Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

156-215.81 Exam Results

Page: 21 / 31
Total 411 questions

Check Point Certified Security Administrator R81.20 CCSA (156-215.81.20) Questions and Answers

Question 81

Bob and Joe both have Administrator Roles on their Gaia Platform. Bob logs in on the WebUI and then Joe logs in through CLI. Choose what BEST describes the following scenario, where Bob and Joe are both logged in:

Options:

A.

Since they both are logged in on different interfaces, they will both be able to make changes.

B.

When Joe logs in. Bob will be logged out automatically.

C.

The database will be locked by Bob and Joe will not be able to make any changes.

D.

Bob will receive a prompt that Joe has logged in.

Question 82

Fill in the blank: An Endpoint identity agent uses a ___________ for user authentication.

Options:

A.

Shared secret

B.

Token

C.

Username/password or Kerberos Ticket

D.

Certificate

Question 83

If an administrator wants to restrict access to a network resource only allowing certain users to access it, and only when they are on a specific network what is the best way to accomplish this?

Options:

A.

Create an inline layer where the destination is the target network resource Define sub-rules allowing only specific sources to access the target resource

B.

Use a "New Legacy User at Location", specifying the LDAP user group that the users belong to, at the desired location

C.

Create a rule allowing only specific source IP addresses access to the target network resource.

D.

Create an Access Role object, with specific users or user groups specified, and specific networks defined Use this access role as the "Source" of an Access Control rule

Question 84

Name the utility that is used to block activities that appear to be suspicious.

Options:

A.

Penalty Box

B.

Drop Rule in the rulebase

C.

Suspicious Activity Monitoring (SAM)

D.

Stealth rule

Page: 21 / 31
Total 411 questions