Free 156-215.81 Exam Braindumps (page: 27)

Page 27 of 102

Which statement is TRUE of anti-spoofing?

  1. Anti-spoofing is not needed when IPS software blade is enabled
  2. It is more secure to create anti-spoofing groups manually
  3. It is BEST Practice to have anti-spoofing groups in sync with the routing table
  4. With dynamic routing enabled, anti-spoofing groups are updated automatically whenever there is a routing change

Answer(s): C

Explanation:

The statement that is TRUE of anti-spoofing is that it is BEST Practice to have anti-spoofing groups in sync with the routing table. Anti-spoofing prevents attackers from sending packets with a false source IP address. Anti-spoofing groups define which IP addresses are expected on each interface of the Security Gateway. If the routing table changes, the anti-spoofing groups should be updated accordingly34.


Reference:

Check Point R81 ClusterXL Administration Guide, Network Defined by Routes: Anti-Spoofing



Fill in the blank: The position of an implied rule is manipulated in the __________________ window.

  1. NAT
  2. Firewall
  3. Global Properties
  4. Object Explorer

Answer(s): C

Explanation:

The position of an implied rule is manipulated in the Global Properties window. Implied rules are predefined rules that are not displayed in the rule base. They allow or block traffic for essential services such as communication with Check Point servers, logging, and VPN traffic. The position of an implied rule can be changed in the Global Properties > Firewall > Implied Rules section56.


Reference:

How to view Implied Rules in R80.x / R81.x SmartConsole, Implied Rules



How can the changes made by an administrator before publishing the session be seen by a superuser administrator?

  1. By impersonating the administrator with the `Login as...' option
  2. They cannot be seen
  3. From the SmartView Tracker audit log
  4. From Manage and Settings > Sessions, right click on the session and click `View Changes...'

Answer(s): D

Explanation:

The changes made by an administrator before publishing the session can be seen by a superuser administrator from Manage and Settings > Sessions, right click on the session and click `View Changes...'. This option allows the superuser to review the changes made by another administrator in a pending session1.


Reference:

Check Point R81 Security Management Administration Guide



Which Check Point software blade monitors Check Point devices and provides a picture of network and security performance?

  1. Application Control
  2. Threat Emulation
  3. Logging and Status
  4. Monitoring

Answer(s): D

Explanation:

The Check Point software blade that monitors Check Point devices and provides a picture of network and security performance is Monitoring. The Monitoring Software Blade presents a complete picture of network and security performance, enabling fast responses to changes in traffic patterns or security events. It centrally monitors Check Point devices and alerts security administrators to changes to gateways, endpoints, tunnels, remote users and security activities234.


Reference:

Monitoring Software Blade, Check Point Integrated Security Architecture, Support, Support Requests, Training, Documentation, and Knowledge base for Check Point products and services



Page 27 of 102



Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:

Pooja commented on September 08, 2024
Nice info ok I will do the same
Anonymous
upvote

IPR commented on October 05, 2023
q:124 is wrong - the correct answer is b but the syntax is: ip-address
Anonymous
upvote

IPR commented on October 05, 2023
Q:124 is wrong - the correct answer is B but the syntax is: ip-address
Anonymous
upvote