Exambible offers free demo for 156-215.80 exam. "Check Point Certified Security Administrator", also known as 156-215.80 exam, is a Check-Point Certification. This set of posts, Passing the Check-Point 156-215.80 exam, will help you answer those questions. The 156-215.80 Questions & Answers covers all the knowledge points of the real exam. 100% real Check-Point 156-215.80 exams and revised by experts!
Check 156-215.80 free dumps before getting the full version:
NEW QUESTION 1
What is true about the IPS-Blade?
Answer: A
NEW QUESTION 2
What needs to be configured if the NAT property ‘Translate destination on client side’ is not enabled in Global properties?
Answer: C
NEW QUESTION 3
Fill in the blank: Service blades must be attached to a _____ .
Answer: A
NEW QUESTION 4
Which of the following licenses are considered temporary?
Answer: B
Explanation:
Should be Trial or Evaluation, even Plug-and-play (all are synonyms ). Answer B is the best choice.
NEW QUESTION 5
Which utility shows the security gateway general system information statistics like operating system information and resource usage, and individual software blade statistics of VPN, Identity Awareness and DLP?
Answer: C
Explanation:
CPView Utility is a text based built-in utility that can be run ('cpview' command) on Security Gateway / Security Management Server / Multi-Domain Security Management Server. CPView Utility shows statistical data that contain both general system information (CPU, Memory, Disk space) and information for different Software Blades (only on Security Gateway). The data is continuously updated in easy to access views.
NEW QUESTION 6
What is the best sync method in the ClusterXL deployment?
Answer: B
NEW QUESTION 7
Which set of objects have an Authentication tab?
Answer: A
NEW QUESTION 8
How Capsule Connect and Capsule Workspace differ?
Answer: A
NEW QUESTION 9
When using GAiA, it might be necessary to temporarily change the MAC address of the interface eth 0 to 00:0C:29:12:34:56. After restarting the network the old MAC address should be active. How do you configure this change?
Answer: C
NEW QUESTION 10
You want to store the GAiA configuration in a file for later reference. What command should you use?
Answer: D
NEW QUESTION 11
What happens if the identity of a user is known?
Answer: D
NEW QUESTION 12
Examine the following Rule Base.
What can we infer about the recent changes made to the Rule Base?
Answer: D
Explanation:
On top of the print screen there is a number "8" which consists for the number of changes made and not saved. Session Management Toolbar (top of SmartConsole)
NEW QUESTION 13
Traffic from source 192.168.1.1 is going to www.google.com. The Application Control Blade on the gateway is inspecting the traffic. Assuming acceleration is enable which path is handling the traffic?
Answer: A
NEW QUESTION 14
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ____ .
Answer: B
Explanation:
To enable Identity Awareness:
Log in to SmartDashboard.
From the Network Objects tree, expand the Check Point branch.
Double-click the Security Gateway on which to enable Identity Awareness.
In the Software Blades section, select Identity Awareness on the Network Security tab.
The Identity Awareness
Configuration wizard opens.
Select one or more options. These options set the methods for acquiring identities of managed and unmanaged assets.
AD Query - Lets the Security Gateway seamlessly identify Active Directory users and computers
Browser-Based Authentication - Sends users to a Web page to acquire identities from unidentified users. If Transparent Kerberos Authentication is configured, AD users may be identified transparently.
NEW QUESTION 15
What is the purpose of Captive Portal?
Answer: C
Explanation:
Captive Portal – a simple method that authenticates users through a web interface before granting them access to Intranet resources. When users try to access a protected resource, they get a web page that
must be filled out to continue.
Reference : https://www.checkpoint.com/products/identity-awareness-software-blade/
NEW QUESTION 16
During the Check Point Stateful Inspection Process, for packets that do not pass Firewall Kernel Inspection and are rejected by the rule definition, packets are:
Answer: D
NEW QUESTION 17
Which one of the following is the preferred licensing model? Select the Best answer.
Answer: B
Explanation:
Central License
A Central License is a license attached to the Security Management server IP address, rather than the gatewa IP address. The benefits of a Central License are:
Only one IP address is needed for all licenses.
A license can be taken from one gateway and given to another.
The new license remains valid when changing the gateway IP address. There is no need to create and install a new license.
NEW QUESTION 18
Fill in the blank: The R80 utility fw monitor is used to troubleshoot _______
Answer: C
Explanation:
Check Point's FW Monitor is a powerful built-in tool for capturing network traffic at the packet level. The Monitor utility captures network packets at multiple capture points along the FireWall inspection chains. These captured packets can be inspected later using the WireShark
NEW QUESTION 19
Which of these components does NOT require a Security Gateway R77 license?
Answer: C
NEW QUESTION 20
How do you configure the Security Policy to provide uses access to the Captive Portal through an external (Internet) interface?
Answer: A
NEW QUESTION 21
Fill the blank. IT is Best Practice to have a _____ rule at the end of each policy layer.
Answer: A
NEW QUESTION 22
Which of the following is NOT an integral part of VPN communication within a network?
Answer: A
Explanation:
VPN key (to not be confused with pre-shared key that is used for authentication).
VPN trust entities, such as a Check Point Internal Certificate Authority (ICA). The ICA is part of the Check Point suite used for creating SIC trusted connection between Security Gateways, authenticating administrators and third party servers. The ICA provides certificates for internal Security Gateways and remote access clients which negotiate the VPN link.
VPN Domain - A group of computers and networks connected to a VPN tunnel by one VPN gateway that handles encryption and protects the VPN Domain members.
VPN Community - A named collection of VPN domains, each protected by a VPN gateway. References: http://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/13868.htm
NEW QUESTION 23
Fill in the blank: The IPS policy for pre-R80 gateways is installed during the _____.
Answer: B
Explanation:
https://sc1.checkpoint.com/documents/R80/CP_R80BC_ThreatPrevention/html_frameset.htm?topic=documents
NEW QUESTION 24
While in SmartView Tracker, Brady has noticed some very odd network traffic that he thinks could be an intrusion. He decides to block the traffic for 60 minutes, but cannot remember all the steps. What is the correct order of steps needed to set up the block?
1) Select Active Mode tab in SmartView Tracker.
2) Select Tools > Block Intruder.
3) Select Log Viewing tab in SmartView Tracker.
4) Set Blocking Timeout value to 60 minutes.
5) Highlight connection that should be blocked.
Answer: C
NEW QUESTION 25
Which component functions as the Internal Certificate Authority for R77?
Answer: B
NEW QUESTION 26
Where can administrator edit a list of trusted SmartConsole clients in R80?
Answer: C
NEW QUESTION 27
What does ExternalZone represent in the presented rule?
Answer: B
Explanation:
Configuring Interfaces
Configure the Security Gateway 80 interfaces in the Interfaces tab in the Security Gateway window. To configure the interfaces:
From the Devices window, double-click the Security Gateway 80.
The Security Gateway
window opens.
Select the Interfaces tab.
Select Use the following settings. The interface settings open.
Select the interface and click Edit.
The Edit window opens.
From the IP Assignment section, configure the IP address of the interface:
Select Static IP.
Enter the IP address and subnet mask for the interface.
In Security Zone, select Wireless, DMS, External, or Internal. Security zone is a type of zone, created by a bridge to easily create segments, while maintaining IP addresses and router configurations. Security zones let you choose if to enable or not the firewall between segments.
References:
NEW QUESTION 28
ABC Corp., and have recently returned from a training course on Check Point's new advanced R80 management platform. You are presenting an in-house R80 Management to the other administrators in ABC Corp.
How will you describe the new “Publish” button in R80 Management Console?
Answer: C
Explanation:
To make your changes available to other administrators, and to save the database before installing a policy, you must publish the session. When you publish a session, a new database version is created.
NEW QUESTION 29
VPN gateways must authenticate to each other prior to exchanging information. What are the two types of credentials used for authentication?
Answer: C
NEW QUESTION 30
You can see the following graphic:
What is presented on it?
Answer: A
NEW QUESTION 31
......
Thanks for reading the newest 156-215.80 exam dumps! We recommend you to try the PREMIUM Dumpscollection 156-215.80 dumps in VCE and PDF here: http://www.dumpscollection.net/dumps/156-215.80/ (485 Q&As Dumps)