Free 156-215.80 Exam Braindumps (page: 42)

Page 42 of 134

Which Check Point software blade provides visibility of users, groups and machines while also providing access control through identity-based policies?

  1. Firewall
  2. Identity Awareness
  3. Application Control
  4. URL Filtering

Answer(s): B

Explanation:

Check Point Identity Awareness Software Blade provides granular visibility of users, groups and machines, providing unmatched application and access control through the creation of accurate, identity-based policies. Centralized management and monitoring allows for policies to be managed from a single, unified console.


Reference:

https://www.checkpoint.com/products/identity-awareness-software-blade/



How many users can have read/write access in Gaia at one time?

  1. Infinite
  2. One
  3. Three
  4. Two

Answer(s): B



Sally has a Hot Fix Accumulator (HFA) she wants to install on her Security Gateway which operates with GAiA, but she cannot SCP the HFA to the system. She can SSH into the Security Gateway, but she has never been able to SCP files to it. What would be the most likely reason she cannot do so?

  1. She needs to edit /etc/SSHd/SSHd_config and add the Standard Mode account.
  2. She needs to run sysconfig and restart the SSH process.
  3. She needs to edit /etc/scpusers and add the Standard Mode account.
  4. She needs to run cpconfig to enable the ability to SCP files.

Answer(s): C



John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, gateway policy permits access only from Join's desktop which is assigned an IP address 10.0.0.19 via DHCP.

John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but the limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop. He wants to move around the organization and continue to have access to the HR Web Server.
To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources.
2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.

John plugged in his laptop to the network on a different network segment and he is not able to connect. How does he solve this problem?

  1. John should install the identity Awareness Agent
  2. The firewall admin should install the Security Policy
  3. John should lock and unlock the computer
  4. Investigate this as a network connectivity issue

Answer(s): C



Page 42 of 134



Post your Comments and Discuss Checkpoint 156-215.80 exam with other Community members:

andreito commented on May 13, 2019
very cool test, im very very ver very cool!
CHILE
upvote

Carlos commented on May 13, 2019
This is a well formatted and clean brain dumps. I had tried other sites and the images were all full of watermarks stolen from other sites. This one looks pretty original and authentic.
CHILE
upvote