Free 156-215.81 Exam Braindumps (page: 22)

Page 22 of 102

How would you determine the software version from the CLI?

  1. fw ver
  2. fw stat
  3. fw monitor
  4. cpinfo

Answer(s): A

Explanation:

The command that can be used to determine the software version from the CLI is fw ver. This command displays the version of the firewall module and the build number3 . fw stat, fw monitor, and cpinfo are not commands for software version identification.


Reference:

Check Point R81 Command Line Interface Reference Guide, [156-315.81 Checkpoint Exam Info and Free Practice Test - ExamTopics]



In R80 Management, apart from using SmartConsole, objects or rules can also be modified using:

  1. 3rd Party integration of CLI and API for Gateways prior to R80.
  2. A complete CLI and API interface using SSH and custom CPCode integration.
  3. 3rd Party integration of CLI and API for Management prior to R80.
  4. A complete CLI and API interface for Management with 3rd Party integration.

Answer(s): B

Explanation:

In R80 Management, apart from using SmartConsole, objects or rules can also be modified using a complete CLI and API interface using SSH and custom CPCode integration. This allows you to automate tasks, integrate with third-party tools, and create custom scripts . 3rd Party integration of CLI and API for Gateways or Management prior to R80 is not relevant for R80 Management. A complete CLI and API interface for Management with 3rd Party integration is not a specific option.


Reference:

[Check Point R81 Security Management Administration Guide], [Check Point Learning and Training Frequently Asked Questions (FAQs)]



When connected to the Check Point R80 Management Server using the SmartConsole the first administrator to connect has a lock on:

  1. Only the objects being modified in the Management Database and other administrators can connect to make changes using a special session as long as they all connect from the same LAN network.
  2. The entire Management Database and other administrators can connect to make changes only if the first administrator switches to Read-only.
  3. The entire Management Database and all sessions and other administrators can connect only as Read-only.
  4. Only the objects being modified in his session of the Management Database and other administrators can connect to make changes using different sessions.

Answer(s): D

Explanation:

The answer is D because in R80 and above, the first administrator to connect to the Management Server using SmartConsole gets a lock on only the objects being modified in his session of the Management Database. Other administrators can connect to make changes using different sessions, but they cannot modify the same objects as the first administrator until he publishes his changes. This is called concurrent administration and it allows multiple administrators to work on the same policy package simultaneously12


Reference:

Check Point R80.10 Concurrent Administration, Check Point R80.40 Security Management Administration Guide



Which is NOT an encryption algorithm that can be used in an IPSEC Security Association (Phase 2)?

  1. AES-GCM-256
  2. AES-CBC-256
  3. AES-GCM-128

Answer(s): B

Explanation:

The answer is B because AES-CBC-256 is not a supported encryption algorithm for IPsec Security Associations (Phase 2) in R81. The supported encryption algorithms are AES-GCM-128, AES-GCM- 256, AES-CBC-128, 3DES, and NULL3


Reference:

Check Point R81 VPN Administration Guide



Page 22 of 102



Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:

Pooja commented on September 08, 2024
Nice info ok I will do the same
Anonymous
upvote

IPR commented on October 05, 2023
q:124 is wrong - the correct answer is b but the syntax is: ip-address
Anonymous
upvote

IPR commented on October 05, 2023
Q:124 is wrong - the correct answer is B but the syntax is: ip-address
Anonymous
upvote