Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Checkpoint 156-215.81 - Check Point Certified Security Administrator R81.20 CCSA (156-215.81.20)

Page: 7 / 13
Total 411 questions

Fill in the blanks: In _____ NAT, Only the ________ is translated.

A.

Static; source

B.

Simple; source

C.

Hide; destination

D.

Hide; source

Which of the following is the most secure means of authentication?

A.

Password

B.

Certificate

C.

Token

D.

Pre-shared secret

What is the default tracking option of a rule?

A.

Tracking

B.

Log

C.

None

D.

Alert

What data MUST be supplied to the SmartConsole System Restore window to restore a backup?

A.

Server, Username, Password, Path, Version

B.

Username, Password, Path, Version

C.

Server, Protocol, Username, Password, Destination Path

D.

Server, Protocol, Username, Password, Path

What key is used to save the current CPView page in a filename format cpview_“cpview process ID”. cap”number of captures”?

A.

S

B.

W

C.

C

D.

Space bar

When a Security Gateway sends its logs to an IP address other than its own, which deployment option is installed?

A.

Distributed

B.

Standalone

C.

Bridge Mode

D.

Targeted

The ______ software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware.

A.

Next Generation Threat Prevention

B.

Next Generation Threat Emulation

C.

Next Generation Threat Extraction

D.

Next Generation Firewall

Which of the following is used to enforce changes made to a Rule Base?

A.

Publish database

B.

Save changes

C.

Install policy

D.

Activate policy

Fill in the blank: It is Best Practice to have a _____ rule at the end of each policy layer.

A.

Explicit Drop

B.

Implied Drop

C.

Explicit Cleanup

D.

Implicit Drop

A layer can support different combinations of blades What are the supported blades:

A.

Firewall. URLF, Content Awareness and Mobile Access

B.

Firewall (Network Access Control). Application & URL Filtering. Content Awareness and Mobile Access

C.

Firewall. NAT, Content Awareness and Mobile Access

D.

Firewall (Network Access Control). Application & URL Filtering and Content Awareness