Free 156-215.81 Exam Braindumps (page: 39)

Page 39 of 102

When should you generate new licenses?

  1. Before installing contract files.
  2. After an RMA procedure when the MAC address or serial number of the appliance changes.
  3. When the existing license expires, license is upgraded or the IP-address where the license is tied changes.
  4. Only when the license is upgraded.

Answer(s): C

Explanation:

You should generate new licenses when the existing license expires, license is upgraded or the IP- address where the license is tied changes13. These scenarios require a new license to be generated and activated on the Security Gateway or Management Server13. Therefore, the correct answer is C. When the existing license expires, license is upgraded or the IP-address where the license is tied changes



Fill in the blank: When a policy package is installed, ________ are also distributed to the target installation Security Gateways.

  1. User and objects databases
  2. Network databases
  3. SmartConsole databases
  4. User databases

Answer(s): A

Explanation:

When a policy package is installed, user and objects databases are also distributed to the target installation Security Gateways14. The user and objects databases contain information about network objects, users, groups, services, VPN domains, and more14. Therefore, the correct answer is A. User and objects databases.



Which of the following is NOT a method used by Identity Awareness for acquiring identity?

  1. Remote Access
  2. Cloud IdP (Identity Provider)
  3. Active Directory Query
  4. RADIUS

Answer(s): B

Explanation:

Identity Awareness uses several methods for acquiring identity, such as Active Directory Query, Identity Agent, Browser-Based Authentication, Terminal Servers, Captive Portal, and RADIUS12. Cloud IdP (Identity Provider) is not a method used by Identity Awareness12. Therefore, the correct answer is B. Cloud IdP (Identity Provider).



Which Check Point software blade provides Application Security and identity control?

  1. Identity Awareness
  2. Data Loss Prevention
  3. URL Filtering
  4. Application Control

Answer(s): D

Explanation:

The Check Point software blade that provides Application Security and identity control is Application Control3 . Application Control enables network administrators to identify, allow, block, or limit usage of thousands of applications and millions of websites3 . Therefore, the correct answer is D. Application Control



Page 39 of 102



Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:

Pooja commented on September 08, 2024
Nice info ok I will do the same
Anonymous
upvote

IPR commented on October 05, 2023
q:124 is wrong - the correct answer is b but the syntax is: ip-address
Anonymous
upvote

IPR commented on October 05, 2023
Q:124 is wrong - the correct answer is B but the syntax is: ip-address
Anonymous
upvote