Free 156-215.81 Exam Braindumps (page: 23)

Page 23 of 102

Fill in the blank: To create policy for traffic to or from a particular location, use the _____________.

  1. DLP shared policy
  2. Geo policy shared policy
  3. Mobile Access software blade
  4. HTTPS inspection

Answer(s): B

Explanation:

The answer is B because Geo policy shared policy is used to create policy for traffic to or from a particular location based on the source or destination country. DLP shared policy is used to prevent data loss by inspecting files and data for sensitive information. Mobile Access software blade is used to provide secure remote access to corporate resources from various devices. HTTPS inspection is used to inspect encrypted web traffic for threats and compliance4


Reference:

Check Point R81 Geo Policy Administration Guide, [Check Point R81 Data Loss Prevention Administration Guide], [Check Point R81 Mobile Access Administration Guide], [Check Point R81 HTTPS Inspection Administration Guide]



After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?

  1. Security Gateway IP-address cannot be changed without re-establishing the trust
  2. The Security Gateway name cannot be changed in command line without re-establishing trust
  3. The Security Management Server name cannot be changed in SmartConsole without re- establishing trust
  4. The Security Management Server IP-address cannot be changed without re-establishing the trust

Answer(s): A

Explanation:

The answer is A because changing the Security Gateway IP-address requires re-establishing the trust with the Security Management Server by initializing the Secure Internal Communication (SIC). Changing the Security Gateway name in command line or changing the Security Management Server name or IP-address in SmartConsole does not require re-establishing the trust, but it may require updating the topology and pushing the policy.


Reference:

[Check Point R81 Security Management Administration Guide], [Check Point R81 Security Gateway Administration Guide]



Which two Identity Awareness commands are used to support identity sharing?

  1. Policy Decision Point (PDP) and Policy Enforcement Point (PEP)
  2. Policy Enforcement Point (PEP) and Policy Manipulation Point (PMP)
  3. Policy Manipulation Point (PMP) and Policy Activation Point (PAP)
  4. Policy Activation Point (PAP) and Policy Decision Point (PDP)

Answer(s): A

Explanation:

The answer is A because Identity Awareness commands are used to support identity sharing between Security Gateways. Policy Decision Point (PDP) is the Security Gateway that collects identities from various sources and shares them with other gateways. Policy Enforcement Point (PEP) is the Security Gateway that enforces the policy based on the identities received from the PDP12


Reference:

Check Point R81 Identity Awareness Administration Guide, Check Point R81 Security Management Administration Guide



True or False: In R80, more than one administrator can login to the Security Management Server with write permission at the same time.

  1. False, this feature has to be enabled in the Global Properties.
  2. True, every administrator works in a session that is independent of the other administrators.
  3. True, every administrator works on a different database that is independent of the other administrators.
  4. False, only one administrator can login with write permission.

Answer(s): B

Explanation:

The answer is B because in R80 and above, more than one administrator can login to the Security Management Server with write permission at the same time. Every administrator works in a session that is independent of the other administrators. This is called concurrent administration and it allows multiple administrators to work on the same policy package simultaneously34


Reference:

Check Point R80.10 Concurrent Administration, Check Point R80.40 Security Management Administration Guide



Page 23 of 102



Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:

Pooja commented on September 08, 2024
Nice info ok I will do the same
Anonymous
upvote

IPR commented on October 05, 2023
q:124 is wrong - the correct answer is b but the syntax is: ip-address
Anonymous
upvote

IPR commented on October 05, 2023
Q:124 is wrong - the correct answer is B but the syntax is: ip-address
Anonymous
upvote