Free 156-215.81 Exam Braindumps (page: 7)

Page 7 of 102

You want to verify if there are unsaved changes in GAiA that will be lost with a reboot.
What command can be used?

  1. show unsaved
  2. show save-state
  3. show configuration diff
  4. show config-state

Answer(s): D

Explanation:

The command show config-state can be used to verify if there are unsaved changes in GAiA that will be lost with a reboot . The other commands are not valid in GAiA.


Reference:

[Check Point GAiA Administration Guide], [Check Point CCSA - R81: Practice Test & Explanation]



In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?

  1. SND is a feature to accelerate multiple SSL VPN connections
  2. SND is an alternative to IPSec Main Mode, using only 3 packets
  3. SND is used to distribute packets among Firewall instances
  4. SND is a feature of fw monitor to capture accelerated packets

Answer(s): C

Explanation:

The Secure Network Distributor (SND) is a feature of the Security Gateway that is used to distribute packets among Firewall instances . It improves the performance and scalability of the Firewall by utilizing multiple CPU cores. The other options are not related to SND.


Reference:

[Check Point Security Gateway Architecture and Packet Flow], [Free Check Point CCSA Sample Questions and Study Guide]



Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.

  1. Symmetric routing
  2. Failovers
  3. Asymmetric routing
  4. Anti-Spoofing

Answer(s): B

Explanation:

The Sticky Decision Function (SDF) is required to prevent failovers in an Active-Active cluster. The SDF ensures that the same cluster member handles all connections that belong to a certain session. If the SDF is not enabled, different cluster members may handle different connections of the same session, which may cause a failover or a drop12.


Reference:

ClusterXL Administration Guide R81, Check Point CCSA - R81: Practice Test & Explanation



What are the steps to configure the HTTPS Inspection Policy?

  1. Go to Manage&Settings > Blades > HTTPS Inspection > Configure in SmartDashboard
  2. Go to Application&url filtering blade > Advanced > Https Inspection > Policy
  3. Go to Manage&Settings > Blades > HTTPS Inspection > Policy
  4. Go to Application&url filtering blade > Https Inspection > Policy

Answer(s): C

Explanation:

The steps to configure the HTTPS Inspection Policy are as follows34:
Go to Manage & Settings > Blades > HTTPS Inspection > Policy. Click on New HTTPS Inspection Rule or select an existing rule and click on Edit Rule.

Define the Source, Destination, and Action for the rule. The action can be either Inspect, Bypass, or Ask.
Click on OK and then on Install Policy to apply the changes.


Reference:

HTTPS Inspection R81 Administration Guide, Check Point CCSA - R81: Practice Test & Explanation



Page 7 of 102



Post your Comments and Discuss Checkpoint 156-215.81 exam with other Community members:

Pooja commented on September 08, 2024
Nice info ok I will do the same
Anonymous
upvote

IPR commented on October 05, 2023
q:124 is wrong - the correct answer is b but the syntax is: ip-address
Anonymous
upvote

IPR commented on October 05, 2023
Q:124 is wrong - the correct answer is B but the syntax is: ip-address
Anonymous
upvote