What is UserCheck?
Answer(s): B
UserCheck is a communication tool used to inform a user about a website or application they are trying to access. UserCheck allows administrators to define actions that require user interaction, such as asking for confirmation, informing about risks, or blocking access3, p. 38. UserCheck is not a messaging tool, an administrator tool, or a notification tool.
Check Point CCSA - R81:Practice Test & Explanation, [Check Point UserCheck Administration Guide R81]
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
Answer(s): A
When doing a Stand-Alone Installation, you would install the Security Management Server with none of the other Check Point architecture components. A Stand-Alone Installation is a type of installation that combines the Security Management Server and the Security Gateway on one computer or appliance3, p. 14. SmartConsole, SecureClient, and SmartEvent are not Check Point architecture components, but software applications that can be installed separately.
Check Point CCSA- R81: Practice Test & Explanation, [Check Point Installation and Upgrade Guide R81]
Fill in the blank: An Endpoint identity agent uses a ___________ for user authentication.
Answer(s): C
An Endpoint identity agent uses a username/password or Kerberos ticket for user authentication3, p.28. An Endpoint identity agent is a lightweight client installed on endpoint computers that communicates with Identity Awareness gateways and provides reliable identity information. An Endpoint identity agent does not use a shared secret, a token, or a certificate for user authentication.
Check Point CCSA - R81: Practice Test & Explanation, [Check Point Identity Awareness Administration Guide R81]
What is the purpose of a Stealth Rule?
The purpose of a Stealth Rule is to drop any traffic destined for the firewall that is not otherwise explicitly allowed1, p. 32. A Stealth Rule is usually placed at the top of the rule base, before any other rule that allows traffic to the Security Gateway2, p. 13. A Stealth Rule is not used to hide a server's IP address, to allow administrators to access SmartDashboard, or to drop any traffic that is not explicitly allowed.
Check Point CCSA - R81: Practice Test & Explanation, 156-315.81 Checkpoint Exam Info and Free Practice Test
Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:
Pooja commented on September 08, 2024 Nice info ok I will do the same Anonymous upvote
IPR commented on October 05, 2023 q:124 is wrong - the correct answer is b but the syntax is: ip-address Anonymous upvote
IPR commented on October 05, 2023 Q:124 is wrong - the correct answer is B but the syntax is: ip-address Anonymous upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the 156-215.81 content, but please register or login to continue.