A Check Point Software license consists of two components, the Software Blade and the Software Container. There are ______ types of Software Containers: ________.
A. Two; Security Management and Endpoint Security
B. Two; Endpoint Security and Security Gateway
C. Three; Security Management, Security Gateway, and Endpoint Security
D. Three; Security Gateway, Endpoint Security, and Gateway Management
Correct Answer: C
A Check Point Software license consists of two components, the Software Blade and the Software Container. There are three types of Software Containers: Security Management, Security Gateway, and Endpoint Security. A Software Blade is a specific security function that can be enabled or disabled on a Software Container. A Software Container is a platform that runs one or more Software Blades. Security Management is a container that manages the security policy and configuration of Security Gateways. Security Gateway is a container that enforces the security policy on network traffic. Endpoint Security is a container that protects endpoints from threats and data loss. References: Check Point Licensing and Contract Operations User Guide
Question 282:
URL Filtering cannot be used to:
A. Control Bandwidth issues
B. Control Data Security
C. Improve organizational security
D. Decrease legal liability
Correct Answer: A
URL Filtering is a blade that enables administrators to control access to millions of websites by category, users, groups, and machines. URL Filtering can be used to improve organizational security, decrease legal liability, and control data security by preventing users from accessing malicious or inappropriate websites. However, URL Filtering cannot be used to control bandwidth issues, such as limiting the amount of traffic or prioritizing certain applications over others. For that purpose, other blades such as QoS (Quality of Service) or SecureXL are more suitable. References: Check Point R81 URL Filtering Administration Guide
Question 283:
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?
A. UDP port 265
B. TCP port 265
C. UDP port 256
D. TCP port 256
Correct Answer: B
The port used for full synchronization between cluster members is TCP port 265. This port is used by the Firewall Kernel to send and receive synchronization data, such as connection tables, NAT tables, and VPN keys. UDP port 8116 is used by the Cluster Control Protocol (CCP) for internal communications between cluster members. References: How does the Cluster Control Protocol function in working and failure scenarios for gateway clusters?
Question 284:
Fill in the blank: The _____ feature allows administrators to share a policy with other policy packages.
A. Concurrent policy packages
B. Concurrent policies
C. Global Policies
D. Shared policies
Correct Answer: D
The Shared policies feature allows administrators to share a policy with other policy packages. This can save time and effort when managing multiple gateways with similar security requirements. Shared policies can be applied to Access Control, Threat Prevention, and HTTPS Inspection layers. References: Check Point R81 Security Management Administration Guide, Check Point R81 SmartConsole R81 Resolved Issues
Question 285:
What is the difference between SSL VPN and IPSec VPN?
A. IPSec VPN does not require installation of a resident VPN client
B. SSL VPN requires installation of a resident VPN client
C. SSL VPN and IPSec VPN are the same
D. IPSec VPN requires installation of a resident VPN client and SSL VPN requires only an installed Browser
Correct Answer: D
The difference between SSL VPN and IPSec VPN is that IPSec VPN requires installation of a resident VPN client and SSL VPN requires only an installed browser . IPSec VPN uses a pre-shared key or certificates to authenticate the endpoints and encrypts the data at the network layer. SSL VPN uses SSL/TLS protocols to authenticate the endpoints and encrypts the data at the application layer. References: Check Point Remote Access VPN Administration Guide R81, [Free Check Point CCSA Sample Questions and Study Guide]
Question 286:
Fill in the blank: When LDAP is integrated with Check Point Security Management, it is then referred to as _______.
A. User Center
B. User Administration
C. User Directory
D. UserCheck
Correct Answer: C
When LDAP is integrated with Check Point Security Management, it is then referred to as User Directory. User Directory is a feature that allows you to import users and groups from an external LDAP server and use them in your security policies. User Center, User Administration, and UserCheck are different features that are not related to LDAP integration.References: [User Directory], [LDAP Integration]
Question 287:
Which of the completed statements is NOT true? The WebUI can be used to manage Operating System user accounts and:
A. add users to your Gaia system.
B. assign privileges to users.
C. assign user rights to their home directory in the Security Management Server.
D. edit the home directory of the user.
Correct Answer: C
The WebUI can be used to manage Operating System user accounts and add users to your Gaia system, assign privileges to users, and edit the home directory of the user. However, it cannot assign user rights to their home directory in the Security Management Server. This is done by the SmartConsole. References: Check Point R81 Security Management Administration Guide, page 11.
Question 288:
John is the administrator of a R80 Security Management server managing R77.30 Check Point Security Gateway. John is currently updating the network objects and amending the rules using SmartConsole. To make John's changes available to other administrators, and to save the database before installing a policy, what must John do?
A. Logout of the session
B. File > Save
C. Install database
D. Publish the session
Correct Answer: D
To make John's changes available to other administrators, and to save the database before installing a policy, John must publish the session. Publishing the session saves the changes to the database and makes them visible to other administrators. The other options do not achieve this goal. References: Publishing a Session
Question 289:
Fill in the blank: Each cluster, at a minimum, should have at least ___________ interfaces.
A. Five
B. Two
C. Three
D. Four
Correct Answer: C
Question 290:
Application Control/URL filtering database library is known as:
A. Application database
B. AppWiki
C. Application-Forensic Database
D. Application Library
Correct Answer: B
Application Control/URL filtering database library is known as AppWiki. AppWiki is an application classification and identification database that enables administrators to control access to thousands of applications and millions of websites. References: [Check Point R81 Application Control Administration Guide], [Check Point AppWiki]
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CheckPoint exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 156-215.81 exam preparations and CheckPoint certification application, do not hesitate to visit our Vcedump.com to find your solutions here.