156-215.81 Exam - Check Point Certified Security Administrator R81

certleader.com

We provide real 156-215.81 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass CheckPoint 156-215.81 Exam quickly & easily. The 156-215.81 PDF type is available for reading and printing. You can print more and practice many times. With the help of our CheckPoint 156-215.81 dumps pdf and vce product and material, you can easily pass the 156-215.81 exam.

Free 156-215.81 Demo Online For CheckPoint Certifitcation:

NEW QUESTION 1
Which Check Point software blade provides Application Security and identity control?

  • A. Identity Awareness
  • B. Data Loss Prevention
  • C. URL Filtering
  • D. Application Control

Answer: D

Explanation:
Check Point Application Control provides the industry’s strongest application security and identity control to organizations of all sizes.

NEW QUESTION 2
Which Threat Prevention Software Blade provides protection from malicious software that can infect your network computers? (Choose the best answer.)

  • A. IPS
  • B. Anti-Virus
  • C. Anti-Malware
  • D. Content Awareness

Answer: B

Explanation:
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ThreatPrevention_AdminGuide/To "Check Point Antivirus Software Blade prevents and stops
threats such as malware, viruses, and Trojans from entering and infecting a network"
Also here -https://www.checkpoint.com/downloads/products/antivirus-datasheet.pdf

NEW QUESTION 3
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ________ .

  • A. Captive Portal and Transparent Kerberos Authentication
  • B. UserCheck
  • C. User Directory
  • D. Captive Portal

Answer: A

Explanation:
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/T

NEW QUESTION 4
Which single Security Blade can be turned on to block both malicious files from being downloaded as well as block websites known to host malware?

  • A. Anti-Bot
  • B. None - both Anti-Virus and Anti-Bot are required for this
  • C. Anti-Virus
  • D. None - both URL Filtering and Anti-Virus are required for this.

Answer: C

Explanation:
Prevent Access to Malicious Websites
The Antivirus Software Blade scans outbound URL requests and ensures users do not visit websites that are known to distribute malware.
Stop Incoming Malicious Files
Check Point Antivirus Software Blade prevents and stops threats such as malware, viruses, and Trojans from entering and infecting a network.
https://www.checkpoint.com/downloads/products/antivirus-datasheet.pdf

NEW QUESTION 5
An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office. Both offices are protected by Check Point Security Gateway managed by the same Security Management Server (SMS). While configuring the VPN community to specify the pre-shared secret, the administrator did not find a box to input the pre-shared secret. Why does it not allow him to specify the pre-shared secret?

  • A. The Gateway is an SMB device
  • B. The checkbox “Use only Shared Secret for all external members” is not checked
  • C. Certificate based Authentication is the only authentication method available between two Security Gateway managed by the same SMS
  • D. Pre-shared secret is already configured in Global Properties

Answer: C

NEW QUESTION 6
Which tool allows you to monitor the top bandwidth on smart console?

  • A. Logs & Monitoring
  • B. Smart Event
  • C. Gateways & Severs Tab
  • D. SmartView Monitor

Answer: D

Explanation:
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGu

NEW QUESTION 7
You are the Check Point administrator for Alpha Corp with an R80 Check Point estate. You have received a call by one of the management users stating that they are unable to browse the Internet with their new tablet connected to the company Wireless. The Wireless system goes through the Check Point Gateway. How do you review the logs to see what the problem may be?

  • A. Open SmartLog and connect remotely to the IP of the wireless controller
  • B. Open SmartView Tracker and filter the logs for the IP address of the tablet
  • C. Open SmartView Tracker and check all the IP logs for the tablet
  • D. Open SmartLog and query for the IP address of the Manager’s tablet

Answer: B

NEW QUESTION 8
Which type of Check Point license is tied to the IP address of a specific Security Gateway and cannot be transferred to a gateway that has a different IP address?

  • A. Formal
  • B. Central
  • C. Corporate
  • D. Local

Answer: D

Explanation:
Local licensing is associated with the IP address of the Security Gateway, to which the license will be applied.
Each time the IP address of the Security Gateway changes, a new license must be generated and installed. https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=

NEW QUESTION 9
Which of the following commands is used to monitor cluster members in CLI?

  • A. show cluster state
  • B. show active cluster
  • C. show clusters
  • D. show running cluster

Answer: A

NEW QUESTION 10
What is the default shell for the command line interface?

  • A. Clish
  • B. Admin
  • C. Normal
  • D. Expert

Answer: A

Explanation:
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Gaia_AdminGuide/Topics-GAG/G

NEW QUESTION 11
Administrator Dave logs into R80 Management Server to review and makes some rule changes. He notices that there is a padlock sign next to the DNS rule in the Rule Base.
156-215.81 dumps exhibit
What is the possible explanation for this?

  • A. DNS Rule is using one of the new feature of R80 where an administrator can mark a rule with the padlock icon to let other administrators know it is important.
  • B. Another administrator is logged into the Management and currently editing the DNS Rule.
  • C. DNS Rule is a placeholder rule for a rule that existed in the past but was deleted.
  • D. This is normal behavior in R80 when there are duplicate rules in the Rule Base.

Answer: B

NEW QUESTION 12
Why is a Central License the preferred and recommended method of licensing?

  • A. Central Licensing is actually not supported with Gaia.
  • B. Central Licensing is the only option when deploying Gaia
  • C. Central Licensing ties to the IP address of a gateway and can be changed to any gateway if needed.
  • D. Central Licensing ties to the IP address of the management server and is not dependent on the IP of any gateway in the event it changes.

Answer: D

Explanation:
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ThreatPrevention_AdminGuide/To

NEW QUESTION 13
Most Check Point deployments use Gaia but which product deployment utilizes special Check Point code (with unification in R81.10)?

  • A. Enterprise Network Security Appliances
  • B. Rugged Appliances
  • C. Scalable Platforms
  • D. Small Business and Branch Office Appliances

Answer: A

NEW QUESTION 14
What command would show the API server status?

  • A. cpm status
  • B. api restart
  • C. api status
  • D. show api status

Answer: D

NEW QUESTION 15
When enabling tracking on a rule, what is the default option?

  • A. Accounting Log
  • B. Extended Log
  • C. Log
  • D. Detailed Log

Answer: C

NEW QUESTION 16
......

100% Valid and Newest Version 156-215.81 Questions & Answers shared by Dumps-files.com, Get Full Dumps HERE: https://www.dumps-files.com/files/156-215.81/ (New 400 Q&As)