New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Full Access Checkpoint 156-215.81 Tutorials

Page: 16 / 29
Total 400 questions

Check Point Certified Security Administrator R81.20 Questions and Answers

Question 61

Which policy type is used to enforce bandwidth and traffic control rules?

Options:

A.

Access Control

B.

Threat Emulation

C.

Threat Prevention

D.

QoS

Question 62

A layer can support different combinations of blades What are the supported blades:

Options:

A.

Firewall. URLF, Content Awareness and Mobile Access

B.

Firewall (Network Access Control). Application & URL Filtering. Content Awareness and Mobile Access

C.

Firewall. NAT, Content Awareness and Mobile Access

D.

Firewall (Network Access Control). Application & URL Filtering and Content Awareness

Question 63

When a gateway requires user information for authentication, what order does it query servers for user information?

Options:

A.

First - Internal user database, then LDAP servers in order of priority, finally the generic external user profile

B.

First the Internal user database, then generic external user profile, finally LDAP servers in order of priority.

C.

First the highest priority LDAP server, then the internal user database, then lower priority LDAP servers, finally the generic external profile

D.

The external generic profile, then the internal user database finally the LDAP servers in order of priority.

Question 64

What type of NAT is a one-to-one relationship where each host is translated to a unique address?

Options:

A.

Source

B.

Static

C.

Hide

D.

Destination

Page: 16 / 29
Total 400 questions