Free 156-215.80 Exam Braindumps (page: 30)

Page 30 of 134

What does it mean if Bob gets this result on an object search? Refer to the image below. Choose the BEST answer.

  1. Search detailed is missing the subnet mask.
  2. There is no object on the database with that name or that IP address.
  3. There is no object on the database with that IP address.
  4. Object does not have a NAT IP address.

Answer(s): B



Why would an administrator see the message below?

  1. A new Policy Package created on both the Management and Gateway will be deleted and must be backed up first before proceeding.
  2. A new Policy Package created on the Management is going to be installed to the existing Gateway.
  3. A new Policy Package created on the Gateway is going to be installed on the existing Management.
  4. A new Policy Package created on the Gateway and transferred to the Management will be overwritten by the Policy Package currently on the Gateway but can be restored from a periodic backup on the Gateway.

Answer(s): B



The ___________ software blade enables Application Security policies to allow, block, or limit website access based on user, group, and machine identities.

  1. Application Control
  2. Data Awareness
  3. URL Filtering
  4. Threat Emulation

Answer(s): A



At what point is the Internal Certificate Authority (ICA) created?

  1. Upon creation of a certificate
  2. During the primary Security Management Server installation process.
  3. When an administrator decides to create one.
  4. When an administrator initially logs into SmartConsole.

Answer(s): B

Explanation:

Introduction to the ICA
The ICA is a Certificate Authority which is an integral part of the Check Point product suite. It is fully compliant with X.509 standards for both certificates and CRLs. See the relevant X.509 and PKI documentation, as well as RFC 2459 standards for more information. You can read more about Check Point and PKI in the R76 VPN Administration Guide.
The ICA is located on the Security Management server. It is created during the installation process, when the Security Management server is configured.


Reference:

https://sc1.checkpoint.com/documents/R76/CP_R76_SecMan_WebAdmin/html_frameset.htm?topic=documents/R76/CP_R76_SecMan_WebAdmin/13118



Page 30 of 134



Post your Comments and Discuss Checkpoint 156-215.80 exam with other Community members:

andreito commented on May 13, 2019
very cool test, im very very ver very cool!
CHILE
upvote

Carlos commented on May 13, 2019
This is a well formatted and clean brain dumps. I had tried other sites and the images were all full of watermarks stolen from other sites. This one looks pretty original and authentic.
CHILE
upvote