Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Checkpoint 156-215.81 - Check Point Certified Security Administrator R81.20 CCSA (156-215.81.20)

Page: 2 / 13
Total 411 questions

What Identity Agent allows packet tagging and computer authentication?

A.

Endpoint Security Client

B.

Full Agent

C.

Light Agent

D.

System Agent

Consider the Global Properties following settings:

The selected option “Accept Domain Name over UDP (Queries)” means:

A.

UDP Queries will be accepted by the traffic allowed only through interfaces with external anti-spoofing topology and this will be done before first explicit rule written by Administrator in a Security Policy.

B.

All UDP Queries will be accepted by the traffic allowed through all interfaces and this will be done before first explicit rule written by Administrator in a Security Policy.

C.

No UDP Queries will be accepted by the traffic allowed through all interfaces and this will be done before first explicit rule written by Administrator in a Security Policy.

D.

All UDP Queries will be accepted by the traffic allowed by first explicit rule written by Administrator in a Security Policy.

AdminA and AdminB are both logged in on SmartConsole What does it mean if AdmmB sees a lock icon on a rule? Choose the BEST answer.

A.

Rule is locked by AdminA and will be made available if the session is published

B.

Rule is locked by AdminA because the rule is currently being edited

C.

Rule is locked by AdminA and if the session is saved, the rule will be made available

D.

Rule is locked by AdminA because the save button has not been pressed

Which command is used to add users to or from existing roles?

A.

add rba user roles

B.

add user

C.

add rba user

D.

add user roles

Which Check Point supported authentication scheme typically requires a user to possess a token?

A.

RADIUS

B.

Check Point password

C.

TACACS

D.

SecurlD

What are the steps to configure the HTTPS Inspection Policy?

A.

Go to Manage&Settings > Blades > HTTPS Inspection > Configure in SmartDashboard

B.

Go to Application&url filtering blade > Advanced > Https Inspection > Policy

C.

Go to Manage&Settings > Blades > HTTPS Inspection > Policy

D.

Go to Application&url filtering blade > Https Inspection > Policy

What object type would you use to grant network access to an LDAP user group?

A.

Access Role

B.

User Group

C.

SmartDirectory Group

D.

Group Template

Which is a main component of the Check Point security management architecture?

A.

Identity Collector

B.

Endpoint VPN client

C.

SmartConsole

D.

Proxy Server

Fill in the blanks: The _______ collects logs and sends them to the _______.

A.

Log server; Security Gateway

B.

Log server; security management server

C.

Security management server; Security Gateway

D.

Security Gateways; log server

A security zone is a group of one or more network interfaces from different centrally managed gateways. What is considered part of the zone?

A.

The zone is based on the network topology and determined according to where the interface leads to.

B.

Security Zones are not supported by Check Point firewalls.

C.

The firewall rule can be configured to include one or more subnets in a zone.

D.

The local directly connected subnet defined by the subnet IP and subnet mask.