Free 156-915.80 Exam Braindumps (page: 27)

Page 26 of 76

Your internal network is configured to be 10.1.1.0/24. This network is behind your perimeter R80 Gateway, which connects to your ISP provider. How do you configure the Gateway to allow this network to go out to the Internet?

  1. Use Hide NAT for network 10.1.1.0/24 behind the external IP address of your perimeter Gateway.
  2. Use Hide NAT for network 10.1.1.0/24 behind the internal interface of your perimeter Gateway.
  3. Use automatic Static NAT for network 10.1.1.0/24.
  4. Do nothing, as long as 10.1.1.0 network has the correct default Gateway.

Answer(s): A



What happens if the identity of a user is known?

  1. If the user credentials do not match an Access Role, the traffic is automatically dropped.
  2. If the user credentials do not match an Access Role, the system displays a sandbox.
  3. If the user credentials do not match an Access Role, the gateway moves onto the next rule.
  4. If the user credentials do not match an Access Role, the system displays the Captive Portal.

Answer(s): C



An internal host initiates a session to the Google.com website and is set for Hide NAT behind the Security Gateway. The initiating traffic is an example of __________.

  1. client side NAT
  2. source NAT
  3. destination NAT
  4. None of these

Answer(s): B



When using AD Query to authenticate users for Identity Awareness, identity data is received seamlessly from the Microsoft Active Directory (AD). What is NOT a recommended usage of this method?

  1. Leveraging identity in the application control blade
  2. Basic identity enforcement in the internal network
  3. Identity-based auditing and logging
  4. Identity-based enforcement for non-AD users (non-Windows and guest users)

Answer(s): D






Post your Comments and Discuss Checkpoint 156-915.80 exam with other Community members:

156-915.80 Discussions & Posts