Top 10 tutorials 156-215.80 for IT examinee (21 to 30)

Act now and download your Check Point 156-215.80 test today! Do not waste time for the worthless Check Point 156-215.80 tutorials. Download Rebirth Check Point Check Point Certified Security Administrator exam with real questions and answers and begin to learn Check Point 156-215.80 with a classic professional.

Q21. In R80, Unified Policy is a combination of

A. Access control policy, QoS Policy, Desktop Security Policy and endpoint policy.

B. Access control policy, QoS Policy, Desktop Security Policy and Threat Prevention Policy.

C. Firewall policy, address Translation and application and URL filtering, QoS Policy, Desktop Security Policy and Threat Prevention Policy.

D. Access control policy, QoS Policy, DesktopSecurity Policy and VPN policy.

Answer: D

Explanation:

D is the best answer given the choices. Unified Policy

In R80 the Access Control policy unifies the policies of these pre-R80 Software Blades:


Q22. What is the default shell for the command line interface?

A. Expert

B. Clish

C. Admin

D. Normal

Answer: B

Explanation:

The default shell of the CLI is called clish


Q23. Vanessa is a Firewall administrator. She wants to test a backup of her company’s production Firewall cluster Dallas_GW. She has a lab environment that is identical to her production environment. She decided to restore production backup via SmartConsole in lab environment. Which details she need to fill in System Restore window before she can click OK button and test the backup?

A. Server, SCP, Username, Password, Path, Comment, Member

B. Server, TFTP, Username, Password, Path, Comment, All Members

C. Server, Protocol, Username, Password, Path, Comment, All Members

D. Server, Protocol,Username, Password, Path, Comment, member

Answer: C


Q24. Fill in the blank: The tool _____ generates a R80 Security Gateway configuration report.

A. infoCP

B. infoview

C. cpinfo

D. fw cpinfo

Answer: C

Explanation:

CPInfo is an auto-updatableutility that collects diagnostics data on a customer's machine at the time of execution and uploads it to Check Point servers (it replaces the

standalone   cp_uploader   utility for uploading files to Check Point servers).

The CPinfo output file allowsanalyzing customer setups from a remote location. Check Point support engineers can open the CPinfo file in a demo mode, while viewing actual customer Security Policies and Objects. This allows the in-depth analysis of customer's configuration and environment settings.

When contacting Check Point Support, collect the cpinfo files from the Security Management server and Security Gateways involved in your case.


Q25. Tina is a new administrator who is currently reviewing the new Check Point R80 Management console interface. In the Gateways view, she is reviewing the Summary screen as in the screenshot below. What as an 'Open Server'?

 

A. Check Point software deployed on a non-Check Point appliance.

B. The Open Server Consortium approved Server Hardware usedfor the purpose of Security and Availability.

C. A check Point Management Server deployed using the Open Systems Interconnection (OSI) Server and Security deployment model.

D. A check Point Management Server software using the Open SSL.

Answer: A

Explanation:

Open Server

Non-Check Point hardware platform that is certified by Check Point as supporting Check Point products. Open Servers allow customers the flexibility of deploying Check Point software on systems which have not been pre-hardened orpre-installed (servers running standard versions of Solaris, Windows, Red Hat Linux).


Q26. Which of the following is NOT an advantage to using multiple LDAP servers?

A. You achieve a faster access time by placing LDAP servers containing the database at remotesites

B. Information on a user is hidden, yet distributed across several servers

C. You achieve compartmentalization by allowing a large number of users to be distributed across several servers

D. You gain High Availability by replicating the same information on several servers

Answer: A


Q27. You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?

A. Eliminate all possible contradictory rules such as the Stealth orCleanup rules.

B. Create a separate Security Policy package for each remote Security Gateway.

C. Create network object that restrict all applicable rules to only certain networks.

D. Run separate SmartConsole instances to login and configure each SecurityGateway directly.

Answer: B


Q28. Fill in the blank: Once a license is activated, a _____ should be installed.

A. License Management file

B. Security Gateway Contract file

C. Service Contract file

D. License Contract file

Answer: C

Explanation:

Service Contract FileFollowing the activation of the license, a Service Contract File should be installed. This file contains important information about all subscriptions purchased for a specific device and is installed via SmartUpdate. A detailed explanation of the Service Contract File can be found in sk33089.


Q29. Fill in the blank: RADIUS Accounting gets _____ data from requests generated by the accounting client

A. Destination

B. Identity

C. Payload

D. Location

Answer: B

Explanation:

How RADIUS Accounting Works with Identity AwarenessRADIUS Accounting gets identity data from RADIUS Accounting Requests generated by the RADIUS accounting client.


Q30. Fill in the blank: The R80 SmartConsole, SmartEvent GUI client, and _____ consolidate billions of logs and shows them as prioritized security events.

A. SmartMonitor

B. SmartView Web Application

C. SmartReporter

D. SmartTracker

Answer: B

Explanation:

Event Analysis with SmartEventThe SmartEvent Software Blade is a unified security event management and analysis solution that delivers real-time, graphical threat management information. SmartConsole, SmartView Web Application, and the SmartEvent GUI client consolidate billions of logs and show them as prioritized security events so you can immediately respond to security incidents, and do the necessary actions to prevent more attacks. You can customize the views to monitor the events that are most important to you. You can move from a high level view to detailed forensic analysis in a few clicks. Withthe free-text search and suggestions, you can quickly run data analysis and identify critical security events.