Which of the following is NOT a policy type available for each policy package?
A. Threat Emulation
B. Access Control
C. Desktop Security
D. Threat Prevention
An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office. Both offices are protected by Check Point Security Gateway managed by the same Security Management Server (SMS). While configuring the VPN community to specify the pre-shared secret, the administrator did not find a box to input the pre-shared secret. Why does it not allow him to specify the pre-shared secret?
A. The Gateway is an SMB device
B. The checkbox "Use only Shared Secret for all external members" is not checked
C. Certificate based Authentication is the only authentication method available between two Security Gateway managed by the same SMS
D. Pre-shared secret is already configured in Global Properties
Which of the following technologies extracts detailed information from packets and stores that information in state tables?
A. INSPECT Engine
B. Next-Generation Firewall
C. Packet Filtering
D. Application Layer Firewall
To enforce the Security Policy correctly, a Security Gateway requires:
A. a routing table
B. that each Security Gateway enforces at least one rule
C. a Demilitarized Zone
D. a Security Policy install
View the rule below. What does the pen-symbol in the left column mean?
A. Those rules have been published in the current session.
B. Rules have been edited by the logged in administrator, but the policy has not been published yet.
C. Another user has currently locked the rules for editing.
D. The configuration lock is present. Click the pen symbol in order to gain the lock.
What data MUST be supplied to the SmartConsole System Restore window to restore a backup?
A. Server, Username, Password, Path, Version
B. Username, Password, Path, Version
C. Server, Protocol, Username, Password, Destination Path
D. Server, Protocol, Username, Password, Path
Which repositories are installed on the Security Management Server by SmartUpdate?
A. License and Update
B. Package Repository and Licenses
C. Update and License and Contract
D. License and Contract and Package Repository
Which back up method uses the command line to create an image of the OS?
A. System backup
B. Save Configuration
C. Migrate
D. snapshot
To quickly review when Threat Prevention signatures were last updated, which Threat Tool would an administrator use?
A. Protections
B. IPS Protections
C. Profiles
D. ThreatWiki
Which of the following is considered to be the more secure and preferred VPN authentication method?
A. Password
B. Certificate
C. MD5
D. Pre-shared secret
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CheckPoint exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 156-215.81.20 exam preparations and CheckPoint certification application, do not hesitate to visit our Vcedump.com to find your solutions here.