DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

156-215 Practice Tests & Real Exam Dumps 2024 Updated, Check Point Certified Security Administrator R80 | SPOTO

Embark on your journey to 156-215 Exam Success with our comprehensive array of mock tests and study resources, curated specifically for Check Point Certified Security Administrators (CCSA) R80. Access a wide range of exam preparation materials, including practice tests, free tests, online exam questions, sample questions, and detailed mock exams. Whether you're looking for exam dumps or comprehensive exam questions and answers, our platform provides the resources you need to excel. Our latest practice tests and exam materials are meticulously crafted to equip you with the skills and knowledge required to pass the certification exam with flying colors. Prepare with confidence as you learn to install, configure, and maintain Check Point Security Gateway and Management Software Blade systems on the GAiA operating system. Let SPOTO be your guide to achieving certification success.
Take other online exams

Question #1
VPN gateways authenticate using ___________ and ___________ .
A. Passwords; tokens
B. Certificates; pre-shared secrets
C. Certificates; passwords
D. Tokens; pre-shared secrets
View answer
Correct Answer: B
Question #2
Which of the following is NOT a SecureXL traffic flow?
A. Medium Path
B. Accelerated PathC
D. Slow Path
View answer
Correct Answer: C
Question #3
While enabling the Identity Awareness blade the Identity Awareness wizard does not automatically detect the windows domain. Why does it not detect the windows domain?
A. Security Gateways is not part of the Domain
B. SmartConsole machine is not part of the domain
C. Security Management Server is not part of the domain
D. Identity Awareness is not enabled on Global properties
View answer
Correct Answer: B
Question #4
Your boss wants you to closely monitor an employee suspected of transferring company secrets to the competition. The IT department discovered the suspect installed a WinSCP client in order to use encrypted communication. Which of the following methods is BEST to accomplish this task?
A. Use SmartView Tracker to follow his actions by filtering log entries that feature the WinSCP destination port
B. Use SmartDashboard to add a rule in the firewall Rule Base that matches his IP address, and those of potential targets and suspicious protocols
C. Watch his IP in SmartView Monitor by setting an alert action to any packet that matches your Rule Base and his IP address for inbound and outbound traffic
D. Send the suspect an email with a keylogging Trojan attached, to get direct information about his wrongdoings
View answer
Correct Answer: A
Question #5
Fill in the blank: An LDAP server holds one or more ______________.
A. Server Units
B. Administrator Units
C. Account Units
D. Account Server
View answer
Correct Answer: C
Question #6
Using the SmartConsole, which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?
A. Editor
B. Read Only All
C. Super User
D. Full Access
View answer
Correct Answer: B
Question #7
Your users are defined in a Windows 2008 R2 Active Directory server. You must add LDAP users to a Client Authentication rule. Which kind of user group do you need in the Client Authentication rule in R77?
A. External-user group
B. LDAP group
C. A group with a genetic user
D. All Users
View answer
Correct Answer: B
Question #8
Fill in the blank: Authentication rules are defined for ____________.
A. User groups
B. Users using UserCheck
C. Individual users
D. All users in the database
View answer
Correct Answer: A
Question #9
With the User Directory Software Blade, you can create R80 user definitions on a(an) ___________ Server.
A. NT domain
B. SMTP
C. LDAP
D. SecurID
View answer
Correct Answer: C
Question #10
What is true about the IPS-Blade?
A. in R80, IPS is managed by the Threat Prevention Policy
B. in R80, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict
C. in R80, IPS Exceptions cannot be attached to “all rules”
D. in R80, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same
View answer
Correct Answer: A
Question #11
What is NOT an advantage of Packet Filtering?
A. Low Security and No Screening above Network Layer
B. Application Independence
C. High Performance
D. Scalability
View answer
Correct Answer: A
Question #12
To build an effective Security Policy, use a ________ and _______ rule.
A. Cleanup; stealth
B. Stealth; implicit
C. Cleanup; default
D. Implicit; explicit
View answer
Correct Answer: A
Question #13
Tina is a new administrator who is currently reviewing the new Check Point R80 Management console interface. In the Gateways view, she is reviewing the Summary screen as in the screenshot below. What as an 'Open Server'?
A. Check Point software deployed on a non-Check Point appliance
B. The Open Server Consortium approved Server Hardware used for the purpose of Security and Availability
C. A Check Point Management Server deployed using the Open Systems Interconnection (OSI) Server and Security deployment model
D. A Check Point Management Server software using the Open SSL
View answer
Correct Answer: A
Question #14
Your manager requires you to setup a VPN to a new business partner site. The administrator from the partner site gives you his VPN settings and you notice that he setup AES 128 for IKE phase 1 and AES 256 for IKE phase 2. Why is this a problematic setup?
A. The two algorithms do not have the same key length and so don't work together
B. All is fine as the longest key length has been chosen for encrypting the data and a shorter key length for higher performance for setting up the tunnel
C. Only 128 bit keys are used for phase 1 keys which are protecting phase 2, so the longer key length in phase 2 only costs performance and does not add security due to a shorter key in phase 1
D. All is fine and can be used as is
View answer
Correct Answer: C
Question #15
Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.
A. Down
B. No Response
C. Inactive
D. Failed
View answer
Correct Answer: A
Question #16
Bob and Joe both have Administrator Roles on their Gaia Platform. Bob logs in on the WebUI and then Joe logs in through CLI. Choose what BEST describes the following scenario, where Bob and Joe are both logged in:
A. When Joe logs in, Bob will be logged out automatically
B. Since they both are logged in on different interfaces, they both will be able to make changes
C. The database will be locked by Bob and Joe will not be able to make any changes
D. Bob will receive a prompt that Joe logged in
View answer
Correct Answer: C
Question #17
Harriet wants to protect sensitive information from intentional loss when users browse to a specific URL: https://personal.mymail.com, which blade will she enable to achieve her goal?
A. DLP
B. SSL Inspection
C. Application Control
D. URL Filtering
View answer
Correct Answer: A
Question #18
The R80 utility fw monitor is used to troubleshoot _____________
A. User data base corruption
B. LDAP conflicts
C. Traffic issues
D. Phase two key negotiation
View answer
Correct Answer: C
Question #19
Fill in the blank: By default, the SIC certificates issued by R80 Management Server are based on the ____________ algorithm.
A. SHA-256
B. SHA-200C
D. SHA-128
View answer
Correct Answer: C
Question #20
What component of R80 Management is used for indexing?
A. DBSync
B. API Server
C. fwm
D. SOLR
View answer
Correct Answer: D
Question #21
The fw monitor utility is used to troubleshoot which of the following problems?
A. Phase two key negotiation
B. Address translation
C. Log Consolidation Engine
D. User data base corruption
View answer
Correct Answer: B
Question #22
How many users can have read/write access in Gaia at one time?
A. Infinite
B. One
C. Three
D. Two
View answer
Correct Answer: B
Question #23
A _______ is used by a VPN gateway to send traffic as if it was a physical interface.
A. VPN Tunnel Interface
B. VPN community
C. VPN router
D. VPN interface
View answer
Correct Answer: A

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: