Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Checkpoint 156-215.81 Practice Exam with Questions & Answers | Set: 7

Questions 61

What is the main difference between Static NAT and Hide NAT?

Options:
A.

Static NAT only allows incoming connections to protect your network.

B.

Static NAT allow incoming and outgoing connections. Hide NAT only allows outgoing connections.

C.

Static NAT only allows outgoing connections. Hide NAT allows incoming and outgoing connections.

D.

Hide NAT only allows incoming connections to protect your network.

Checkpoint 156-215.81 Premium Access
Questions 62

Name the authentication method that requires token authenticator.

Options:
A.

SecureID

B.

Radius

C.

DynamicID

D.

TACACS

Questions 63

Which one of the following is the preferred licensing model? Select the BEST answer

Options:
A.

Local licensing because it ties the package license to the IP-address of the gateway and has no dependency of the Security Management Server.

B.

Central licensing because it ties the package license to the IP-address of the Security Management Server and has no dependency on the gateway.

C.

Central licensing because it ties the package license to the MAC-address of the Security Management Server's Mgmt-interface and has no dependency

on the gateway.

D.

Local licensing because it ties the package license to the MAC-address of the gateway management interface and has no Security Management Server

dependency.

Questions 64

Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?

Options:
A.

UDP port 265

B.

TCP port 265

C.

UDP port 256

D.

TCP port 256

Questions 65

You have enabled "Extended Log" as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?

Options:
A.

Identity Awareness is not enabled.

B.

Log Trimming is enabled.

C.

Logging has disk space issues

D.

Content Awareness is not enabled.

Questions 66

Fill in the blank: The_____is used to obtain identification and security information about network users.

Options:
A.

User index

B.

UserCheck

C.

User Directory

D.

User server

Questions 67

Fill in the blank: Once a certificate is revoked from the Security Gateway by the Security Management Server, the certificate information is _____.

Options:
A.

Stored on the Security Management Server.

B.

Stored on the Certificate Revocation List.

C.

Sent to the Internal Certificate Authority.

D.

Sent to the Security Administrator.

Questions 68

Which one of the following is TRUE?

Options:
A.

Ordered policy is a sub-policy within another policy

B.

One policy can be either inline or ordered, but not both

C.

Inline layer can be defined as a rule action

D.

Pre-R80 Gateways do not support ordered layers

Questions 69

Can multiple administrators connect to a Security Management Server at the same time?

Options:
A.

No, only one can be connected

B.

Yes, all administrators can modify a network object at the same time

C.

Yes, every administrator has their own username, and works in a session that is independent of other administrators

D.

Yes, but only one has the right to write

Questions 70

In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?

Options:
A.

Accounting

B.

Suppression

C.

Accounting/Suppression

D.

Accounting/Extended