Free 156-215.80 Exam Braindumps (page: 54)

Page 54 of 134

A digital signature:

  1. Guarantees the authenticity and integrity of a message.
  2. Automatically exchanges shared keys.
  3. Decrypts data to its original form.
  4. Provides a secure key exchange mechanism over the Internet.

Answer(s): A



According to Check Point Best Practice, when adding a 3rd party gateway to a Check Point security solution what object SHOULD be added? A(n):

  1. Interoperable Device
  2. Network Node
  3. Externally managed gateway
  4. Gateway

Answer(s): A



You find a suspicious connection from a problematic host. You decide that you want to block everything from that whole network, not just the problematic host. You want to block this for an hour while you investigate further, but you do not want to add any rules to the Rule Base. How do you achieve this?

  1. Use dbedit to script the addition of a rule directly into the Rule Bases_5_0.fws configuration file.
  2. Select Block intruder from the Tools menu in SmartView Tracker.
  3. Create a Suspicious Activity Rule in Smart Monitor.
  4. Add a temporary rule using SmartDashboard and select hide rule.

Answer(s): C



When launching SmartDashboard, what information is required to log into R77?

  1. User Name, Management Server IP, certificate fingerprint file
  2. User Name, Password, Management Server IP
  3. Password, Management Server IP
  4. Password, Management Server IP, LDAP Server IP

Answer(s): B



Page 54 of 134



Post your Comments and Discuss Checkpoint 156-215.80 exam with other Community members:

andreito commented on May 13, 2019
very cool test, im very very ver very cool!
CHILE
upvote

Carlos commented on May 13, 2019
This is a well formatted and clean brain dumps. I had tried other sites and the images were all full of watermarks stolen from other sites. This one looks pretty original and authentic.
CHILE
upvote