Proper study guides for Latest Check Point Check Point Certified Security Administrator certified begins with Check Point 156-215.75 preparation products which designed to deliver the Real 156-215.75 questions by making you pass the 156-215.75 test at your first time. Try the free 156-215.75 demo right now.
2016 Jun 156-215.75 Study Guide Questions:
Q291. Many companies have defined more than one administrator. To increase security, only one administrator should be able to install a Rule Base on a specific Firewall. How do you configure this?
A. Define a permission profile in SmartDashboard with read/write privileges, but restrict it to all other firewalls by placing them in the Policy Targets field. Then, an administrator with this permission profile cannot install a policy on any Firewall not listed here.
B. In the General Properties of the object representing the specific Firewall, go to the Software Blades product list and select Firewall. Right-click in the menu, select Administrator to Install to define only this administrator.
C. Put the one administrator in an Administrator group and configure this group in the specific Firewall object in Advanced / Permission to Install.
D. Right-click on the object representing the specific administrator, and select that Firewall in Policy Targets.
Q292. Which tool CANNOT be launched from SmartUpdate R75?
B. SecurePlatform WebUI
D. IP Appliance Voyager
Q293. You have an NGX R65 Gateway running on SecurePlatform. The Gateway also serves as a Policy Server. When you run patch add CD from the Security Gateway R75 CD-ROM, what does this command allow you to upgrade?
A. Only the R75 Security Gateway
B. Only the patch utility is upgraded using this command
C. All products, except the Policy Server
D. Both the operating system and all Check Point products
Avant-garde 156-215.75 exam price:
Q294. The CEO of ACME recently bought her own personal iPad. She wants to access the internal Finance Web server from her iPad. Because the iPad is not a member of the Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter her AD credentials in the Captive Portal and then get the same access as on her office computer. Her access to resources is based on rules in the Firewall Rule Base.
To make this scenario work, the IT administrator must: 1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity Sources.
2) In the Portal Settings window in the User Access section, make sure that Name and password login is selected.
3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network destinations. Select accept as the Action.
When Jennifer McHanry tries to access the resource but is unable. What should she do?
A. Have the security administrator select the Action field of the Firewall Rule "Redirect HTTP connections to an authentication (captive) portal"
B. Install the Identity Awareness agent on her iPad
C. Have the security administrator reboot the firewall
D. Have the security administrator select Any for the Machines tab in the appropriate Access Role
Q295. You need to plan the company's new security system. The company needs a very high level of security and also high performance and high throughput for their applications. You need to turn on most of the integrated IPS checks while maintaining high throughput. What would be the BEST solution for this scenario?
A. You need to buy a strong multi-core machine and run R70 or later on SecurePlatform with CoreXL technology enabled.
B. Bad luck, both together can not be achieved.
C. The IPS does not run when CoreXL is enabled.
D. The IPS system does not affect the firewall performance and CoreXL is not needed in this scenario.
Q296. When using an encryption algorithm, which is generally considered the best encryption method?
C. Triple DES
D. CAST cipher
Verified 156-215.75 bootcamp:
Q297. Select the correct statement about Secure Internal Communications (SIC) Certificates. SIC Certificates:
A. Are used for securing internal network communications between the SmartDashboard and the Security Management Server.
B. For R75 Security Gateways are created during the Security Management Server installation.
C. Decrease network security by securing administrative communication among the Security Management Servers and the Security Gateway.
D. Uniquely identify Check Point enabled machines; they have the same function as VPN Certificates.
Q298. A Security Policy has several database versions. What configuration remains the same no matter which version is used?
A. Rule Bases_5_0.fws
B. Internal Certificate Authority (ICA) certificate
Q299. For remote user authentication, which authentication scheme is NOT supported?
C. Check Point Password
Q300. Which command gives an overview of your installed licenses?
A. cplic print
D. lic print