Free 156-915.80 Exam Braindumps (page: 34)

Page 33 of 76

Which of the following are authentication methods that Security Gateway R80 uses to validate connection attempts? Select the response below that includes the MOST complete list of valid authentication methods.

  1. Proxied, User, Dynamic, Session
  2. Connection, User, Client
  3. User, Client, Session
  4. User, Proxied, Session

Answer(s): C



As a Security Administrator, you must refresh the Client Authentication authorization time-out every time a new user connection is authorized. How do you do this? Enable the Refreshable Timeout setting:

  1. in the user object's Authentication screen.
  2. in the Gateway object's Authentication screen.
  3. in the Limit tab of the Client Authentication Action Properties screen.
  4. in the Global Properties Authentication screen.

Answer(s): C



You have a diskless appliance platform. How do you keep swap file wear to a minimum?

  1. Issue FW-1 bases its package structure on the Security Management Server, dynamically loading when the firewall is booted.
  2. The external PCMCIA-based flash extension has the swap file mapped to it, allowing easy replacement.
  3. Use PRAM flash devices, eliminating the longevity.
  4. A RAM drive reduces the swap file thrashing which causes fast wear on the device.

Answer(s): D



Security Gateway R80 supports User Authentication for which of the following services? Select the response below that contains the MOST correct list of supported services.

  1. SMTP, FTP, TELNET
  2. SMTP, FTP, HTTP, TELNET
  3. FTP, HTTP, TELNET
  4. FTP, TELNET

Answer(s): C






Post your Comments and Discuss Checkpoint 156-915.80 exam with other Community members:

156-915.80 Exam Discussions & Posts