Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Checkpoint CCSA R81 156-215.81 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam 156-215.81 Premium Access

View all detail and faqs for the 156-215.81 exam


464 Students Passed

86% Average Score

95% Same Questions
Viewing page 1 out of 13 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?

Options:

A.

Active Directory Query

B.

User Directory Query

C.

Account Unit Query

D.

UserCheck

Questions # 2:

Fill in the blanks: Gaia can be configured using the ____ or ____

Options:

A.

GaiaUI; command line interface (serial console only)

B.

Gaia Interface; Gaia Ultimate Shell

C.

Command line interface; GAiA Portal

D.

Web Ultimate Interface; Gaia Interface (SSH)

Questions # 3:

What is the best sync method in the ClusterXL deployment?

Options:

A.

Use 1 cluster + 1st sync

B.

Use 1 dedicated sync interface

C.

Use 3 clusters + 1st sync + 2nd sync + 3rd sync

D.

Use 2 clusters + 1st sync + 2nd sync

Questions # 4:

The Network Operations Center administrator needs access to Check Point Security devices mostly for troubleshooting purposes. You do not want to give her access to the expert mode, but she still should be able to run tcpdump. How can you achieve this requirement?

Options:

A.

Add tcpdump to CLISH using add command.Create a new access role.Add tcpdump to the role.Create new user with any UID and assign role to the user.

B.

Add tcpdump to CLISH using add command.Create a new access role.Add tcpdump to the role.Create new user with UID 0 and assign role to the user.

C.

Create a new access role.Add expert-mode access to the role.Create new user with UID 0 and assign role to the user.

D.

Create a new access role.Add expert-mode access to the role.Create new user with any UID and assign role to the user.

Questions # 5:

When configuring Spoof Tracking, which tracking actions can an administrator select to be done when spoofed packets are detected?

Options:

A.

Log, send snmp trap, email

B.

Drop packet, alert, none

C.

Log, alert, none

D.

Log, allow packets, email

Questions # 6:

The SIC Status “Unknown” means

Options:

A.

There is connection between the gateway and Security Management Server but it is not trusted.

B.

The secure communication is established.

C.

There is no connection between the gateway and Security Management Server.

D.

The Security Management Server can contact the gateway, but cannot establish SIC.

Questions # 7:

Which Threat Prevention Software Blade provides protection from malicious software that can infect your network computers? (Choose the best answer.)

Options:

A.

IPS

B.

Anti-Virus

C.

Anti-Malware

D.

Content Awareness

Questions # 8:

Where is the “Hit Count” feature enabled or disabled in SmartConsole?

Options:

A.

On the Policy Package

B.

On each Security Gateway

C.

On the Policy layer

D.

In Global Properties for the Security Management Server

Questions # 9:

To ensure that VMAC mode is enabled, which CLI command you should run on all cluster members? Choose the best answer.

Options:

A.

fw ctl set int fwha vmac global param enabled

B.

fw ctl get int fwha vmac global param enabled; result of command should return value 1

C.

cphaprob –a if

D.

fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1

Questions # 10:

Which of the following is NOT a policy type available for each policy package?

Options:

A.

Threat Emulation

B.

Access Control

C.

Desktop Security

D.

Threat Prevention

Viewing page 1 out of 13 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.