Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

156-215.81 Exam Dumps - Check Point Certified Security Administrator R81.20

Go to page:
Question # 65

Which of the following is used to extract state related information from packets and store that information in state tables?

A.

STATE Engine

B.

TRACK Engine

C.

RECORD Engine

D.

INSPECT Engine

Full Access
Question # 66

In R80 Management, apart from using SmartConsole, objects or rules can also be modified using:

A.

3rd Party integration of CLI and API for Gateways prior to R80.

B.

A complete CLI and API interface using SSH and custom CPCode integration.

C.

3rd Party integration of CLI and API for Management prior to R80.

D.

A complete CLI and API interface for Management with 3rd Party integration.

Full Access
Question # 67

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?

A.

Detects and blocks malware by correlating multiple detection engines before users are affected.

B.

Configure rules to limit the available network bandwidth for specified users or groups.

C.

Use UserCheck to help users understand that certain websites are against the company’s security policy.

D.

Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.

Full Access
Question # 68

At what point is the Internal Certificate Authority (ICA) created?

A.

During the primary Security Management Server installation process.

B.

Upon creation of a certificate

C.

When an administrator decides to create one

D.

When an administrator initially logs into SmartConsole.

Full Access
Question # 69

Customer’s R80 management server needs to be upgraded to R80.10. What is the best upgrade method when the management server is not connected to the Internet?

A.

Export R80 configuration, clean install R80.10 and import the configuration

B.

CPUSE online upgrade

C.

CPUSE offline upgrade

D.

SmartUpdate upgrade

Full Access
Question # 70

What is the purpose of the CPCA process?

A.

Monitoring the status of processes

B.

Sending and receiving logs

C.

Communication between GUI clients and the SmartCenter server

D.

Generating and modifying certificates

Full Access
Question # 71

There are four policy types available for each policy package. What are those policy types?

A.

Access Control, Threat Prevention, Mobile Access and HTTPS Inspection

B.

Access Control, Custom Threat Prevention, Autonomous Threat Prevention and HTTPS Inspection

C.

There are only three policy types: Access Control, Threat Prevention and NAT.

D.

Access Control, Threat Prevention, NAT and HTTPS Inspection

Full Access
Question # 72

Fill in the bank: In Office mode, a Security Gateway assigns a remote client to an IP address once___________.

A.

the user connects and authenticates

B.

office mode is initiated

C.

the user requests a connection

D.

the user connects

Full Access
Go to page: