DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

156-215 Exam Questions & Study Materials, Check Point Certified Security Administrator R80 | SPOTO

spoto offers the latest practice tests and exam materials to help you succeed on the Check Point Certified Security Administrator (CCSA) R80 certification exam. Our free test questions, exam practice, online exam questions, and sample questions cover the full scope of the CCSA R80 exam objectives. Realistic mock exams and exam dumps with questions and answers allow you to study actual exam content. These exam practice materials validate your skills in installing, configuring, and maintaining Check Point Security Gateway and Management Software Blade systems on the GAiA operating system. Up-to-date exam questions and study guides ensure you are prepared for the latest CCSA R80 certification topics. Utilizing our comprehensive exam materials is the best way to get ready to pass your certification on the first attempt.
Take other online exams

Question #1
Which software blade does NOT accompany the Threat Prevention policy?
A. Anti-virus
B. IPS
C. Threat Emulation
D. Application Control and URL Filtering
View answer
Correct Answer: D

View The Updated 156-215.80 Exam Questions

SPOTO Provides 100% Real 156-215.80 Exam Questions for You to Pass Your 156-215.80 Exam!

Question #2
What is the default shell for the command line interface?
A. Expert
B. Clish
C. Admin
D. Normal
View answer
Correct Answer: A
Question #3
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
A. None, Security Management Server would be installed by itself
B. SmartConsole
C. SecureClient
D. Security Gateway
View answer
Correct Answer: D
Question #4
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?
A. Security Gateway IP-address cannot be changed without re-establishing the trust
B. The Security Gateway name cannot be changed in command line without re-establishing trust
C. The Security Management Server name cannot be changed in SmartConsole without re-establishing trust
D. The Security Management Server IP-address cannot be changed without re-establishing the trust
View answer
Correct Answer: A
Question #5
How do you manage Gaia?
A. Through CLI and WebUI
B. Through CLI only
C. Through SmartDashboard only
D. Through CLI, WebUI, and SmartDashboard
View answer
Correct Answer: D
Question #6
Which of the following commands is used to verify license installation?
A. Cplic verify license
B. Cplic print
C. Cplic show
D. Cplic license
View answer
Correct Answer: B
Question #7
Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?
A. UserCheck
B. Active Directory Query
C. Account Unit Query
D. User Directory Query
View answer
Correct Answer: B
Question #8
The following graphic shows:
A. View from SmartLog for logs initiated from source address 10
B. View from SmartView Tracker for logs of destination address 10
C. View from SmartView Tracker for logs initiated from source address 10
D. View from SmartView Monitor for logs initiated from source address 10
View answer
Correct Answer: D
Question #9
Which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?
A. Auditor
B. Read Only All
C. Super User
D. Full Access
View answer
Correct Answer: C
Question #10
If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsible, which of these steps should NOT be performed:
A. Rename the hostname of the Standby member to match exactly the hostname of the Active member
B. Change the Standby Security Management Server to Active
C. Change the Active Security Management Server to Standby
D. Manually synchronize the Active and Standby Security Management Servers
View answer
Correct Answer: A
Question #11
Which one of the following is TRUE?
A. Ordered policy is a sub-policy within another policy
B. One policy can be either inline or ordered, but not both
C. Inline layer can be defined as a rule action
D. Pre-R80 Gateways do not support ordered layers
View answer
Correct Answer: C
Question #12
Which Threat Prevention Software Blade provides comprehensive against malicious and unwanted network traffic, focusing on application and server vulnerabilities?
A. Anti-Virus
B. IPS
C. Anti-Spam
D. Anti-bot
View answer
Correct Answer: B
Question #13
Which of the following are types of VPN communities?
A. Pentagon, star, and combination
B. Star, octagon, and combination
C. Combined and star
D. Meshed, star, and combination
View answer
Correct Answer: D
Question #14
When defining group-based access in an LDAP environment with Identity Awareness, what is the BEST object type to represent an LDAP group in a Security Policy?
A. Access Role
B. User Group
C. SmartDirectory Group
D. Group Template
View answer
Correct Answer: A
Question #15
Fill in the blank: The R80 utility fw monitor is used to troubleshoot _____________
A. User data base corruption
B. LDAP conflicts
C. Traffic issues
D. Phase two key negotiation
View answer
Correct Answer: A
Question #16
Which of the following is NOT a valid backup command for a Security Management Server?
A. save backup
B. add backup
C. add snapshot
D. migrate export
View answer
Correct Answer: A
Question #17
Which of the following commands can be used to remove site-to-site IPSEC Security Associations (SA)?
A. vpn tu
B. vpn ipsec remove -l
C. vpn debug ipsec
D. fw ipsec tu
View answer
Correct Answer: B
Question #18
Can multiple administrators connect to a Security Management Server at the same time?
A. No, only one can be connected
B. Yes, all administrators can modify a network object at the same time
C. Yes, every administrator has their own username, and works in a session that is independent of other administrators
D. Yes, but only one has the right to write
View answer
Correct Answer: C
Question #19
Which message indicates IKE Phase 2 has completed successfully?
A. Quick Mode Complete
B. Aggressive Mode Complete
C. Main Mode Complete
D. IKE Mode Complete
View answer
Correct Answer: A
Question #20
What is the purpose of a Stealth Rule?
A. A rule used to hide a server's IP address from the outside world
B. A rule that allows administrators to access SmartDashboard from any device
C. To drop any traffic destined for the firewall that is not otherwise explicitly allowed
D. A rule at the end of your policy to drop any traffic that is not explicitly allowed
View answer
Correct Answer: C
Question #21
Choose what BEST describes the Policy Layer Traffic Inspection.
A. If a packet does not match any of the inline layers, the matching continues to the next Layer
B. If a packet matches an inline layer, it will continue matching the next layer
C. If a packet does not match any of the inline layers, the packet will be matched against the Implicit Clean-up Rule
D. If a packet does not match a Network Policy Layer, the matching continues to its inline layer
View answer
Correct Answer: B
Question #22
Where is the “Hit Count” feature enabled or disabled in SmartConsole?
A. On the Policy Package
B. On each Security Gateway
C. On the Policy layer
D. In Global Properties for the Security Management Server
View answer
Correct Answer: B
Question #23
An Endpoint identity agent uses a ___________ for user authentication.
A. Shared secret
B. Token
C. Username/password or Kerberos Ticket
D. Certificate
View answer
Correct Answer: C
Question #24
The SIC Status “Unknown” means
A. There is connection between the gateway and Security Management Server but it is not trusted
B. The secure communication is established
C. There is no connection between the gateway and Security Management Server
D. The Security Management Server can contact the gateway, but cannot establish SIC
View answer
Correct Answer: C
Question #25
The position of an implied rule is manipulated in the __________________ window.
A. NAT
B. Firewall
C. Global Properties
D. Object Explorer
View answer
Correct Answer: C
Question #26
Administrator Kofi has just made some changes on his Management Server and then clicks on the Publish button in SmartConsole but then gets the error message shown in the screenshot below. Where can the administrator check for more information on these errors?
A. The Log and Monitor section in SmartConsole
B. The Validations section in SmartConsole
C. The Objects section in SmartConsoleD
View answer
Correct Answer: B
Question #27
Identify the ports to which the Client Authentication daemon listens on by default?
A. 259, 900
B. 256, 257
C. 8080, 529
D. 80, 256
View answer
Correct Answer: A
Question #28
The Gaia operating system supports which routing protocols?
A. BGP, OSPF, RIP
B. BGP, OSPF, EIGRP, PIM, IGMP
C. BGP, OSPF, RIP, PIM, IGMP
D. BGP, OSPF, RIP, EIGRP
View answer
Correct Answer: C
Question #29
ABC Corp has a new administrator who logs into the Gaia Portal to make some changes. He realizes that even though he has logged in as an administrator, he is unable to make any changes because all configuration options are greyed out as shown in the screenshot image below. What is the likely cause for this?
A. The Gaia /bin/confd is locked by another administrator from a SmartConsole session
B. The database is locked by another administrator SSH session
C. The Network address of his computer is in the blocked hosts
D. The IP address of his computer is not in the allowed hosts
View answer
Correct Answer: B
Question #30
While enabling the Identity Awareness blade the Identity Awareness wizard does not automatically detect the windows domain. Why does it not detect the windows domain?
A. Security Gateways is not part of the Domain
B. SmartConsole machine is not part of the domain
C. SMS is not part of the domain
D. Identity Awareness is not enabled on Global properties
View answer
Correct Answer: D
Question #31
Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?
A. One machine, but it needs to be installed using SecurePlatform for compatibility purposes
B. One machine
C. Two machines
D. Three machines
View answer
Correct Answer: C
Question #32
Fill in the blank: The _________ collects logs and sends them to the _________ .
A. Log server; security management server
B. Log server; Security Gateway
C. Security management server; Security Gateway
D. Security Gateways; log server
View answer
Correct Answer: B
Question #33
What is the default time length that Hit Count Data is kept?
A. 3 month
B. 4 weeks
C. 12 months
D. 6 months
View answer
Correct Answer: B
Question #34
Fill in the blank: The R80 feature ________ permits blocking specific IP addresses for a specified time period.
A. Block Port Overflow
B. Local Interface Spoofing
C. Suspicious Activity Monitoring
D. Adaptive Threat Prevention
View answer
Correct Answer: D

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: