156-215-75 CheckPoint Check Point Certified Security(R) Administrator
156-215.75 A. A-3, B-4, C-1, D-2 B. A-2, B-3, C-4, D-1 C. A-3, B-2, C-1, D-4 D. A-3, B-2, C-4, D-1 Answer: D QUESTION: 258 To qualify as an Identity Awareness enabled rule, which columns may include an Access Role? A. Track B. User C. Destination D. Action Answer: C QUESTION: 259 From the output below, where is this fingerprint generated? 95 . 94
156-215.75 A. SmartUpdate B. SmartConsole C. Security Management Server D. SmartDashboard Answer: C QUESTION: 260 Which Check Point mechanism used for controlling traffic enables firewalls to incorporate layer 4 awareness in packet inspection? A. Stateful Inspection B. Packet filtering C. Application Intelligence D. IPS Answer: A QUESTION: 261 The Check Point Security Gateway's virtual machine (kernel) exists between which two OSI model layers? 96 . 95
156-215.75 A. Application and Presentation layers B. Network and Datalink layers C. Session and Network layers D. Physical and Datalink layers Answer: B
You've reached the end of your free preview.
Want to read all 8 pages?
- Fall '20
- B. Network, B. Transport, Identity Awareness