Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Checkpoint 156-215.81 - Check Point Certified Security Administrator R81.20 CCSA (156-215.81.20)

Page: 10 / 13
Total 411 questions

To view statistics on detected threats, which Threat Tool would an administrator use?

A.

Protections

B.

IPS Protections

C.

Profiles

D.

ThreatWiki

Fill in the blank: A(n)_____rule is created by an administrator and configured to allow or block traffic based on specified criteria.

A.

Inline

B.

Explicit

C.

Implicit drop

D.

Implicit accept

What is the best sync method in the ClusterXL deployment?

A.

Use 1 cluster + 1st sync

B.

Use 1 dedicated sync interface

C.

Use 3 clusters + 1st sync + 2nd sync + 3rd sync

D.

Use 2 clusters + 1st sync + 2nd sync

Is it possible to have more than one administrator connected to a Security Management Server at once?

A.

Yes, but only if all connected administrators connect with read-only permissions.

B.

Yes, but objects edited by one administrator will be locked for editing by others until the session is published.

C.

No, only one administrator at a time can connect to a Security Management Server

D.

Yes, but only one of those administrators will have write-permissions. All others will have read-only permission.

After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?

A.

Security Gateway IP-address cannot be changed without re-establishing the trust

B.

The Security Gateway name cannot be changed in command line without re-establishing trust

C.

The Security Management Server name cannot be changed in SmartConsole without re-establishing trust

D.

The Security Management Server IP-address cannot be changed without re-establishing the trust

Which command shows detailed information about VPN tunnels?

A.

cat $FWDIR/conf/vpn.conf

B.

vpn tu tlist

C.

vpn tu

D.

cpview

Phase 1 of the two-phase negotiation process conducted by IKE operates in ______ mode.

A.

Main

B.

Authentication

C.

Quick

D.

High Alert

Which option in tracking allows you to see the amount of data passed in the connection?

A.

Data

B.

Accounting

C.

Logs

D.

Advanced

What two ordered layers make up the Access Control Policy Layer?

A.

URL Filtering and Network

B.

Network and Threat Prevention

C.

Application Control and URL Filtering

D.

Network and Application Control

What are the software components used by Autonomous Threat Prevention Profiles in R8I.20 and higher?

A.

Sandbox, ThreatCloud, Zero Phishing, Sanitization, C&C Protection, JPS, File and URL Reputation

B.

IPS, Threat Emulation and Threat Extraction

C.

Sandbox, ThreatCloud, Sanitization, C&C Protection, IPS

D.

IPS, Anti-Bot, Anti-Virus, SandBlast and Macro Extraction