exam questions

Exam 156-215.80 All Questions

View all questions & answers for the 156-215.80 exam

Exam 156-215.80 topic 1 question 400 discussion

Actual exam question from Checkpoint's 156-215.80
Question #: 400
Topic #: 1
[All 156-215.80 Questions]

Which of the following methods can be used to update the trusted log server regarding the policy and configuration changes performed on the Security
Management Server?

  • A. Save Policy
  • B. Install Database
  • C. Save session
  • D. Install Policy
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Shacharh
Highly Voted 2 years, 8 months ago
Install Database, Policy is only for GW objects...
upvoted 12 times
Hernan_Mella
6 months, 3 weeks ago
But you have to configure the GW to send the logs to new log server or not? so must to enforce the policy to GWs
upvoted 1 times
...
...
nariman93
Highly Voted 2 years, 4 months ago
https://sc1.checkpoint.com/documents/R80/CP_R80_SmartDashboard_OLH/html_frameset.htm?topic=documents/R80/CP_R80_SmartDashboard_OLH/1XsAOD74nmuI7gyc1V59rg2
upvoted 5 times
...
babochnik
Most Recent 8 months, 2 weeks ago
Selected Answer: B
Deploying Logging You can enable logging on the Security Management Server (enabled by default), or deploy a dedicated Log Server. After you deploy the Log Server, you must configure the Security Gateways for logging. You must execute the Install Database function on the remote Log Server when you: • Enable or disable a logging related blade or function, including Log Indexing in a server object. • Add a new Log Server to the system. • Change a Security Gateway's Log Server. • Change a Log Server's log settings or make any other Log Server object change. • Change anything in the Global Properties that might affect the Log Server. https://dl3.checkpoint.com/paid/92/921b7d92f2feff47a9161ceeeb8fd746/CP_R80.40_LoggingAndMonitoring_AdminGuide.pdf?HashKey=1652960740_d3df348161d94730a79eeb91e47db1f7&xtn=.pdf
upvoted 2 times
...
mari1
2 years, 4 months ago
You must choose to install the policy or the user database, based on the changes you made: Install the policy, if you modified additional components of the Policy Package (for example, added new Security Policy rules) that are used by the installation targets Install the user database, if you only changed the user definitions or the administrator definitions - From the Menu, select Install Database The user database is installed on: Security Gateways - during policy installation Check Point hosts with one or more Management Software Blades enabled - during database installation You can also install the user database on Security Gateways and on a remote server, such as a Log Server, from the command line interface on the Security Management Server. Check Point Security Management R80 Administration Guide
upvoted 5 times
...
Snowwhite
2 years, 7 months ago
D is correct.
upvoted 3 times
...
Alphainisde
2 years, 7 months ago
Install Database in not available in R80, so it should be D?
upvoted 1 times
hllovet
2 years, 5 months ago
you have instal database in R80.30
upvoted 2 times
...
...
GeraldNat
2 years, 7 months ago
yes the answer is B.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago