Free 156-215.81 Exam Braindumps (page: 34)

Page 34 of 102

Which of the following is NOT a valid application navigation tab in the R80 SmartConsole?

  1. Manage and Command Line
  2. Logs and Monitor
  3. Security Policies
  4. Gateway and Servers

Answer(s): A

Explanation:

Manage and Command Line is not a valid application navigation tab in the R80 SmartConsole, as it does not exist in the interface. The image shows the navigation toolbar of the R80 SmartConsole, which has four tabs: Security Policies, Logs & Monitor, Gateways & Servers, and Manage & Settings1. The Command Line Interface button is located in the system information area, not in the navigation toolbar1.


Reference:

Application Control and URL Filtering - Check Point Software





Phase 1 of the two-phase negotiation process conducted by IKE operates in ______ mode.

  1. Main
  2. Authentication
  3. Quick
  4. High Alert

Answer(s): A

Explanation:

Phase 1 of the two-phase negotiation process conducted by IKE operates in Main mode or

Aggressive mode12. Main mode is more secure than Aggressive mode, as it protects the identities of the peers and uses six messages to establish the IKE SA13. Authentication, Quick, and High Alert are not valid modes for IKE phase 1.


Reference:

Understand IPsec IKEv1 Protocol, Internet Key Exchange for IPsec VPNs Configuration Guide, Internet Key Exchange



What is the BEST method to deploy Identity Awareness for roaming users?

  1. Use Office Mode
  2. Use identity agents
  3. Share user identities between gateways
  4. Use captive portal

Answer(s): B

Explanation:

The BEST method to deploy Identity Awareness for roaming users is to use identity agents, which are software components installed on endpoints that provide user and machine identity information to the Security Gateway45. Identity agents are more secure and reliable than other methods, as they do not require network changes or user interaction4. Office Mode, sharing user identities between gateways, and using captive portal are not methods to deploy Identity Awareness, but rather features or options that can be used with Identity Awareness46.


Reference:

Identity Awareness Reference Architecture and Best Practices, Identity Awareness PDP Broker, Identity Awareness Datasheet



What is the purpose of the Clean-up Rule?

  1. To log all traffic that is not explicitly allowed or denied in the Rule Base
  2. To clean up policies found inconsistent with the compliance blade reports
  3. To remove all rules that could have a conflict with other rules in the database
  4. To eliminate duplicate log entries in the Security Gateway

Answer(s): A

Explanation:

The purpose of the Clean-up Rule is to log all traffic that is not explicitly allowed or denied in the Rule Base78. The Clean-up Rule is the last rule in the rulebase and is used to drop and log explicitly unmatched traffic97. To improve the rulebase performance, noise traffic that is logged in the Clean- up rule should be included in the Noise rule so it is matched and dropped higher up in the rulebase8. The other options are not valid purposes of the Clean-up Rule.


Reference:

Using Intune device cleanup rules, Security policy fundamentals, Support, Support

Requests, Training, Documentation, and Knowledge base for Check Point products and services



Page 34 of 102



Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:

Pooja commented on September 08, 2024
Nice info ok I will do the same
Anonymous
upvote

IPR commented on October 05, 2023
q:124 is wrong - the correct answer is b but the syntax is: ip-address
Anonymous
upvote

IPR commented on October 05, 2023
Q:124 is wrong - the correct answer is B but the syntax is: ip-address
Anonymous
upvote