Check-Point-Certified-Security-Administrator-(156-215-75).pdf - CheckPoint 156-215-75 Check Point Certified Security(R Administrator

Check-Point-Certified-Security-Administrator-(156-215-75).pdf

This preview shows page 1 - 5 out of 8 pages.

156-215-75 CheckPoint Check Point Certified Security(R) Administrator
Image of page 1
156-215.75 A. A-3, B-4, C-1, D-2 B. A-2, B-3, C-4, D-1 C. A-3, B-2, C-1, D-4 D. A-3, B-2, C-4, D-1 Answer: D QUESTION: 258 To qualify as an Identity Awareness enabled rule, which columns may include an Access Role? A. Track B. User C. Destination D. Action Answer: C QUESTION: 259 From the output below, where is this fingerprint generated? 95 . 94
Image of page 2
156-215.75 A. SmartUpdate B. SmartConsole C. Security Management Server D. SmartDashboard Answer: C QUESTION: 260 Which Check Point mechanism used for controlling traffic enables firewalls to incorporate layer 4 awareness in packet inspection? A. Stateful Inspection B. Packet filtering C. Application Intelligence D. IPS Answer: A QUESTION: 261 The Check Point Security Gateway's virtual machine (kernel) exists between which two OSI model layers? 96 . 95
Image of page 3
156-215.75 A. Application and Presentation layers B. Network and Datalink layers C. Session and Network layers D. Physical and Datalink layers Answer: B
Image of page 4
Image of page 5

You've reached the end of your free preview.

Want to read all 8 pages?

  • Fall '20
  • B. Network, B. Transport, Identity Awareness

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture