Exam 156-21581 All QuestionsBrowse all questions from this exam
Question 113

To increase security, the administrator has modified the Core protection ‘Host Port Scan’ from ‘Medium’ to ‘High’ Predefined Sensitivity. Which Policy should the administrator install after Publishing the changes?

    Correct Answer: B

    To increase security by modifying the Core protection setting, the administrator needs to reinstall the Access Control Policy after publishing the changes. Core protections in Check Point's architecture are part of the Access Control policy, and while they are configured through the Threat Prevention policy settings, they are enforced through the Access Control policy.

Discussion
pepso100Option: B

correct is B. In the past it was under IPS. Now on R80.x this "ex-IPS" part of policy called CORE were moved to ACCESS CONTROL The IPS protections are divided into two main types: Core protections - These protections are included in the product and are assigned per gateway. They are part of the Access Control policy. ThreatCloud protections - Updated from the Check Point cloud, (see Updating IPS Protections). These protections are part of the Threat Prevention policy. Here is table , how it was change https://community.checkpoint.com/t5/Management/Where-did-all-my-IPS-Protections-go/m-p/3497?searchId=396ad4e8-2509-4862-b15f-61fb6460769e&searchIndex=1&sr=searc

cpointerOption: B

Core Protections are installed via Access policy installation. This is even visible in the screenshot from sk110873 which is mentioned in an older comment.

NineInchNameOption: B

Check Point Certified Security Administrator (CCSA) R81.10 Guide (page 644): "Core Protections are configured by selecting the Inspection Settings hyperlink in the Threat Prevention Policy. However, they are installed as part of the Access Control Policy."

monkemann21Option: D

Should be correct. Host port scan falls under Threat Prevention Policy according to: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk110873 https://community.checkpoint.com/t5/Threat-Prevention/Port-scan-from-external-network/td-p/65445

jjdrew

Not true. Test this in your production environment and then call support. I've seen dozens of cases where the customer didn't know how to do this. Core protections are enabled by Threat Prevention being active, but are installed with the Access Control policy.

DRFPOption: B

The answer is Access Control Policy. https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ThreatPrevention_AdminGuide/Topics-TPG/IPS_Protections.htm

DankataOption: B

https://support.checkpoint.com/results/sk/sk162493

paul001Option: B

The question asks about which policy should be installed, not which policy should the change be made on. You have to install the access policy to effect a core policy change made in the TP policy.

Nando0505Option: B

correct B

darkdante24Option: B

It is the Access control policy. Core Protection are installed via ACL see: https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ThreatPrevention_AdminGuide/Topics-TPG/IPS_Protections.htm

luismgOption: B

They are installed after installing the access control poicy

Doris8000Option: B

https://community.checkpoint.com/t5/Threat-Prevention/Exceptions-on-IPS-Core-Protections/td-p/63103

McBeanoOption: D

I would say D. IPS is a threat prevention blade. Enable Intrusion Prevention System (IPS) protection "Host Port Scan" to detect port scan: https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&eventSubmit_doGoviewsolutiondetails=&solutionid=sk110873

jjdrew

Not true. Test this in your production environment and then call support. I've seen dozens of cases where the customer didn't know how to do this. Core protections are enabled by Threat Prevention being active, but are installed with the Access Control policy.

kevin403Option: B

Ans: ACCESS CONTROL POLICY

kevin403

Sorry is threat prevention Policy. Note To enforce the IPS updates, you must install the Threat Prevention Policy.