DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Prepare Check Point 156-215 Exam Questions & Practice Tests, Check Point Certified Security Administrator R80 | SPOTO

Gearing up for the Check Point Certified Security Administrator (CCSA) R80 certification? Our latest 156-215 exam questions and practice tests are essential preparation materials. Access hundreds of realistic online exam questions, sample questions, and mock exams covering Security Gateway, Management Software Blades, and GAiA operating system know-how. These authentic exam dumps mirror the actual certification exam for an ideal exam practice experience. Identify knowledge gaps through our comprehensive test prep with exam questions and answers. Regular practice is proven to boost your skills and confidence for passing the challenging CCSA R80 certification. Don't miss this free test opportunity - start today with our latest practice tests and study materials to succeed!
Take other online exams

Question #1
Which policy type is used to enforce bandwidth and traffic control rules?
A. Threat Emulation
B. Access Control
C. QoS
D. Threat Prevention
View answer
Correct Answer: B
Question #2
Katie has been asked to do a backup on the Blue Security Gateway. Which command would accomplish this in the Gaia CLI?
A. Blue > add local backup
B. Expert&Blue#add local backing
C. Blue > set backup local
D. Blue > add backup local
View answer
Correct Answer: A
Question #3
Fill in the blank: A(n) _____ rule is created by an administrator and is located before the first and before last rules in the Rule Base.
A. Firewall drop
B. Explicit
C. Implicit accept
D. Implicit drop
E. Implied
View answer
Correct Answer: A
Question #4
The Captive Portal tool:
A. Acquires identities from unidentified users
B. Is only used for guest user authentication
C. Allows access to users already identified
D. Is deployed from the Identity Awareness page in the Global Properties settings
View answer
Correct Answer: C
Question #5
Can a Check Point gateway translate both source IP address and destination IP address in a given packet?
A. Yes
B. No
C. Yes, but only when using Automatic NAT
D. Yes, but only when using Manual NAT
View answer
Correct Answer: A
Question #6
A client has created a new Gateway object that will be managed at a remote location. When the client attempts to install the Security Policy to the new Gateway object, the object does not appear in the Install On check box. What should you look for?
A. Secure Internal Communications (SIC) not configured for the object
B. A Gateway object created using the Check Point > Externally Managed VPN Gateway option from the Network Objects dialog box
C. Anti-spoofing not configured on the interfaces on the Gateway object
D. A Gateway object created using the Check Point > Secure Gateway option in the network objects, dialog box, but still needs to configure the interfaces for the Security Gateway object
View answer
Correct Answer: D
Question #7
Where can administrator edit a list of trusted SmartConsole clients in R80?
A. cpconfig on a Security Management Server, in the WebUI logged into a Security Management Server
B. Only using SmartConsole: Manage and Settings > Permissions and Administrators > Advanced > Trusted Clients
C. In cpconfig on a Security Management Server, in the WebUI logged into a Security Management Server, in SmartConsole: Manage and Settings>Permissions and Administrators>Advanced>Trusted Clients
D. WebUI client logged to Security Management Server, SmartDashboard: Manage and Settings>Permissions and Administrators>Advanced>Trusted Clients, via cpconfig on a Security Gateway
View answer
Correct Answer: D
Question #8
Which of the following firewall modes DOES NOT allow for Identity Awareness to be deployed?
A. Bridge
B. Load Sharing
C. High Availability
D. Fail Open
View answer
Correct Answer: B
Question #9
Which of the following statements accurately describes the command snapshot?
A. snapshot creates a full OS-level backup, including network-interface data, Check Point production information, and configuration settings of a GAiA Security Gateway
B. snapshot creates a Security Management Server full system-level backup on any OS
C. snapshot stores only the system-configuration settings on the Gateway
D. A Gateway snapshot includes configuration settings and Check Point product information from the remote Security Management Server
View answer
Correct Answer: C
Question #10
What is the appropriate default Gaia Portal address?
A. HTTP://[IPADDRESS]
B. HTTPS://[IPADDRESS]:8080
C. HTTPS://[IPADDRESS]:4434
D. HTTPS://[IPADDRESS]
View answer
Correct Answer: C
Question #11
How many packets does the IKE exchange use for Phase 1 Main Mode?
A. 12
B. 1C
D. 6
View answer
Correct Answer: B
Question #12
Fill in the blank: The _________ software blade enables Application Security policies to allow, block, or limit website access based on user, group, and machine identities.
A. Application Control
B. Data Awareness
C. URL Filtering
D. Threat Emulation
View answer
Correct Answer: D
Question #13
What CLI utility allows an administrator to capture traffic along the firewall inspection chain?
A. show interface (interface) –chain
B. tcpdump
C. tcpdump /snoop
D. fw monitor
View answer
Correct Answer: B
Question #14
Match the following commands to their correct function. Each command has one function only listed.
A. C1>F6; C2>F4; C3>F2; C4>F5
B. C1>F2; C2>F1; C3>F6; C4>F4
C. C1>F2; C2>F4; C3>F1; C4>F5
D. C1>F4; C2>F6; C3>F3; C4>F5
View answer
Correct Answer: D
Question #15
Where do you verify that UserDirectory is enabled?
A. Verify that Security Gateway > General Properties > Authentication > Use UserDirectory (LDAP) for Security Gateways is checked
View answer
Correct Answer: C
Question #16
As you review this Security Policy, what changes could you make to accommodate Rule 4?
A. Remove the service HTTP from the column Service in Rule 4
B. Modify the column VPN in Rule 2 to limit access to specific traffic
C. Nothing at all
D. Modify the columns Source or Destination in Rule 4
View answer
Correct Answer: A
Question #17
A digital signature:
A. Guarantees the authenticity and integrity of a message
B. Automatically exchanges shared keys
C. Decrypts data to its original form
D. Provides a secure key exchange mechanism over the Internet
View answer
Correct Answer: A
Question #18
Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use her iPad to access the internal Finance Web server. Because the iPad is not a member of the Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter her AD credentials in the Captive Portal and then get the same access as on her office computer. Her access to resources is based on rules in the R77 Firewall Rule Base. To make this scenario work, the IT administrator must: 1) Enable I
A. Have the security administrator select the Action field of the Firewall Rule “Redirect HTTP connections to an authentication (captive) portal”
B. Have the security administrator reboot the firewall
C. Have the security administrator select Any for the Machines tab in the appropriate Access Role
D. Install the Identity Awareness agent on her iPad
View answer
Correct Answer: B
Question #19
Which of the following is NOT an option for internal network definition of Anti-spoofing?
A. Specific – derived from a selected object
B. Route-based – derived from gateway routing table
C. Network defined by the interface IP and Net Mask
D. Not-defined Explanation/Reference: MegaCorp's security infrastructure separates Security Gateways geographically
A. Using the remote Gateway's IP address, and attaching the license to the remote Gateway via SmartUpdate
B. Using your Security Management Server's IP address, and attaching the license to the remote Gateway via SmartUpdate
C. Using the remote Gateway's IP address, and applying the license locally with command cplic put
D. Using each of the Gateway's IP addresses, and applying the licenses on the Security Management Server with the command cprlic put
View answer
Correct Answer: B
Question #20
When launching SmartDashboard, what information is required to log into R77?
A. User Name, Management Server IP, certificate fingerprint file
B. User Name, Password, Management Server IP
C. Password, Management Server IP
D. Password, Management Server IP, LDAP Server IP Explanation/Reference: A Cleanup rule:
A. logs connections that would otherwise be dropped without logging by default
B. drops packets without logging connections that would otherwise be dropped and logged by default
C. logs connections that would otherwise be accepted without logging by default
D. drops packets without logging connections that would otherwise be accepted and logged by default
View answer
Correct Answer: A
Question #21
Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is ________ all traffic. However, in the Application Control policy layer, the default action is ________ all traffic.
A. Accept; redirect
B. Accept; drop
C. Redirect; drop
D. Drop; accept
View answer
Correct Answer: B
Question #22
Study the Rule base and Client Authentication Action properties screen. After being authenticated by the Security Gateways, a user starts a HTTP connection to a Web site. What happens when the user tries to FTP to another site using the command line? The:
A. user is prompted for authentication by the Security Gateways again
B. FTP data connection is dropped after the user is authenticated successfully
C. user is prompted to authenticate from that FTP site only, and does not need to enter his username and password for Client Authentication
D. FTP connection is dropped by Rule 2
View answer
Correct Answer: D
Question #23
Your users are defined in a Windows 2008 R2 Active Directory server. You must add LDAP users to a Client Authentication rule. Which kind of user group do you need in the Client Authentication rule in R77?
A. External-user group
B. LDAP group
C. A group with a genetic user
D. All Users Explanation/Reference: What is Consolidation Policy?
A. The collective name of the Security Policy, Address Translation, and IPS Policies
B. The specific Policy written in SmartDashboard to configure which log data is stored in the SmartReporter database
C. The collective name of the logs generated by SmartReporter
D. A global Policy used to share a common enforcement policy for multiple Security Gateways
View answer
Correct Answer: A
Question #24
You want to reset SIC between smberlin and sgosaka. In SmartDashboard, you choose sgosaka, Communication, Reset. On sgosaka, you start cpconfig, choose Secure Internal Communication and enter the new SIC Activation Key. The screen reads The SIC was successfully initialized and jumps back to the menu. When trying to establish a connection, instead of a working connection, you receive this error message: What is the reason for this behavior?
A. The Gateway was not rebooted, which is necessary to change the SIC key
B. You must first initialize the Gateway object in SmartDashboard (i
C. The check Point services on the Gateway were not restarted because you are still in the cpconfig utility
D. The activation key contains letters that are on different keys on localized keyboards
View answer
Correct Answer: A
Question #25
To install a brand new Check Point Cluster, the MegaCorp IT department bought 1 Smart-1 and 2 Security Gateway Appliances to run a cluster. Which type of cluster is it?
A. Full HA Cluster
B. High Availability
C. Standalone
D. Distributed
View answer
Correct Answer: A
Question #26
After the initial installation the First Time Configuration Wizard should be run. Select the BEST answer.
A. First Time Configuration Wizard can be run from the Unified SmartConsole
B. First Time Configuration Wizard can be run from the command line or from the WebUI
C. First time Configuration Wizard can only be run from the WebUI
D. Connection to the internet is required before running the First Time Configuration wizard
View answer
Correct Answer: B
Question #27
Which Check Point software blade prevents malicious files from entering a network using virus signatures and anomaly-based protections from ThreatCloud?
A. Firewall
B. Application Control
C. Anti-spam and Email Security
D. Antivirus
View answer
Correct Answer: D
Question #28
MyCorp has the following NAT rules. You need to disable the NAT function when Alpha-internal networks try to reach the Google DNS (8.8.8.8) server. What can you do in this case?
A. Use manual NAT rule to make an exception
B. Use the NAT settings in the Global Properties
C. Disable NAT inside the VPN community
D. Use network exception in the Alpha-internal network object
View answer
Correct Answer: B
Question #29
John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, gateway policy permits access only from Join's desktop which is assigned an IP address 10.0.0.19 via DHCP. John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but the limits him to operating it only from his desk. The cu
A. John should install the identity Awareness Agent
B. The firewall admin should install the Security Policy
C. John should lock and unlock the computer
D. Investigate this as a network connectivity issue
View answer
Correct Answer: B
Question #30
According to Check Point Best Practice, when adding a 3rd party gateway to a Check Point security solution what object SHOULD be added? A(n):
A. Interoperable Device
View answer
Correct Answer: D
Question #31
Provide very wide coverage for all products and protocols, with noticeable performance impact. How could you tune the profile in order to lower the CPU load still maintaining security at good level? Select the BEST answer.
A. Set High Confidence to Low and Low Confidence to Inactive
B. Set the Performance Impact to Medium or lower
C. The problem is not with the Threat Prevention Profile
D. Set the Performance Impact to Very Low Confidence to Prevent
View answer
Correct Answer: D
Question #32
You are the Security Administrator for MegaCorp. In order to see how efficient your firewall Rule Base is, you would like to see how many often the particular rules match. Where can you see it? Give the BEST answer.
A. In the SmartView Tracker, if you activate the column Matching Rate
B. In SmartReporter, in the section Firewall Blade – Activity > Network Activity with information concerning Top Matched Logged Rules
C. SmartReporter provides this information in the section Firewall Blade – Security > Rule Base Analysis with information concerning Top Matched Logged Rules
D. It is not possible to see it directly
View answer
Correct Answer: D
Question #33
Which of the following licenses are considered temporary?
A. Perpetual and Trial
B. Plug-and-play and Evaluation
C. Subscription and Perpetual
D. Evaluation and Subscription
View answer
Correct Answer: D
Question #34
You want to define a selected administrator's permission to edit a layer. However, when you click the + sign in the “Select additional profile that will be able edit this layer” you do not see anything. What is the most likely cause of this problem? Select the BEST answer.
A. “Edit layers by Software Blades” is unselected in the Permission Profile
B. There are no permission profiles available and you need to create one first
C. All permission profiles are in use
D. “Edit layers by selected profiles in a layer editor” is unselected in the Permission profile
View answer
Correct Answer: C
Question #35
Which of the following is NOT defined by an Access Role object?
A. Source Network
B. Source Machine
C. Source User
D. Source Server
View answer
Correct Answer: A
Question #36
Which of the following actions do NOT take place in IKE Phase 1?
A. Peers agree on encryption method
B. Diffie-Hellman key is combined with the key material to produce the symmetrical IPsec key
C. Peers agree on integrity method
D. Each side generates a session key from its private key and peer's public key
View answer
Correct Answer: A
Question #37
Which Check Point software blade provides visibility of users, groups and machines while also providing access control through identity-based policies?
A. Firewall
B. Identity Awareness
C. Application Control
D. URL Filtering Explanation/Reference:
View answer
Correct Answer: C
Question #38
Fill in the blanks: A security Policy is created in _________ , stored in the _________ , and Distributed to the various __________ .
A. Rule base, Security Management Server, Security Gateways
B. SmartConsole, Security Gateway, Security Management Servers
C. SmartConsole, Security Management Server, Security Gateways
D. The Check Point database, SmartConsole, Security Gateways
View answer
Correct Answer: C

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: