Free 156-215.81 Exam Braindumps (page: 17)

Page 17 of 102

In the Check Point Security Management Architecture, which component(s) can store logs?

  1. SmartConsole
  2. Security Management Server and Security Gateway
  3. Security Management Server
  4. SmartConsole and Security Management Server

Answer(s): B

Explanation:

The Security Management Server and the Security Gateway are the components that can store logs in the Check Point Security Management Architecture. The Security Management Server stores logs in a database and can also forward them to external log servers. The Security Gateway can store logs locally in a buffer or a local log file, and can also send them to the Security Management Server or a log server.


Reference:

Check Point Security Management Administration Guide R81, p. 11-12



Fill in the blank: In order to install a license, it must first be added to the ____________.

  1. User Center
  2. Package repository
  3. Download Center Web site
  4. License and Contract repository

Answer(s): D

Explanation:

In order to install a license, it must first be added to the License and Contract repository. The License and Contract repository is a centralized database that stores all the licenses and contracts for Check Point products. It allows you to manage, activate, and attach licenses to your Check Point products.


Reference:

Check Point Security Management Administration Guide R81, p. 19-20



When logging in for the first time to a Security management Server through SmartConsole, a fingerprint is saved to the:

  1. Security Management Server's /home/.fgpt file and is available for future SmartConsole authentications.
  2. Windows registry is available for future Security Management Server authentications.
  3. There is no memory used for saving a fingerprint anyway.
  4. SmartConsole cache is available for future Security Management Server authentications.

Answer(s): D

Explanation:

When logging in for the first time to a Security Management Server through SmartConsole, a fingerprint is saved to the SmartConsole cache and is available for future Security Management Server authentications. The fingerprint is a unique identifier of the Security Management Server that is used to verify its identity and prevent man-in-the-middle attacks. The SmartConsole cache is a local folder on the client machine that stores temporary files and settings.


Reference:

Check Point Security Management Administration Guide R81, p. 25-26



Fill in the blank: By default, the SIC certificates issued by R80 Management Server are based on the ____________ algorithm.

  1. SHA-256
  2. SHA-200
  3. MD5
  4. SHA-128

Answer(s): A

Explanation:

By default, the SIC certificates issued by R80 Management Server are based on the SHA-256 algorithm1. SHA-256 is a secure hash algorithm that produces a 256-bit digest. SHA-200, MD5, and SHA-128 are not valid algorithms for SIC certificates.


Reference:

SHA-1 and SHA-256 certificates in Check Point Internal CA (ICA)



Page 17 of 102



Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:

Pooja commented on September 08, 2024
Nice info ok I will do the same
Anonymous
upvote

IPR commented on October 05, 2023
q:124 is wrong - the correct answer is b but the syntax is: ip-address
Anonymous
upvote

IPR commented on October 05, 2023
Q:124 is wrong - the correct answer is B but the syntax is: ip-address
Anonymous
upvote