Question 25

Which of the following cannot be configured in an Access Role Object?

Correct Answer:C
Access Role objects includes one or more of these objects: Networks.
Users and user groups. Computers and computer groups. Remote Access Clients.
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/T

Question 26

Which of these is NOT a feature or benefit of Application Control?

Correct Answer:C
File scanning is a job for ThreatCloud and it sandboxes/scrubs files.

Question 27

Which of the following is NOT a valid deployment option for R80?

Correct Answer:D

Question 28

When an encrypted packet is decrypted, where does this happen?

Correct Answer:A

Question 29

Your internal networks 10.1.1.0/24, 10.2.2.0/24 and 192.168.0.0/16 are behind the Internet Security Gateway. Considering that Layer 2 and Layer 3 setup is correct, what are the steps you will need to do in SmartConsole in order to get the connection working?

Correct Answer:C

Question 30

URL Filtering cannot be used to:

Correct Answer:D
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide

START 156-215.81 EXAM