Free 156-215.80 Exam Braindumps (page: 66)

Page 66 of 134

When using GAiA, it might be necessary to temporarily change the MAC address of the interface eth 0 to 00:0C:29:12:34:56. After restarting the network the old MAC address should be active. How do you configure this change?

  1. As expert user, issue these commands:
    # IP link set eth0 down
    # IP link set eth0 addr 00:0C:29:12:34:56
    # IP link set eth0 up
  2. Edit the file /etc/sysconfig/netconf.C and put the new MAC address in the field
    (conf
    :(conns
    :(conn
    :hwaddr (“00:0C:29:12:34:56”)
  3. As expert user, issue the command:
    # IP link set eth0 addr 00:0C:29:12:34:56
  4. Open the WebUI, select Network > Connections > eth0. Place the new MAC address in the field
    Physical Address, and press Apply to save the settings.

Answer(s): C



John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned a static IP address 10.0.0.19.
John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his desktop with a static IP (10.0.0.19). He wants to move around the organization and continue to have access to the HR Web Server.

To make this scenario work, the IT administrator:
1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the policy.
2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.
3) Changes from static IP address to DHCP for the client PC.

What should John request when he cannot access the web server from his laptop?

  1. John should lock and unlock his computer
  2. Investigate this as a network connectivity issue
  3. The access should be changed to authenticate the user instead of the PC
  4. John should install the Identity Awareness Agent

Answer(s): C



Review the rules. Assume domain UDP is enabled in the implied rules.


What happens when a user from the internal network tries to browse to the internet using HTTP? The user:

  1. can connect to the Internet successfully after being authenticated.
  2. is prompted three times before connecting to the Internet successfully.
  3. can go to the Internet after Telnetting to the client authentication daemon port 259.
  4. can go to the Internet, without being prompted for authentication.

Answer(s): D



Which component functions as the Internal Certificate Authority for R77?

  1. Security Gateway
  2. Management Server
  3. Policy Server
  4. SmartLSM

Answer(s): B



Page 66 of 134



Post your Comments and Discuss Checkpoint 156-215.80 exam with other Community members:

andreito commented on May 13, 2019
very cool test, im very very ver very cool!
CHILE
upvote

Carlos commented on May 13, 2019
This is a well formatted and clean brain dumps. I had tried other sites and the images were all full of watermarks stolen from other sites. This one looks pretty original and authentic.
CHILE
upvote