Decide Fast & Get 50% Flat Discount | Limited Time Offer - Ends In 0d 00h 00m 00s Coupon code: SAVE50

Master CheckPoint 156-215.81 Exam with Reliable Practice Questions

Page: 1 out of Viewing questions 1-5 out of 401 questions
Last exam update: Nov 25,2024
Upgrade to Premium
Question 1

Which Security Blade needs to be enabled in order to sanitize and remove potentially malicious content from files, before those files enter the network?


Correct : D

Threat Extraction is the Security Blade that needs to be enabled in order to sanitize and remove potentially malicious content from files, before those files enter the network. It can strip out active content, embedded objects, and other risky elements from documents and deliver a safe version of the file to the user.Reference:Remote Access VPN R81.20 Administration Guide, page 18.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 2

Fill in the blank: A(n)_____rule is created by an administrator and configured to allow or block traffic based on specified criteria.


Correct : B

An explicit rule is created by an administrator and configured to allow or block traffic based on specified criteria. Explicit rules are displayed in the Rule Base and can be modified by the administrator.Reference:Certified Security Administrator (CCSA) R81.20 Course Overview, page 12.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 3

Which Check Point supported authentication scheme typically requires a user to possess a token?


Correct : D

SecurID is a Check Point supported authentication scheme that typically requires a user to possess a token. A token is a physical device that generates a one-time password that changes periodically. The user must enter the password along with their username to authenticate.Reference:Remote Access VPN R81.20 Administration Guide, page 30.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 4

Which of the following is true about Stateful Inspection?


Correct : B

Stateful Inspection is true about looking at both the headers of packets, as well as deeply examining their content. Stateful Inspection inspects packets at all layers of the OSI model and maintains information about the state and context of each connection in a state table.Reference:Certified Security Administrator (CCSA) R81.20 Course Overview, page 6.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 5

Fill in the blank: An identity server uses a______________to trust a Terminal Server Identity Agent.


Correct : B


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500