Free 156-215.81 Exam Braindumps (page: 24)

Page 24 of 102

Which one of the following is TRUE?

  1. Ordered policy is a sub-policy within another policy
  2. One policy can be either inline or ordered, but not both
  3. Inline layer can be defined as a rule action
  4. Pre-R80 Gateways do not support ordered layers

Answer(s): C

Explanation:

The answer is C because inline layer can be defined as a rule action in a policy layer. Inline layer is a sub-policy that contains additional rules that are applied only if the parent rule matches. Ordered layer is a policy layer that contains rules that are applied in order, from top to bottom. One policy can be either inline or ordered, but not both. Pre-R80 Gateways do support ordered layers, but not inline layers5


Reference:

Check Point R81 Policy Layers and Sub-Policies, [Check Point R81 Security Gateway Administration Guide]



Which deployment adds a Security Gateway to an existing environment without changing IP routing?

  1. Distributed
  2. Bridge Mode
  3. Remote
  4. Standalone

Answer(s): B

Explanation:

The answer is B because bridge mode deployment adds a Security Gateway to an existing environment without changing IP routing. Bridge mode is a transparent mode that does not require assigning IP addresses to the Security Gateway interfaces. Distributed deployment is a deployment where the Security Management Server and the Security Gateway are installed on separate machines. Remote deployment is a deployment where the Security Gateway is installed on a remote site and connects to the Security Management Server over a VPN tunnel. Standalone deployment is a deployment where the Security Management Server and the Security Gateway are installed on the same machine.


Reference:

[Check Point R81 Bridge Mode], [Check Point R81 Deployment Scenarios]



Fill in the blank: An identity server uses a ___________ for user authentication.

  1. Shared secret
  2. Certificate
  3. One-time password
  4. Token

Answer(s): A

Explanation:

The answer is A because an identity server uses a shared secret for user authentication. A shared secret is a passphrase that is known by both the identity server and the user. The identity server sends a challenge to the user, who encrypts it with the shared secret and sends it back. The identity server then verifies the response and authenticates the user12


Reference:

Check Point R81 Identity Awareness Administration Guide, Check Point R81 Identity Server



You can see the following graphic:



What is presented on it?

  1. Properties of personal. p12 certificate file issued for user John.
  2. Shared secret properties of John's password.
  3. VPN certificate properties of the John's gateway.
  4. Expired. p12 certificate properties for user John.

Answer(s): A

Explanation:

The answer is A because the graphic shows the properties of a personal .p12 certificate file issued for user John. A .p12 file is a file format that contains a user's private key and public key certificate. The graphic shows that the certificate file is valid and has an expiration date of 07-Apr-2018. The graphic also shows that the certificate file is issued by an internal CA, which is a Check Point component that manages certificates for users and gateways.


Reference:

Check Point R81 Certificate Management, Check Point R81 Internal CA



Page 24 of 102



Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:

Pooja commented on September 08, 2024
Nice info ok I will do the same
Anonymous
upvote

IPR commented on October 05, 2023
q:124 is wrong - the correct answer is b but the syntax is: ip-address
Anonymous
upvote

IPR commented on October 05, 2023
Q:124 is wrong - the correct answer is B but the syntax is: ip-address
Anonymous
upvote