Free 156-215.81 Exam Braindumps (page: 37)

Page 37 of 102

In Unified SmartConsole Gateways and Servers tab you can perform the following functions EXCEPT ________.

  1. Upgrade the software version
  2. Open WebUI
  3. Open SSH
  4. Open service request with Check Point Technical Support

Answer(s): C

Explanation:

The function that can NOT be performed in the Unified SmartConsole Gateways and Servers tab is Open SSH. SSH is a secure shell protocol that allows remote access to a device via command line interface. The Unified SmartConsole does not provide an option to open SSH from the Gateways and Servers tab, as it is not a graphical user interface. The other functions can be performed in the Unified SmartConsole Gateways and Servers tab, such as upgrading the software version, opening WebUI, or opening service request with Check Point Technical Support.


Reference:

[SSH (Secure Shell)], [QUANTUM SECURITY MANAGEMENT R81]



Which Threat Prevention Software Blade provides protection from malicious software that can infect your network computers? (Choose the best answer.)

  1. IPS
  2. Anti-Virus
  3. Anti-Malware
  4. Content Awareness

Answer(s): B

Explanation:

The Threat Prevention Software Blade that provides protection from malicious software that can infect your network computers is Anti-Virus. Anti-Virus is a software blade that scans files and traffic for viruses, worms, trojans, spyware, and other malware. Anti-Virus can block or clean infected files and prevent malware outbreaks. IPS is a software blade that provides protection from network attacks and exploits. Anti-Malware is not a software blade, but rather a term that refers to any software that can detect and remove malware. Content Awareness is a software blade that provides visibility and control over data that enters or leaves the network based on file types, data types, and keywords.


Reference:

[Anti-Virus Software Blade], [IPS Software Blade], [What is Anti-Malware?], [Content Awareness Software Blade]



When configuring Spoof Tracking, which tracking actions can an administrator select to be done when spoofed packets are detected?

  1. Log, send snmp trap, email
  2. Drop packet, alert, none
  3. Log, alert, none
  4. Log, allow packets, email

Answer(s): C

Explanation:

The tracking actions that can be selected when configuring Spoof Tracking are Log, alert, none. Spoof Tracking is a feature that detects packets with spoofed source IP addresses and logs them in SmartView Tracker. The administrator can choose to log only, log and alert, or do nothing when spoofed packets are detected. The other options are not valid tracking actions for Spoof Tracking, as they are either not available or not relevant for this feature.


Reference:

[Spoof Tracking], [Firewall Administration Guide]



Access roles allow the firewall administrator to configure network access according to:

  1. remote access clients.
  2. a combination of computer or computer groups and networks.
  3. users and user groups.
  4. All of the above.

Answer(s): D

Explanation:

Access roles allow the firewall administrator to configure network access according to remote access clients, a combination of computer or computer groups and networks, and users and user groups12.
Therefore, the correct answer is D.



Page 37 of 102



Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:

Pooja commented on September 08, 2024
Nice info ok I will do the same
Anonymous
upvote

IPR commented on October 05, 2023
q:124 is wrong - the correct answer is b but the syntax is: ip-address
Anonymous
upvote

IPR commented on October 05, 2023
Q:124 is wrong - the correct answer is B but the syntax is: ip-address
Anonymous
upvote