Check Point 156-215.81.20 Real Exam Questions
The questions for 156-215.81.20 were last updated at Nov 20,2024.
- Exam Code: 156-215.81.20
- Exam Name: Check Point Certified Security Administrator R81.20
- Certification Provider: Check Point
- Latest update: Nov 20,2024
Which of the following is NOT an option to calculate the traffic direction?
- A . Incoming
- B . Internal
- C . External
- D . Outgoing
To enforce the Security Policy correctly, a Security Gateway requires:
- A . a routing table
- B . awareness of the network topology
- C . a Demilitarized Zone
- D . a Security Policy install
Which Threat Prevention Profile is not included by default in R80 Management?
- A . Basic C Provides reliable protection on a range of non-HTTP protocols for servers, with minimal impact on network performance
- B . Optimized C Provides excellent protection for common network products and protocols against recent or popular attacks
- C . Strict C Provides a wide coverage for all products and protocols, with impact on network performance
- D . Recommended C Provides all protection for all common network products and servers, with impact on network performance
SandBlast offers flexibility in implementation based on their individual business needs.
What is an option for deployment of Check Point SandBlast Zero-Day Protection?
- A . Smart Cloud Services
- B . Load Sharing Mode Services
- C . Threat Agent Solution
- D . Public Cloud Services
What is the difference between SSL VPN and IPSec VPN?
- A . IPSec VPN does not require installation of a resident VPN client
- B . SSL VPN requires installation of a resident VPN client
- C . SSL VPN and IPSec VPN are the same
- D . IPSec VPN requires installation of a resident VPN client and SSL VPN requires only an installed Browser
Which of the following is the most secure means of authentication?
- A . Password
- B . Certificate
- C . Token
- D . Pre-shared secret
Using R80 Smart Console, what does a “pencil icon” in a rule mean?
- A . I have changed this rule
- B . Someone else has changed this rule
- C . This rule is managed by check point’s SOC
- D . This rule can’t be changed as it’s an implied rule
Full synchronization between cluster members is handled by Firewall Kernel.
Which port is used for this?
- A . UDP port 265
- B . TCP port 265
- C . UDP port 256
- D . TCP port 256
Which of the following methods can be used to update the trusted log server regarding the policy and configuration changes performed on the Security Management Server?
- A . Save Policy
- B . Install Database
- C . Save session
- D . Install Policy
In R80 Management, apart from using SmartConsole, objects or rules can also be modified using:
- A . 3rd Party integration of CLI and API for Gateways prior to R80.
- B . A complete CLI and API interface using SSH and custom CPCode integration.
- C . 3rd Party integration of CLI and API for Management prior to R80.
- D . A complete CLI and API interface for Management with 3rd Party integration.