Which statement is TRUE of anti-spoofing?
Answer(s): C
The statement that is TRUE of anti-spoofing is that it is BEST Practice to have anti-spoofing groups in sync with the routing table. Anti-spoofing prevents attackers from sending packets with a false source IP address. Anti-spoofing groups define which IP addresses are expected on each interface of the Security Gateway. If the routing table changes, the anti-spoofing groups should be updated accordingly34.
Check Point R81 ClusterXL Administration Guide, Network Defined by Routes: Anti-Spoofing
Fill in the blank: The position of an implied rule is manipulated in the __________________ window.
The position of an implied rule is manipulated in the Global Properties window. Implied rules are predefined rules that are not displayed in the rule base. They allow or block traffic for essential services such as communication with Check Point servers, logging, and VPN traffic. The position of an implied rule can be changed in the Global Properties > Firewall > Implied Rules section56.
How to view Implied Rules in R80.x / R81.x SmartConsole, Implied Rules
How can the changes made by an administrator before publishing the session be seen by a superuser administrator?
Answer(s): D
The changes made by an administrator before publishing the session can be seen by a superuser administrator from Manage and Settings > Sessions, right click on the session and click `View Changes...'. This option allows the superuser to review the changes made by another administrator in a pending session1.
Check Point R81 Security Management Administration Guide
Which Check Point software blade monitors Check Point devices and provides a picture of network and security performance?
The Check Point software blade that monitors Check Point devices and provides a picture of network and security performance is Monitoring. The Monitoring Software Blade presents a complete picture of network and security performance, enabling fast responses to changes in traffic patterns or security events. It centrally monitors Check Point devices and alerts security administrators to changes to gateways, endpoints, tunnels, remote users and security activities234.
Monitoring Software Blade, Check Point Integrated Security Architecture, Support, Support Requests, Training, Documentation, and Knowledge base for Check Point products and services
Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:
Pooja commented on September 08, 2024 Nice info ok I will do the same Anonymous upvote
IPR commented on October 05, 2023 q:124 is wrong - the correct answer is b but the syntax is: ip-address Anonymous upvote
IPR commented on October 05, 2023 Q:124 is wrong - the correct answer is B but the syntax is: ip-address Anonymous upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the 156-215.81 content, but please register or login to continue.