Free 156-215.80 Exam Braindumps (page: 7)

Page 7 of 134

Which of the following is NOT a component of a Distinguished Name?

  1. Organizational Unit
  2. Country
  3. Common Name
  4. User container

Answer(s): D

Explanation:

Distinguished Name Components
CN=common name, OU=organizational unit, O=organization, L=locality, ST=state or province, C=country name


Reference:

https://sc1.checkpoint.com/documents/R76/CP_R76_SecMan_WebAdmin/html_frameset.htm?topic=documents/R76/CP_R76_SecMan_WebAdmin/71950



What are the three authentication methods for SIC?

  1. Passwords, Users, and standards-based SSL for the creation of secure channels
  2. Certificates, standards-based SSL for the creation of secure channels, and 3DES or AES128 for encryption
  3. Packet Filtering, certificates, and 3DES or AES128 for encryption
  4. Certificates, Passwords, and Tokens

Answer(s): B

Explanation:

Secure Internal Communication (SIC)
Secure Internal Communication (SIC) lets Check Point platforms and products authenticate with each other. The SIC procedure creates a trusted status between gateways, management servers and other Check Point components. SIC is required to install polices on gateways and to send logs between gateways and management servers.
These security measures make sure of the safety of SIC:
-Certificates for authentication
-Standards-based SSL for the creation of the secure channel
-3DES for encryption


Reference:

https://sc1.checkpoint.com/documents/R76/CP_R76_SecMan_WebAdmin/html_frameset.htm?topic=documents/R76/CP_R76_SecMan_WebAdmin/71950



You have enabled “Extended Log” as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?

  1. Logging has disk space issues. Change logging storage options on the logging server or Security Management Server properties and install database.
  2. Content Awareness is not enabled.
  3. Identity Awareness is not enabled.
  4. Log Trimming is enabled.

Answer(s): A

Explanation:

The most likely reason for the logs data to stop is the low disk space on the logging device, which can be the Management Server or the Gateway Server.



What is the order of NAT priorities?

  1. Static NAT, IP pool NAT, hide NAT
  2. IP pool NAT, static NAT, hide NAT
  3. Static NAT, automatic NAT, hide NAT
  4. Static NAT, hide NAT, IP pool NAT

Answer(s): A

Explanation:

The order of NAT priorities is:
1. Static NAT
2. IP Pool NAT
3. Hide NAT
Since Static NAT has all of the advantages of IP Pool NAT and more, it has a higher priority than the other NAT methods.


Reference:

https://sc1.checkpoint.com/documents/R77/CP_R77_Firewall_WebAdmin/6724.htm#o6919



Page 7 of 134



Post your Comments and Discuss Checkpoint 156-215.80 exam with other Community members:

andreito commented on May 13, 2019
very cool test, im very very ver very cool!
CHILE
upvote

Carlos commented on May 13, 2019
This is a well formatted and clean brain dumps. I had tried other sites and the images were all full of watermarks stolen from other sites. This one looks pretty original and authentic.
CHILE
upvote