Free 156-215.80 Exam Braindumps (page: 41)

Page 41 of 134

A(n) ______________ rule is created by an administrator and is located before the first and before last rules in the Rule Base.

  1. Firewall drop
  2. Explicit
  3. Implicit accept
  4. Implicit drop
  5. Implied

Answer(s): E

Explanation:

This is the order that rules are enforced:

1. First Implied Rule: You cannot edit or delete this rule and no explicit rules can be placed before it.
2. Explicit Rules: These are rules that you create.
3. Before Last Implied Rules: These implied rules are applied before the last explicit rule.
4. Last Explicit Rule: We recommend that you use the Cleanup rule as the last explicit rule.
5. Last Implied Rules: Implied rules that are configured as Last in Global Properties.
6. Implied Drop Rule: Drops all packets without logging.


Reference:

https://sc1.checkpoint.com/documents/R76/CP_R76_Firewall_WebAdmin/92703.htm



The IPS policy for pre-R80 gateways is installed during the ______________ .

  1. Firewall policy install
  2. Threat Prevention policy install
  3. Anti-bot policy install
  4. Access Control policy install

Answer(s): B

Explanation:

https://sc1.checkpoint.com/documents/R80/CP_R80BC_ThreatPrevention/html_frameset.htm?topic=documents/R80/CP_R80BC_ThreatPrevention/136486



RADIUS Accounting gets ______________ data from requests generated by the accounting client

  1. Destination
  2. Identity
  3. Payload
  4. Location

Answer(s): B

Explanation:

How RADIUS Accounting Works with Identity Awareness
RADIUS Accounting gets identity data from RADIUS Accounting Requests generated by the RADIUS accounting client.


Reference:

https://sc1.checkpoint.com/documents/R77/CP_R77_IdentityAwareness_WebAdminGuide/html_frameset.htm?topic=documents/R77/CP_R77_IdentityAwareness_WebAdminGuide/62050



The R80 SmartConsole, SmartEvent GUI client, and ______________ consolidate billions of logs and shows them as prioritized security events.

  1. SmartMonitor
  2. SmartView Web Application
  3. SmartReporter
  4. SmartTracker

Answer(s): B

Explanation:

Event Analysis with SmartEvent
The SmartEvent Software Blade is a unified security event management and analysis solution that delivers real-time, graphical threat management information. SmartConsole, SmartView Web Application, and the SmartEvent GUI client consolidate billions of logs and show them as prioritized security events so you can immediately respond to security incidents, and do the necessary actions to prevent more attacks. You can customize the views to monitor the events that are most important to you. You can move from a high level view to detailed forensic analysis in a few clicks. With the free-text search and suggestions, you can quickly run data analysis and identify critical security events.


Reference:

https://sc1.checkpoint.com/documents/R80/CP_R80_LoggingAndMonitoring/html_frameset.htm?topic=documents/R80/CP_R80_LoggingAndMonitoring/131915



Page 41 of 134



Post your Comments and Discuss Checkpoint 156-215.80 exam with other Community members:

andreito commented on May 13, 2019
very cool test, im very very ver very cool!
CHILE
upvote

Carlos commented on May 13, 2019
This is a well formatted and clean brain dumps. I had tried other sites and the images were all full of watermarks stolen from other sites. This one looks pretty original and authentic.
CHILE
upvote