Free 156-215.80 Exam Braindumps (page: 61)

Page 61 of 134

What happens when you run the command: fw sam -J src [Source IP Address]?

  1. Connections from the specified source are blocked without the need to change the Security Policy.
  2. Connections to the specified target are blocked without the need to change the Security Policy.
  3. Connections to and from the specified target are blocked without the need to change the Security Policy.
  4. Connections to and from the specified target are blocked with the need to change the Security Policy.

Answer(s): A



VPN gateways must authenticate to each other prior to exchanging information. What are the two types of credentials used for authentication?

  1. 3DES and MD5
  2. Certificates and IPsec
  3. Certificates and pre-shared secret
  4. IPsec and VPN Domains

Answer(s): C



According to Check Point Best Practice, when adding a non-managed Check Point Gateway to a Check Point security solution what object SHOULD be added? A(n):

  1. Gateway
  2. Interoperable Device
  3. Externally managed gateway
  4. Network Node

Answer(s): C



You are about to integrate RSA SecurID users into the Check Point infrastructure. What kind of users are to be defined via SmartDashboard?

  1. A group with generic user
  2. All users
  3. LDAP Account Unit Group
  4. Internal user Group

Answer(s): A



Page 61 of 134



Post your Comments and Discuss Checkpoint 156-215.80 exam with other Community members:

andreito commented on May 13, 2019
very cool test, im very very ver very cool!
CHILE
upvote

Carlos commented on May 13, 2019
This is a well formatted and clean brain dumps. I had tried other sites and the images were all full of watermarks stolen from other sites. This one looks pretty original and authentic.
CHILE
upvote