Check Point 156-215.81.20 Check Point Certified Security Administrator R81.20 Online Training
Check Point 156-215.81.20 Online Training
The questions for 156-215.81.20 were last updated at Nov 19,2024.
- Exam Code: 156-215.81.20
- Exam Name: Check Point Certified Security Administrator R81.20
- Certification Provider: Check Point
- Latest update: Nov 19,2024
Which is a suitable command to check whether Drop Templates are activated or not?
- A . fw ctl get int activate_drop_templates
- B . fwaccel stat
- C . fwaccel stats
- D . fw ctl templates Cd
Please choose correct command syntax to add an “emailserver1” host with IP address 10.50.23.90 using GAiA management CLI?
- A . hostname myHost12 ip-address 10.50.23.90
- B . mgmt add host name ip-address 10.50.23.90
- C . add host name emailserver1 ip-address 10.50.23.90
- D . mgmt add host name emailserver1 ip-address 10.50.23.90
The CDT utility supports which of the following?
- A . Major version upgrades to R77.30
- B . Only Jumbo HFA’s and hotfixes
- C . Only major version upgrades to R80.10
- D . All upgrades
Using ClusterXL, what statement is true about the Sticky Decision Function?
- A . Can only be changed for Load Sharing implementations
- B . All connections are processed and synchronized by the pivot
- C . Is configured using cpconfig
- D . Is only relevant when using SecureXL
What command would show the API server status?
- A . cpm status
- B . api restart
- C . api status
- D . show api status
How Capsule Connect and Capsule Workspace differ?
- A . Capsule Connect provides a Layer3 VPN. Capsule Workspace provides a Desktop with usable applications
- B . Capsule Workspace can provide access to any application
- C . Capsule Connect provides Business data isolation
- D . Capsule Connect does not require an installed application at client
Which of the following is a new R80.10 Gateway feature that had not been available in R77.X and older?
- A . The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.
- B . Limits the upload and download throughput for streaming media in the company to 1 Gbps.
- C . Time object to a rule to make the rule active only during specified times.
- D . Sub Policies are sets of rules that can be created and attached to specific rules. If the rule is matched, inspection will continue in the sub policy attached to it rather than in the next rule.
What are the three components for Check Point Capsule?
- A . Capsule Docs, Capsule Cloud, Capsule Connect
- B . Capsule Workspace, Capsule Cloud, Capsule Connect
- C . Capsule Workspace, Capsule Docs, Capsule Connect
- D . Capsule Workspace, Capsule Docs, Capsule Cloud
Full synchronization between cluster members is handled by Firewall Kernel.
Which port is used for this?
- A . UDP port 265
- B . TCP port 265
- C . UDP port 256
- D . TCP port 256
What is true about the IPS-Blade?
- A . in R80, IPS is managed by the Threat Prevention Policy
- B . in R80, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict
- C . in R80, IPS Exceptions cannot be attached to “all rules”
- D . in R80, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same