Pre-Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

156-215.81 Exam Dumps - Check Point Certified Security Administrator R81.20 CCSA (156-215.81.20)

Go to page:
Question # 9

Fill in the blank: An Endpoint identity agent uses a ___________ for user authentication.

A.

Shared secret

B.

Token

C.

Username/password or Kerberos Ticket

D.

Certificate

Full Access
Question # 10

An administrator wishes to use Application objects in a rule in their policy but there are no Application objects listed as options to add when clicking the"+" to add new items to the "Services & Applications" column of a rule. What should be done to fix this?

A.

The administrator should drag-and-drop the needed Application objects from the Object Explorer into the new rule

B.

The "Application Control" blade should be enabled on a gateway

C.

"Applications & URL Filtering" should first be enabled on the policy layer where the rule is being created.

D.

The administrator should first create some applications to add to the rule.

Full Access
Question # 11

True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway

A.

True, CLI is the prefer method for Licensing

B.

False, Central License are handled via Security Management Server

C.

False, Central License are installed via Gaia on Security Gateways

D.

True, Central License can be installed with CPLIC command on a Security Gateway

Full Access
Question # 12

What are the advantages of a “shared policy” in R80?

A.

Allows the administrator to share a policy between all the users identified by the Security Gateway

B.

Allows the administrator to share a policy between all the administrators managing the Security Management Server

C.

Allows the administrator to share a policy so that it is available to use in another Policy Package

D.

Allows the administrator to install a policy on one Security Gateway and it gets installed on another managed Security Gateway

Full Access
Question # 13

Fill in the blank: Back up and restores can be accomplished through_________.

A.

SmartConsole, WebUI, or CLI

B.

WebUI, CLI, or SmartUpdate

C.

CLI, SmartUpdate, or SmartBackup

D.

SmartUpdate, SmartBackup, or SmartConsole

Full Access
Question # 14

When should you generate new licenses?

A.

Before installing contract files.

B.

After a device upgrade.

C.

When the existing license expires, license is upgraded or the IP-address associated with the license changes.

D.

Only when the license is upgraded.

Full Access
Question # 15

What are two basic rules Check Point recommending for building an effective security policy?

A.

Accept Rule and Drop Rule

B.

Cleanup Rule and Stealth Rule

C.

Explicit Rule and Implied Rule

D.

NAT Rule and Reject Rule

Full Access
Question # 16

When installing a dedicated R80 SmartEvent server, what is the recommended size of the root partition?

A.

Any size

B.

Less than 20GB

C.

More than 10GB and less than 20 GB

D.

At least 20GB

Full Access
Go to page: