Pass the Checkpoint CCSA R81 156-215.81 Questions and answers with CertsForce

Viewing page 7 out of 12 pages
Viewing questions 61-70 out of questions
Questions # 61:

In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?

Options:

A.

Publish changes


B.

Save changes


C.

Install policy


D.

Install database


Expert Solution
Questions # 62:

Can you use the same layer in multiple policies or rulebases?

Options:

A.

Yes - a layer can be shared with multiple policies and rules.


B.

No - each layer must be unique.


C.

No - layers cannot be shared or reused, but an identical one can be created.


D.

Yes - but it must be copied and pasted with a different name.


Expert Solution
Questions # 63:

What are the Threat Prevention software components available on the Check Point Security Gateway?

Options:

A.

IPS, Threat Emulation and Threat Extraction


B.

IPS, Anti-Bot, Anti-Virus, SandBlast and Macro Extraction


C.

IPS, Anti-Bot, Anti-Virus, Threat Emulation and Threat Extraction


D.

IDS, Forensics, Anti-Virus, Sandboxing


Expert Solution
Questions # 64:

Name the pre-defined Roles included in Gaia OS.

Options:

A.

AdminRole, and MonitorRole


B.

ReadWriteRole, and ReadyOnly Role


C.

AdminRole, cloningAdminRole, and Monitor Role


D.

AdminRole


Expert Solution
Questions # 65:

What is the main difference between Static NAT and Hide NAT?

Options:

A.

Static NAT only allows incoming connections to protect your network.


B.

Static NAT allow incoming and outgoing connections. Hide NAT only allows outgoing connections.


C.

Static NAT only allows outgoing connections. Hide NAT allows incoming and outgoing connections.


D.

Hide NAT only allows incoming connections to protect your network.


Expert Solution
Questions # 66:

Fill in the blank: Once a certificate is revoked from the Security GateWay by the Security Management Server, the certificate information is _______.

Options:

A.

Sent to the Internal Certificate Authority.


B.

Sent to the Security Administrator.


C.

Stored on the Security Management Server.


D.

Stored on the Certificate Revocation List.


Expert Solution
Questions # 67:

Which GUI tool can be used to view and apply Check Point licenses?

Options:

A.

cpconfig


B.

Management Command Line


C.

SmartConsole


D.

SmartUpdate


Expert Solution
Questions # 68:

To provide updated malicious data signatures to all Threat Prevention blades, the Threat Prevention gateway does what with the data?

Options:

A.

Cache the data to speed up its own function.


B.

Share the data to the ThreatCloud for use by other Threat Prevention blades.


C.

Log the traffic for Administrator viewing.


D.

Delete the data to ensure an analysis of the data is done each time.


Expert Solution
Questions # 69:

What are the two elements of address translation rules?

Options:

A.

Original packet and translated packet


B.

Manipulated packet and original packet


C.

Translated packet and untranslated packet


D.

Untranslated packet and manipulated packet


Expert Solution
Questions # 70:

Which type of Check Point license ties the package license to the IP address of the Security Management Server?

Options:

A.

Central


B.

Corporate


C.

Local


D.

Formal


Expert Solution
Viewing page 7 out of 12 pages
Viewing questions 61-70 out of questions