Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

156-215.81 Exam Dumps - Check Point Certified Security Administrator R81.20 CCSA (156-215.81.20)

Go to page:
Question # 81

When should you generate new licenses?

A.

Before installing contract files.

B.

After an RMA procedure when the MAC address or serial number of the appliance changes.

C.

When the existing license expires, license is upgraded or the IP-address where the license is tied changes.

D.

Only when the license is upgraded.

Full Access
Question # 82

Which of the following is the most secure means of authentication?

A.

Password

B.

Certificate

C.

Token

D.

Pre-shared secret

Full Access
Question # 83

You are the Check Point administrator for Alpha Corp. You received a call that one of the users is unable to browse the Internet on their new tablet which is connected to the company wireless, which goes through a Check Point Gateway. How would you review the logs to see what is blocking this traffic?

A.

Open SmartLog and connect remotely to the wireless controller

B.

Open SmartEvent to see why they are being blocked

C.

Open SmartDashboard and review the logs tab

D.

From SmartConsole, go to the Log & Monitor and filter for the IP address of the tablet.

Full Access
Question # 84

Which single Security Blade can be turned on to block both malicious files from being downloaded as well as block websites known to host malware?

A.

Anti-Bot

B.

None - both Anti-Virus and Anti-Bot are required for this

C.

Anti-Virus

D.

None - both URL Filtering and Anti-Virus are required for this.

Full Access
Question # 85

Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?

A.

All options stop Check Point processes

B.

backup

C.

migrate export

D.

snapshot

Full Access
Question # 86

How do logs change when the "Accounting" tracking option is enabled on a traffic rule?

A.

Involved traffic logs will be forwarded to a log server.

B.

Provides log details view email to the Administrator.

C.

Involved traffic logs are updated every 10 minutes to show how much data has passed on the connection.

D.

Provides additional information to the connected user.

Full Access
Question # 87

Fill in the blanks: A Check Point software license consists of a__________ and _______.

A.

Software blade; software container

B.

Software package: signature

C.

Signature; software blade

D.

Software container software package

Full Access
Question # 88

Security Zones do no work with what type of defined rule?

A.

Application Control rule

B.

Manual NAT rule

C.

IPS bypass rule

D.

Firewall rule

Full Access
Go to page: