Free 156-215.81 Exam Braindumps (page: 54)

Page 54 of 102

What data MUST be supplied to the SmartConsole System Restore window to restore a backup?

  1. Server, Username, Password, Path, Version
  2. Username, Password, Path, Version
  3. Server, Protocol, Username, Password, Destination Path
  4. Server, Protocol, Username, Password, Path

Answer(s): D

Explanation:

According to the Check Point R81.10 SmartConsole for Windows1, to restore a backup, you need to supply the following data: Server, Protocol, Username, Password, and Path. The Server is the IP address or hostname of the Security Management Server. The Protocol is either SCP or SFTP. The Username and Password are the credentials for the Security Management Server. The Path is the location of the backup file on the Security Management Server.


Reference:

Check Point R81.10 SmartConsole for Windows



Which repositories are installed on the Security Management Server by SmartUpdate?

  1. License and Update
  2. Package Repository and Licenses
  3. Update and License & Contract
  4. License & Contract and Package Repository

Answer(s): D

Explanation:

According to the Managing and Installing license via SmartUpdate2, there are two repositories installed on the Security Management Server by SmartUpdate: License & Contract and Package Repository. The License & Contract repository stores all licenses available and all of the assigned licenses. The Package Repository stores all packages downloaded from the Check Point Cloud or uploaded from a local device.


Reference:

Managing and Installing license via SmartUpdate



Which back up method uses the command line to create an image of the OS?

  1. System backup
  2. Save Configuration
  3. Migrate
  4. snapshot

Answer(s): D

Explanation:

According to the Hewlett Packard Enterprise Support Center3, the snapshot command uses the command line to create an image of the OS. A snapshot is a point-in-time copy of a disk partition that can be used to restore the system in case of a failure or corruption.


Reference:

Hewlett Packard Enterprise Support Center



To quickly review when Threat Prevention signatures were last updated, which Threat Tool would an administrator use?

  1. Protections
  2. IPS Protections
  3. Profiles
  4. ThreatWiki

Answer(s): B

Explanation:

According to the Learn More About Threat Signatures4, to quickly review when Threat Prevention signatures were last updated, you can use the IPS Protections tool. This tool shows you the date and time of the last update, as well as the number of signatures and their categories.


Reference:

Learn More About Threat Signatures



Page 54 of 102



Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:

Pooja commented on September 08, 2024
Nice info ok I will do the same
Anonymous
upvote

IPR commented on October 05, 2023
q:124 is wrong - the correct answer is b but the syntax is: ip-address
Anonymous
upvote

IPR commented on October 05, 2023
Q:124 is wrong - the correct answer is B but the syntax is: ip-address
Anonymous
upvote