Which of the following is NOT a valid configuration screen of an Access Role Object?
Answer(s): C
An Access Role Object has four configuration screens: Users, Machines, Networks, and Identity Tags1, p. 27. Time is not a valid configuration screen of an Access Role Object.
Check Point CCSA - R81: Practice Test & Explanation
What is the purpose of the Stealth Rule?
Answer(s): A
The Stealth Rule is used to prevent users from directly connecting to a Security Gateway. It is usually placed at the top of the rule base, before any other rule that allows traffic to the Security Gateway1, p. 32.
What key is used to save the current CPView page in a filename format cpview_"cpview process ID".cap"number of captures"?
The key C is used to save the current CPView page in a filename format cpview_"cpview process ID". cap"number of captures"2.
Free Check Point CCSA Sample Questions and Study Guide
Fill in the blank: It is Best Practice to have a _____ rule at the end of each policy layer.
It is Best Practice to have an Explicit CleanUp rule at the end of each policy layer. This rule will log and drop any traffic that does not match any of the preceding rules in the layer1, p. 23.
Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:
Pooja commented on September 08, 2024 Nice info ok I will do the same Anonymous upvote
IPR commented on October 05, 2023 q:124 is wrong - the correct answer is b but the syntax is: ip-address Anonymous upvote
IPR commented on October 05, 2023 Q:124 is wrong - the correct answer is B but the syntax is: ip-address Anonymous upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the 156-215.81 content, but please register or login to continue.