Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the Checkpoint CCSA R81 156-215.81 Questions and answers with ValidTests

Exam 156-215.81 All Questions
Exam 156-215.81 Premium Access

View all detail and faqs for the 156-215.81 exam

Viewing page 3 out of 13 pages
Viewing questions 21-30 out of questions
Questions # 21:

Fill in the blanks: Gaia can be configured using the ____ or ____

Options:

A.

GaiaUI; command line interface (serial console only)

B.

Gaia Interface; Gaia Ultimate Shell

C.

Command line interface; GAiA Portal

D.

Web Ultimate Interface; Gaia Interface (SSH)

Expert Solution
Questions # 22:

Security Gateway software blades must be attached to what?

Options:

A.

Security Gateway

B.

Security Gateway container

C.

Management server

D.

Management container

Expert Solution
Questions # 23:

Fill in the blank: An Endpoint identity agent uses a ___________ for user authentication.

Options:

A.

Shared secret

B.

Token

C.

Username/password or Kerberos Ticket

D.

Certificate

Expert Solution
Questions # 24:

Fill in the blank: Back up and restores can be accomplished through_________.

Options:

A.

SmartConsole, WebUI, or CLI

B.

WebUI, CLI, or SmartUpdate

C.

CLI, SmartUpdate, or SmartBackup

D.

SmartUpdate, SmartBackup, or SmartConsole

Expert Solution
Questions # 25:

Which of the following is NOT an identity source used for Identity Awareness?

Options:

A.

Remote Access

B.

UserCheck

C.

AD Query

D.

RADIUS

Expert Solution
Questions # 26:

Fill in the blanks: The Application Layer Firewalls inspect traffic through the ______ layer(s) of the TCP/IP model and up to and including the ______ layer.

Options:

A.

Upper; Application

B.

First two; Internet

C.

Lower; Application

D.

First two; Transport

Expert Solution
Questions # 27:

You are going to perform a major upgrade. Which back up solution should you use to ensure your database can be restored on that device?

Options:

A.

backup

B.

logswitch

C.

Database Revision

D.

snapshot

Expert Solution
Questions # 28:

What are the software components used by Autonomous Threat Prevention Profiles in R8I.20 and higher?

Options:

A.

Sandbox, ThreatCloud, Zero Phishing, Sanitization, C&C Protection, JPS, File and URL Reputation

B.

IPS, Threat Emulation and Threat Extraction

C.

Sandbox, ThreatCloud, Sanitization, C&C Protection, IPS

D.

IPS, Anti-Bot, Anti-Virus, SandBlast and Macro Extraction

Expert Solution
Questions # 29:

Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?

Options:

A.

UDP port 265

B.

TCP port 265

C.

UDP port 256

D.

TCP port 256

Expert Solution
Questions # 30:

Which of the following is NOT an advantage to using multiple LDAP servers?

Options:

A.

You achieve a faster access time by placing LDAP servers containing the database at remote sites

B.

You achieve compartmentalization by allowing a large number of users to be distributed across several servers

C.

Information on a user is hidden, yet distributed across several servers.

D.

You gain High Availability by replicating the same information on several servers

Expert Solution
Viewing page 3 out of 13 pages
Viewing questions 21-30 out of questions