Free 156-215.81 Exam Braindumps

Pass your Check Point Certified Security Administrator R81 exam with these free Questions and Answers

Page 13 of 74
QUESTION 56

The Online Activation method is available for Check Point manufactured appliances. How does the administrator use the Online Activation method?

  1. A. The SmartLicensing GUI tool must be launched from the SmartConsole for the Online Activation tool to start automatically.
  2. B. No action is required if the firewall has internet access and a DNS server to resolve domain names.
  3. C. Using the Gaia First Time Configuration Wizard, the appliance connects to the Check Point User Center and downloads all necessary licenses and contracts.
  4. D. The cpinfo command must be run on the firewall with the switch -online-license-activation.

Correct Answer: C
"Online activation: this method of activation is available for Check Point manufactured appliances. These appliances should be configured to have internet connectivity during the completion of the First Time Configuration Wizard for software version R77 and below. Customers using R80 and higher will be able to use this feature during or after the completion of the First Time Configuration Wizard."
https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=s

QUESTION 57

Which is NOT an encryption algorithm that can be used in an IPSEC Security Association (Phase 2)?

  1. A. AES-GCM-256
  2. B. AES-CBC-256
  3. C. AES-GCM-128

Correct Answer: B

QUESTION 58

Choose what BEST describes the reason why querying logs now is very fast.

  1. A. New Smart-1 appliances double the physical memory install
  2. B. Indexing Engine indexes logs for faster search results
  3. C. SmartConsole now queries results directly from the Security Gateway
  4. D. The amount of logs been store is less than the usual in older versions

Correct Answer: B
Ref: https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_LoggingAndMonitoring_Ad

QUESTION 59

A Check Point Software license consists of two components, the Software Blade and the Software Container. There are _____ types of Software Containers: _________ .

  1. A. Two; Security Management and Endpoint Security
  2. B. Two; Endpoint Security and Security Gateway
  3. C. Three; Security Management, Security Gateway, and Endpoint Security
  4. D. Three; Security Gateway, Endpoint Security, and Gateway Management

Correct Answer: C
There are three types of Software Containers: Security Management, Security Gateway, and Endpoint Security. Ref: https://downloads.checkpoint.com/dc/download.htm?ID=11608

QUESTION 60

Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ________ .

  1. A. Captive Portal and Transparent Kerberos Authentication
  2. B. UserCheck
  3. C. User Directory
  4. D. Captive Portal

Correct Answer: A
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/T

Page 13 of 74

Post your Comments and Discuss CheckPoint 156-215.81 exam with other Community members: