Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 156-215.81 All Questions

View all questions & answers for the 156-215.81 exam

Exam 156-215.81 topic 1 question 113 discussion

Actual exam question from Checkpoint's 156-215.81
Question #: 113
Topic #: 1
[All 156-215.81 Questions]

To increase security, the administrator has modified the Core protection ‘Host Port Scan’ from ‘Medium’ to ‘High’ Predefined Sensitivity. Which Policy should the administrator install after Publishing the changes?

  • A. The Access Control and Threat Prevention Policies.
  • B. The Access Control Policy.
  • C. The Access Control & HTTPS Inspection Policy.
  • D. The Threat Prevention Policy.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
yeru
1 week, 6 days ago
Protection Types The IPS protections are divided into two main types: Core protections - These protections are included in the product and are assigned per gateway. They are part of the Access Control policy. ThreatCloud protections - Updated from the Check Point cloud, (see Updating IPS Protections). These protections are part of the Threat Prevention policy.
upvoted 1 times
...
Nando0505
1 year ago
Selected Answer: B
correct B
upvoted 1 times
...
Dankata
1 year, 4 months ago
Selected Answer: B
https://support.checkpoint.com/results/sk/sk162493
upvoted 2 times
...
darkdante24
1 year, 5 months ago
Selected Answer: B
It is the Access control policy. Core Protection are installed via ACL see: https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ThreatPrevention_AdminGuide/Topics-TPG/IPS_Protections.htm
upvoted 1 times
...
luismg
1 year, 5 months ago
Selected Answer: B
They are installed after installing the access control poicy
upvoted 1 times
...
paul001
1 year, 6 months ago
The question asks about which policy should be installed, not which policy should the change be made on. You have to install the access policy to effect a core policy change made in the TP policy.
upvoted 2 times
...
cpointer
1 year, 7 months ago
Selected Answer: B
Core Protections are installed via Access policy installation. This is even visible in the screenshot from sk110873 which is mentioned in an older comment.
upvoted 3 times
...
Doris8000
1 year, 9 months ago
Selected Answer: B
https://community.checkpoint.com/t5/Threat-Prevention/Exceptions-on-IPS-Core-Protections/td-p/63103
upvoted 1 times
...
NineInchName
1 year, 10 months ago
Selected Answer: B
Check Point Certified Security Administrator (CCSA) R81.10 Guide (page 644): "Core Protections are configured by selecting the Inspection Settings hyperlink in the Threat Prevention Policy. However, they are installed as part of the Access Control Policy."
upvoted 3 times
...
pepso100
1 year, 11 months ago
Selected Answer: B
correct is B. In the past it was under IPS. Now on R80.x this "ex-IPS" part of policy called CORE were moved to ACCESS CONTROL The IPS protections are divided into two main types: Core protections - These protections are included in the product and are assigned per gateway. They are part of the Access Control policy. ThreatCloud protections - Updated from the Check Point cloud, (see Updating IPS Protections). These protections are part of the Threat Prevention policy. Here is table , how it was change https://community.checkpoint.com/t5/Management/Where-did-all-my-IPS-Protections-go/m-p/3497?searchId=396ad4e8-2509-4862-b15f-61fb6460769e&searchIndex=1&sr=searc
upvoted 4 times
...
McBeano
2 years ago
Selected Answer: D
I would say D. IPS is a threat prevention blade. Enable Intrusion Prevention System (IPS) protection "Host Port Scan" to detect port scan: https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&eventSubmit_doGoviewsolutiondetails=&solutionid=sk110873
upvoted 1 times
jjdrew
10 months, 3 weeks ago
Not true. Test this in your production environment and then call support. I've seen dozens of cases where the customer didn't know how to do this. Core protections are enabled by Threat Prevention being active, but are installed with the Access Control policy.
upvoted 1 times
...
...
kevin403
2 years ago
Selected Answer: B
Ans: ACCESS CONTROL POLICY
upvoted 1 times
kevin403
2 years ago
Sorry is threat prevention Policy. Note To enforce the IPS updates, you must install the Threat Prevention Policy.
upvoted 2 times
...
...
monkemann21
2 years ago
Selected Answer: D
Should be correct. Host port scan falls under Threat Prevention Policy according to: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk110873 https://community.checkpoint.com/t5/Threat-Prevention/Port-scan-from-external-network/td-p/65445
upvoted 3 times
jjdrew
10 months, 3 weeks ago
Not true. Test this in your production environment and then call support. I've seen dozens of cases where the customer didn't know how to do this. Core protections are enabled by Threat Prevention being active, but are installed with the Access Control policy.
upvoted 1 times
...
...
DRFP
2 years, 1 month ago
Selected Answer: B
The answer is Access Control Policy. https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ThreatPrevention_AdminGuide/Topics-TPG/IPS_Protections.htm
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...