We offers . "Check Point Certified Security Administrator", also known as 156-215.80 exam, is a Check Point Certification. This set of posts, Passing the 156-215.80 exam with , will help you answer those questions. The covers all the knowledge points of the real exam. 100% real and revised by experts!
Online 156-215.80 free questions and answers of New Version:
NEW QUESTION 1
Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?
Answer: D
NEW QUESTION 2
The system administrator of a company is trying to find out why acceleration is not working for the traffic. The traffic is allowed according to the rule base and checked for viruses. But it is not accelerated. What is the most likely reason that the traffic is not accelerated?
Answer: D
NEW QUESTION 3
Please choose correct command syntax to add an “emailserver1” host with IP address 10.50.23.90 using GAiA management CLI?
Answer: D
NEW QUESTION 4
Which VPN routing option uses VPN routing for every connection a satellite gateway handles?
Answer: D
Explanation: On the VPN Routing page, enable the VPN routing for satellites section, by selecting one of these options:
To center and to other Satellites through center; this allows connectivity between Gateways; for example, if the spoke Gateways are DAIP Gateways, and the hub is a Gateway with a static IP address
To center, or through the center to other satellites, to Internet and other VPN targets; this allows connectivity between the Gateways, as well as the ability to inspect all communication passing through the hub to the Internet.
NEW QUESTION 5
What Check Point technologies deny or permit network traffic?
Answer: B
NEW QUESTION 6
Can a Check Point gateway translate both source IP address and destination IP address in a given packet?
Answer: A
NEW QUESTION 7
Which of the following is NOT a set of Regulatory Requirements related to Information Security?
Answer: A
Explanation: ISO 37001 - Anti-bribery management systems
NEW QUESTION 8
On the following picture an administrator configures Identity Awareness:
After clicking “Next” the above configuration is supported by:
Answer: B
Explanation: To enable Identity Awareness:
Log in to R80 SmartConsole.
From the Awareness.
Gateway&s
Servers
view, double-click the Security Gateway on which to enable Identity
On the Network Security tab, select Identity Awareness.
The Identity Awareness
Configuration wizard opens.
Select one or more options. These options set the methods for acquiring identities of managed and unmanaged assets.
AD Query - Lets the Security Gateway seamlessly identify Active Directory users and computers
Browser-Based Authentication - Sends users to a Web page to acquire identities from unidentified users. If Transparent Kerberos Authentication is configured, AD users may be identified transparently.
Terminal Servers - Identify users in a Terminal Server environment (originating from one IP address).
NEW QUESTION 9
What port is used for communication to the User Center with SmartUpdate?
Answer: D
NEW QUESTION 10
Which policy type is used to enforce bandwidth and traffic control rules?
Answer: C
Explanation: Check Point's QoS Solution
QoS is a policy-based QoS management solution from Check Point Software Technologies Ltd., satisfies your needs for a bandwidth management solution. QoS is a unique, software-only based application that manages traffic end-to-end across networks, by distributing enforcement throughout network hardware and software.
NEW QUESTION 11
Using mgmt_cli, what is the correct syntax to import a host object called Server_1 from the CLI?
Answer: A
NEW QUESTION 12
There are two R77.30 Security Gateways in the Firewall Cluster. They are named FW_A and FW_B. The cluster is configured to work as HA (High availability) with default cluster configuration. FW_A is configured to have higher priority than FW_B. FW_A was active and processing the traffic in the morning. FW_B was standby. Around 1100 am, its interfaces went down and this caused a failover. FW_B became active. After an hour, FW_A’s interface issues were resolved and it became operational. When it re-joins the cluster, will it become active automatically?
Answer: A
Explanation: What Happens When a Security Gateway Recovers?
In a Load Sharing configuration, when the failed Security Gateway in a cluster recovers, all connections are redistributed among all active members. High Availability and Load Sharing in ClusterXL ClusterXL Administration Guide R77 Versions | 31 In a High Availability configuration, when the failed Security Gateway in a cluster recovers, the recovery method depends on the configured cluster setting. The options are:
• Maintain Current Active Security Gateway means that if one member passes on control to a lower priority member, control will be returned to the higher priority member only if the lower priority member fails. This mode is recommended if all members are equally capable of processing traffic, in order to minimize the number of failover events.
• Switch to Higher Priority Security Gateway means that if the lower priority member has control and the higher priority member is restored, then control will be returned to the higher priority member. This mode is recommended if one member is better equipped for handling connections, so it will be the default Security Gateway.
NEW QUESTION 13
According to Check Point Best Practice, when adding a non-managed Check Point Gateway to a Check Point security solution what object SHOULD be added? A(n):
Answer: C
NEW QUESTION 14
Fill in the blank: RADIUS protocol uses ______ to communicate with the gateway.
Answer: A
Explanation: Parameters:
NEW QUESTION 15
You are conducting a security audit. While reviewing configuration files and logs, you notice logs accepting POP3 traffic, but you do not see a rule allowing POP3 traffic in the Rule Base. Which of the following is the
most likely cause?
Answer: C
NEW QUESTION 16
What is a reason for manual creation of a NAT rule?
Answer: D
NEW QUESTION 17
Study the Rule base and Client Authentication Action properties screen.
After being authenticated by the Security Gateways, a user starts a HTTP connection to a Web site. What happens when the user tries to FTP to another site using the command line? The:
Answer: C
NEW QUESTION 18
What component of R80 Management is used for indexing?
Answer: D
Recommend!! Get the Full 156-215.80 dumps in VCE and PDF From prep-labs.com, Welcome to Download: https://www.prep-labs.com/dumps/156-215.80/ (New 440 Q&As Version)