156-215.81問題集には練習試験問題解答 [Q86-Q111]

Share

156-215.81問題集には練習試験問題解答

156-215.81はCheckPoint Certification実際の無料試験練習テスト

質問 86
Where is the "Hit Count" feature enabled or disabled in SmartConsole?

  • A. On the Policy layer
  • B. On the Policy Package
  • C. On each Security Gateway
  • D. In Global Properties for the Security Management Server

正解: C

 

質問 87
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?

  • A. None, Security Management Server would be installed by itself.
  • B. SecureClient
  • C. SmartEvent
  • D. SmartConsole

正解: C

 

質問 88
When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?

  • A. AD Query
  • B. RADIUS
  • C. Remote Access and RADIUS
  • D. AD Query and Browser-based Authentication

正解: D

解説:
Identity Awareness gets identities from these acquisition sources:

 

質問 89
Fill in the blanks: There are ________ types of software containers ________.

  • A. Two; endpoint security and Security Gateway
  • B. Two; security management and endpoint security
  • C. Three; security management, Security Gateway, and endpoint security
  • D. Three; Security gateway, endpoint security, and gateway management

正解: C

解説:
There are three types of Software Containers: Security Management, Security Gateway, and Endpoint Security.

 

質問 90
Choose what BEST describes users on Gaia Platform.

  • A. There is one default user that cannot be deleted.
  • B. There are two default users and one cannot be deleted.
  • C. There are two default users that cannot be deleted and one SmartConsole Administrator.
  • D. There is one default user that can be deleted.

正解: B

解説:
These users are created by default and cannot be deleted:

 

質問 91
During the Check Point Stateful Inspection Process, for packets that do not pass Firewall Kernel Inspection and are rejected by the rule definition, packets are:

  • A. Dropped without logs and without sending a negative acknowledgment
  • B. Dropped with negative acknowledgment
  • C. Dropped with logs and without sending a negative acknowledgment
  • D. Dropped without sending a negative acknowledgment

正解: C

 

質問 92
What two ordered layers make up the Access Control Policy Layer?

  • A. Network and Threat Prevention
  • B. Application Control and URL Filtering
  • C. Network and Application Control
  • D. URL Filtering and Network

正解: C

 

質問 93
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.

  • A. Asymmetric routing
  • B. Anti-Spoofing
  • C. Symmetric routing
  • D. Failovers

正解: D

 

質問 94
Fill in the blank: Once a license is activated, a ________ should be installed.

  • A. Service Contract file
  • B. License Contract file
  • C. Security Gateway Contract file
  • D. License Management file

正解: A

解説:
Service Contract File
Following the activation of the license, a Service Contract File should be installed. This file contains important information about all subscriptions purchased for a specific device and is installed via SmartUpdate. A detailed of the Service Contract File can be found in sk33089.

 

質問 95
In SmartView Tracker, which rule shows when a packet is dropped due to anti-spoofing?

  • A. Cleanup Rule
  • B. Rule 1
  • C. Blank field under Rule Number
  • D. Rule 0

正解: D

 

質問 96
True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway

  • A. False, Central License are installed via Gaia on Security Gateways
  • B. False, Central License are handled via Security Management Server
  • C. True, CLI is the prefer method for Licensing
  • D. True, Central License can be installed with CPLIC command on a Security Gateway

正解: D

 

質問 97
What is the SOLR database for?

  • A. Enables powerful matching capabilities and writes data to the database
  • B. Writes data to the database and full text search
  • C. Serves GUI responsible to transfer request to the DLE server
  • D. Used for full text search and enables powerful matching capabilities

正解: D

 

質問 98
Which of the following is NOT a back up method?

  • A. snapshot
  • B. Migrate
  • C. System backup
  • D. Save backup

正解: D

解説:
The built-in Gaia backup procedures:
Check Point provides three different procedures for backing up (and restoring) the operating system and networking parameters on your appliances.

 

質問 99
Mesh and Star are two types of VPN topologies. Which statement below is TRUE about these types of communities?

  • A. In a star community, satellite gateways cannot communicate with each other.
  • B. A star community requires Check Point gateways, as it is a Check Point proprietary technology.
  • C. In a mesh community, all members can create a tunnel with any other member.
  • D. In a mesh community, member gateways cannot communicate directly with each other.

正解: C

 

質問 100
Identity Awareness allows the Security Administrator to configure network access based on which of the following?

  • A. Network location, identity of a user, and identity of a machine
  • B. Name of the application, identity of the user, and identity of the machine
  • C. Identity of the machine, username, and certificate
  • D. Browser-Based Authentication, identity of a user, and network location

正解: A

 

質問 101
When should you generate new licenses?

  • A. Before installing contract files.
  • B. When the existing license expires, license is upgraded or the IP-address where the license is tied changes.
  • C. Only when the license is upgraded.
  • D. After an RMA procedure when the MAC address or serial number of the appliance changes.

正解: D

 

質問 102
True or False: In R80, more than one administrator can login to the Security Management Server with write permission at the same time.

  • A. False, only one administrator can login with write permission.
  • B. True, every administrator works in a session that is independent of the other administrators.
  • C. True, every administrator works on a different database that is independent of the other administrators.
  • D. False, this feature has to be enabled in the Global Properties.

正解: B

解説:
More than one administrator can connect to the Security Management Server at the same time. Every administrator has their own username, and works in a session that is independent of the other administrators.

 

質問 103
Which component functions as the Internal Certificate Authority for R77?

  • A. SmartLSM
  • B. Management Server
  • C. Policy Server
  • D. Security Gateway

正解: B

 

質問 104
What is the difference between an event and a log?

  • A. A log entry becomes an event when it matches any rule defined in Event Policy
  • B. Logs and Events are synonyms
  • C. Events are collected with SmartWorkflow from Trouble Ticket systems
  • D. Events are generated at gateway according to Event Policy

正解: A

 

質問 105
When connected to the Check Point R80 Management Server using the SmartConsole the first administrator to connect has a lock on:

  • A. Only the objects being modified in the Management Database and other administrators can connect to make changes using a special session as long as they all connect from the same LAN network.
  • B. The entire Management Database and all sessions and other administrators can connect only as Read-only.
  • C. The entire Management Database and other administrators can connect to make changes only if the first administrator switches to Read-only.
  • D. Only the objects being modified in his session of the Management Database and other administrators can connect to make changes using different sessions.

正解: D

 

質問 106
What is the appropriate default Gaia Portal address?

  • A. HTTPS://[IPADDRESS]
  • B. HTTP://[IPADDRESS]
  • C. HTTPS://[IPADDRESS]:4434
  • D. HTTPS://[IPADDRESS]:8080

正解: A

 

質問 107
Which of the following is NOT defined by an Access Role object?

  • A. Source Machine
  • B. Source Network
  • C. Source User
  • D. Source Server

正解: D

 

質問 108
Which of the following is NOT a valid deployment option for R80?

  • A. Bridge Mode
  • B. Distributed
  • C. CloudGuard
  • D. All-in-one (stand-alone)

正解: C

 

質問 109
Fill in the blanks: A security Policy is created in _________ , stored in the _________ , and Distributed to the various __________ .

  • A. SmartConsole, Security Gateway, Security Management Servers
  • B. SmartConsole, Security Management Server, Security Gateways
  • C. The Check Point database, SmartConsole, Security Gateways
  • D. Rule base, Security Management Server, Security Gateways

正解: B

 

質問 110
What is the command to see cluster status in cli expert mode?

  • A. clusterXL status
  • B. clusterXL stat
  • C. fw ctl stat
  • D. cphaprob stat

正解: C

 

質問 111
......


CheckPoint 156-215.81 認定試験の出題範囲:

トピック出題範囲
トピック 1
  • Understand the Infinity Threat Prevention system
  • Understand how SmartConsole is used by administrators to give user access
トピック 2
  • Understand how to enable the Application Control and URL Filtering software
  • Understand licensing and contract requirements for Check Point security products
トピック 3
  • Describe different Check Point Threat Prevention solutions for network attacks
  • Describe the basic functions of the Gaia operating system
トピック 4
  • Learn how Check Point security solutions and products work and how they protect networks
  • Describe how to configure manual and automatic NAT

 

無料CheckPoint Certification 156-215.81試験問題:https://www.goshiken.com/CheckPoint/156-215.81-mondaishu.html

156-215.81問題集でCheckPoint Certification必ず合格できる練習問題集:https://drive.google.com/open?id=1o0OHE2iJVSItTy7IcglIu1UocYcA5p0K