Check Point 156-215.81 Check Point Certified Security Administrator R81 Online Training
Check Point 156-215.81 Online Training
The questions for 156-215.81 were last updated at Nov 23,2024.
- Exam Code: 156-215.81
- Exam Name: Check Point Certified Security Administrator R81
- Certification Provider: Check Point
- Latest update: Nov 23,2024
What licensing feature is used to verify licenses and activate new licenses added to the License and Contracts repository?
- A . Verification tool
- B . Verification licensing
- C . Automatic licensing
- D . Automatic licensing and Verification tool
A security zone is a group of one or more network interfaces from different centrally managed gateways.
What is considered part of the zone?
- A . The zone is based on the network topology and determined according to where the interface leads to.
- B . Security Zones are not supported by Check Point firewalls.
- C . The firewall rule can be configured to include one or more subnets in a zone.
- D . The local directly connected subnet defined by the subnet IP and subnet mask.
Which of the following commands is used to monitor cluster members?
- A . cphaprob state
- B . cphaprob status
- C . cphaprob
- D . cluster state
Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?
- A . Windows Management Instrumentation (WMI)
- B . Hypertext Transfer Protocol Secure (HTTPS)
- C . Lightweight Directory Access Protocol (LDAP)
- D . Remote Desktop Protocol (RDP)
A network administrator has informed you that they have identified a malicious host on the
network, and instructed you to block it. Corporate policy dictates that firewall policy changes cannot be made at this time.
What tool can you use to block this traffic?
- A . Anti-Bot protection
- B . Anti-Malware protection
- C . Policy-based routing
- D . Suspicious Activity Monitoring (SAM) rules
What is the main difference between Threat Extraction and Threat Emulation?
- A . Threat Emulation never delivers a file and takes more than 3 minutes to complete
- B . Threat Extraction always delivers a file and takes less than a second to complete
- C . Threat Emulation never delivers a file that takes less than a second to complete
- D . Threat Extraction never delivers a file and takes more than 3 minutes to complete
In Unified SmartConsole Gateways and Servers tab you can perform the following functions EXCEPT ________.
- A . Upgrade the software version
- B . Open WebUI
- C . Open SSH
- D . Open service request with Check Point Technical Support
Identity Awareness allows the Security Administrator to configure network access based on which of the following?
- A . Name of the application, identity of the user, and identity of the machine
- B . Identity of the machine, username, and certificate
- C . Network location, identity of a user, and identity of a machine
- D . Browser-Based Authentication, identity of a user, and network location
What is NOT an advantage of Packet Filtering?
- A . Application Independence
- B . High Performance
- C . Scalability
- D . Low Security and No Screening above Network Layer
An administrator wishes to enable Identity Awareness on the Check Point firewalls. However they allow users to use company issued or personal laptops.
Since the administrator cannot manage the personal laptops, which of the following methods would BEST suit this company?
- A . AD Query
- B . Browser-Based Authentication
- C . Identity Agents
- D . Terminal Servers Agent