Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 156-315.81 All Questions

View all questions & answers for the 156-315.81 exam

Exam 156-315.81 topic 1 question 55 discussion

Actual exam question from Checkpoint's 156-315.81
Question #: 55
Topic #: 1
[All 156-315.81 Questions]

To increase security, the administrator has modified the Core protection 'Host Port Scan' from 'Medium' to 'High' Predefined Sensitivity. Which Policy should the administrator install after Publishing the changes?

  • A. The Access Control and Threat Prevention Policies.
  • B. The Access Control Policy.
  • C. The Access Control & HTTPS Inspection Policy.
  • D. The Threat Prevention Policy.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
zut
9 months, 4 weeks ago
Selected Answer: D
Threat prevention policy installation is required
upvoted 1 times
...
Dreschi
11 months ago
Selected Answer: D
D is correct, When dealing with Host Port Scan settings within the Threat Prevention policy, you are addressing a specific security threat related to scanning activities. In this case, the Host Port Scan feature is part of the threat prevention measures and would be configured within the Threat Prevention policy.
upvoted 2 times
Dreschi
11 months ago
When you modify settings in the Core Protection, such as the sensitivity level for the "Host Port Scan" feature from 'Medium' to 'High,' you are making changes to the Threat Prevention policy. The Threat Prevention policy is where security administrators configure and manage settings related to various threat prevention features, including Host Port Scan. To apply the changes you've made in the Threat Prevention policy, you will need to install the Threat Prevention policy. The installation process ensures that the updated policy configurations take effect on the relevant security gateways and enforcement points within your Check Point environment.
upvoted 2 times
...
...
rabbirobert
1 year, 5 months ago
Selected Answer: B
https://sc1.checkpoint.com/documents/R80.30/SmartConsole_OLH/EN/html_frameset.htm?topic=documents/R80.30/SmartConsole_OLH/EN/M0dJyXtObiXDtT11ShxxwQ2 The IPS protections are divided into two main types: Core protections - These protections are included in the product and are assigned per gateway. They are part of the Access Control policy.
upvoted 3 times
...
jjdrew
1 year, 6 months ago
Selected Answer: B
B - Core protections modifications require an access control policy installation.
upvoted 2 times
...
Watermelon
1 year, 7 months ago
Selected Answer: B
"Core Protections are configured by selecting the inspection Settings hyperlink in the Threat Prevention Policy. However, they are installed as part of the Access Control Policy
upvoted 2 times
Watermelon
1 year, 7 months ago
I tested in lab and when i install policy appears modification in The Access Control and Threat Prevention Policies, than the correct in my opnion is /"A"
upvoted 2 times
...
...
gperes
1 year, 7 months ago
D is correct, Host scan is on IPS blade which is part of the Treat Prevention Policy
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...