Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

156-215.81 Exam Dumps - Check Point Certified Security Administrator R81.20

Go to page:
Question # 89

What are the three main components of Check Point security management architecture?

A.

SmartConsole, Security Management, and Security Gateway

B.

Smart Console, Standalone, and Security Management

C.

SmartConsole, Security policy, and Logs & Monitoring

D.

GUI-Client, Security Management, and Security Gateway

Full Access
Question # 90

To view the policy installation history for each gateway, which tool would an administrator use?

A.

Revisions

B.

Gateway installations

C.

Installation history

D.

Gateway history

Full Access
Question # 91

Which product correlates logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?

A.

SmartDashboard

B.

SmartEvent

C.

SmartView Monitor

D.

SmartUpdate

Full Access
Question # 92

How many layers make up the TCP/IP model?

A.

2

B.

7

C.

6

D.

4

Full Access
Question # 93

Which option, when applied to a rule, allows traffic to VPN gateways in specific VPN communities?

A.

All Connections (Clear or Encrypted)

B.

Accept all encrypted traffic

C.

Specific VPN Communities

D.

All Site-to-Site VPN Communities

Full Access
Question # 94

What are the Threat Prevention software components available on the Check Point Security Gateway?

A.

IPS, Threat Emulation and Threat Extraction

B.

IPS, Anti-Bot, Anti-Virus, SandBlast and Macro Extraction

C.

IPS, Anti-Bot, Anti-Virus, Threat Emulation and Threat Extraction

D.

IDS, Forensics, Anti-Virus, Sandboxing

Full Access
Question # 95

Which is NOT an encryption algorithm that can be used in an IPSEC Security Association (Phase 2)?

A.

AES-GCM-256

B.

AES-CBC-256

C.

AES-GCM-128

Full Access
Question # 96

Fill in the blanks: The Application Layer Firewalls inspect traffic through the ______ layer(s) of the TCP/IP model and up to and including the ______ layer.

A.

Upper; Application

B.

First two; Internet

C.

Lower; Application

D.

First two; Transport

Full Access
Go to page: