Free 156-215.81 Exam Braindumps (page: 48)

Page 48 of 102

To view the policy installation history for each gateway, which tool would an administrator use?

  1. Revisions
  2. Gateway installations
  3. Installation history
  4. Gateway history

Answer(s): C

Explanation:

To view the policy installation history for each gateway, an administrator would use the Installation history tool1, p. 22. The Installation history tool shows the date and time of each policy installation, the name of the administrator who installed it, and the status of the installation3. Revisions, Gateway installations, and Gateway history are not valid tools in SmartConsole.


Reference:

Check Point CCSA - R81: Practice Test & Explanation, Check Point SmartConsole R81 Help



Which SmartConsole tab shows logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?

  1. Gateway and Servers
  2. Logs and Monitor
  3. Manage Seeting
  4. Security Policies

Answer(s): B

Explanation:

The SmartConsole tab that shows logs and detects security threats, providing a centralized display of potential attack patterns from all network devices, is Logs and Monitor1, p. 24. The Logs and Monitor tab allows administrators to view logs from various sources, such as Security Gateways, SmartEvent servers, and SmartReporter servers. Gateway and Servers, Manage Setting, and Security Policies are other tabs in SmartConsole that have different functions.


Reference:

Check Point CCSA - R81: Practice

Test & Explanation, [Check Point SmartConsole R81 Help]



Which of the following is NOT a valid deployment option for R80?

  1. All-in-one (stand-alone)
  2. Log server
  3. SmartEvent
  4. Multi-domain management server

Answer(s): D

Explanation:

Multi-domain management server is a valid deployment option for R81, not R80. R80 supports multi-domain security management, which is a centralized management solution for large-scale, distributed environments with many different domain networks1.


Reference:

Multi-Domain Security Management Administration Guide R80



You have created a rule at the top of your Rule Base to permit Guest Wireless access to the Internet. However, when guest users attempt to reach the Internet, they are not seeing the splash page to accept your Terms of Service, and cannot access the Internet. How can you fix this?

  1. Right click Accept in the rule, select "More", and then check "Enable Identity Captive Portal"
  2. On the firewall object, Legacy Authentication screen, check "Enable Identity Captive Portal"
  3. In the Captive Portal screen of Global Properties, check "Enable Identity Captive Portal"
  4. On the Security Management Server object, check the box "Identity Logging"

Answer(s): A

Explanation:

Identity Captive Portal is a Check Point Identity Awareness web portal, to which users connect with their web browser to log in and authenticate, when using Browser-Based Authentication2. To enable Identity Captive Portal for a specific rule, you need to right click Accept in the rule, select "More", and then check "Enable Identity Captive Portal"3.


Reference:

Identity Awareness Administration Guide R80, Identity awareness with captive portal in Checkpoint R80



Page 48 of 102



Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:

Pooja commented on September 08, 2024
Nice info ok I will do the same
Anonymous
upvote

IPR commented on October 05, 2023
q:124 is wrong - the correct answer is b but the syntax is: ip-address
Anonymous
upvote

IPR commented on October 05, 2023
Q:124 is wrong - the correct answer is B but the syntax is: ip-address
Anonymous
upvote