DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Prepare Confidently for the Check Point 156-215.81 Exam with Practice Questions

SPOTO's Check Point 156-215.81 practice questions are a vital resource for candidates aiming to succeed in their exams. These practice tests are meticulously crafted to mirror the actual exam format, providing a comprehensive set of exam questions and answers that cover key topics required for the Check Point Certified Security Administrator R81 certification. By regularly engaging with SPOTO's practice questions and mock exams, candidates can enhance their understanding of Check Point security concepts and strengthen their exam preparation. SPOTO's extensive study materials and exam resources offer candidates the support they need to pass the exam successfully. With SPOTO's guidance, candidates can approach the exam with confidence and demonstrate their expertise in Check Point security administration.
Take other online exams

Question #1
After a new Log Server is added to the environment and the SIC trust has been established with the SMS what will the gateways do?
A. Gateways will send new firewall logs to the new Log Server as soon as the SIC trust is set up between the SMS and the new Log Server
B. Logs are not automatically forwarded to a new Log Server
C. The firewalls will detect the new Log Server after the next policy install and redirect the new logs to the new Log Server
D. The gateways can only send logs to an SMS and cannot send logs to a Log Server
View answer
Correct Answer: B

View The Updated 156-215.81 Exam Questions

SPOTO Provides 100% Real 156-215.81 Exam Questions for You to Pass Your 156-215.81 Exam!

Question #2
The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?
A. ecure Internal Communication (SIC)
B. estart Daemons if they fail
C. ransfer messages between Firewall processes
D. ulls application monitoring status
View answer
Correct Answer: D
Question #3
Which is the correct order of a log flow processed by SmartEvent components:
A. irewall > Correlation Unit > Log Server > SmartEvent Server Database > SmartEvent Client
B. irewall > SmartEvent Server Database > Correlation Unit > Log Server > SmartEvent Client
C. irewall > Log Server > SmartEvent Server Database > Correlation Unit > SmartEvent Client
D. irewall > Log Server > Correlation Unit > SmartEvent Server Database > SmartEvent Client
View answer
Correct Answer: D
Question #4
Fill in the blanks: A security Policy is created in _________ , stored in the _________ , and Distributed to the various __________ .
A. ule base, Security Management Server, Security Gateways
B. martConsole, Security Gateway, Security Management Servers
C. martConsole, Security Management Server, Security Gateways
D. he Check Point database, SmartConsole, Security Gateways
View answer
Correct Answer: C
Question #5
By default, which port is used to connect to the GAiA Portal?
A. 4434
B. 80
C. 8080
D. 443
View answer
Correct Answer: D
Question #6
Your bank's distributed R77 installation has Security Gateways up for renewal. Which SmartConsole application will tell you which Security Gateways have licenses that will expire within the next 30 days?
A. martView Tracker
B. martPortal
C. martUpdate
D. martDashboard
View answer
Correct Answer: C
Question #7
Which command can you use to verify the number of active concurrent connections?
A. w conn all
B. w ctl pst pstat
C. how all connections
D. how connections
View answer
Correct Answer: B
Question #8
A Cleanup rule:
A. ogs connections that would otherwise be dropped without logging by default
B. rops packets without logging connections that would otherwise be dropped and logged by default
C. ogs connections that would otherwise be accepted without logging by default
D. rops packets without logging connections that would otherwise be accepted and logged by default
View answer
Correct Answer: A
Question #9
Which command shows detailed information about VPN tunnels?
A. cat $FWDIR/conf/vpn
B. vpn tu tlist
C. vpn tu
D. cpview
View answer
Correct Answer: B
Question #10
Which firewall daemon is responsible for the FW CLI commands?
A. wd
B. wm
C. pm
D. pd
View answer
Correct Answer: A
Question #11
What kind of NAT enables Source Port Address Translation by default?
A. Automatic Hide NAT
B. Automatic Static NAT
C. Manual Static NAT
D. Manual Hide NAT
View answer
Correct Answer: A
Question #12
What are types of Check Point APIs available currently as part of R80.10 code?
A. ecurity Gateway API, Management API, Threat Prevention API and Identity Awareness Web Services API
B. anagement API, Threat Prevention API, Identity Awareness Web Services API and OPSEC SDK API
C. SE API, OPSEC SDK API, Threat Prevention API and Policy Editor API
D. PMI API, Management API, Threat Prevention API and Identity Awareness Web Services API
View answer
Correct Answer: B
Question #13
Where does the security administrator activate Identity Awareness within SmartDashboard?
A. ateway Object > General Properties
B. ecurity Management Server > Identity Awareness
C. olicy > Global Properties > Identity Awareness
D. DAP Server Object > General Properties
View answer
Correct Answer: A
Question #14
Your users are defined in a Windows 2008 R2 Active Directory server. You must add LDAP users to a Client Authentication rule. Which kind of user group do you need in the Client Authentication rule in R77?
A. xternal-user group
B. DAP group
C. group with a genetic user
D. ll Users
View answer
Correct Answer: B
Question #15
Which of these statements describes the Check Point ThreatCloud?
A. locks or limits usage of web applications
B. revents or controls access to web sites based on category
C. revents Cloud vulnerability exploits
D. worldwide collaborative security network
View answer
Correct Answer: D
Question #16
Which type of Check Point license ties the package license to the IP address of the Security Management Server?
A. Formal
B. Corporate
C. Central
D. Local
View answer
Correct Answer: C
Question #17
Which of the following is NOT an alert option?
A. ommand line of the Security Management Server or mgmt_cli
B. martConsole and WebUI on the Security Management Server
C. gmt_cli or WebUI on Security Gateway and SmartConsole on the Security Management Server
D. martConsole or mgmt_cli on any computer where SmartConsole is installed
View answer
Correct Answer: B
Question #18
John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned a static IP address 10.0.0.19.John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The cu
A. ohn should lock and unlock his computer
B. nvestigate this as a network connectivity issue
C. he access should be changed to authenticate the user instead of the PC
D. ohn should install the Identity Awareness Agent
View answer
Correct Answer: C
Question #19
During the Check Point Stateful Inspection Process, for packets that do not pass Firewall Kernel Inspection and are rejected by the rule definition, packets are:
A. ropped without sending a negative acknowledgment
B. ropped without logs and without sending a negative acknowledgment
C. ropped with negative acknowledgment
D. ropped with logs and without sending a negative acknowledgment
View answer
Correct Answer: D
Question #20
Which type of Endpoint Identity Agent includes packet tagging and computer authentication?
A. ull
B. ight
C. ustom
D. omplete
View answer
Correct Answer: A
Question #21
What is the potential downside or drawback to choosing the Standalone deployment option instead of the Distributed deployment option?
A. egrades performance as the Security Policy grows in size
B. equires additional Check Point appliances
C. equires additional software subscription
D. ncreases cost
View answer
Correct Answer: A
Question #22
You want to store the GAiA configuration in a file for later reference. What command should you use?
A. rite mem
B. how config -f
C. ave config -o
D. ave configuration
View answer
Correct Answer: D
Question #23
The Firewall kernel is replicated multiple times, therefore:
A. he Firewall kernel only touches the packet if the connection is accelerated
B. he Firewall can run different policies per core
C. he Firewall kernel is replicated only with new connections and deletes itself once the connection times out
D. he Firewall can run the same policy on all cores
View answer
Correct Answer: D
Question #24
What is the command to see cluster status in cli expert mode?
A. w ctl stat
B. lusterXL stat
C. lusterXL status
D. phaprob stat
View answer
Correct Answer: A
Question #25
What port is used for communication to the User Center with SmartUpdate?
A. PMI 200
B. CP 8080
C. TTP 80
D. TTPS 443
View answer
Correct Answer: D
Question #26
Fill in the blank: A _______ is used by a VPN gateway to send traffic as if it were a physical interface.
A. PN Tunnel Interface
B. PN community
C. PN router
D. PN interface
View answer
Correct Answer: A
Question #27
How do you configure an alert in SmartView Monitor?
A. n alert cannot be configured in SmartView Monitor
B. y choosing the Gateway, and Configure Thresholds
C. y right-clicking on the Gateway, and selecting Properties
D. y right-clicking on the Gateway, and selecting System Information
View answer
Correct Answer: B
Question #28
Which backup utility captures the most information and tends to create the largest archives?
A. ackup
B. napshot
C. atabase Revision
D. igrate export
View answer
Correct Answer: B
Question #29
SandBlast has several functional components that work together to ensure that attacks are prevented in real-time. Which the following is NOT part of the SandBlast component?
A. hreat Emulation
B. obile Access
C. ail Transfer Agent
D. hreat Cloud
View answer
Correct Answer: C
Question #30
How do you configure the Security Policy to provide uses access to the Captive Portal through an external (Internet) interface?
A. hange the gateway settings to allow Captive Portal access via an external interface
B. o action is necessary
C. hange the Identity Awareness settings under Global Properties to allow Captive Policy access on all interfaces
D. hange the Identity Awareness settings under Global Properties to allow Captive Policy access for an external interface
View answer
Correct Answer: A
Question #31
Which of the following is NOT a valid application navigation tab in the R80 SmartConsole?
A. anage and Command Line
B. ogs and Monitor
C. ecurity Policies
D. ateway and Servers
View answer
Correct Answer: A
Question #32
What is Consolidation Policy?
A. he collective name of the Security Policy, Address Translation, and IPS Policies
B. he specific Policy written in SmartDashboard to configure which log data is stored in the SmartReporter database
C. he collective name of the logs generated by SmartReporter
D. global Policy used to share a common enforcement policy for multiple Security Gateways
View answer
Correct Answer: B
Question #33
What is the BEST method to deploy Identity Awareness for roaming users?
A. se Office Mode
B. se identity agents
C. hare user identities between gateways
D. se captive portal
View answer
Correct Answer: B
Question #34
Which Check Point software blade monitors Check Point devices and provides a picture of network and security performance?
A. Logging and Status
B. Monitoring
C. Threat Emulation
D. Application Control
View answer
Correct Answer: B
Question #35
In what way are SSL VPN and IPSec VPN different?
A. SL VPN is using HTTPS in addition to IKE, whereas IPSec VPN is clientless
B. SL VPN adds an extra VPN header to the packet, IPSec VPN does not
C. PSec VPN does not support two factor authentication, SSL VPN does support this
D. PSec VPN uses an additional virtual adapter, SSL VPN uses the client network adapter only
View answer
Correct Answer: D
Question #36
What statement is true regarding Visitor Mode?
A. PN authentication and encrypted traffic are tunneled through port TCP 443
B. nly ESP traffic is tunneled through port TCP 443
C. nly Main mode and Quick mode traffic are tunneled on TCP port 443
D. ll VPN traffic is tunneled through UDP port 4500
View answer
Correct Answer: A
Question #37
Please choose correct command syntax to add an "emailserver1" host with IP address 10.50.23.90 using GAiA management CLI?
A. ost name myHost12 ip-address 10
B. gmt add host name ip-address 10
C. dd host name emailserver1 ip-address 10
D. gmt add host name emailserver1 ip-address 10
View answer
Correct Answer: D
Question #38
Fill in the blanks: A, Check Point software license consists of a _______ and _______ .
A. oftware container; software package
B. oftware blade; software container
C. oftware package; signature
D. ignature; software blade
View answer
Correct Answer: B
Question #39
If the first packet of an UDP session is rejected by a security policy, what does the firewall send to the client?
A. othing
B. CP FIN
C. CP RST
D. CMP unreachable
View answer
Correct Answer: A
Question #40
Fill in the blank: A(n) _____ rule is created by an administrator and is located before the first and before last rules in the Rule Base.
A. irewall drop
B. xplicit
C. mplicit accept
D. mplicit drop
E. mplied
View answer
Correct Answer: E
Question #41
Which of the following is NOT an option for internal network definition of Anti-spoofing?
A. pecific \xad derived from a selected object
B. oute-based \xad derived from gateway routing table
C. etwork defined by the interface IP and Net Mask
D. ot-defined
View answer
Correct Answer: B
Question #42
Jack works for a managed service provider and he has been tasked to create 17 new policies for several new customers. He does not have much time. What is the BEST way to do this with R80 security management?
A. reate a text-file with mgmt_cli script that creates all objects and policies
B. reate a text-file with Gaia CLI -commands in order to create all objects and policies
C. reate a text-file with DBEDIT script that creates all objects and policies
D. se Object Explorer in SmartConsole to create the objects and Manage Policies from the menu to create the policies
View answer
Correct Answer: A
Question #43
Using mgmt_cli, what is the correct syntax to import a host object called Server_1 from the CLI?
A. gmt_cli add-host "Server_1" ip_address "10
B. gmt_cli add host name "Server_1" ip_address "10
C. gmt_cli add object-host "Server_1" ip_address "10
D. gmt_cli add object "Server_1" ip_address "10
View answer
Correct Answer: A
Question #44
A client has created a new Gateway object that will be managed at a remote location. When the client attempts to install the Security Policy to the new Gateway object, the object does not appear in the Install On check box. What should you look for?
A. ecure Internal Communications (SIC) not configured for the object
B. Gateway object created using the Check Point > Externally Managed VPN Gateway option from the Network Objects dialog box
C. nti-spoofing not configured on the interfaces on the Gateway object
D. Gateway object created using the Check Point > Secure Gateway option in the network objects, dialog box, but still needs to configure the interfaces for the Security Gateway object
View answer
Correct Answer: B
Question #45
Fill in the blanks: The _____ collects logs and sends them to the _____.
A. Log server; Security Gateway
B. Security Gateways; log server
C. Log server; security management server
D. Security management server; Security Gateway
View answer
Correct Answer: B
Question #46
Which icon in the WebUI indicates that read/write access is enabled?
A. encil
B. adlock
C. ook
D. yeglasses
View answer
Correct Answer: A
Question #47
Which of the following firewall modes DOES NOT allow for Identity Awareness to be deployed?
A. ridge
B. oad Sharing
C. igh Availability
D. ail Open
View answer
Correct Answer: A
Question #48
Which of the following actions do NOT take place in IKE Phase 1?
A. eers agree on encryption method
B. iffie-Hellman key is combined with the key material to produce the symmetrical IPsec key
C. eers agree on integrity method
D. ach side generates a session key from its private key and peer's public key
View answer
Correct Answer: B
Question #49
Which type of Check Point license is tied to the IP address of a specific Security Gateway and cannot be transferred to a gateway that has a different IP address?
A. Formal
B. Central
C. Local
D. Corporate
View answer
Correct Answer: C
Question #50
Mesh and Star are two types of VPN topologies. Which statement below is TRUE about these types of communities?
A. star community requires Check Point gateways, as it is a Check Point proprietary technology
B. n a star community, satellite gateways cannot communicate with each other
C. n a mesh community, member gateways cannot communicate directly with each other
D. n a mesh community, all members can create a tunnel with any other member
View answer
Correct Answer: D
Question #51
Which statement is TRUE of anti-spoofing?
A. nti-spoofing is not needed when IPS software blade is enabled
B. t is more secure to create anti-spoofing groups manually
C. t is BEST Practice to have anti-spoofing groups in sync with the routing table
D. ith dynamic routing enabled, anti-spoofing groups are updated automatically whenever there is a routing change
View answer
Correct Answer: C
Question #52
Which of the following log queries would show only dropped packets with source address of 192.168.1.1 and destination address of 172.26.1.1?
A. 192
B. src:192
C. 192
D. src:192
View answer
Correct Answer: B
Question #53
Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is________ all traffic. However, in the Application Control policy layer, the default action is ________ all traffic.
A. ccept; redirect
B. ccept; drop
C. edirect; drop
D. rop; accept
View answer
Correct Answer: D
Question #54
A digital signature:
A. uarantees the authenticity and integrity of a message
B. utomatically exchanges shared keys
C. ecrypts data to its original form
D. rovides a secure key exchange mechanism over the Internet
View answer
Correct Answer: A
Question #55
Of all the Check Point components in your network, which one changes most often and should be backed up most frequently?
A. Security Management Server
B. Security Gateway
C. SmartConsole
D. SmartManager
View answer
Correct Answer: A
Question #56
The organization's security manager wishes to back up just the Gaia operating system parameters. Which command can be used to back up only Gaia operating system parameters like interface details, Static routes and Proxy ARP entries?
A. how configuration
B. ackup
C. igrate export
D. pgrade export
View answer
Correct Answer: B
Question #57
Customer's R80 management server needs to be upgraded to R80.10. What is the best upgrade method when the management server is not connected to the Internet?
A. xport R80 configuration, clean install R80
B. PUSE online upgrade
C. PUSE offline upgrade
D. martUpdate upgrade
View answer
Correct Answer: C
Question #58
Which of the following is NOT an attribute of packet acceleration?
A. ource address
B. rotocol
C. estination port
D. pplication Awareness
View answer
Correct Answer: D
Question #59
Which Check Point software blade provides protection from zero-day and undiscovered threats?
A. Threat Extraction
B. Threat Emulation
C. Firewall
D. Application Control
View answer
Correct Answer: B
Question #60
Match the following commands to their correct function. Each command has one function only listed.
A. 1>F6; C2>F4; C3>F2; C4>F5
B. 1>F2; C2>F1; C3>F6; C4>F4
C. 1>F2; C2>F4; C3>F1; C4>F5
D. 1>F4; C2>F6; C3>F3; C4>F5
View answer
Correct Answer: A
Question #61
You believe Phase 2 negotiations are failing while you are attempting to configure a site-to- site VPN with one of your firm's business partners. Which SmartConsole application should you use to confirm your suspicious?
A. martDashboard
B. martUpdate
C. martView Status
D. martView Tracker
View answer
Correct Answer: D
Question #62
You have just installed your Gateway and want to analyze the packet size distribution of your traffic with SmartView Monitor.Unfortunately, you get the message:"There are no machines that contain Firewall Blade and SmartView Monitor".What should you do to analyze the packet size distribution of your traffic? Give the BEST answer.
A. urchase the SmartView Monitor license for your Security Management Server
B. nable Monitoring on your Security Management Server
C. urchase the SmartView Monitor license for your Security Gateway
D. nable Monitoring on your Security Gateway
View answer
Correct Answer: D
Question #63
You want to establish a VPN, using certificates. Your VPN will exchange certificates with an external partner. Which of the following activities sh you do first?
A. reate a new logical-server object to represent your partner's CA
B. xchange exported CA keys and use them to create a new server object to represent your partner's Certificate Authority (CA)
C. anually import your partner's Certificate Revocation List
D. anually import your partner's Access Control List
View answer
Correct Answer: B
Question #64
When dealing with policy layers, what two layer types can be utilized?
A. Inbound Layers and Outbound Layers
B. Ordered Layers and Inline Layers
C. Structured Layers and Overlap Layers
D. R81
View answer
Correct Answer: B
Question #65
Which of the following is NOT a policy type available for each policy package?
A. hreat Emulation
B. ccess Control
C. esktop Security
D. hreat Prevention
View answer
Correct Answer: A
Question #66
Which of the following is NOT a back up method?
A. ave backup
B. ystem backup
C. napshot
D. igrate
View answer
Correct Answer: A
Question #67
The technical-support department has a requirement to access an intranet server. When configuring a User Authentication rule to achieve this, which of the following should you remember?
A. ou can only use the rule for Telnet, FTP, SMPT, and rlogin services
B. he Security Gateway first checks if there is any rule that does not require authentication for this type of connection before invoking the Authentication Security Server
C. nce a user is first authenticated, the user will not be prompted for authentication again until logging out
D. ou can limit the authentication attempts in the User Properties' Authentication tab
View answer
Correct Answer: B
Question #68
The default method for destination NAT is _____________, where NAT occurs on the Inbound interface closest to the client.
A. estination side
B. ource side
C. erver side
D. lient side
View answer
Correct Answer: D
Question #69
Check Point Update Service Engine (CPUSE), also known as Deployment Agent [DA], is an advanced and intuitive mechanism for software deployment on Gaia OS.What software packages are supported for deployment?
A. It supports deployments of single HotFixes (HF), and of Major Versions
B. It supports deployments of single HotFixes (HF), of HotFix Accumulators (Jumbo), and of Major Versions
C. It supports deployments of Major Versions and Blink packages only
D. It supports deployments of single HotFixes (HF), of HotFix Accumulators (Jumbo), but not of Major Versions
View answer
Correct Answer: B
Question #70
Fill in the blanks: A ____ license requires an administrator to designate a gateway for attachment whereas a _____ license is automatically attached to a Security Gateway.
A. ormal; corporate
B. ocal; formal
C. ocal; central
D. entral; local
View answer
Correct Answer: D
Question #71
Which of the following is NOT an identity source used for Identity Awareness?
A. emote Access
B. serCheck
C. D Query
D. ADIUS
View answer
Correct Answer: B
Question #72
Why would an administrator see the message below?
A. new Policy Package created on both the Management and Gateway will be deleted and must be packed up first before proceeding
B. new Policy Package created on the Management is going to be installed to the existing Gateway
C. new Policy Package created on the Gateway is going to be installed on the existing Management
D. new Policy Package created on the Gateway and transferred to the management will be overwritten by the Policy Package currently on the Gateway but can be restored from a periodic backup on the Gateway
View answer
Correct Answer: B
Question #73
Your company enforces a strict change control policy. Which of the following would be MOST effective for quickly dropping an attacker's specific active connection?
A. hange the Rule Base and install the Policy to all Security Gateways
B. lock Intruder feature of SmartView Tracker
C. ntrusion Detection System (IDS) Policy install
D. AM \xad Suspicious Activity Rules feature of SmartView Monitor
View answer
Correct Answer: B
Question #74
In which VPN community is a satellite VPN gateway not allowed to create a VPN tunnel with another satellite VPN gateway?
A. entagon
B. ombined
C. eshed
D. tar
View answer
Correct Answer: D
Question #75
Which directory holds the SmartLog index files by default?
A. SMARTLOGDIR/data
B. SMARTLOG/dir
C. FWDIR/smartlog
D. FWDIR/log
View answer
Correct Answer: A
Question #76
What is the difference between an event and a log?
A. vents are generated at gateway according to Event Policy
B. log entry becomes an event when it matches any rule defined in Event Policy
C. vents are collected with SmartWorkflow from Trouble Ticket systems
D. ogs and Events are synonyms
View answer
Correct Answer: B
Question #77
Which one of the following is TRUE?
A. One policy can be either inline or ordered, but not both
B. Inline layer can be defined as a rule action
C. Ordered policy is a sub-policy within another policy
D. Pre-R80 Gateways do not support ordered layers
View answer
Correct Answer: B
Question #78
What is the default shell of Gaia CLI?
A. Read-only
B. Expert
C. Clish
D. Bash
View answer
Correct Answer: C
Question #79
Which Check Point software blade prevents malicious files from entering a network using virus signatures and anomaly-based protections from ThreatCloud?
A. irewall
B. pplication Control
C. nti-spam and Email Security
D. ntivirus
View answer
Correct Answer: D
Question #80
What happens if the identity of a user is known?
A. f the user credentials do not match an Access Role, the system displays the Captive Portal
B. f the user credentials do not match an Access Role, the system displays a sandbox
C. f the user credentials do not match an Access Role, the traffic is automatically dropped
D. f the user credentials match an Access Role, the rule is applied and traffic is accepted or dropped based on the defined action
View answer
Correct Answer: D
Question #81
Joey is using the computer with IP address 192.168.20.13. He wants to access web page "www.CheckPoint.com", which is hosted on Web server with IP address 203.0.113.111. How many rules on Check Point Firewall are required for this connection?
A. wo rules \xad first one for the HTTP traffic and second one for DNS traffic
B. nly one rule, because Check Point firewall is a Packet Filtering firewall
C. wo rules \xad one for outgoing request and second one for incoming replay
D. nly one rule, because Check Point firewall is using Stateful Inspection technology
View answer
Correct Answer: D
Question #82
What are the three types of UserCheck messages?
A. ask, block, and notify
B. block, action, and warn
C. action, inform, and ask
D. inform, ask, and drop
View answer
Correct Answer: D
Question #83
Which of the following is used to initially create trust between a Gateway and Security Management Server?
A. One-time Password
B. Token
C. Certificate
D. Internal Certificate Authority
View answer
Correct Answer: A
Question #84
Which of the following is NOT an authentication scheme used for accounts created through SmartConsole?
A. RADIUS
B. SecurID
C. Check Point password
D. Security questions
View answer
Correct Answer: D
Question #85
When defining QoS global properties, which option below is not valid?
A. eight
B. uthenticated timeout
C. chedule
D. ate
View answer
Correct Answer: C
Question #86
Which limitation of CoreXL is overcome by using (mitigated by) Multi-Queue?
A. here is no traffic queue to be handled
B. everal NICs can use one traffic queue by one CPU
C. ach NIC has several traffic queues that are handled by multiple CPU cores
D. ach NIC has one traffic queue that is handled by one CPU
View answer
Correct Answer: C
Question #87
MyCorp has the following NAT rules. You need to disable the NAT function when Alpha- internal networks try to reach the Google DNS (8.8.8.8) server.What can you do in this case?
A. se manual NAT rule to make an exception
B. se the NAT settings in the Global Properties
C. isable NAT inside the VPN community
D. se network exception in the Alpha-internal network object
View answer
Correct Answer: D
Question #88
Anti-Spoofing is typically set up on which object type?
A. ecurity Gateway
B. ost
C. ecurity Management object
D. etwork
View answer
Correct Answer: A
Question #89
Fill in the blanks: In _____ NAT, Only the _____ is translated.
A. Hide; source
B. Simple; source
C. Static; source
D. Hide; destination
View answer
Correct Answer: A
Question #90
Message digests use which of the following?
A. ES and RC4
B. DEA and RC4
C. SL and MD4
D. HA-1 and MD5
View answer
Correct Answer: D
Question #91
Which of the following is NOT a VPN routing option available in a star community?
A. NMP
B. igh alert
C. ail
D. ser defined alert
View answer
Correct Answer: AD
Question #92
What is the benefit of Manual NAT over Automatic NAT?
A. f you create a new Security Policy, the Manual NAT rules will be transferred to this new policy
B. here is no benefit since Automatic NAT has in any case higher priority over ManualNAT
C. ou have the full control about the priority of the NAT rules
D. n IPSO and GAIA Gateways, it is handled in a Stateful manner
View answer
Correct Answer: C
Question #93
To fully enable Dynamic Dispatcher on a Security Gateway:
A. un fw ctl multik set_mode 9 in Expert mode and then reboot
B. sing cpconfig, update the Dynamic Dispatcher value to "full" under the CoreXL menu
C. dit /proc/interrupts to include multik set_mode 1 at the bottom of the file, save, and reboot
D. un fw ctl multik set_mode 1 in Expert mode and then reboot
View answer
Correct Answer: A
Question #94
Which statement describes what Identity Sharing is in Identity Awareness?
A. anagement servers can acquire and share identities with Security Gateways
B. sers can share identities with other users
C. ecurity Gateways can acquire and share identities with other Security Gateways
D. dministrators can share identifies with other administrators
View answer
Correct Answer: C
Question #95
Which Threat Prevention Software Blade provides protection from malicious software that can infect your network computers? Choose the BEST answer.
A. Anti-Malware
B. Content Awareness
C. Anti-Virus
D. IPS
View answer
Correct Answer: C
Question #96
Fill in the blank: When LDAP is integrated with Check Point Security Management, it is then referred to as _______
A. serCheck
B. ser Directory
C. ser Administration
D. ser Center
View answer
Correct Answer: B
Question #97
On the following picture an administrator configures Identity Awareness:After clicking "Next" the above configuration is supported by:
A. erberos SSO which will be working for Active Directory integration
B. ased on Active Directory integration which allows the Security Gateway to correlate Active Directory users and machines to IP addresses in a method that is completely transparent to the user
C. bligatory usage of Captive Portal
D. he ports 443 or 80 what will be used by Browser-Based and configured Authentication
View answer
Correct Answer: B
Question #98
Which of the following statements about Site-to-Site VPN Domain-based is NOT true?
A. Route-based- The Security Gateways will have a Virtual Tunnel Interface (VTI) for each VPN Tunnel with a peer VPN Gateway
B. Domain-based- VPN domains are pre-defined for all VPN Gateways
C. Domain-based- VPN domains are pre-defined for all VPN Gateways
D. Domain-based- VPN domains are pre-defined for all VPN Gateways
View answer
Correct Answer: B
Question #99
There are 4 ways to use the Management API for creating host object with R80 Management API. Which one is NOT correct?
A. sing Web Services
B. sing Mgmt_cli tool
C. sing CLISH
D. sing SmartConsole GUI console
View answer
Correct Answer: C
Question #100
A Check Point Software license consists of two components, the Software Blade and the Software Container. There are _____ types of Software Containers: _____.
A. Two; Security Management and Endpoint Security
B. Three; Security Management, Security Gateway, and Endpoint Security
C. Three; Security Gateway, Endpoint Security, and Gateway Management
D. Two; Endpoint Security and Security Gateway
View answer
Correct Answer: C
Question #101
You are about to integrate RSA SecurID users into the Check Point infrastructure. What kind of users are to be defined via SmartDashboard?
A. group with generic user
B. ll users
C. DAP Account Unit Group
D. nternal user Group
View answer
Correct Answer: A

View The Updated CheckPoint Exam Questions

SPOTO Provides 100% Real CheckPoint Exam Questions for You to Pass Your CheckPoint Exam!

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: