Which of the following is NOT a component of a Distinguished Name?
Answer(s): D
Distinguished Name ComponentsCN=common name, OU=organizational unit, O=organization, L=locality, ST=state or province, C=country name
https://sc1.checkpoint.com/documents/R76/CP_R76_SecMan_WebAdmin/html_frameset.htm?topic=documents/R76/CP_R76_SecMan_WebAdmin/71950
What are the three authentication methods for SIC?
Answer(s): B
Secure Internal Communication (SIC)Secure Internal Communication (SIC) lets Check Point platforms and products authenticate with each other. The SIC procedure creates a trusted status between gateways, management servers and other Check Point components. SIC is required to install polices on gateways and to send logs between gateways and management servers.These security measures make sure of the safety of SIC: -Certificates for authentication-Standards-based SSL for the creation of the secure channel -3DES for encryption
You have enabled “Extended Log” as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?
Answer(s): A
The most likely reason for the logs data to stop is the low disk space on the logging device, which can be the Management Server or the Gateway Server.
What is the order of NAT priorities?
The order of NAT priorities is:1. Static NAT2. IP Pool NAT3. Hide NATSince Static NAT has all of the advantages of IP Pool NAT and more, it has a higher priority than the other NAT methods.
https://sc1.checkpoint.com/documents/R77/CP_R77_Firewall_WebAdmin/6724.htm#o6919
Post your Comments and Discuss Checkpoint 156-215.80 exam with other Community members:
andreito commented on May 13, 2019 very cool test, im very very ver very cool! CHILE upvote
Carlos commented on May 13, 2019 This is a well formatted and clean brain dumps. I had tried other sites and the images were all full of watermarks stolen from other sites. This one looks pretty original and authentic. CHILE upvote