Which type of Endpoint Identity Agent includes packet tagging and computer authentication?
A. Full
B. Custom
C. Complete
D. Light
Correct Answer: A
The type of Endpoint Identity Agent that includes packet tagging and computer authentication is Full. The Full Identity Agent is a client-side software that provides full identity awareness features, such as user authentication, computer authentication, packet tagging, identity caching, and identity sharing. The other types of Endpoint Identity Agents are Custom, Complete, and Light, which have different features and capabilities.
Question 72:
What key is used to save the current CPView page in a filename format cpview_"cpview process ID". cap"number of captures"?
A. S
B. W
C. C
D. Space bar
Correct Answer: C
Question 73:
Fill in the blank Once a license is activated, a___________should be installed.
A. Security Gateway Contract file
B. Service Contract file
C. License Management file
D. License Contract file
Correct Answer: B
Once a license is activated, a Service Contract file should be installed. This file contains information about the license expiration date, support level, and other details.
What are the two elements of address translation rules?
A. Original packet and translated packet
B. Manipulated packet and original packet
C. Translated packet and untranslated packet
D. Untranslated packet and manipulated packet
Correct Answer: A
Address translation rules are used to map an IP address space into another by modifying network address information in the IP header of packets. Address translation rules have two elements: original packet and translated packet. The original packet is the packet before it undergoes address translation, and the translated packet is the packet after it undergoes address translation. The original packet and the translated packet may have different source and destination IP addresses, depending on the type and direction of address translation.
Question 75:
Fill in the blank: In Security Gateways R75 and above, SIC uses ______________ for encryption.
A. AES-128
B. AES-256
C. DES
D. 3DES
Correct Answer: A
In Security Gateways R75 and above, SIC uses AES-128 for encryption. SIC stands for Secure Internal Communication, which is a mechanism that establishes trust between Check Point components, such as Security Gateways, Security Management Servers, Log Servers, etc. SIC uses certificates to authenticate and encrypt the communication between the components. AES-128 is an encryption algorithm that uses a 128-bit key to encrypt and decrypt data. The other options are incorrect. AES-256 is an encryption algorithm that uses a 256-bit key, but it is not used by SIC. DES and 3DES are older encryption algorithms that use 56-bit and 168-bit keys respectively, but they are not used by SIC either. References: [Secure Internal Communication (SIC) between Check Point components], AES - Wikipedia, DES - Wikipedia, Triple DES - Wikipedia
Question 76:
An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office. Both offices are protected by Check Point Security Gateway managed by the same Security Management Server (SMS). While configuring the VPN community to specify the pre-shared secret, the administrator did not find a box to input the pre-shared secret. Why does it not allow him to specify the pre-shared secret?
A. The Gateway is an SMB device
B. The checkbox "Use only Shared Secret for all external members" is not checked
C. Certificate based Authentication is the only authentication method available between two Security Gateway managed by the same SMS
D. Pre-shared secret is already configured in Global Properties
Correct Answer: C
Certificate based Authentication is the only authentication method available between two Security Gateway managed by the same SMS. This is because certificate based authentication provides stronger security and easier management than pre-shared secret authentication. The other options are either incorrect or irrelevant for this scenario. References: [Check Point R80.10 - Part 6 - Certificate Based Authentication]
Question 77:
Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?
A. Windows Management Instrumentation (WMI)
B. Hypertext Transfer Protocol Secure (HTTPS)
C. Lightweight Directory Access Protocol (LDAP)
D. Remote Desktop Protocol (RDP)
Correct Answer: C
Using AD Query, the security gateway connections to the Active Directory Domain Controllers using LDAP (Lightweight Directory Access Protocol). The other protocols are not used for this purpose. References: : [Check Point R81 Identity Awareness Administration Guide], page 14.
Question 78:
Which of the following commands is used to verify license installation?
A. Cplic verify license
B. Cplic print
C. Cplic show
D. Cplic license
Correct Answer: B
The command cplic print is used to verify license installation. It displays the installed licenses and their expiration dates .
References: [Check Point R81 Command Line Interface Reference Guide]
Question 79:
You want to verify if there are unsaved changes in GAiA that will be lost with a reboot. What command can be used?
A. show unsaved
B. show save-state
C. show configuration diff
D. show config-state
Correct Answer: D
The command show config-state can be used to verify if there are unsaved changes in GAiA that will be lost with a reboot . The other commands are not valid in GAiA. References: [Check Point GAiA Administration Guide], []
Question 80:
When an encrypted packet is decrypted, where does this happen?
A. Security policy
B. Inbound chain
C. Outbound chain
D. Decryption is not supported
Correct Answer: A
When an encrypted packet is decrypted, this happens in the security policy. The security policy is a set of rules that defines how the Security Gateway inspects and secures traffic. The security policy includes VPN rules that specify which traffic should be encrypted or decrypted. The inbound and outbound chains are part of the inspection framework that processes packets according to the security policy. References: Check Point R81 VPN Administration Guide
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CheckPoint exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 156-215.81 exam preparations and CheckPoint certification application, do not hesitate to visit our Vcedump.com to find your solutions here.