必ず合格できるCheckPoint 156-215.81試験の正確な402問題と解答あります [Q25-Q46]

Share

必ず合格できるCheckPoint 156-215.81試験の正確な402問題と解答あります

最新 [2023年10月21日]2023年最新の実際にある検証済みの156-215.81問題集

質問 # 25
The CDT utility supports which of the following?

  • A. Only major version upgrades to R81.10
  • B. Major version upgrades to R77.30
  • C. All upgrades
  • D. Only Jumbo HFA's and hotfixes

正解:C


質問 # 26
As you review this Security Policy, what changes could you make to accommodate Rule 4?

  • A. Modify the columns Source or Destination in Rule 4
  • B. Nothing at all
  • C. Modify the column VPN in Rule 2 to limit access to specific traffic.
  • D. Remove the service HTTP from the column Service in Rule 4.

正解:C


質問 # 27
Session unique identifiers are passed to the web api using which http header option?

  • A. X-chkp-sid
  • B. Application
  • C. Proxy-Authorization
  • D. Accept-Charset

正解:C


質問 # 28
In which deployment is the security management server and Security Gateway installed on the same appliance?

  • A. Bridge Mode
  • B. Standalone
  • C. Remote
  • D. Distributed

正解:B

解説:
Explanation
A standalone deployment is when the security management server and Security Gateway are installed on the same appliance. This is suitable for small or branch office environments1


質問 # 29
John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, gateway policy permits access only from Join's desktop which is assigned an IP address 10.0.0.19 via DHCP.
John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but the limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop. He wants to move around the organization and continue to have access to the HR Web Server.
To make this scenario work, the IT administrator:
1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources.
2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.
John plugged in his laptop to the network on a different network segment and he is not able to connect. How does he solve this problem?

  • A. John should lock and unlock the computer
  • B. Investigate this as a network connectivity issue
  • C. John should install the identity Awareness Agent
  • D. The firewall admin should install the Security Policy

正解:A


質問 # 30
The competition between stateful inspection and proxies was based on performance, protocol support, and security. Considering stateful Inspections and Proxies, which statement is correct?

  • A. When it comes to performance, proxies were significantly faster than stateful inspection firewalls.
  • B. When it comes to performance, stateful inspection was significantly faster than proxies.
  • C. Stateful Inspection is limited to Layer 3 visibility, with no Layer 4 to Layer 7 visibility capabilities.
  • D. Proxies offer far more security because of being able to give visibility of the payload (the data).

正解:B


質問 # 31
You are the Check Point administrator for Alpha Corp. You received a call that one of the users is unable to browse the Internet on their new tablet which is connected to the company wireless, which goes through a Check Point Gateway.
How would you review the logs to see what is blocking this traffic?

  • A. Open SmartDashboard and review the logs tab
  • B. From SmartConsole, go to the Log & Monitor and filter for the IP address of the tablet.
  • C. Open SmartLog and connect remotely to the wireless controller
  • D. Open SmartEvent to see why they are being blocked

正解:B


質問 # 32
Which of the following is NOT a valid deployment option for R80?

  • A. SmartEvent
  • B. Multi-domain management server
  • C. All-in-one (stand-alone)
  • D. Log server

正解:B

解説:
Explanation
Multi-domain management server is a valid deployment option for R81, not R80. R80 supports multi-domain security management, which is a centralized management solution for large-scale, distributed environments with many different domain networks1. References: Multi-Domain Security Management Administration Guide R80


質問 # 33
You have discovered suspicious activity in your network. What is the BEST immediate action to take?

  • A. Contact ISP to block the traffic.
  • B. Wait until traffic has been identified before making any changes.
  • C. Create a policy rule to block the traffic.
  • D. Create a suspicious action rule to block that traffic.

正解:D


質問 # 34
By default, which port does the WebUI listen on?

  • A. 0
  • B. 1
  • C. 2
  • D. 3

正解:D

解説:
Explanation
By default, the WebUI listens on port 80. The WebUI is a web-based interface that allows administrators to configure and monitor Gaia OS settings and features from a web browser. The WebUI uses the HTTP protocol to communicate with the Gaia machine, which by default uses port 80 as the standard port number. The other port numbers are not used by the WebUI by default, but they can be changed by modifying the Gaia configuration file or using CLISH commands.


質問 # 35
What are the three main components of Check Point security management architecture?

  • A. SmartConsole, Security policy, and Logs & Monitoring
  • B. GUI-Client, Security Management, and Security Gateway
  • C. SmartConsole, Security Management, and Security Gateway
  • D. Smart Console, Standalone, and Security Management

正解:C

解説:
Explanation
The three main components of Check Point security management architecture are SmartConsole, Security Management, and Security Gateway5. SmartConsole is the graphical user interface that allows administrators to manage and monitor Check Point products. Security Management is the server that stores the security policy and configuration data. Security Gateway is the device that enforces the security policy on the network traffic.
References: Check Point R81 Security Management Administration Guide


質問 # 36
An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office. Both offices are protected by Check Point Security Gateway managed by the same Security Management Server (SMS). While configuring the VPN community to specify the pre-shared secret, the administrator did not find a box to input the pre-shared secret. Why does it not allow him to specify the pre-shared secret?

  • A. The Gateway is an SMB device
  • B. Pre-shared secret is already configured in Global Properties
  • C. Certificate based Authentication is the only authentication method available between two Security Gateway managed by the same SMS
  • D. The checkbox "Use only Shared Secret for all external members" is not checked

正解:C


質問 # 37
When configuring Anti-Spoofing, which tracking options can an Administrator select?

  • A. Log, Send SNMP Trap, Email
  • B. Log, Allow Packets, Email
  • C. Log, Alert, None
  • D. Drop Packet, Alert, None

正解:C


質問 # 38
Name the file that is an electronically signed file used by Check Point to translate the features in the license into a code?

  • A. Contract file (.xml)
  • B. Both License (.lic) and Contract (.xml) files
  • C. license File (.lie)
  • D. cp.macro

正解:D

解説:
Explanation
The file that is an electronically signed file used by Check Point to translate the features in the license into a code is cp.macro. This file contains a list of macros that define the license features and their values. It is located in the $FWDIR/conf directory on the Security Management Server or Security Gateway.References:
[Check Point R81 Licensing Guide], [Check Point R80.40 Licensing Guide]


質問 # 39
What Check Point technologies deny or permit network traffic?

  • A. ACL, SandBlast, MPT
  • B. Packet Filtering, Stateful Inspection, Application Layer Firewall.
  • C. Application Control, DLP
  • D. IPS, Mobile Threat Protection

正解:B

解説:
Explanation
Check Point technologies that deny or permit network traffic are packet filtering, stateful inspection, and application layer firewall1, p. 15-16. Packet filtering is a basic firewall technique that examines packets based on their source and destination addresses and ports2, p. 13. Stateful inspection is an advanced firewall technique that tracks the state and context of network connections and inspects packets based on their content and sequence2, p. 13. Application layer firewall is a firewall technique that operates at the application layer of the OSI model and inspects packets based on their application protocols and data2, p. 14. References: Check Point CCSA - R81: Practice Test & Explanation, 156-315.81 Checkpoint Exam Info and Free Practice Test


質問 # 40
Which option in a firewall rule would only match and allow traffic to VPN gateways for one Community in common?

  • A. Specific VPN Communities
  • B. All Site-to-Site VPN Communities
  • C. Accept all encrypted traffic
  • D. All Connections (Clear or Encrypted)

正解:A


質問 # 41
Which of the following is NOT an identity source used for Identity Awareness?

  • A. UserCheck
  • B. RADIUS
  • C. Remote Access
  • D. AD Query

正解:A


質問 # 42
When defining group-based access in an LDAP environment with Identity Awareness, what is the BEST object type to represent an LDAP group in a Security Policy?

  • A. Access Role
  • B. User Group
  • C. SmartDirectory Group
  • D. Group Template

正解:A


質問 # 43
Identify the API that is not supported by Check Point currently.

  • A. Open REST API
  • B. OPSEC SDK
  • C. Identity Awareness Web Services API
  • D. R81 Management API-

正解:A


質問 # 44
True or False: More than one administrator can log into the Security Management Server with SmartConsole with write permission at the same time.

  • A. True, every administrator works on a different database that Is independent of the other administrators
  • B. False, only one administrator can login with write permission
  • C. True, every administrator works in a session that is independent of the other administrators
  • D. False, this feature has to be enabled in the Global Properties.

正解:C

解説:
Explanation
SmartConsole is a unified graphical user interface that allows administrators to manage multiple Check Point security products from a single console. More than one administrator can log into the Security Management Server with SmartConsole with write permission at the same time. Every administrator works in a session that is independent of the other administrators. The changes made by one administrator are not visible to others until they are published2. References: Check Point R81 SmartConsole R81 User Guide


質問 # 45
What is UserCheck?

  • A. Communication tool used to notify an administrator when a new user is created
  • B. Administrator tool used to monitor users on their network
  • C. Communication tool used to inform a user about a website or application they are trying to access
  • D. Messaging tool user to verify a user's credentials

正解:C


質問 # 46
......

無料でゲット!2023年最新のに更新されたCheckPoint 156-215.81試験問題と解答:https://www.jpntest.com/shiken/156-215.81-mondaishu

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡