Free 156-215.81 Exam Braindumps (page: 53)

Page 53 of 102

An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office. Both offices are protected by Check Point Security Gateway managed by the same Security Management Server (SMS).
While configuring the VPN community to specify the pre-shared secret,

the administrator did not find a box to input the pre-shared secret.
Why does it not allow him to specify the pre-shared secret?

  1. The Gateway is an SMB device
  2. The checkbox "Use only Shared Secret for all external members" is not checked
  3. Certificate based Authentication is the only authentication method available between two Security Gateway managed by the same SMS
  4. Pre-shared secret is already configured in Global Properties

Answer(s): C

Explanation:

Certificate based Authentication is the only authentication method available between two Security Gateway managed by the same SMS. This is because certificate based authentication provides stronger security and easier management than pre-shared secret authentication. The other options are either incorrect or irrelevant for this scenario.


Reference:

[Check Point R80.10 - Part 6 - Certificate Based Authentication]



Which of the following technologies extracts detailed information from packets and stores that information in state tables?

  1. INSPECT Engine
  2. Next-Generation Firewall
  3. Packet Filtering
  4. Application Layer Firewall

Answer(s): B

Explanation:

The INSPECT Engine is a technology that extracts detailed information from packets and stores that information in state tables. It enables stateful inspection and application layer filtering12


Reference:

INSPECT Engine, Stateful Inspection



What object type would you use to grant network access to an LDAP user group?

  1. Access Role
  2. User Group
  3. SmartDirectory Group
  4. Group Template

Answer(s): B

Explanation:

The Access Role object type is used to grant network access to an LDAP user group. It defines a set of users and machines that can access a specific network resource34


Reference:

Access Role, LDAP User Group



View the rule below.
What does the pen-symbol in the left column mean?

  1. Those rules have been published in the current session.
  2. Rules have been edited by the logged in administrator, but the policy has not been published yet.
  3. Another user has currently locked the rules for editing.
  4. The configuration lock is present. Click the pen symbol in order to gain the lock.

Answer(s): B

Explanation:

The pen-symbol in the left column means that the rules have been edited by the logged in administrator, but the policy has not been published yet. It indicates that the changes are not yet effective and can be discarded.


Reference:

Policy Editor, Publishing Changes



Page 53 of 102



Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:

Pooja commented on September 08, 2024
Nice info ok I will do the same
Anonymous
upvote

IPR commented on October 05, 2023
q:124 is wrong - the correct answer is b but the syntax is: ip-address
Anonymous
upvote

IPR commented on October 05, 2023
Q:124 is wrong - the correct answer is B but the syntax is: ip-address
Anonymous
upvote