Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

156-215.81 Exam Dumps - Check Point Certified Security Administrator R81.20 CCSA (156-215.81.20)

Go to page:
Question # 97

Which statement describes what Identity Sharing is in Identity Awareness?

A.

Management servers can acquire and share identities with Security Gateways

B.

Users can share identities with other users

C.

Security Gateways can acquire and share identities with other Security Gateways

D.

Administrators can share identifies with other administrators

Full Access
Question # 98

Identity Awareness allows easy configuration for network access and auditing based on what three items?

A.

Client machine IP address.

B.

Network location, the identity of a user and the identity of a machine.

C.

Log server IP address.

D.

Gateway proxy IP address.

Full Access
Question # 99

Fill in the blank: Each cluster, at a minimum, should have at least ___________ interfaces.

A.

Five

B.

Two

C.

Three

D.

Four

Full Access
Question # 100

Consider the Global Properties following settings:

The selected option “Accept Domain Name over UDP (Queries)” means:

A.

UDP Queries will be accepted by the traffic allowed only through interfaces with external anti-spoofing topology and this will be done before first explicit rule written by Administrator in a Security Policy.

B.

All UDP Queries will be accepted by the traffic allowed through all interfaces and this will be done before first explicit rule written by Administrator in a Security Policy.

C.

No UDP Queries will be accepted by the traffic allowed through all interfaces and this will be done before first explicit rule written by Administrator in a Security Policy.

D.

All UDP Queries will be accepted by the traffic allowed by first explicit rule written by Administrator in a Security Policy.

Full Access
Question # 101

You have discovered suspicious activity in your network. What is the BEST immediate action to take?

A.

Create a policy rule to block the traffic.

B.

Create a suspicious action rule to block that traffic.

C.

Wait until traffic has been identified before making any changes.

D.

Contact ISP to block the traffic.

Full Access
Question # 102

What command from the CLI would be used to view current licensing?

A.

license view

B.

fw ctl tab -t license -s

C.

show license -s

D.

cplic print

Full Access
Question # 103

Which information is included in the “Extended Log” tracking option, but is not included in the “Log” tracking option?

A.

file attributes

B.

application information

C.

destination port

D.

data type information

Full Access
Question # 104

Session unique identifiers are passed to the web api using which http header option?

A.

X-chkp-sid

B.

Accept-Charset

C.

Proxy-Authorization

D.

Application

Full Access
Go to page: