Fill in the blank RADIUS Accounting gets_____data from requests generated by the accounting client
A. Location
B. Payload
C. Destination
D. Identity
Correct Answer: D
RADIUS Accounting gets identity data from requests generated by the accounting client. RADIUS Accounting is a feature that allows tracking and measuring resource usage of network services by users. The accounting client, which is usually a network access server (NAS), sends accounting requests to a RADIUS server with information about user sessions, such as start and stop times, bytes transmitted and received, IP addresses, etc. The RADIUS server records this information in a database for billing, auditing, or reporting purposes. One of the mandatory attributes that the accounting client must include in every accounting request is the User-Name attribute, which identifies the user who is accessing the network service.
Question 152:
How do logs change when the "Accounting" tracking option is enabled on a traffic rule?
A. Involved traffic logs will be forwarded to a log server.
B. Provides log details view email to the Administrator.
C. Involved traffic logs are updated every 10 minutes to show how much data has passed on the connection.
D. Provides additional information to the connected user.
Correct Answer: C
The Accounting tracking option is used to monitor the amount of data that passes through a connection. When this option is enabled on a traffic rule, the involved traffic logs are updated every 10 minutes to show how much data has passed on the connection. This information can be used for billing or auditing purposes. References: Check Point R81 Logging and Monitoring Administration Guide
Question 153:
Secure Internal Communication (SIC) is handled by what process?
A. CPM
B. HTTPS
C. FWD
D. CPD
Correct Answer: D
Secure Internal Communication (SIC) is handled by the CPD process. CPD is the Check Point Daemon that runs on all Check Point modules and handles internal licensing and SIC operations. SIC is a mechanism that ensures secure communication between Check Point components using certificates and encryption. References: Check Point R81 Security Management Administration Guide
Question 154:
The SIC Status "Unknown" means
A. There is connection between the gateway and Security Management Server but it is not trusted.
B. The secure communication is established.
C. There is no connection between the gateway and Security Management Server.
D. The Security Management Server can contact the gateway, but cannot establish SIC.
Correct Answer: C
The SIC Status "Unknown" means that there is no connection between the gateway and Security Management Server. This can happen if the gateway is down, unreachable, or has not been initialized yet. References: Check Point R81 Security Management Administration Guide, Free Check Point CCSA Sample Questions and Study Guide
Question 155:
Which backup utility captures the most information and tends to create the largest archives?
A. backup
B. snapshot
C. Database Revision
D. migrate export
Correct Answer: B
Snapshot is the backup utility that captures the most information and tends to create the largest archives. Snapshot creates an image of the entire system, including operating system files, configuration files, databases, and logs. It can be used to restore the system in case of a failure or corruption. Backup creates a compressed file that contains configuration files and databases, but not operating system files or logs. It can be used to restore configuration settings and policies. Database Revision creates a backup of only the database files that store policies and objects. It can be used to revert to a previous revision of the database. Migrate export creates a compressed file that contains configuration files, databases, and logs, but not operating system files. It can be used to migrate data from one machine to another with different hardware or software versions.References: [Backup and Restore], [Database Revision Control], [Migrate Tools], [Hewlett Packard Enterprise Support Center]
Question 156:
When a Security Gateways sends its logs to an IP address other than its own, which deployment option is installed?
A. Distributed
B. Standalone
C. Bridge
Correct Answer: A
When a Security Gateway sends its logs to an IP address other than its own, it means that the Security Gateway and the Log Server are installed on different machines. This is a characteristic of a Distributed deployment. Therefore, the correct answer is A
Question 157:
The CDT utility supports which of the following?
A. Major version upgrades to R77.30
B. Only Jumbo HFA's and hotfixes
C. Only major version upgrades to R80.10
D. All upgrades
Correct Answer: D
The CDT utility supports all upgrades, including major version upgrades, Jumbo HFA's, and hotfixes. References: Check Point Upgrade Service Engine (CPUSE) - Gaia Deployment Agent
Question 158:
Fill in the blank: In order to install a license, it must first be added to the ____________.
A. User Center
B. Package repository
C. Download Center Web site
D. License and Contract repository
Correct Answer: D
In order to install a license, it must first be added to the License and Contract repository. The License and Contract repository is a centralized database that stores all the licenses and contracts for Check Point products. It allows you to manage, activate, and attach licenses to your Check Point products. References: Check Point Security Management Administration Guide R81, p. 19-20
Question 159:
Which of the following is NOT an option to calculate the traffic direction?
A. Incoming
B. Internal
C. External
D. Outgoing
Correct Answer: D
The options to calculate the traffic direction are Incoming, Internal, and External. Outgoing is not an option. Incoming traffic is traffic that enters the Security Gateway from an external network. Internal traffic is traffic that originates and terminates in networks that are directly connected to the Security Gateway. External traffic is traffic that originates or terminates in networks that are not directly connected to the Security Gateway. References: Check Point R81 Security Management Administration Guide
Question 160:
Please choose correct command syntax to add an "emailserver" host with IP address 10.50.23.90 using GAiA management CLI?
A. hostname myHost ip-address 10.50.23.90
B. mgmt add host name ip-address 10.50.23.90
C. add host name emailserver ip-address 10.50.23.90
D. mgmt add host name emailserver ip-address 10.50.23.90
Correct Answer: D
The correct syntax for adding a host using GAiA management CLI is mgmt add host name ip-address . References: Check Point GAiA R81 Command Line Interface Reference Guide
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CheckPoint exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 156-215.81 exam preparations and CheckPoint certification application, do not hesitate to visit our Vcedump.com to find your solutions here.