Free 156-215.81 Exam Braindumps (page: 19)

Page 19 of 102

What is the BEST command to view configuration details of all interfaces in Gaia CLISH?

  1. ifconfig -a
  2. show interfaces
  3. show interfaces detail
  4. show configuration interface

Answer(s): D

Explanation:

The BEST command to view configuration details of all interfaces in Gaia CLISH is show configuration interface3. This command displays the interface name, IP address, netmask, state, MTU, and other parameters for each interface. ifconfig -a, show interfaces, and show interfaces detail are not valid commands in Gaia CLISH.


Reference:

How to configure static routes in CLISH on Gaia OS and IPSO OS, GAIA CLISH Commands - Fir3net, Gaia Administration Guide R80 - Check Point Software, Gaia Clish commands including User Defined (Extended) commands



Fill in the blank: Authentication rules are defined for ____________.

  1. User groups
  2. Users using UserCheck
  3. Individual users
  4. All users in the database

Answer(s): A

Explanation:

Authentication rules are defined for user groups rather than individual users1. To define authentication rules, you must first define users and groups. You can define users with the Check Point user database, or with an external server, such as LDAP1. UserCheck is a feature that enables user interaction with security events2. Individual users and all users in the database are not valid options for defining authentication rules.


Reference:

How to Configure Client Authentication, UserCheck



Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?

  1. ThreatWiki
  2. Whitelist Files
  3. AppWiki
  4. IPS Protections

Answer(s): A

Explanation:

ThreatWiki is a tool that provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed3. ThreatWiki is a web-based service that collects information about files from various sources, such as Check Point customers, partners, and researchers. Administrators can use ThreatWiki to view file reputation, upload files for analysis, and download indicators of compromise3.
Whitelist Files, AppWiki, and IPS Protections are not tools that provide a list of trusted files.


Reference:

Threat Prevention R80.40 Administration Guide



Which of the following is an authentication method used for Identity Awareness?

  1. SSL
  2. Captive Portal
  3. PKI
  4. RSA

Answer(s): B

Explanation:

Captive Portal is an authentication method used for Identity Awareness4. Captive Portal is a web- based authentication method that redirects users to a browser-based login page when they try to access the network. Users must provide their credentials to access the network resources. Captive Portal can be used for guest users or users who are not identified by other methods4. SSL, PKI, and RSA are not authentication methods used for Identity Awareness, but rather encryption or certificate technologies.


Reference:

Identity Awareness Reference Architecture and Best Practices



Page 19 of 102



Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:

Pooja commented on September 08, 2024
Nice info ok I will do the same
Anonymous
upvote

IPR commented on October 05, 2023
q:124 is wrong - the correct answer is b but the syntax is: ip-address
Anonymous
upvote

IPR commented on October 05, 2023
Q:124 is wrong - the correct answer is B but the syntax is: ip-address
Anonymous
upvote