Free 156-215.81 Exam Braindumps (page: 49)

Page 49 of 102

Identity Awareness allows the Security Administrator to configure network access based on which of the following?

  1. Name of the application, identity of the user, and identity of the machine
  2. Identity of the machine, username, and certificate
  3. Network location, identity of a user, and identity of a machine
  4. Browser-Based Authentication, identity of a user, and network location

Answer(s): C

Explanation:

Identity Awareness allows the Security Administrator to configure network access based on network location, identity of a user, and identity of a machine1. These are the three main identity sources that Identity Awareness supports1.


Reference:

Identity Awareness R80.40 Administration Guide



Which option will match a connection regardless of its association with a VPN community?

  1. All Site-to-Site VPN Communities
  2. Accept all encrypted traffic
  3. All Connections (Clear or Encrypted)
  4. Specific VPN Communities

Answer(s): B

Explanation:

Accept all encrypted traffic is the option that will match a connection regardless of its association with a VPN community2. This option allows encrypted traffic from any VPN peer, even if it is not defined in a VPN community2.


Reference:

Site to Site VPN in R80.x - Tutorial for Beginners



Which of the following is NOT a tracking log option in R80.x?

  1. Log
  2. Full Log
  3. Detailed Log
  4. Extended Log

Answer(s): C

Explanation:

Detailed Log is not a valid tracking log option in R80.x3. The tracking log options in R80.x are Log, Full Log, and Extended Log45.


Reference:

Where is `full log' option in track column, LOGGINGAND MONITORING R80, Logging and Monitoring Administration Guide R80.20



Which information is included in the "Extended Log" tracking option, but is not included in the "Log" tracking option?

  1. file attributes
  2. application information
  3. destination port
  4. data type information

Answer(s): B

Explanation:

Application information is included in the "Extended Log" tracking option, but is not included in the "Log" tracking option4. The "Extended Log" option provides additional information about the application, such as name, category, risk, and technology4.


Reference:

LOGGINGAND MONITORING R80



Page 49 of 102



Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:

Pooja commented on September 08, 2024
Nice info ok I will do the same
Anonymous
upvote

IPR commented on October 05, 2023
q:124 is wrong - the correct answer is b but the syntax is: ip-address
Anonymous
upvote

IPR commented on October 05, 2023
Q:124 is wrong - the correct answer is B but the syntax is: ip-address
Anonymous
upvote