A Review Of Vivid 156-215.80 Training Tools

Realistic of 156-215.80 free draindumps materials and test preparation for Check-Point certification for IT engineers, Real Success Guaranteed with Updated 156-215.80 pdf dumps vce Materials. 100% PASS Check Point Certified Security Administrator exam Today!

Online Check-Point 156-215.80 free dumps demo Below:

Page: 1 / 40
Total 485 questions Full Exam Access
Question 1
- (Exam Topic 2)
The most important part of a site-to-site VPN deployment is the ____.
My answer: -
Reference answer: C
Reference analysis:

Site to Site VPN
The basis of Site to Site VPN is the encrypted VPN tunnel. Two Security Gateways negotiate a link and create a VPN tunnel and each tunnel can contain more than one VPN connection. One Security Gateway can maintain more than one VPN tunnel at the same time.

Question 2
- (Exam Topic 1)
ABC Corp., and have recently returned from a training course on Check Point's new advanced R80 management platform. You are presenting an in-house R80 Management to the other administrators in ABC Corp.
156-215.80 dumps exhibit
How will you describe the new “Publish” button in R80 Management Console?
My answer: -
Reference answer: C
Reference analysis:

To make your changes available to other administrators, and to save the database before installing a policy, you must publish the session. When you publish a session, a new database version is created.

Question 3
- (Exam Topic 4)
Fill the blank. IT is Best Practice to have a _____ rule at the end of each policy layer.
My answer: -
Reference answer: A
Reference analysis:

None

Question 4
- (Exam Topic 2)
When using LDAP as an authentication method for Identity Awareness, the query:
My answer: -
Reference answer: D
Reference analysis:

None

Question 5
- (Exam Topic 4)
Which deployment adds a Security Gateway to an existing environment without changing IP routing?
My answer: -
Reference answer: B
Reference analysis:

None

Question 6
- (Exam Topic 2)
What does it mean if Bob gets this result on an object search? Refer to the image below. Choose the BEST answer.
156-215.80 dumps exhibit
My answer: -
Reference answer: B
Reference analysis:

None

Question 7
- (Exam Topic 4)
Which of the following is NOT a method used by Identity Awareness for acquiring identity?
My answer: -
Reference answer: D
Reference analysis:

None

Question 8
- (Exam Topic 3)
Which the following type of authentication on Mobile Access can NOT be used as the first authentication method?
My answer: -
Reference answer: A
Reference analysis:

None

Question 9
- (Exam Topic 4)
Access roles allow the firewall administrator to configure Network access according to:
My answer: -
Reference answer: C
Reference analysis:

None

Question 10
- (Exam Topic 2)
Fill in the blank: Licenses can be added to the License and Contract repository _____.
My answer: -
Reference answer: A
Reference analysis:

None

Question 11
- (Exam Topic 3)
What happens if the identity of a user is known?
My answer: -
Reference answer: C
Reference analysis:

None

Question 12
- (Exam Topic 4)
Traffic from source 192.168.1.1 is going to www.google.com. The Application Control Blade on the gateway is inspecting the traffic. Assuming acceleration is enable which path is handling the traffic?
My answer: -
Reference answer: A
Reference analysis:

None

Question 13
- (Exam Topic 1)
View the rule below. What does the lock-symbol in the left column mean? Select the BEST answer.
156-215.80 dumps exhibit
My answer: -
Reference answer: B
Reference analysis:

Administrator Collaboration
More than one administrator can connect to the Security Management Server at the same time. Every administrator has their own username, and works in a session that is independent of the other administrators.
When an administrator logs in to the Security Management Server through SmartConsole, a new editing session starts. The changes that the administrator makes during the session are only available to that administrator. Other administrators see a lock icon on object and rules that are being edited.
To make changes available to all administrators, and to unlock the objects and rules that are being edited, the administrator must publish the session.

Question 14
- (Exam Topic 1)
Which of the following is NOT a SecureXL traffic flow?
My answer: -
Reference answer: C
Reference analysis:

SecureXL is an acceleration solution that maximizes performance of the Firewall and does not compromise security. When SecureXL is enabled on a Security Gateway, some CPU intensive operations are processed by virtualized software instead of the Firewall kernel. The Firewall can inspect and process connections more efficiently and accelerate throughput and connection rates. These are the SecureXL traffic flows:
Slow path - Packets and connections that are inspected by the Firewall and are not processed by SecureXL. Accelerated path - Packets and connections that are offloaded to SecureXL and are not processed by the
Firewall.
Medium path - Packets that require deeper inspection cannot use the accelerated path. It is not necessary for the Firewall to inspect these packets, they can be offloaded and do not use the slow path. For example, packets that are inspected by IPS cannot use the accelerated path and can be offloaded to the IPS PSL (Passive Streaming Library). SecureXL processes these packets more quickly than packets on the slow path.

Question 15
- (Exam Topic 4)
How would you determine the software version from the CLI?
My answer: -
Reference answer: A
Reference analysis:

None

Question 16
- (Exam Topic 4)
Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?
My answer: -
Reference answer: A
Reference analysis:

None

Question 17
- (Exam Topic 1)
WeBControl Layer has been set up using the settings in the following dialogue:
156-215.80 dumps exhibit
Consider the following policy and select the BEST answer.
156-215.80 dumps exhibit
My answer: -
Reference answer: D
Reference analysis:

Policy Layers and Sub-Policies
R80 introduces the concept of layers and sub-policies, allowing you to segment your policy according to your network segments or business units/functions. In addition, you can also assign granular privileges by layer or sub-policy to distribute workload and tasks to the most qualified administrators
With layers, the rule base is organized into a set of security rules. These set of rules or layers, are inspected in the order in which they are defined, allowing control over the rule base flow and the security functionalities that take precedence. If an “accept” action is performed across a layer, the inspection will continue to the next layer. For example, a compliance layer can be created to overlay across a cross-section of rules.
Sub-policies are sets of rules that are created for a specific network segment, branch office or business unit, so if a rule is matched, inspection will continue through this subset of rules before it moves on to the next rule.
Sub-policies and layers can be managed by specific administrators, according to their permissions profiles. This facilitates task delegation and workload distribution.

Question 18
- (Exam Topic 1)
To optimize Rule Base efficiency, the most hit rules should be where?
My answer: -
Reference answer: C
Reference analysis:

It is logical that if lesser rules are checked for the matched rule to be found the lesser CPU cycles the device is using. Checkpoint match a session from the first rule on top till the last on the bottom.

Question 19
- (Exam Topic 2)
Your manager requires you to setup a VPN to a new business partner site. The administrator from the partner site gives you his VPN settings and you notice that he setup AES 128 for IKE phase 1 and AES 256 for IKE phase 2. Why is this a problematic setup?
My answer: -
Reference answer: C
Reference analysis:

None

Question 20
- (Exam Topic 4)
Which Threat Prevention Profile is not included by default in R80 Management?
My answer: -
Reference answer: D
Reference analysis:

None

Question 21
- (Exam Topic 2)
Can a Check Point gateway translate both source IP address and destination IP address in a given packet?
My answer: -
Reference answer: A
Reference analysis:

None

Question 22
- (Exam Topic 1)
Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?
My answer: -
Reference answer: B
Reference analysis:

AD Query extracts user and computer identity information from the Active Directory Security Event Logs. The system generates a Security Event log entry when a user or computer accesses a network resource. For example, this occurs when a user logs in, unlocks a screen, or accesses a network drive.
Reference : https://sc1.checkpoint.com/documents/R76/CP_R76_IdentityAwareness_AdminGuide/62402.htm

Question 23
- (Exam Topic 3)
What is the benefit of Manual NAT over Automatic NAT?
My answer: -
Reference answer: C
Reference analysis:

None

Page: 1 / 40
Total 485 questions Full Exam Access