High Value Check-Point 156-215.80 Bundle

It is more faster and easier to pass the Check-Point 156-215.80 exam by using Pinpoint Check-Point Check Point Certified Security Administrator questuins and answers. Immediate access to the Down to date 156-215.80 Exam and find the same core area 156-215.80 questions with professionally verified answers, then PASS your exam with a high score now.

Page: 1 / 40
Total 485 questions Full Exam Access
Question 1
- (Exam Topic 1)
What are the two types of address translation rules?
My answer: -
Reference answer: D
Reference analysis:

NAT Rule Base
The NAT Rule Base has two sections that specify how the IP addresses are translated:
Original Packet
Translated Packet References:

Question 2
- (Exam Topic 1)
Ken wants to obtain a configuration lock from other administrator on R80 Security Management Server. He can do this via WebUI or a via CLI. Which command should be use in CLI? Choose the correct answer.
My answer: -
Reference answer: D
Reference analysis:

Use the database feature to obtain the configuration lock. The database feature has two commands:
lock database [override].
unlock database
The commands do the same thing: obtain the configuration lock from another administrator.
\"156-215.80

Question 3
- (Exam Topic 2)
Which of the following is NOT a back up method?
My answer: -
Reference answer: A
Reference analysis:

The built-in Gaia backup procedures:
Snapshot Management
System Backup (and System Restore)
Save/Show Configuration (and Load Configuration)
Check Point provides three different procedures for backing up (and restoring) the operating system and networking parameters on your appliances.
Snapshot (Revert)
Backup (Restore)
upgrade_export (Migrate) References:

Question 4
- (Exam Topic 1)
Which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?
My answer: -
Reference answer: B
Reference analysis:

To create a new permission profile:
In SmartConsole, go to Manage & Settings > Permissions and Administrators > Permission Profiles.
Click New Profile.
The New Profile window opens.
Enter a unique name for the profile.
Select a profile type:
Read/Write All - Administrators can make changes
Auditor (Read Only All) - Administrators can see information but cannot make changes
Customized - Configure custom settings
Click OK.

Question 5
- (Exam Topic 4)
Which of the following is a new R80.10 Gateway feature that had not been available in R77.X and older?
My answer: -
Reference answer: D
Reference analysis:

None

Question 6
- (Exam Topic 3)
Your company enforces a strict change control policy. Which of the following would be MOST effective for quickly dropping an attacker's specific active connection?
My answer: -
Reference answer: B
Reference analysis:

None

Question 7
- (Exam Topic 3)
Where does the security administrator activate Identity Awareness within SmartDashboard?
My answer: -
Reference answer: A
Reference analysis:

None

Question 8
- (Exam Topic 4)
Which of the following is NOT a valid deployment option for R80?
My answer: -
Reference answer: D
Reference analysis:

None

Question 9
- (Exam Topic 1)
To optimize Rule Base efficiency, the most hit rules should be where?
My answer: -
Reference answer: C
Reference analysis:

It is logical that if lesser rules are checked for the matched rule to be found the lesser CPU cycles the device is using. Checkpoint match a session from the first rule on top till the last on the bottom.

Question 10
- (Exam Topic 2)
NAT can NOT be configured on which of the following objects?
My answer: -
Reference answer: A
Reference analysis:

None

Question 11
- (Exam Topic 1)
WeBControl Layer has been set up using the settings in the following dialogue:
156-215.80 dumps exhibit
Consider the following policy and select the BEST answer.
156-215.80 dumps exhibit
My answer: -
Reference answer: D
Reference analysis:

Policy Layers and Sub-Policies
R80 introduces the concept of layers and sub-policies, allowing you to segment your policy according to your network segments or business units/functions. In addition, you can also assign granular privileges by layer or sub-policy to distribute workload and tasks to the most qualified administrators
With layers, the rule base is organized into a set of security rules. These set of rules or layers, are inspected in the order in which they are defined, allowing control over the rule base flow and the security functionalities that take precedence. If an “accept” action is performed across a layer, the inspection will continue to the next layer. For example, a compliance layer can be created to overlay across a cross-section of rules.
Sub-policies are sets of rules that are created for a specific network segment, branch office or business unit, so if a rule is matched, inspection will continue through this subset of rules before it moves on to the next rule.
Sub-policies and layers can be managed by specific administrators, according to their permissions profiles. This facilitates task delegation and workload distribution.

Question 12
- (Exam Topic 4)
Fill in the blank: Service blades must be attached to a _____ .
My answer: -
Reference answer: A
Reference analysis:

None

Question 13
- (Exam Topic 1)
Which one of the following is the preferred licensing model? Select the Best answer.
My answer: -
Reference answer: B
Reference analysis:

Central License
A Central License is a license attached to the Security Management server IP address, rather than the gatewa IP address. The benefits of a Central License are:
Only one IP address is needed for all licenses.
A license can be taken from one gateway and given to another.
The new license remains valid when changing the gateway IP address. There is no need to create and install a new license.

Question 14
- (Exam Topic 4)
You want to store the GAiA configuration in a file for later reference. What command should you use?
My answer: -
Reference answer: D
Reference analysis:

None

Question 15
- (Exam Topic 1)
Which of the following are types of VPN communicates?
My answer: -
Reference answer: D
Reference analysis:

None

Question 16
- (Exam Topic 4)
Traffic from source 192.168.1.1 is going to www.google.com. The Application Control Blade on the gateway is inspecting the traffic. Assuming acceleration is enable which path is handling the traffic?
My answer: -
Reference answer: A
Reference analysis:

None

Question 17
- (Exam Topic 1)
If there are two administrators logged in at the same time to the SmartConsole, and there are objects locked for editing, what must be done to make them available to other administrators? Choose the BEST answer.
My answer: -
Reference answer: A
Reference analysis:

To make changes available to all administrators, and to unlock the objects and rules that are being edited, the administrator must publish the session.
To make your changes available to other administrators, and to save the database before installing a policy, you must publish the session. When you publish a session, a new database version is created.
When you select Install Policy, you are prompted to publish all unpublished changes. You cannot install a policy if the included changes are not published.

Question 18
- (Exam Topic 2)
The IT Management team is interested in the new features of the Check Point R80 Management and wants to upgrade but they are concerned that the existing R77.30 Gaia Gateways cannot be managed by R80 because it is so different. As the administrator responsible for the Firewalls, how can you answer or confirm these concerns?
My answer: -
Reference answer: A
Reference analysis:

None

Question 19
- (Exam Topic 4)
In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?
My answer: -
Reference answer: C
Reference analysis:

None

Question 20
- (Exam Topic 3)
As a Security Administrator, you must refresh the Client Authentication authorized time-out every time a new user connection is authorized. How do you do this? Enable the Refreshable Timeout setting:
My answer: -
Reference answer: C
Reference analysis:

None

Question 21
- (Exam Topic 2)
Fill in the blank: A ____ is used by a VPN gateway to send traffic as if it were a physical interface.
My answer: -
Reference answer: A
Reference analysis:

Route Based VPN
VPN traffic is routed according to the routing settings (static or dynamic) of the Security Gateway operating system. The Security Gateway uses a VTI (VPN Tunnel Interface) to send the VPN traffic as if it were a physical interface. The VTIs of Security Gateways in a VPN community connect and can support dynamic routing protocols.

Question 22
- (Exam Topic 2)
Fill in the blank: Once a license is activated, a ____ should be installed.
My answer: -
Reference answer: C
Reference analysis:

Service Contract File
Following the activation of the license, a Service Contract File should be installed. This file contains important information about all subscriptions purchased for a specific device and is installed via SmartUpdate. A detailed Explanation: of the Service Contract File can be found in sk33089.

Question 23
- (Exam Topic 4)
Using ClusterXL, what statement is true about the Sticky Decision Function?
My answer: -
Reference answer: A
Reference analysis:

None

Question 24
- (Exam Topic 2)
Which command is used to obtain the configuration lock in Gaia?
My answer: -
Reference answer: A
Reference analysis:

Obtaining a Configuration Lock
lock database override
unlock database

Question 25
- (Exam Topic 2)
Which Check Point software blade provides visibility of users, groups and machines while also providing access control through identity-based policies?
My answer: -
Reference answer: B
Reference analysis:

Check Point Identity Awareness Software Blade provides granular visibility of users, groups and machines, providing unmatched application and access control through the creation of accurate, identity-based policies. Centralized management and monitoring allows for policies to be managed from a single, unified console.

Question 26
- (Exam Topic 2)
Which type of Endpoint Identity Agent includes packet tagging and computer authentication?
My answer: -
Reference answer: A
Reference analysis:

Endpoint Identity Agents – dedicated client agents installed on users’ computers that acquire and report identities to the Security Gateway.

Question 27
- (Exam Topic 3)
What is the command to see cluster status in cli expert mode?
My answer: -
Reference answer: A
Reference analysis:

None

Page: 1 / 40
Total 485 questions Full Exam Access