Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Checkpoint 156-215.81 - Check Point Certified Security Administrator R81.20 CCSA (156-215.81.20)

Page: 8 / 13
Total 411 questions

Which Threat Prevention Software Blade provides protection from malicious software that can infect your network computers? (Choose the best answer.)

A.

IPS

B.

Anti-Virus

C.

Anti-Malware

D.

Content Awareness

Stateful Inspection compiles and registers connections where?

A.

Connection Cache

B.

State Cache

C.

State Table

D.

Network Table

By default, which port does the WebUI listen on?

A.

8080

B.

80

C.

4434

D.

443

Which application is used for the central management and deployment of licenses and packages?

A.

SmartProvisioning

B.

SmartLicense

C.

SmartUpdate

D.

Deployment Agent

Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?

A.

Windows Management Instrumentation (WMI)

B.

Hypertext Transfer Protocol Secure (HTTPS)

C.

Lightweight Directory Access Protocol (LDAP)

D.

Remote Desktop Protocol (RDP)

What are the three deployment considerations for a secure network?

A.

Distributed, Bridge Mode, and Remote

B.

Bridge Mode, Remote, and Standalone

C.

Remote, Standalone, and Distributed

D.

Standalone, Distributed, and Bridge Mode

What is the purpose of Captive Portal?

A.

It manages user permission in SmartConsole

B.

It provides remote access to SmartConsole

C.

It authenticates users, allowing them access to the Internet and corporate resources

D.

It authenticates users, allowing them access to the Gaia OS

What is the difference between SSL VPN and IPSec VPN?

A.

IPSec VPN does not require installation of a resident VPN client

B.

SSL VPN requires installation of a resident VPN client

C.

SSL VPN and IPSec VPN are the same

D.

IPSec VPN requires installation of a resident VPN client and SSL VPN requires only an installed Browser

Which policy type is used to enforce bandwidth and traffic control rules?

A.

Access Control

B.

Threat Emulation

C.

Threat Prevention

D.

QoS

When dealing with policy layers, what two layer types can be utilized?

A.

Inbound Layers and Outbound Layers

B.

Ordered Layers and Inline Layers

C.

Structured Layers and Overlap Layers

D.

R81.X does not support Layers.