Free 156-215.80 Exam Braindumps (page: 33)

Page 33 of 134

Which of the following is NOT an element of VPN Simplified Mode and VPN Communities?

  1. “Encrypt” action in the Rule Base
  2. Permanent Tunnels
  3. “VPN” column in the Rule Base
  4. Configuration checkbox “Accept all encrypted traffic”

Answer(s): A

Explanation:

Migrating from Traditional Mode to Simplified Mode
To migrate from Traditional Mode VPN to Simplified Mode:
1. On the Global Properties > VPN page, select one of these options:
• Simplified mode to all new Firewall Policies
• Traditional or Simplified per new Firewall Policy
2. Click OK.
3. From the R80 SmartConsole Menu, select Manage policies.

The Manage Policies window opens.
4. Click New.

The New Policy window opens.
5. Give a name to the new policy and select Access Control.

In the Security Policy Rule Base, a new column marked VPN shows and the Encrypt option is no longer available in the Action column. You are now working in Simplified Mode.


Reference:

http://dl3.checkpoint.com/paid/05/05e695b2012b4fd1d2bdfeccecd29290/CP_R80BC_VPN_AdminGuide.pdf?HashKey=1479823792_55fbc10656c87db4fcf742f4899ba90d&xtn=.pdf



A Check Point software license consists of a ______________ and ______________ .

  1. Software container; software package
  2. Software blade; software container
  3. Software package; signature
  4. Signature; software blade

Answer(s): B

Explanation:

Check Point's licensing is designed to be scalable and modular. To this end, Check Point offers both predefined packages as well as the ability to custom build a solution tailored to the needs of the Network Administrator. This is accomplished by the use of the following license components:
-Software Blades
-Container


Reference:

https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk11054



Once a license is activated, a ______________ should be installed.

  1. License Management file
  2. Security Gateway Contract file
  3. Service Contract file
  4. License Contract file

Answer(s): C

Explanation:

Service Contract File
Following the activation of the license, a Service Contract File should be installed. This file contains important information about all subscriptions purchased for a specific device and is installed via SmartUpdate. A detailed explanation of the Service Contract File can be found in sk33089.


Reference:

https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk11054



Which policy type is used to enforce bandwidth and traffic control rules?

  1. Threat Emulation
  2. Access Control
  3. QoS
  4. Threat Prevention

Answer(s): C

Explanation:

Check Point's QoS Solution
QoS is a policy-based QoS management solution from Check Point Software Technologies Ltd., satisfies your needs for a bandwidth management solution. QoS is a unique, software-only based application that manages traffic end-to-end across networks, by distributing enforcement throughout network hardware and software.


Reference:

https://sc1.checkpoint.com/documents/R76/CP_R76_QoS_AdminGuide/index.html



Page 33 of 134



Post your Comments and Discuss Checkpoint 156-215.80 exam with other Community members:

andreito commented on May 13, 2019
very cool test, im very very ver very cool!
CHILE
upvote

Carlos commented on May 13, 2019
This is a well formatted and clean brain dumps. I had tried other sites and the images were all full of watermarks stolen from other sites. This one looks pretty original and authentic.
CHILE
upvote