Avaya 156-215.81 Check Point Certified Security Administrator R81 https://killexams.com/pass4sure/exam-detail/156-215.81 Question: 87 What are the two types of NAT supported by the Security Gateway? A. Destination and Hide B. Hide and Static C. Static and Source D. Source and Destination Answer: B Explanation: A Security Gateway can use these procedures to translate IP addresses in your network: Question: 88 You are the Check Point administrator for Alpha Corp with an R80 Check Point estate. You have received a call by one of the management users stating that they are unable to browse the Internet with their new tablet connected to the company Wireless. The Wireless system goes through the Check Point Gateway. How do you review the logs to see what the problem may be? A. Open SmartLog and connect remotely to the IP of the wireless controller B. Open SmartView Tracker and filter the logs for the IP address of the tablet C. Open SmartView Tracker and check all the IP logs for the tablet D. Open SmartLog and query for the IP address of the Manager’s tablet Answer: B Question: 89 What type of NAT is a one-to-one relationship where each host is translated to a unique address? A. Source B. Static C. Hide D. Destination Answer: B Question: 90 Can you use the same layer in multiple policies or rulebases? A. Yes – a layer can be shared with multiple policies and rules. B. No – each layer must be unique. C. No – layers cannot be shared or reused, but an identical one can be created. D. Yes – but it must be copied and pasted with a different name. Answer: A Explanation: https://community.checkpoint.com/t5/Management/Sharing-a-layer-across-different-policies/td-p/1660 Question: 91 What is the purpose of the CPCA process? A. Monitoring the status of processes B. Sending and receiving logs C. Communication between GUI clients and the SmartCenter server D. Generating and modifying certificates Answer: D Question: 92 A SAM rule Is implemented to provide what function or benefit? A. Allow security audits. B. Handle traffic as defined in the policy. C. Monitor sequence activity. D. Block suspicious activity. Answer: D Explanation: https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGuide/Topics- LMG/Monitoring-Suspicious-Activity-Rules.htm Question: 93 What is the purpose of Captive Portal? A. It manages user permission in SmartConsole B. It provides remote access to SmartConsole C. It authenticates users, allowing them access to the Internet and corporate resources D. It authenticates users, allowing them access to the Gaia OS Answer: C Explanation: Captive Portal is a simple method that authenticates users with a web interface. When users try to access a protected web resource, they enter authentication information in a form that shows in their web browser. https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_IdentityAwareness_AdminGuide/html_frameset.htm? topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_IdentityAwareness_AdminGuide/148468 Question: 94 Which Threat Prevention profile uses sanitization technology? A. Cloud/data Center B. perimeter C. Sandbox D. Guest Network Answer: B Explanation: Strict Security for Perimeter Profile & Perimeter Profile use sanitization as a technology in Threat prevention profile Question: 95 Choose what BEST describes the reason why querying logs now is very fast. A. New Smart-1 appliances double the physical memory install B. Indexing Engine indexes logs for faster search results C. SmartConsole now queries results directly from the Security Gateway D. The amount of logs been store is less than the usual in older versions Answer: B Explanation: Ref: https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_LoggingAndMonitoring_AdminGuide/Topics- LMG/Enabling-log-indexing.htm Question: 96 What is the Transport layer of the TCP/IP model responsible for? A. It transports packets as datagrams along different routes to reach their destination. B. It manages the flow of data between two hosts to ensure that the packets are correctly assembled and delivered to the target application. C. It defines the protocols that are used to exchange data between networks and how host programs interact with the Application layer. D. It deals with all aspects of the physical components of network connectivity and connects with different network types. Answer: B Question: 97 Stateful Inspection compiles and registers connections where? A. Connection Cache B. State Cache C. State Table D. Network Table Answer: C Question: 98 What kind of NAT enables Source Port Address Translation by default? A. Automatic Static NAT B. Manual Hide NAT C. Automatic Hide NAT D. Manual Static NAT Answer: C Explanation: https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/NAT- Rules.htm Question: 99 Which tool is used to enable cluster membership on a Gateway? A. SmartUpdate B. cpconfig C. SmartConsole D. sysconfig Answer: B Explanation: References: Question: 100 When an encrypted packet is decrypted, where does this happen? A. Security policy B. Inbound chain C. Outbound chain D. Decryption is not supported Answer: A For More exams visit https://killexams.com/vendors-exam-list