>Advanced>Trusted Clients.
  4. WebUI client logged to Security Management Server, SmartDashboard: Manage and Settings>Permissions and Administrators>Advanced>Trusted Clients, via cpconfig on a Security Gateway.

Answer(s): C



In a Network policy with Inline layers, the default action for the Implied last rule is __________all traffic. However, in the Application Control policy layer, the default action is ____________all traffic.

  1. Accept; redirect
  2. Accept; drop
  3. Redirect; drop
  4. Drop; accept

Answer(s): D



Vanessa is a Firewall administrator. She wants to test a backup of her company’s production Firewall cluster Dallas_GW. She has a lab environment that is identical to her production environment. She decided to restore production backup via SmartConsole in lab environment. Which details she need to fill in System Restore window before she can click OK button and test the backup?

  1. Server, SCP, Username, Password, Path, Comment, Member
  2. Server, TFTP, Username, Password, Path, Comment, All Members
  3. Server, Protocol, Username, Password, Path, Comment, All Members
  4. Server, Protocol, Username, Password, Path, Comment, Member

Answer(s): C



On the following picture an administrator configures Identity Awareness:


After clicking “Next” the above configuration is supported by:

  1. Kerberos SSO which will be working for Active Directory integration
  2. Based on Active Directory integration which allows the Security Gateway to correlate Active Directory users and machines to IP addresses in a method that is completely transparent to the user
  3. Obligatory usage of Captive Portal
  4. The ports 443 or 80 what will be used by Browser-Based and configured Authentication

Answer(s): B

Explanation:

To enable Identity Awareness:
1. Log in to R80 SmartConsole.
2. From the Gateways & Servers view, double-click the Security Gateway on which to enable Identity Awareness.
3. On the Network Security tab, select Identity Awareness. The Identity Awareness Configuration wizard opens.
4. Select one or more options. These options set the methods for acquiring identities of managed and unmanaged assets.
-AD Query - Lets the Security Gateway seamlessly identify Active Directory users and computers.
-Browser-Based Authentication - Sends users to a Web page to acquire identities from unidentified users. If Transparent Kerberos Authentication is configured, AD users may be identified transparently.
-Terminal Servers - Identify users in a Terminal Server environment (originating from one IP address).


Reference:

https://sc1.checkpoint.com/documents/R80/CP_R80BC_IdentityAwareness/html_frameset.htm?topic=documents/R80/CP_R80BC_IdentityAwareness/62050



Page 29 of 134



Post your Comments and Discuss Checkpoint 156-215.80 exam with other Community members:

andreito commented on May 13, 2019
very cool test, im very very ver very cool!
CHILE
upvote

Carlos commented on May 13, 2019
This is a well formatted and clean brain dumps. I had tried other sites and the images were all full of watermarks stolen from other sites. This one looks pretty original and authentic.
CHILE
upvote