Certbus > CheckPoint > CCSA R80 > 156-215.80 > 156-215.80 Online Practice Questions and Answers

156-215.80 Online Practice Questions and Answers

Questions 4

Which of the following commands is used to monitor cluster members?

A. cphaprob state

B. cphaprob status

C. cphaprob

D. cluster state

Browse 535 Q&As
Questions 5

How would you determine the software version from the CLI?

A. fw ver

B. fw stat

C. fw monitor

D. cpinfo

Browse 535 Q&As
Questions 6

Which of the following Windows Security Events will NOT map a username to an IP address in Identity Awareness?

A. Kerberos Ticket Renewed

B. Kerberos Ticket Requested

C. Account Logon

D. Kerberos Ticket Timed Out

Browse 535 Q&As
Questions 7

When should you generate new licenses?

A. Before installing contract files.

B. After an RMA procedure when the MAC address or serial number of the appliance changes.

C. When the existing license expires, license is upgraded or the IP-address where the license is tied changes.

D. Only when the license is upgraded.

Browse 535 Q&As
Questions 8

Which option, when applied to a rule, allows all encrypted and non-VPN traffic that matches the rule?

A. All Site-to-Site VPN Communities

B. Accept all encrypted traffic

C. All Connections (Clear or Encrypted)

D. Specific VPN Communities

Browse 535 Q&As
Questions 9

You find that Users are not prompted for authentication when they access their Web servers, even though you have created an HTTP rule via User Authentication. Choose the BEST reason why.

A. You checked the cache password on desktop option in Global Properties.

B. Another rule that accepts HTTP without authentication exists in the Rule Base.

C. You have forgotten to place the User Authentication Rule before the Stealth Rule.

D. Users must use the SecuRemote Client, to use the User Authentication Rule.

Browse 535 Q&As
Questions 10

How do you configure an alert in SmartView Monitor?

A. An alert cannot be configured in SmartView Monitor.

B. By choosing the Gateway, and Configure Thresholds.

C. By right-clicking on the Gateway, and selecting Properties.

D. By right-clicking on the Gateway, and selecting System Information.

Browse 535 Q&As
Questions 11

Traffic from source 192.168.1.1 is going to www.google.com. The Application Control Blade on the gateway is inspecting the traffic. Assuming acceleration is enable which path is handling the traffic?

A. Slow Path

B. Medium Path

C. Fast Path

D. Accelerated Path

Browse 535 Q&As
Questions 12

Fill in the blanks: VPN gateways authenticate using ___________ and ___________ .

A. Passwords; tokens

B. Certificates; pre-shared secrets

C. Certificates; passwords

D. Tokens; pre-shared secrets

Browse 535 Q&As
Questions 13

Choose the Best place to find a Security Management Server backup file named backup_fw, on a Check Point Appliance.

A. /var/log/Cpbackup/backups/backup/backup_fw.tgs

B. /var/log/Cpbackup/backups/backup/backup_fw.tar

C. /var/log/Cpbackup/backups/backups/backup_fw.tar

D. /var/log/Cpbackup/backups/backup_fw.tgz

Browse 535 Q&As
Questions 14

Why would an administrator see the message below?

A. A new Policy Package created on both the Management and Gateway will be deleted and must be packed up first before proceeding.

B. A new Policy Package created on the Management is going to be installed to the existing Gateway.

C. A new Policy Package created on the Gateway is going to be installed on the existing Management.

D. A new Policy Package created on the Gateway and transferred to the management will be overwritten by the Policy Package currently on the Gateway but can be restored from a periodic backup on the Gateway.

Browse 535 Q&As
Questions 15

There are two R77.30 Security Gateways in the Firewall Cluster. They are named FW_A and FW_B. The cluster is configured to work as HA (High availability) with default cluster configuration. FW_A is configured to have higher priority than FW_B. FW_A was active and processing the traffic in the morning. FW_B was standby. Around 1100 am, its interfaces went down and this caused a failover. FW_B became active. After an hour, FW_A's interface issues were resolved and it became operational. When it re-joins the cluster, will it become active automatically?

A. No, since "maintain current active cluster member" option on the cluster object properties is enabled by default

B. No, since "maintain current active cluster member" option is enabled by default on the Global Properties

C. Yes, since "Switch to higher priority cluster member" option on the cluster object properties is enabled by default

D. Yes, since "Switch to higher priority cluster member" option is enabled by default on the Global Properties

Browse 535 Q&As
Questions 16

Which Check Point software blade provides protection from zero-day and undiscovered threats?

A. Firewall

B. Threat Emulation

C. Application Control

D. Threat Extraction

Browse 535 Q&As
Questions 17

You are the Check Point administrator for Alpha Corp. You received a call that one of the users is unable

to browse the Internet on their new tablet which is connected to the company wireless, which goes through

a Check Point Gateway.

How would you review the logs to see what is blocking this traffic?

A. Open SmartLog and connect remotely to the wireless controller

B. Open SmartEvent to see why they are being blocked

C. Open SmartDashboard and review the logs tab

D. Open SmartLog and filter for the IP address of the tablet

Browse 535 Q&As
Questions 18

The default method for destination NAT is _____________, where NAT occurs on the inbound interface closest to the client.

A. Destination side

B. Source side

C. Server side

D. Client side

Browse 535 Q&As
Exam Code: 156-215.80
Exam Name: Check Point Certified Security Administrator
Last Update: Apr 27, 2024
Questions: 535 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99