Download Checkpoint.156-215.81.NewDumps.2023-08-14.88q.vcex

Download Exam

File Info

Exam Check Point Certified Security Administrator R81
Number 156-215.81
File Name Checkpoint.156-215.81.NewDumps.2023-08-14.88q.vcex
Size 571 KB
Posted Aug 14, 2023
Download Checkpoint.156-215.81.NewDumps.2023-08-14.88q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which of the following is NOT an authentication scheme used for accounts created through SmartConsole?


  1. RADIUS
  2. Check Point password
  3. Security questions
  4. SecurID
Correct answer: C



Question 2

What are the two types of NAT supported by the Security Gateway?


  1. Destination and Hide
  2. Hide and Static
  3. Static and Source
  4. Source and Destination
Correct answer: B
Explanation:
A Security Gateway can use these procedures to translate IP addresses in your network:
A Security Gateway can use these procedures to translate IP addresses in your network:



Question 3

In SmartConsole, objects are used to represent physical and virtual network components and also some logical components. These objects are divided into several categories. Which of the following is NOT an objects category?


  1. Limit
  2. Resource
  3. Custom Application / Site
  4. Network Object
Correct answer: B



Question 4

In a Distributed deployment, the Security Gateway and the Security Management software are installed on what platforms?


  1. Different computers or appliances.
  2. The same computer or appliance.
  3. Both on virtual machines or both on appliances but not mixed.
  4. In Azure and AWS cloud environments.
Correct answer: A
Explanation:
"The Security Management ServerClosed (1) and the Security GatewayClosed (3) are installed on different computers, with a network connection (2)." https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Installation_and_Upgrade_Guide/T
"The Security Management ServerClosed (1) and the Security GatewayClosed (3) are installed on different computers, with a network connection (2)." 
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Installation_and_Upgrade_Guide/T



Question 5

Under which file is the proxy arp configuration stored?


  1. $FWDIR/state/proxy_arp.conf on the management server
  2. $FWDIR/conf/local.arp on the management server
  3. $FWDIR/state/_tmp/proxy.arp on the security gateway
  4. $FWDIR/conf/local.arp on the gateway
Correct answer: D



Question 6

Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. 
After installation, is the administrator required to perform any additional tasks?


  1. Go to clash-Run cpstop | Run cpstart
  2. Go to clash-Run cpconfig | Configure CoreXL to make use of the additional Cores | Exit cpconfig | Reboot Security Gateway
  3. Administrator does not need to perform any tas
  4. Check Point will make use of the newly installed CPU and Cores
  5. Go to clash-Run cpconfig | Configure CoreXL to make use of the additional Cores | Exit cpconfig | Reboot Security Gateway | Install Security Policy
Correct answer: B



Question 7

Which of the following is NOT a component of Check Point Capsule?


  1. Capsule Docs 
  2. Capsule Cloud
  3. Capsule Enterprise
  4. Capsule Workspace
Correct answer: C



Question 8

Administrator Dave logs into R80 Management Server to review and makes some rule changes. He notices that there is a padlock sign next to the DNS rule in the Rule Base.
 
What is the possible explanation for this?


  1. DNS Rule is using one of the new feature of R80 where an administrator can mark a rule with the padlock icon to let other administrators know it is important.
  2. Another administrator is logged into the Management and currently editing the DNS Rule.
  3. DNS Rule is a placeholder rule for a rule that existed in the past but was deleted.
  4. This is normal behavior in R80 when there are duplicate rules in the Rule Base.
Correct answer: B



Question 9

Name one limitation of using Security Zones in the network?


  1. Security zones will not work in Automatic NAT rules
  2. Security zone will not work in Manual NAT rules
  3. Security zones will not work in firewall policy layer
  4. Security zones cannot be used in network topology
Correct answer: B
Explanation:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=



Question 10

Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?


  1. All options stop Check Point processes
  2. backup
  3. migrate export
  4. snapshot
Correct answer: D



Question 11

Which of the following is NOT an authentication scheme used for accounts created through SmartConsole?


  1. RADIUS
  2. Check Point password
  3. Security questions
  4. SecurID
Correct answer: C



Question 12

What are the two types of NAT supported by the Security Gateway?


  1. Destination and Hide
  2. Hide and Static
  3. Static and Source
  4. Source and Destination
Correct answer: B
Explanation:
A Security Gateway can use these procedures to translate IP addresses in your network:
A Security Gateway can use these procedures to translate IP addresses in your network:



Question 13

In SmartConsole, objects are used to represent physical and virtual network components and also some logical components. These objects are divided into several categories. Which of the following is NOT an objects category?


  1. Limit
  2. Resource
  3. Custom Application / Site
  4. Network Object
Correct answer: B



Question 14

In a Distributed deployment, the Security Gateway and the Security Management software are installed on what platforms?


  1. Different computers or appliances.
  2. The same computer or appliance.
  3. Both on virtual machines or both on appliances but not mixed.
  4. In Azure and AWS cloud environments.
Correct answer: A
Explanation:
"The Security Management ServerClosed (1) and the Security GatewayClosed (3) are installed on different computers, with a network connection (2)." https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Installation_and_Upgrade_Guide/T
"The Security Management ServerClosed (1) and the Security GatewayClosed (3) are installed on different computers, with a network connection (2)." 
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Installation_and_Upgrade_Guide/T



Question 15

Under which file is the proxy arp configuration stored?


  1. $FWDIR/state/proxy_arp.conf on the management server
  2. $FWDIR/conf/local.arp on the management server
  3. $FWDIR/state/_tmp/proxy.arp on the security gateway
  4. $FWDIR/conf/local.arp on the gateway
Correct answer: D



Question 16

Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. 
After installation, is the administrator required to perform any additional tasks?


  1. Go to clash-Run cpstop | Run cpstart
  2. Go to clash-Run cpconfig | Configure CoreXL to make use of the additional Cores | Exit cpconfig | Reboot Security Gateway
  3. Administrator does not need to perform any tas
  4. Check Point will make use of the newly installed CPU and Cores
  5. Go to clash-Run cpconfig | Configure CoreXL to make use of the additional Cores | Exit cpconfig | Reboot Security Gateway | Install Security Policy
Correct answer: B



Question 17

Which of the following is NOT a component of Check Point Capsule?


  1. Capsule Docs 
  2. Capsule Cloud
  3. Capsule Enterprise
  4. Capsule Workspace
Correct answer: C



Question 18

Administrator Dave logs into R80 Management Server to review and makes some rule changes. He notices that there is a padlock sign next to the DNS rule in the Rule Base.
 
What is the possible explanation for this?


  1. DNS Rule is using one of the new feature of R80 where an administrator can mark a rule with the padlock icon to let other administrators know it is important.
  2. Another administrator is logged into the Management and currently editing the DNS Rule.
  3. DNS Rule is a placeholder rule for a rule that existed in the past but was deleted.
  4. This is normal behavior in R80 when there are duplicate rules in the Rule Base.
Correct answer: B



Question 19

Name one limitation of using Security Zones in the network?


  1. Security zones will not work in Automatic NAT rules
  2. Security zone will not work in Manual NAT rules
  3. Security zones will not work in firewall policy layer
  4. Security zones cannot be used in network topology
Correct answer: B
Explanation:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=



Question 20

Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?


  1. All options stop Check Point processes
  2. backup
  3. migrate export
  4. snapshot
Correct answer: D



Question 21

Which of the following is NOT an authentication scheme used for accounts created through SmartConsole?


  1. RADIUS
  2. Check Point password
  3. Security questions
  4. SecurID
Correct answer: C



Question 22

What are the two types of NAT supported by the Security Gateway?


  1. Destination and Hide
  2. Hide and Static
  3. Static and Source
  4. Source and Destination
Correct answer: B
Explanation:
A Security Gateway can use these procedures to translate IP addresses in your network:
A Security Gateway can use these procedures to translate IP addresses in your network:



Question 23

In SmartConsole, objects are used to represent physical and virtual network components and also some logical components. These objects are divided into several categories. Which of the following is NOT an objects category?


  1. Limit
  2. Resource
  3. Custom Application / Site
  4. Network Object
Correct answer: B



Question 24

In a Distributed deployment, the Security Gateway and the Security Management software are installed on what platforms?


  1. Different computers or appliances.
  2. The same computer or appliance.
  3. Both on virtual machines or both on appliances but not mixed.
  4. In Azure and AWS cloud environments.
Correct answer: A
Explanation:
"The Security Management ServerClosed (1) and the Security GatewayClosed (3) are installed on different computers, with a network connection (2)." https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Installation_and_Upgrade_Guide/T
"The Security Management ServerClosed (1) and the Security GatewayClosed (3) are installed on different computers, with a network connection (2)." 
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Installation_and_Upgrade_Guide/T



Question 25

Under which file is the proxy arp configuration stored?


  1. $FWDIR/state/proxy_arp.conf on the management server
  2. $FWDIR/conf/local.arp on the management server
  3. $FWDIR/state/_tmp/proxy.arp on the security gateway
  4. $FWDIR/conf/local.arp on the gateway
Correct answer: D



Question 26

Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. 
After installation, is the administrator required to perform any additional tasks?


  1. Go to clash-Run cpstop | Run cpstart
  2. Go to clash-Run cpconfig | Configure CoreXL to make use of the additional Cores | Exit cpconfig | Reboot Security Gateway
  3. Administrator does not need to perform any tas
  4. Check Point will make use of the newly installed CPU and Cores
  5. Go to clash-Run cpconfig | Configure CoreXL to make use of the additional Cores | Exit cpconfig | Reboot Security Gateway | Install Security Policy
Correct answer: B



Question 27

Which of the following is NOT a component of Check Point Capsule?


  1. Capsule Docs 
  2. Capsule Cloud
  3. Capsule Enterprise
  4. Capsule Workspace
Correct answer: C



Question 28

Administrator Dave logs into R80 Management Server to review and makes some rule changes. He notices that there is a padlock sign next to the DNS rule in the Rule Base.
 
What is the possible explanation for this?


  1. DNS Rule is using one of the new feature of R80 where an administrator can mark a rule with the padlock icon to let other administrators know it is important.
  2. Another administrator is logged into the Management and currently editing the DNS Rule.
  3. DNS Rule is a placeholder rule for a rule that existed in the past but was deleted.
  4. This is normal behavior in R80 when there are duplicate rules in the Rule Base.
Correct answer: B



Question 29

Name one limitation of using Security Zones in the network?


  1. Security zones will not work in Automatic NAT rules
  2. Security zone will not work in Manual NAT rules
  3. Security zones will not work in firewall policy layer
  4. Security zones cannot be used in network topology
Correct answer: B
Explanation:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=



Question 30

Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?


  1. All options stop Check Point processes
  2. backup
  3. migrate export
  4. snapshot
Correct answer: D



Question 31

Which of the following is NOT an authentication scheme used for accounts created through SmartConsole?


  1. RADIUS
  2. Check Point password
  3. Security questions
  4. SecurID
Correct answer: C



Question 32

What are the two types of NAT supported by the Security Gateway?


  1. Destination and Hide
  2. Hide and Static
  3. Static and Source
  4. Source and Destination
Correct answer: B
Explanation:
A Security Gateway can use these procedures to translate IP addresses in your network:
A Security Gateway can use these procedures to translate IP addresses in your network:



Question 33

In SmartConsole, objects are used to represent physical and virtual network components and also some logical components. These objects are divided into several categories. Which of the following is NOT an objects category?


  1. Limit
  2. Resource
  3. Custom Application / Site
  4. Network Object
Correct answer: B



Question 34

In a Distributed deployment, the Security Gateway and the Security Management software are installed on what platforms?


  1. Different computers or appliances.
  2. The same computer or appliance.
  3. Both on virtual machines or both on appliances but not mixed.
  4. In Azure and AWS cloud environments.
Correct answer: A
Explanation:
"The Security Management ServerClosed (1) and the Security GatewayClosed (3) are installed on different computers, with a network connection (2)." https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Installation_and_Upgrade_Guide/T
"The Security Management ServerClosed (1) and the Security GatewayClosed (3) are installed on different computers, with a network connection (2)." 
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Installation_and_Upgrade_Guide/T



Question 35

Under which file is the proxy arp configuration stored?


  1. $FWDIR/state/proxy_arp.conf on the management server
  2. $FWDIR/conf/local.arp on the management server
  3. $FWDIR/state/_tmp/proxy.arp on the security gateway
  4. $FWDIR/conf/local.arp on the gateway
Correct answer: D



Question 36

Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. 
After installation, is the administrator required to perform any additional tasks?


  1. Go to clash-Run cpstop | Run cpstart
  2. Go to clash-Run cpconfig | Configure CoreXL to make use of the additional Cores | Exit cpconfig | Reboot Security Gateway
  3. Administrator does not need to perform any tas
  4. Check Point will make use of the newly installed CPU and Cores
  5. Go to clash-Run cpconfig | Configure CoreXL to make use of the additional Cores | Exit cpconfig | Reboot Security Gateway | Install Security Policy
Correct answer: B



Question 37

Which of the following is NOT a component of Check Point Capsule?


  1. Capsule Docs 
  2. Capsule Cloud
  3. Capsule Enterprise
  4. Capsule Workspace
Correct answer: C



Question 38

Administrator Dave logs into R80 Management Server to review and makes some rule changes. He notices that there is a padlock sign next to the DNS rule in the Rule Base.
 
What is the possible explanation for this?


  1. DNS Rule is using one of the new feature of R80 where an administrator can mark a rule with the padlock icon to let other administrators know it is important.
  2. Another administrator is logged into the Management and currently editing the DNS Rule.
  3. DNS Rule is a placeholder rule for a rule that existed in the past but was deleted.
  4. This is normal behavior in R80 when there are duplicate rules in the Rule Base.
Correct answer: B



Question 39

Name one limitation of using Security Zones in the network?


  1. Security zones will not work in Automatic NAT rules
  2. Security zone will not work in Manual NAT rules
  3. Security zones will not work in firewall policy layer
  4. Security zones cannot be used in network topology
Correct answer: B
Explanation:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=



Question 40

Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?


  1. All options stop Check Point processes
  2. backup
  3. migrate export
  4. snapshot
Correct answer: D









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files