Free 156-215.81 Exam Braindumps (page: 47)

Page 47 of 102

What is UserCheck?

  1. Messaging tool user to verify a user's credentials
  2. Communication tool used to inform a user about a website or application they are trying to access
  3. Administrator tool used to monitor users on their network
  4. Communication tool used to notify an administrator when a new user is created

Answer(s): B

Explanation:

UserCheck is a communication tool used to inform a user about a website or application they are trying to access. UserCheck allows administrators to define actions that require user interaction, such as asking for confirmation, informing about risks, or blocking access3, p. 38. UserCheck is not a messaging tool, an administrator tool, or a notification tool.


Reference:

Check Point CCSA - R81:
Practice Test & Explanation, [Check Point UserCheck Administration Guide R81]



When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?

  1. None, Security Management Server would be installed by itself.
  2. SmartConsole
  3. SecureClient
  4. SmartEvent

Answer(s): A

Explanation:

When doing a Stand-Alone Installation, you would install the Security Management Server with none of the other Check Point architecture components. A Stand-Alone Installation is a type of installation that combines the Security Management Server and the Security Gateway on one computer or appliance3, p. 14. SmartConsole, SecureClient, and SmartEvent are not Check Point architecture components, but software applications that can be installed separately.


Reference:

Check Point CCSA
- R81: Practice Test & Explanation, [Check Point Installation and Upgrade Guide R81]



Fill in the blank: An Endpoint identity agent uses a ___________ for user authentication.

  1. Shared secret
  2. Token
  3. Username/password or Kerberos Ticket
  4. Certificate

Answer(s): C

Explanation:

An Endpoint identity agent uses a username/password or Kerberos ticket for user authentication3, p.
28. An Endpoint identity agent is a lightweight client installed on endpoint computers that communicates with Identity Awareness gateways and provides reliable identity information. An Endpoint identity agent does not use a shared secret, a token, or a certificate for user authentication.


Reference:

Check Point CCSA - R81: Practice Test & Explanation, [Check Point Identity Awareness Administration Guide R81]



What is the purpose of a Stealth Rule?

  1. A rule used to hide a server's IP address from the outside world.
  2. A rule that allows administrators to access SmartDashboard from any device.
  3. To drop any traffic destined for the firewall that is not otherwise explicitly allowed.
  4. A rule at the end of your policy to drop any traffic that is not explicitly allowed.

Answer(s): C

Explanation:

The purpose of a Stealth Rule is to drop any traffic destined for the firewall that is not otherwise explicitly allowed1, p. 32. A Stealth Rule is usually placed at the top of the rule base, before any other rule that allows traffic to the Security Gateway2, p. 13. A Stealth Rule is not used to hide a server's IP address, to allow administrators to access SmartDashboard, or to drop any traffic that is not explicitly allowed.


Reference:

Check Point CCSA - R81: Practice Test & Explanation, 156-315.81 Checkpoint Exam Info and Free Practice Test



Page 47 of 102



Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:

Pooja commented on September 08, 2024
Nice info ok I will do the same
Anonymous
upvote

IPR commented on October 05, 2023
q:124 is wrong - the correct answer is b but the syntax is: ip-address
Anonymous
upvote

IPR commented on October 05, 2023
Q:124 is wrong - the correct answer is B but the syntax is: ip-address
Anonymous
upvote