Free 156-215.81 Exam Braindumps (page: 51)

Page 51 of 102

Examine the sample Rule Base.



What will be the result of a verification of the policy from SmartConsole?

  1. No errors or Warnings
  2. Verification Error. Empty Source-List in Rule 5 (Mail Inbound)
  3. Verification Error. Rule 4 (Web Inbound) hides Rule 6 (Webmaster access)
  4. Verification Error. Rule 7 (Clean-Up Rule) hides Implicit Clean-up Rule

Answer(s): C

Explanation:

Verification Error. Rule 4 (Web Inbound) hides Rule 6 (Webmaster access) is the correct answer. This is because Rule 4 has a broader source and destination than Rule 6, and both rules have the same service (HTTP). Therefore, Rule 6 will never be matched, and the Webmaster access will be denied.


Reference:

Check Point R80.10 - Part 3 - Rule Base Order



You are the Check Point administrator for Alpha Corp. You received a call that one of the users is unable to browse the Internet on their new tablet which is connected to the company wireless, which goes through a Check Point Gateway. How would you review the logs to see what is blocking this traffic?

  1. Open SmartLog and connect remotely to the wireless controller
  2. Open SmartEvent to see why they are being blocked
  3. Open SmartDashboard and review the logs tab
  4. From SmartConsole, go to the Log & Monitor and filter for the IP address of the tablet.

Answer(s): D

Explanation:

From SmartConsole, go to the Log & Monitor and filter for the IP address of the tablet is the correct answer. This is because the Log & Monitor view in SmartConsole allows you to view and analyze logs and events from various sources, such as Security Gateways, Security Management Servers, and SmartEvent Servers. You can use filters to search for specific logs and events based on different criteria, such as source IP, destination IP, action, time, etc.


Reference:

[Logging and Monitoring Administration Guide R80.20]



What is a role of Publishing?

  1. The Publish operation sends the modifications made via SmartConsole in the private session and makes them public
  2. The Security Management Server installs the updated policy and the entire database on Security Gateways
  3. The Security Management Server installs the updated session and the entire Rule Base on Security Gateways
  4. Modifies network objects, such as servers, users, services, or IPS profiles, but not the Rule Base

Answer(s): A

Explanation:

The Publish operation sends the modifications made via SmartConsole in the private session and makes them public is the correct answer. This is because publishing is the process of saving your changes to the database and making them available to other administrators. Publishing also allows you to install policies on Security Gateways.


Reference:

[Publishing Changes]



Which software blade enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine?

  1. Application Control
  2. Data Awareness
  3. Identity Awareness
  4. Threat Emulation

Answer(s): A

Explanation:

Application Control is the software blade that enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine. Application Control allows you to define granular rules for applications, web sites, web categories, web content types, and users. You can also use Application Control to monitor and block risky applications and web usage.


Reference:

[Application Control Administration Guide R80.40]



Page 51 of 102



Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:

Pooja commented on September 08, 2024
Nice info ok I will do the same
Anonymous
upvote

IPR commented on October 05, 2023
q:124 is wrong - the correct answer is b but the syntax is: ip-address
Anonymous
upvote

IPR commented on October 05, 2023
Q:124 is wrong - the correct answer is B but the syntax is: ip-address
Anonymous
upvote