Free 156-215.81 Exam Braindumps

Pass your Check Point Certified Security Administrator R81 exam with these free Questions and Answers

Page 15 of 74
QUESTION 66

When connected to the Check Point R80 Management Server using the SmartConsole the first administrator to connect has a lock on:

  1. A. Only the objects being modified in the Management Database and other administrators can connect to make changes using a special session as long as they all connect from the same LAN network.
  2. B. The entire Management Database and other administrators can connect to make changes only if the first administrator switches to Read-only.
  3. C. The entire Management Database and all sessions and other administrators can connect only as Read-only.
  4. D. Only the objects being modified in his session of the Management Database and other administrators can connect to make changes using different sessions.

Correct Answer: D

QUESTION 67

Which statement is NOT TRUE about Delta synchronization?

  1. A. Using UDP Multicast or Broadcast on port 8161
  2. B. Using UDP Multicast or Broadcast on port 8116
  3. C. Quicker than Full sync
  4. D. Transfers changes in the Kernel tables between cluster members

Correct Answer: A

QUESTION 68

What licensing feature is used to verify licenses and activate new licenses added to the License and Contracts repository?

  1. A. Verification tool
  2. B. Verification licensing
  3. C. Automatic licensing
  4. D. Automatic licensing and Verification tool

Correct Answer: D

QUESTION 69

The _________ software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware.

  1. A. Next Generation Threat Prevention
  2. B. Next Generation Threat Emulation
  3. C. Next Generation Threat Extraction
  4. D. Next Generation Firewall

Correct Answer: B

QUESTION 70

There are four policy types available for each policy package. What are those policy types?

  1. A. Access Control, Threat Prevention, Mobile Access and HTTPS Inspection
  2. B. Access Control, Custom Threat Prevention, Autonomous Threat Prevention and HTTPS Inspection
  3. C. There are only three policy types: Access Control, Threat Prevention and NAT.
  4. D. Access Control, Threat Prevention, NAT and HTTPS Inspection

Correct Answer: D
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide

Page 15 of 74

Post your Comments and Discuss CheckPoint 156-215.81 exam with other Community members: