Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

156-215.81 Exam Dumps - Checkpoint CCSA R81 Questions and Answers

Question # 74

If an administrator wants to restrict access to a network resource only allowing certain users to access it, and only when they are on a specific network what is the best way to accomplish this?

Options:

A.

Create an inline layer where the destination is the target network resource Define sub-rules allowing only specific sources to access the target resource

B.

Use a "New Legacy User at Location", specifying the LDAP user group that the users belong to, at the desired location

C.

Create a rule allowing only specific source IP addresses access to the target network resource.

D.

Create an Access Role object, with specific users or user groups specified, and specific networks defined Use this access role as the "Source" of an Access Control rule

Buy Now
Question # 75

In order to modify Security Policies, the administrator can use which of the following tools? (Choose the best answer.)

Options:

A.

SmartConsole and WebUI on the Security Management Server.

B.

SmartConsole or mgmt_cli (API) on any computer where SmartConsole is installed.

C.

Command line of the Security Management Server or mgmt_cli.exe on any Windows computer.

D.

mgmt_cli (API) or WebUI on Security Gateway and SmartConsole on the Security Management Server.

Buy Now
Question # 76

Which of the following methods can be used to update the trusted log server regarding the policy and configuration changes performed on the Security Management Server?

Options:

A.

Save Policy

B.

Install Database

C.

Save session

D.

Install Policy

Buy Now
Question # 77

When should you generate new licenses?

Options:

A.

Before installing contract files.

B.

After a device upgrade.

C.

When the existing license expires, license is upgraded or the IP-address associated with the license changes.

D.

Only when the license is upgraded.

Buy Now
Question # 78

View the rule below. What does the pen-symbol in the left column mean?

Options:

A.

Those rules have been published in the current session.

B.

Rules have been edited by the logged in administrator, but the policy has not been published yet.

C.

Another user has currently locked the rules for editing.

D.

The configuration lock is present. Click the pen symbol in order to gain the lock.

Buy Now
Question # 79

To view the policy installation history for each gateway, which tool would an administrator use?

Options:

A.

Revisions

B.

Gateway installations

C.

Installation history

D.

Gateway history

Buy Now
Question # 80

What are valid authentication methods for mutual authenticating the VPN gateways?

Options:

A.

Pre-shared Secret and PKI Certificates

B.

PKI Certificates and Kerberos Tickets

C.

Pre-Shared Secrets and Kerberos Ticket

D.

PKI Certificates and DynamiciD OTP

Buy Now
Question # 81

When changes are made to a Rule base, it is important to _______________ to enforce changes.

Options:

A.

Publish database

B.

Activate policy

C.

Install policy

D.

Save changes

Buy Now
Question # 82

Which of the completed statements is NOT true? The WebUI can be used to manage Operating System user accounts and

Options:

A.

add users to your Gaia system.

B.

assign privileges to users.

C.

assign user rights to their home directory in the Security Management Server.

D.

edit the home directory of the user.

Buy Now
Question # 83

Which Check Point software blade prevents malicious files from entering a network using virus signatures and anomaly-based protections from ThreatCloud?

Options:

A.

Firewall

B.

Application Control

C.

Anti-spam and Email Security

D.

Anti-Virus

Buy Now
Exam Code: 156-215.81
Exam Name: Check Point Certified Security Administrator R81.20 CCSA (156-215.81.20)
Last Update: Mar 14, 2025
Questions: 411
156-215.81 pdf

156-215.81 PDF

$25.5  $84.99
156-215.81 Engine

156-215.81 Testing Engine

$28.5  $94.99
156-215.81 PDF + Engine

156-215.81 PDF + Testing Engine

$40.5  $134.99