READ Free Dumps For Checkpoint- 156-215
Question ID 18705 | Amy is configuring a User Authentication rule for the technical-support department to |
Option A | The Security Server first checks if there is any rule that does not require authentication for this type of connection. |
Option B | The User Authentication rule must be placed above the Stealth Rule. |
Option C | Once a user is first authenticated, the user will not be prompted for authentication again until logging out. |
Option D | Amy can only use the rule for Telnet, FTP, and rlogin services. |
Option E | Amy can limit the authentication attempts in the Authentication tab of the User Properties screen. |
Correct Answer | A |
Question ID 18706 | What happens when you select File>Export from the SmartView Tracker menu? |
Option A | It is not possible to export an old log file, only save and switch in SmartView Tracker. |
Option B | Current logs are exported to a new *.log file. |
Option C | Exported log entries are still viewable in SmartView Tracker. |
Option D | Exported log entries are deleted from fw.log. |
Option E | Logs in fw.log are exported to a file that can be opened by Microsoft Excel. |
Correct Answer | E |