Pass the Checkpoint CCSA R81 156-215.81 Questions and answers with CertsForce

Viewing page 8 out of 12 pages
Viewing questions 71-80 out of questions
Questions # 71:

Fill in the blank: It is Best Practice to have a _____ rule at the end of each policy layer.

Options:

A.

Explicit Drop


B.

Implied Drop


C.

Explicit Cleanup


D.

Implicit Drop


Expert Solution
Questions # 72:

A Check Point Software license consists of two components, the Software Blade and the Software Container. There are ______ types of Software Containers: ________.

Options:

A.

Two; Security Management and Endpoint Security


B.

Two; Endpoint Security and Security Gateway


C.

Three; Security Management, Security Gateway, and Endpoint Security


D.

Three; Security Gateway, Endpoint Security, and Gateway Management


Expert Solution
Questions # 73:

Which of the following is a new R80.10 Gateway feature that had not been available in R77.X and older?

Options:

A.

The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.


B.

Limits the upload and download throughput for streaming media in the company to 1 Gbps.


C.

Time object to a rule to make the rule active only during specified times.


D.

Sub Policies are sets of rules that can be created and attached to specific rules. If the rule is matched, inspection will continue in the sub policy attached to it rather than in the next rule.


Expert Solution
Questions # 74:

What two ordered layers make up the Access Control Policy Layer?

Options:

A.

URL Filtering and Network


B.

Network and Threat Prevention


C.

Application Control and URL Filtering


D.

Network and Application Control


Expert Solution
Questions # 75:

Which command shows the installed licenses?

Options:

A.

cplic print


B.

print cplic


C.

fwlic print


D.

show licenses


Expert Solution
Questions # 76:

You have enabled "Extended Log" as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?

Options:

A.

Identity Awareness is not enabled.


B.

Log Trimming is enabled.


C.

Logging has disk space issues


D.

Content Awareness is not enabled.


Expert Solution
Questions # 77:

Which of the following is true about Stateful Inspection?

Options:

A.

Stateful Inspection tracks state using two tables, one for incoming traffic and one for outgoing traffic


B.

Stateful Inspection looks at both the headers of packets, as well as deeply examining their content.


C.

Stateful Inspection requires that a server reply to a request, in order to track a connection's state


D.

Stateful Inspection requires two rules, one for outgoing traffic and one for incoming traffic.


Expert Solution
Questions # 78:

What is the purpose of Captive Portal?

Options:

A.

It manages user permission in SmartConsole


B.

It provides remote access to SmartConsole


C.

It authenticates users, allowing them access to the Internet and corporate resources


D.

It authenticates users, allowing them access to the Gaia OS


Expert Solution
Questions # 79:

Which key is created during Phase 2 of a site-to-site VPN?

Options:

A.

Pre-shared secret


B.

Diffie-Hellman Public Key


C.

Symmetrical IPSec key


D.

Diffie-Hellman Private Key


Expert Solution
Questions # 80:

If there are two administrators logged in at the same time to the SmartConsole, and there are objects locked for editing, what must be done to make them available to other administrators? Choose the BEST answer

Options:

A.

Save and install the Policy


B.

Delete older versions of database


C.

Revert the session.


D.

Publish or discard the session


Expert Solution
Viewing page 8 out of 12 pages
Viewing questions 71-80 out of questions