image


Avaya


156-215.81


Check Point Certified Security Administrator R81


https://killexams.com/pass4sure/exam-detail/156-215.81

What are the two types of NAT supported by the Security Gateway?

  1. Destination and Hide

  2. Hide and Static

  3. Static and Source

  4. Source and Destination


Answer: B Explanation:


n: 88


he Check Point administrator for Alpha Corp with an R80 Check Point estate. You have received a call by one of the ment users stating that they are unable to browse the Internet with their new tablet connected to the company Wireless.

system goes through the Check Point Gateway.


ou review the logs to see what the problem may be?

SmartLog and connect remotely to the IP of the wireless controller SmartView Tracker and filter the logs for the IP address of the tablet SmartView Tracker and check all the IP logs for the tablet

SmartLog and query for the IP address of the Manager’s tablet


B


n: 89


pe of NAT is a one-to-one relationship where each host is translated to a unique address?

Source


nation


B


n: 90


use the same layer in multiple policies or rulebases?

a layer can be shared with multiple policies and rules.

image

A Security Gateway can use these procedures to translate IP addresses in your network:


Questio


You are t

manage The

Wireless


How do y

  1. Open

  2. Open

  3. Open

  4. Open


Answer:


Questio


What ty A.

  1. Static

  2. Hide

  3. Desti


Answer:


Questio


Can you

  1. Yes –

  2. No – each layer must be unique.

  3. No – layers cannot be shared or reused, but an identical one can be created.

  4. Yes – but it must be copied and pasted with a different name.


Answer: A Explanation:

https://community.checkpoint.com/t5/Management/Sharing-a-layer-across-different-policies/td-p/1660


Question: 91

What is the purpose of the CPCA process?

  1. Monitoring the status of processes

  2. Sending and receiving logs

  3. Communication between GUI clients and the SmartCenter server

  4. Generating and modifying certificates


Answer: D


Question: 92


A SAM rule Is implemented to provide what function or benefit?

  1. Allow security audits.

    tor sequence activity. suspicious activity.


    D

    ion: c1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGuide/Topics-

    onitoring-Suspicious-Activity-Rules.htm


    n: 93


    he purpose of Captive Portal?

    nages user permission in SmartConsole vides remote access to SmartConsole

    henticates users, allowing them access to the Internet and corporate resources henticates users, allowing them access to the Gaia OS


    C


    ion:


    ortal is a simple method that authenticates users with a web interface. When users try to access a protected web resour hentication information in a form that shows in their web browser.


    c1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_IdentityAwareness_AdminGuide/html_frame cuments/R80.30/WebAdminGuides/EN/CP_R80.30_IdentityAwareness_AdminGuide/148468


    n: 94

    image

  2. Handle traffic as defined in the policy.

  3. Moni

  4. Block


Answer: Explanat https://s

LMG/M


Questio


What is t

  1. It ma

  2. It pro

  3. It aut

  4. It aut


Answer:


Explanat


Captive P ce, they

enter aut


https://s set.htm?

topic=do


Questio


Which Threat Prevention profile uses sanitization technology?

  1. Cloud/data Center

  2. perimeter

  3. Sandbox

  4. Guest Network


Answer: B Explanation:

Strict Security for Perimeter Profile & Perimeter Profile use sanitization as a technology in Threat prevention profile

Choose what BEST describes the reason why querying logs now is very fast.

  1. New Smart-1 appliances double the physical memory install

  2. Indexing Engine indexes logs for faster search results

  3. SmartConsole now queries results directly from the Security Gateway

  4. The amount of logs been store is less than the usual in older versions



c1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_LoggingAndMonitoring_AdminGuide/Topic nabling-log-indexing.htm


n: 96


he Transport layer of the TCP/IP model responsible for?

nsports packets as datagrams along different routes to reach their destination.

nages the flow of data between two hosts to ensure that the packets are correctly assembled and delivered to the target on.

ines the protocols that are used to exchange data between networks and how host programs interact with the Applicatio ls with all aspects of the physical components of network connectivity and connects with different network types.


B


n: 97


nspection compiles and registers connections where? ection Cache

ache able

ork Table


C


n: 98


nd of NAT enables Source Port Address Translation by default? matic Static NAT

image

Answer: B Explanation: Ref:

https://s s-

LMG/E


Questio


What is t

  1. It tra

  2. It ma applicati

  3. It def n layer.

  4. It dea


Answer:


Questio


Stateful I

  1. Conn

  2. State C

  3. State T

  4. Netw


Answer:


Questio


What ki

  1. Auto

  2. Manual Hide NAT

  3. Automatic Hide NAT

  4. Manual Static NAT


Answer: C Explanation:

https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/NAT- Rules.htm

Which tool is used to enable cluster membership on a Gateway?

  1. SmartUpdate

  2. cpconfig

  3. SmartConsole

  4. sysconfig



n: 100


encrypted packet is decrypted, where does this happen? ity policy

nd chain ound chain

yption is not supported


A

image

Answer: B Explanation: References: Questio

When an

  1. Secur

  2. Inbou

  3. Outb

  4. Decr


Answer:


For More exams visit https://killexams.com/vendors-exam-list


image