Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Checkpoint 156-215.81 Practice Exam with Questions & Answers | Set: 2

Questions 11

At what point is the Internal Certificate Authority (ICA) created?

Options:
A.

During the primary Security Management Server installation process.

B.

Upon creation of a certificate

C.

When an administrator decides to create one

D.

When an administrator initially logs into SmartConsole.

Checkpoint 156-215.81 Premium Access
Questions 12

Which of the following situations would not require a new license to be generated and installed?

Options:
A.

The Security Gateway is upgraded.

B.

The existing license expires.

C.

The license is upgraded.

D.

The IP address of the Security Management or Security Gateway has changed.

Questions 13

Which of the following statements about Site-to-Site VPN Domain-based is NOT true?

    Route-based— The Security Gateways will have a Virtual Tunnel Interface (VTI) for each VPN Tunnel with a peer VPN Gateway. The Routing Table can have routes to forward traffic to these VTls. Any traffic routed through a VTI is automatically identified as VPN Traffic and is passed through the VPN Tunnel associated with the VTI.

Options:
A.

Domain-based— VPN domains are pre-defined for all VPN Gateways. A VPN domain is a service or user that can send or receive VPN traffic through a VPN Gateway.

B.

Domain-based— VPN domains are pre-defined for all VPN Gateways. A VPN domain is a host or network that can send or receive VPN traffic through a VPN Gateway.

C.

Domain-based— VPN domains are pre-defined for all VPN Gateways. When the Security Gateway encounters traffic originating from one VPN Domain with the destination to a VPN Domain of another VPN Gateway, that traffic is identified as VPN traffic and is sent through the VPN Tunnel between the two Gateways.

Questions 14

Which of the following is NOT a component of a Distinguished Name?

Options:
A.

Common Name

B.

Country

C.

User container

D.

Organizational Unit

Questions 15

Which of the following is NOT a type of Endpoint Identity Agent?

Options:
A.

Custom

B.

Terminal

C.

Full

D.

Light

Questions 16

Which of the following commands is used to monitor cluster members?

Options:
A.

cphaprob state

B.

cphaprob status

C.

cphaprob

D.

cluster state

Questions 17

In a Distributed deployment, the Security Gateway and the Security Management software are installed on what platforms?

Options:
A.

Different computers or appliances.

B.

The same computer or appliance.

C.

Both on virtual machines or both on appliances but not mixed.

D.

In Azure and AWS cloud environments.

Questions 18

Which command is used to add users to or from existing roles?

Options:
A.

add rba user roles

B.

add user

C.

add rba user

D.

add user roles

Questions 19

Which Threat Prevention Software Blade provides comprehensive protection against malicious and unwanted network traffic, focusing on application and server vulnerabilities?

Options:
A.

IPS

B.

Anti-Virus

C.

Anti-Spam

D.

Anti-bot

Questions 20

Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?

Options:
A.

All options stop Check Point processes

B.

backup

C.

migrate export

D.

snapshot