Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 156-215.81 All Questions

View all questions & answers for the 156-215.81 exam

Exam 156-215.81 topic 1 question 46 discussion

Actual exam question from Checkpoint's 156-215.81
Question #: 46
Topic #: 1
[All 156-215.81 Questions]

A network administrator has informed you that they have identified a malicious host on the network, and instructed you to block it. Corporate policy dictates that firewall policy changes cannot be made at this time. What tool can you use to block this traffic?

  • A. Anti-Bot protection
  • B. Anti-Malware protection
  • C. Policy-based routing
  • D. Suspicious Activity Monitoring (SAM) rules
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
monkemann21
Highly Voted 2 years, 1 month ago
Selected Answer: D
I would vote for Suspicious Activity Monitor. If changing the policy is not possible, a fast SAM rule can block any unwanted traffic. https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGuide/Topics-LMG/Monitoring-Suspicious-Activity-Rules.htm
upvoted 5 times
david13121991
2 years ago
I agree answer D
upvoted 2 times
...
...
Dino0329
Most Recent 1 year, 3 months ago
Monitoring Suspicious Activity Rules Suspicious Activity Monitoring (SAM) is a utility that is integrated in SmartView Monitor. It can be used to block activities that are displayed in the SmartView Monitor results and appear to be suspicious. For example, a user who continually tries to gain unauthorized access to a network or Internet resource can be blocked. A Security Gateway with SAM enabled has Firewall rules to block suspicious connections that are not restricted by the Security Policy. These rules are applied immediately. Installing policy is not required. SAM rules allow administrators to react to a security problem without having to change the Firewall rules of the Access Control Rule Base. This is useful in cases where a specific user needs to be instantly blocked. All inbound and outbound network activity should be inspected and identified as suspicious when necessary, such as when system activity indicates that someone is attempting to break into the network.
upvoted 1 times
...
geroboamo
1 year, 4 months ago
Selected Answer: D
you can do this with SAM
upvoted 1 times
...
darkdante24
1 year, 5 months ago
SAM It is I had same question in my pearsonvue practice test answer is SAM
upvoted 1 times
...
Ritchie84
1 year, 6 months ago
Selected Answer: D
SAM it is...
upvoted 1 times
...
DarthFrank
1 year, 7 months ago
I've noticed a lot of the "show suggested answer" are incorrect. I am doing some studying with testing question software and I've searched the questions to confirm if they are right or not. I've been doing CP for many years and I know the answer, but see they said something else. So it got me to question if I was right or what. So on my study question I'm doing it says the correct answer is "policy-based routing". This site says it's "Anti-Malware protection". I personally thought it was SAM and that is why I looked it up and I see everyone else is saying the same thing. Has anyone taken the R81 test and gotten these questions? Are you using your own correct answer, or do you go with the ones that they are saying on here or other testing software?
upvoted 1 times
...
NineInchName
1 year, 10 months ago
Check Point Certified Security Administrator (CCSA) R81.10 guide (page 595): "SAM rules let administrators react to a security problem without having to change the Firewall rules of the Access Control Rulebase. This is useful in cases where a specific user needs to be instantly blocked."
upvoted 2 times
...
OKELLS
1 year, 11 months ago
SAM you can block networks OR HOSTS/ 32 on the fly without installing policy - ANS =D
upvoted 1 times
...
Sup007
1 year, 12 months ago
SAM is correct
upvoted 1 times
...
simo94
2 years ago
Selected Answer: D
SAM is correct
upvoted 1 times
...
gielda211
2 years ago
Selected Answer: D
SAM is correct
upvoted 1 times
...
bernardesgo
2 years ago
Selected Answer: D
D is correct
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...