Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Checkpoint 156-215.81 Practice Exam with Questions & Answers | Set: 12

Questions 111

Check Point ClusterXL Active/Active deployment is used when:

Options:
A.

Only when there is Multicast solution set up

B.

There is Load Sharing solution set up

C.

Only when there is Unicast solution set up

D.

There is High Availability solution set up

Checkpoint 156-215.81 Premium Access
Questions 112

Your internal networks 10.1.1.0/24, 10.2.2.0/24 and 192.168.0.0/16 are behind the Internet Security Gateway. Considering that Layer 2 and Layer 3 setup is correct, what are the steps you will need to do in SmartConsole in order to get the connection working?

Options:
A.

1. Define an accept rule in Security Policy.2. Define Security Gateway to hide all internal networks behind the gateway’s external IP.3. Publish and install the policy.

B.

1. Define an accept rule in Security Policy.2. Define automatic NAT for each network to NAT the networks behind a public IP.3. Publish the policy.

C.

1. Define an accept rule in Security Policy.2. Define automatic NAT for each network to NAT the networks behind a public IP.3. Publish and install the policy.

D.

1. Define an accept rule in Security Policy.2. Define Security Gateway to hide all internal networks behind the gateway’s external IP.3. Publish the policy.

Questions 113

Fill in the blank: An LDAP server holds one or more ______________.

Options:
A.

Server Units

B.

Administrator Units

C.

Account Units

D.

Account Servers

Questions 114

What command would show the API server status?

Options:
A.

cpm status

B.

api restart

C.

api status

D.

show api status

Questions 115

If an administrator wants to restrict access to a network resource only allowing certain users to access it, and only when they are on a specific network what is the best way to accomplish this?

Options:
A.

Create an inline layer where the destination is the target network resource Define sub-rules allowing only specific sources to access the target resource

B.

Use a "New Legacy User at Location", specifying the LDAP user group that the users belong to, at the desired location

C.

Create a rule allowing only specific source IP addresses access to the target network resource.

D.

Create an Access Role object, with specific users or user groups specified, and specific networks defined Use this access role as the "Source" of an Access Control rule

Questions 116

Which of the following is considered a "Subscription Blade", requiring renewal every 1-3 years?

Options:
A.

IPS blade

B.

IPSEC VPN Blade

C.

Identity Awareness Blade

D.

Firewall Blade

Questions 117

What is the default shell for the Gaia command line interface?

Options:
A.

Admin

B.

Clish

C.

Expert

D.

Bash

Questions 118

Fill in the blank: With the User Directory Software Blade, you can create user definitions on a(n) ___________ Server.

Options:
A.

SecurID

B.

LDAP

C.

NT domain

D.

SMTP

Questions 119

An administrator wishes to use Application objects in a rule in their policy but there are no Application objects listed as options to add when clicking the"+" to add new items to the "Services & Applications" column of a rule. What should be done to fix this?

Options:
A.

The administrator should drag-and-drop the needed Application objects from the Object Explorer into the new rule

B.

The "Application Control" blade should be enabled on a gateway

C.

"Applications & URL Filtering" should first be enabled on the policy layer where the rule is being created.

D.

The administrator should first create some applications to add to the rule.

Questions 120

What is the purpose of the Clean-up Rule?

Options:
A.

To log all traffic that is not explicitly allowed or denied in the Rule Base

B.

To clean up policies found inconsistent with the compliance blade reports

C.

To remove all rules that could have a conflict with other rules in the database

D.

To eliminate duplicate log entries in the Security Gateway