Pass the Checkpoint CCSA R81 156-215.81 Questions and answers with CertsForce

Viewing page 1 out of 12 pages
Viewing questions 1-10 out of questions
Questions # 1:

In the Check Point Security Management Architecture, which component(s) can store logs?

Options:

A.

Security Management Server and Security Gateway


B.

SmartConsole


C.

SmartConsole and Security Management Server


D.

Security Management Server


Expert Solution
Questions # 2:

Which of the following is an authentication method used for Identity Awareness?

Options:

A.

SSL


B.

Captive Portal


C.

PKI


D.

RSA


Expert Solution
Questions # 3:

The purpose of the Communication Initialization process is to establish a trust between the Security Management Server and the Check Point gateways. Which statement best describes this Secure Internal

Communication (SIC)?

Options:

A.

After successful initialization, the gateway can communicate with any Check Point node that possesses a SIC certificate signed by the same ICA.


B.

Secure Internal Communications authenticates the security gateway to the SMS before http communications are allowed.


C.

A SIC certificate is automatically generated on the gateway because the gateway hosts a subordinate CA to the SMS ICA.


D.

New firewalls can easily establish the trust by using the expert password defined on the SMS and the SMS IP address.


Expert Solution
Questions # 4:

Check Point licenses come in two forms. What are those forms?

Options:

A.

Security Gateway and Security Management.


B.

On-premise and Public Cloud


C.

Central and Local.


D.

Access Control and Threat Prevention.


Expert Solution
Questions # 5:

In the Check Point Security Management Architecture, which component(s) can store logs?

Options:

A.

SmartConsole


B.

Security Management Server and Security Gateway


C.

Security Management Server


D.

SmartConsole and Security Management Server


Expert Solution
Questions # 6:

In R80 Management, apart from using SmartConsole, objects or rules can also be modified using:

Options:

A.

3rd Party integration of CLI and API for Gateways prior to R80.


B.

A complete CLI and API interface using SSH and custom CPCode integration.


C.

3rd Party integration of CLI and API for Management prior to R80.


D.

A complete CLI and API interface for Management with 3rd Party integration.


Expert Solution
Questions # 7:

In ____________ NAT, the ____________ is translated.

Options:

A.

Hide; source


B.

Static; source


C.

Simple; source


D.

Hide; destination


Expert Solution
Questions # 8:

What SmartEvent component creates events?

Options:

A.

Consolidation Policy


B.

Correlation Unit


C.

SmartEvent Policy


D.

SmartEvent GUI


Expert Solution
Questions # 9:

Security Zones do no work with what type of defined rule?

Options:

A.

Application Control rule


B.

Manual NAT rule


C.

IPS bypass rule


D.

Firewall rule


Expert Solution
Questions # 10:

Which Check Point software blade prevents malicious files from entering a network using virus signatures and anomaly-based protections from ThreatCloud?

Options:

A.

Firewall


B.

Application Control


C.

Anti-spam and Email Security


D.

Anti-Virus


Expert Solution
Viewing page 1 out of 12 pages
Viewing questions 1-10 out of questions