Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Checkpoint 156-215.81 - Check Point Certified Security Administrator R81.20 CCSA (156-215.81.20)

Page: 1 / 13
Total 411 questions

Why is a Central License the preferred and recommended method of licensing?

A.

Central Licensing is actually not supported with Gaia.

B.

Central Licensing is the only option when deploying Gaia

C.

Central Licensing ties to the IP address of a gateway and can be changed to any gateway if needed.

D.

Central Licensing ties to the IP address of the management server and is not dependent on the IP of any gateway in the event it changes.

Examine the sample Rule Base.

What will be the result of a verification of the policy from SmartConsole?

A.

No errors or Warnings

B.

Verification Error. Empty Source-List in Rule 5 (Mail Inbound)

C.

Verification Error. Rule 4 (Web Inbound) hides Rule 6 (Webmaster access)

D.

Verification Error. Rule 7 (Clean-Up Rule) hides Implicit Clean-up Rule

Administrator Dave logs into R80 Management Server to review and makes some rule changes. He notices that there is a padlock sign next to the DNS rule in the Rule Base.

What is the possible explanation for this?

A.

DNS Rule is using one of the new feature of R80 where an administrator can mark a rule with the padlock icon to let other administrators know it is important.

B.

Another administrator is logged into the Management and currently editing the DNS Rule.

C.

DNS Rule is a placeholder rule for a rule that existed in the past but was deleted.

D.

This is normal behavior in R80 when there are duplicate rules in the Rule Base.

Which of the following is NOT a component of Check Point Capsule?

A.

Capsule Docs

B.

Capsule Cloud

C.

Capsule Enterprise

D.

Capsule Workspace

Fill in the blank: Authentication rules are defined for ____________.

A.

User groups

B.

Users using UserCheck

C.

Individual users

D.

All users in the database

Which encryption algorithm is the least secured?

A.

3DES

B.

AES-128

C.

DES

D.

AES-256

Which Check Point software blade prevents malicious files from entering a network using virus signatures and anomaly-based protections from ThreatCloud?

A.

Firewall

B.

Application Control

C.

Anti-spam and Email Security

D.

Anti-Virus

Which GUI tool can be used to view and apply Check Point licenses?

A.

cpconfig

B.

Management Command Line

C.

SmartConsole

D.

SmartUpdate

When enabling tracking on a rule, what is the default option?

A.

Accounting Log

B.

Extended Log

C.

Log

D.

Detailed Log

URL Filtering employs a technology, which educates users on web usage policy in real time. What is the name of that technology?

A.

WebCheck

B.

UserCheck

C.

Harmony Endpoint

D.

URL categorization