Professional Documents
Culture Documents
Version: 17.091
Important Notice
Product
Our Product Manager keeps an eye for Exam updates by Vendors. Free update is available within
One year after your purchase.
You can login member center and download the latest product anytime. (Product downloaded
from member center is always the latest.)
PS: Ensure you can pass the exam, please check the latest product in 2-3 days before the exam
again.
Feedback
We devote to promote the product quality and the grade of service to ensure customers interest.
If you have any questions about our product, please provide Exam Number, Version, Page
Number, Question Number, and your Login Account to us, please contact us at
support@passleader.com and our technical experts will provide support in 24 hours.
Copyright
The product of each order has its own encryption code, so you should use it independently.
If anyone who share the file we will disable the free update and account access.
Any unauthorized changes will be inflicted legal punishment. We will reserve the right of final
explanation for this statement.
A. VPN key
B. VPN community
C. VPN trust entities
D. VPN domain
Answer: A
Explanation:
VPN key (to not be confused with pre-shared key that is used for authentication).
VPN trust entities, such as a Check Point Internal Certificate Authority (ICA). The ICA is part of
the Check Point suite used for creating SIC trusted connection between Security Gateways,
authenticating administrators and third party servers. The ICA provides certificates for internal
Security Gateways and remote access clients which negotiate the VPN link.
VPN Domain - A group of computers and networks connected to a VPN tunnel by one VPN
gateway that handles encryption and protects the VPN Domain members.
VPN Community - A named collection of VPN domains, each protected by a VPN gateway.
Reference:
http://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/13868.htm
QUESTION 2
Two administrators Dave and Jon both manage R80 Management as administrators for Alpha
Corp. Jon logged into the R80 Management and then shortly after Dave logged in to the same
server. They are both in the Security Policies view. From the screenshots below, why does Dave
not have the rule no.6 in his SmartConsole view even though Jon has it his in his SmartConsole
view?
A. Jon is currently editing rule no.6 but has Published part of his changes.
B. Dave is currently editing rule no.6 and has marked this rule for deletion.
C. Dave is currently editing rule no.6 and has deleted it from his Rule Base.
D. Jon is currently editing rule no.6 but has not yet Published his changes.
Answer: D
Explanation:
When an administrator logs in to the Security Management Server through SmartConsole, a new
editing session starts. The changes that the administrator makes during the session are only
available to that administrator. Other administrators see a lock icon on object and rules that are
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 2
http://www.passleader.com
being edited. To make changes available to all administrators, and to unlock the objects and rules
that are being edited, the administrator must publish the session.
QUESTION 3
Vanessa is firewall administrator in her company; her company is using Check Point firewalls on
central and remote locations, which are managed centrally by R80 Security Management Server.
One central location has an installed R77.30 Gateway on Open server. Remote location is using
Check Point UTM-1 570 series appliance with R71. Which encryption is used in Secure Internal
Communication (SIC) between central management and firewall on each location?
A. On central firewall AES128 encryption is used for SIC, on Remote firewall 3DES encryption is used
for SIC.
B. On both firewalls, the same encryption is used for SIC. This is AES-GCM-256.
C. The Firewall Administrator can choose which encryption suite will be used by SIC.
D. On central firewall AES256 encryption is used for SIC, on Remote firewall AES128 encryption is
used for SIC.
Answer: A
Explanation:
Gateways above R71 use AES128 for SIC. If one of the gateways is R71 or below, the gateways
use 3DES.
QUESTION 4
Review the following screenshot and select the BEST answer.
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 3
http://www.passleader.com
Layer.
D. If a connection is accepted in Network-layer, it will not be matched against the rules in Data Center
Layer.
Answer: C
QUESTION 5
Which of the following is NOT a SecureXL traffic flow?
A. Medium Path
B. Accelerated Path
C. Fast Path
D. Slow Path
Answer: C
Explanation:
SecureXL is an acceleration solution that maximizes performance of the Firewall and does not
compromise security. When SecureXL is enabled on a Security Gateway, some CPU intensive
operations are processed by virtualized software instead of the Firewall kernel. The Firewall can
inspect and process connections more efficiently and accelerate throughput and connection
rates. These are the SecureXL traffic flows:
Slow path - Packets and connections that are inspected by the Firewall and are not processed by
SecureXL.
Accelerated path - Packets and connections that are offloaded to SecureXL and are not
processed by the Firewall.
Medium path - Packets that require deeper inspection cannot use the accelerated path. It is not
necessary for the Firewall to inspect these packets, they can be offloaded and do not use the
slow path. For example, packets that are inspected by IPS cannot use the accelerated path and
can be offloaded to the IPS PSL (Passive Streaming Library). SecureXL processes these packets
more quickly than packets on the slow path.
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_Firewall_WebAdmin/92711.htm
QUESTION 6
Which of the following Automatically Generated Rules NAT rules have the lowest implementation
priority?
Answer: BC
Explanation:
SmartDashboard organizes the automatic NAT rules in this order:
1. Static NAT rules for Firewall, or node (computer or server) objects
2. Hide NAT rules for Firewall, or node objects
3. Static NAT rules for network or address range objects
4. Hide NAT rules for network or address range objects
Reference:
https://sc1.checkpoint.com/documents/R77/CP_R77_Firewall_WebAdmin/6724.htm
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 4
http://www.passleader.com
QUESTION 7
Fill in the blanks: VPN gateways authenticate using ___________ and ___________ .
A. Passwords; tokens
B. Certificates; pre-shared secrets
C. Certificates; passwords
D. Tokens; pre-shared secrets
Answer: B
Explanation:
VPN gateways authenticate using Digital Certificates and Pre-shared secrets.
Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/85469.htm
QUESTION 8
In R80 spoofing is defined as a method of:
Answer: D
Explanation:
IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack
connections to your network. Attackers use IP spoofing to send malware and bots to your
protected network, to execute DoS attacks, or to gain unauthorized access.
QUESTION 9
Fill in the blank: The __________ is used to obtain identification and security information about
network users.
A. User Directory
B. User server
C. UserCheck
D. User index
Answer: A
Explanation:
https://www.checkpoint.com/downloads/product-related/datasheets/DS_UserDirectorySWB.pdf
QUESTION 10
Which Check Point feature enables application scanning and the detection?
A. Application Dictionary
B. AppWiki
C. Application Library
D. CPApp
Answer: B
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 5
http://www.passleader.com
Explanation:
AppWiki Application Classification Library
AppWiki enables application scanning and detection of more than 5,000 distinct applications and
over 300,000 Web 2.0 widgets including instant messaging, social networking, video streaming,
VoIP, games and more.
Reference: https://www.checkpoint.com/products/application-control-software-blade/
QUESTION 11
DLP and Geo Policy are examples of what type of Policy?
A. Standard Policies
B. Shared Policies
C. Inspection Policies
D. Unified Policies
Answer: B
Explanation:
The Shared policies are installed with the Access Control Policy.
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=docu
ments/R80/CP_R80_SecMGMT/126197
QUESTION 12
In which deployment is the security management server and Security Gateway installed on the
same appliance?
A. Bridge Mode
B. Remote
C. Standalone
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 6
http://www.passleader.com
D. Distributed
Answer: C
Explanation:
Installing Standalone
Standalone Deployment - The Security Management Server and the Security Gateway are
installed on the same computer or appliance.
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_Installation_and_Upgrade_Guide-
webAdmin/89230.htm#o98246
QUESTION 13
Fill in the blank: A _________ VPN deployment is used to provide remote users with secure
access to internal corporate resources by authenticating the user through an internet browser.
Answer: A
Explanation:
Clientless - Users connect through a web browser and use HTTPS connections. Clientless
solutions usually supply access to web-based corporate resources.
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80BC_Firewall/html_frameset.htm?topic=docu
ments/R80/CP_R80BC_Firewall/92704
QUESTION 14
Which of the following statements is TRUE about R80 management plug-ins?
Answer: C
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 7
http://www.passleader.com
QUESTION 15
Fill in the blank: Gaia can be configured using the _______ or ______ .
Answer: C
Explanation:
Configuring Gaia for the First Time
In This Section:
Running the First Time Configuration Wizard in WebUI
Running the First Time Configuration Wizard in CLI
After you install Gaia for the first time, use the First Time Configuration Wizard to configure the
system and the Check Point products on it.
QUESTION 16
Where can you trigger a failover of the cluster members? Log in to Security Gateway CLI and run
command clusterXL_admin down. In SmartView Monitor right-click the Security Gateway member
and select Cluster member stop. Log into Security Gateway CLI and run command cphaprob
down.
A. 1, 2, and 3
B. 2 and 3
C. 1 and 2
D. 1 and 3
Answer: C
Explanation:
How to Initiate Failover
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 8
http://www.passleader.com
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7298.htm
QUESTION 17
Which utility allows you to configure the DHCP service on GAIA from the command line?
A. ifconfig
B. dhcp_cfg
C. sysconfig
D. cpconfig
Answer: C
Explanation:
Sysconfig Configuration Options
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 9
http://www.passleader.com
Refrence: https://sc1.checkpoint.com/documents/R76/CP_R76_Splat_AdminGuide/51548.htm
NOTE:Question must be wrong because no answer is possible for GAIA system, this must be
SPLAT version.
DHCP CLI configuration for GAIA reference: https://sc1.checkpoint.com/documents/R76/
CP_R76_Gaia_WebAdmin/73181.htm#o80096
QUESTION 18
Which VPN routing option uses VPN routing for every connection a satellite gateway handles?
Answer: D
Explanation:
On the VPN Routing page, enable the VPN routing for satellites section, by selecting one of these
options:
To center and to other Satellites through center; this allows connectivity between Gateways; for
example, if the spoke Gateways are DAIP Gateways, and the hub is a Gateway with a static IP
address To center, or through the center to other satellites, to Internet and other VPN targets; this
allows connectivity between the Gateways, as well as the ability to inspect all communication
passing through the hub to the Internet.
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails
=&solutionid=sk31021
QUESTION 19
Which product correlates logs and detects security threats, providing a centralized display of
potential attack patterns from all network devices?
A. SmartView Monitor
B. SmartEvent
C. SmartUpdate
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 10
http://www.passleader.com
D. SmartDashboard
Answer: B
Explanation:
SmartEvent correlates logs from all Check Point enforcement points, including end-points, to
identify suspicious activity from the clutter. Rapid data analysis and custom event logs
immediately alert administrators to anomalous behavior such as someone attempting to use the
same credential in multiple geographies simultaneously.
Reference: https://www.checkpoint.com/products/smartevent/
QUESTION 20
What will be the effect of running the following command on the Security Management Server?
Answer: A
Explanation:
This command uninstall actual security policy (already installed)
Reference:
https://sc1.checkpoint.com/documents/R77/CP_R77_SecurityGatewayTech_WebAdmin/6751.ht
m
QUESTION 21
An administrator is creating an IPsec site-to-site VPN between his corporate office and branch
office. Both offices are protected by Check Point Security Gateway managed by the same
Security Management Server. While configuring the VPN community to specify the pre-shared
secret the administrator found that the check box to enable pre-shared secret is shared and
cannot be enabled. Why does it not allow him to specify the pre-shared secret?
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 11
http://www.passleader.com
Gateway managed by the same SMS.
D. The Security Gateways are pre-R75.40.
Answer: C
QUESTION 22
Alpha Corp., and have recently returned from a training course on Check Point's new advanced
R80 management platform. You are presenting an in-house R80 Management to the other
administrators in Alpha Corp.
How will you describe the new "Publish" button in R80 Management Console?
A. The Publish button takes any changes an administrator has made in their management session,
publishes a copy to the Check Point of R80, and then saves it to the R80 database.
B. The Publish button takes any changes an administrator has made in their management session
and publishes a copy to the Check Point Cloud of R80 and but does not save it to the R80
C. The Publish button makes any changes an administrator has made in their management session
visible to all other administrator sessions and saves it to the Database.
D. The Publish button makes any changes an administrator has made in their management session
visible to the new Unified Policy session and saves it to the Database.
Answer: C
Explanation:
To make your changes available to other administrators, and to save the database before
installing a policy, you must publish the session.
When you publish a session, a new database version is created.
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=docu
ments/R80/CP_R80_SecMGMT/126197
QUESTION 23
Which of the following ClusterXL modes uses a non-unicast MAC address for the cluster IP
address.
A. High Availability
B. Load Sharing Multicast
C. Load Sharing Pivot
D. Master/Backup
Answer: B
Explanation:
Explanation : ClusterXL uses the Multicast mechanism to associate the virtual cluster IP
addresses with all cluster members. By binding these IP addresses to a Multicast MAC address,
it ensures that all packets sent to the cluster, acting as a gateway, will reach all members in the
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 12
http://www.passleader.com
cluster.
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7292.htm
QUESTION 24
Fill in the blank: With the User Directory Software Blade, you can create R80 user definitions on
a(an) ___________ Server.
A. NT domain
B. SMTP
C. LDAP
D. SecurID
Answer: C
Explanation:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=docu
ments/R80/CP_R80_SecMGMT/126197
QUESTION 25
Which of the following is NOT a component of a Distinguished Name?
A. Organization Unit
B. Country
C. Common name
D. User container
Answer: D
Explanation:
Distinguished Name Components
CN=common name, OU=organizational unit, O=organization, L=locality, ST=state or province,
C=country name
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_SecMan_WebAdmin/html_frameset.htm?to
pic=documents/R76/CP_R76_SecMan_WebAdmin/71950
QUESTION 26
What are the three authentication methods for SIC?
A. Passwords, Users, and standards-based SSL for the creation of security channels
B. Certificates, standards-based SSL for the creation of secure channels, and 3DES or AES128 for
encryption
C. Packet Filtering, certificates, and 3DES or AES128 for encryption
D. Certificates, Passwords, and Tokens
Answer: B
QUESTION 27
You have enabled "Full Log" as a tracking option to a security rule. However, you are still not
seeing any data type information. What is the MOST likely reason?
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 13
http://www.passleader.com
A. Logging has disk space issues. Change logging storage options on the logging server or Security
Management Server properties and install database.
B. Data Awareness is not enabled.
C. Identity Awareness is not enabled.
D. Logs are arriving from Pre-R80 gateways.
Answer: A
Explanation:
The most likely reason for the logs data to stop is the low disk space on the logging device, which
can be the Management Server or the Gateway Server.
QUESTION 28
What is the order of NAT priorities?
Answer: A
Explanation:
The order of NAT priorities are:
1. Static NAT
2. IP Pool NAT
3. Hide NAT
Since Static NAT has all of the advantages of IP Pool NAT and more, it has a higher priority than
the other NAT methods.
Reference:
https://sc1.checkpoint.com/documents/R77/CP_R77_Firewall_WebAdmin/6724.htm#o6919
QUESTION 29
Which of the following is an identity acquisition method that allows a Security Gateway to identify
Active Directory users and computers?
A. UserCheck
B. Active Directory Query
C. Account Unit Query
D. User Directory Query
Answer: B
Explanation:
Explanation : AD Query extracts user and computer identity information from the Active Directory
Security Event Logs. The system generates a Security Event log entry when a user or computer
accesses a network resource. For example, this occurs when a user logs in, unlocks a screen, or
accesses a network drive.
Reference :
https://sc1.checkpoint.com/documents/R76/CP_R76_IdentityAwareness_AdminGuide/62402.htm
QUESTION 30
Ken wants to obtain a configuration lock from other administrator on R80 Security Management
Server. He can do this via WebUI or a via CLI. Which command should be use in CLI? Choose
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 14
http://www.passleader.com
the correct answer.
Answer: D
QUESTION 31
Examine the following Rule Base.
What can we infer about the recent changes made to the Rule Base?
Answer: D
Explanation:
On top of the print screen there is a number "8" which consists for the number of changes made
and not saved.
Session Management Toolbar (top of SmartConsole)
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 15
http://www.passleader.com
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=docu
ments/R80/CP_R80_SecMGMT/117948
QUESTION 32
ALPHA Corp has a new administrator who logs into the Gaia Portal to make some changes. He
realizes that even though he has logged in as an administrator, he is unable to make any
changes because all configuration options are greyed out as shown in the screenshot image
below. What is the likely cause for this?
Answer: B
Explanation:
There is a lock on top left side of the screen. B is the logical answer.
QUESTION 33
Administrator Kofi has just made some changes on his Management Server and then clicks on
the Publish button in SmartConsole but then gets the error message shown in the screenshot
below. Where can the administrator check for more information on these errors?
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 16
http://www.passleader.com
A. The Log and Monitor section in SmartConsole
B. The Validations section in SmartConsole
C. The Objects section in SmartConsole
D. The Policies section in SmartConsole
Answer: B
Explanation:
Validation Errors
The validations pane in SmartConsole shows configuration error messages. Examples of errors
are object names that are not unique, and the use of objects that are not valid in the Rule Base.
To publish, you must fix the errors.
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=docu
ments/ R80/CP_R80_SecMGMT/126197
QUESTION 34
You are working with multiple Security Gateways enforcing an extensive number of rules.
To simplify security administration, which action would you choose?
A. Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.
B. Create a separate Security Policy package for each remote Security Gateway.
C. Create network object that restrict all applicable rules to only certain networks.
D. Run separate SmartConsole instances to login and configure each Security Gateway directly.
Answer: B
QUESTION 35
Harriet wants to protect sensitive information from intentional loss when users browse to a
specific URL:
https://personal.mymail.com, which blade will she enable to achieve her goal?
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 17
http://www.passleader.com
A. DLP
B. SSL Inspection
C. Application Control
D. URL Filtering
Answer: A
Explanation:
Check Point revolutionizes DLP by combining technology and processes to move businesses
from passive detection to active Data Loss Prevention. Innovative MultiSpectTM data
classification combines user, content and process information to make accurate decisions, while
UserCheckTM technology empowers users to remediate incidents in real time. Check Point's self-
educating network-based DLP solution frees IT/security personnel from incident handling and
educates users on proper data handling policies--protecting sensitive corporate information from
both intentional and unintentional loss.
Reference: https://www.checkpoint.com/downloads/product-related/datasheets/DLP-software-
blade-datasheet.pdf
QUESTION 36
To optimize Rule Base efficiency the most hit rules should be where?
Answer: C
Explanation:
It is logical that if lesser rules are checked for the matched rule to be found the lesser CPU cycles
the device is using. Checkpoint match a session from the first rule on top till the last on the
bottom.
QUESTION 37
Which of the following is NOT a license activation method?
A. SmartConsole Wizard
B. Online Activation
C. License Activation Wizard
D. Offline Activation
Answer: A
QUESTION 38
Which policy type has its own Exceptions section?
A. Thread Prevention
B. Access Control
C. Threat Emulation
D. Desktop Security
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 18
http://www.passleader.com
Answer: A
Explanation:
The Exceptions Groups pane lets you define exception groups. When necessary, you can create
exception groups to use in the Rule Base. An exception group contains one or more defined
exceptions. This option facilitates ease-of-use so you do not have to manually define exceptions
in multiple rules for commonly required exceptions. You can choose to which rules you want to
add exception groups.
This means they can be added to some rules and not to others, depending on necessity.
Reference:
https://sc1.checkpoint.com/documents/R77/CP_R77_ThreatPrevention_WebAdmin/82209.htm#o
97030
QUESTION 39
By default, which port does the WebUI listen on?
A. 80
B. 4434
C. 443
D. 8080
Answer: C
Explanation:
To configure Security Management Server on Gaia:
1. Open a browser to the WebUI: https://<Gaia management IP address>
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_Gaia_IUG/html_frameset.htm?topic=docum
ents/R80/CP_R80_Gaia_IUG/132120
QUESTION 40
When doing a Stand-Alone Installation, you would install the Security Management Server with
which other Check Point architecture component?
Answer: D
QUESTION 41
Which options are given on features, when editing a Role on Gaia Platform?
Answer: B
Explanation:
Roles
Role-based administration (RBA) lets you create administrative roles for users. With RBA, an
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 19
http://www.passleader.com
administrator can allow Gaia users to access specified features by including those features in a
role and assigning that role to users. Each role can include a combination of administrative
(read/write) access to some features, monitoring (read-only) access to other features, and no
access to other features.
You can also specify which access mechanisms (WebUI or the CLI) are available to the user.
Note - When users log in to the WebUI, they see only those features that they have read-only or
read/write access to. If they have read-only access to a feature, they can see the settings pages,
but cannot change the settings.
Gaia includes these predefined roles:
adminRole - Gives the user read/write access to all features.
monitorRole- Gives the user read-only access to all features.
Note - Do not define a new user for external users. An external user is one that is defined on an
authentication server (such as RADIUS or TACACS) and not on the local Gaia system.
Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_Gaia_AdminWebAdminGuide/
html_frameset.htm?topic=documents/R77/CP_R77_Gaia_AdminWebAdminGuide/75930
QUESTION 42
What is the default time length that Hit Count Data is kept?
A. 3 month
B. 4 weeks
C. 12 months
D. 6 months
Answer: A
Explanation:
Keep Hit Count data up to - Select one of the time range options. The default is 6 months. Data is
kept in the Security Management Server database for this period and is shown in the Hits column.
QUESTION 43
Choose the Best place to find a Security Management Server backup file named backup_fw, on a
Check Point Appliance.
A. /var/log/Cpbackup/backups/backup/backup_fw.tgs
B. /var/log/Cpbackup/backups/backup/backup_fw.tar
C. /var/log/Cpbackup/backups/backups/backup_fw.tar
D. /var/log/Cpbackup/backups/backup_fw.tgz
Answer: D
Explanation:
Gaia's Backup feature allows backing up the configuration of the Gaia OS and of the Security
Management server database, or restoring a previously saved configuration.
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 20
http://www.passleader.com
The configuration is saved to a .tgz file in the following directory:
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?
action=portlets.SearchResultMainAction&eventSubmit_doGoviewsolutiondetails=&solutionid=sk9
1400
QUESTION 44
With which command can view the running configuration of Gaia-based system.
A. show conf-active
B. show configuration active
C. show configuration
D. show running-configuration
Answer: C
QUESTION 45
Which of the following is TRUE regarding Gaia command line?
A. Configuration changes should be done in mgmt_cli and use CLISH for monitoring, Expert mode is
used only for OS level tasks.
B. Configuration changes should be done in expert-mode and CLISH is used for monitoring.
C. Configuration changes should be done in mgmt-cli and use expert-mode for OS-level tasks.
D. All configuration changes should be made in CLISH and expert-mode should be used for OS-level
tasks.
Answer: D
QUESTION 46
If there are two administrators logged in at the same time to the SmartConsole, and there are
objects locked for editing, what must be done to make them available to other administrators?
Choose the BEST answer.
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 21
http://www.passleader.com
D. Delete older versions of database.
Answer: A
Explanation:
To make changes available to all administrators, and to unlock the objects and rules that are
being edited, the administrator must publish the session.
To make your changes available to other administrators, and to save the database before
installing a policy, you must publish the session. When you publish a session, a new database
version is created.
When you select Install Policy, you are prompted to publish all unpublished changes. You cannot
install a policy if the included changes are not published.
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=docu
ments/R80/CP_R80_SecMGMT/126197
QUESTION 47
Which one of the following is the preferred licensing model? Select the Best answer.
A. Local licensing because it ties the package license to the IP-address of the gateway and has no
dependency of the Security Management Server.
B. Central licensing because it ties the package license to the IP-address of the Security
Management Server and has no dependency of the gateway.
C. Local licensing because it ties the package license to the MAC-address of the gateway
management interface and has no Security Management Server dependency.
D. Central licensing because it ties the package license to the MAC-address of the Security
Management Server Mgmt-interface and has no dependency of the gateway.
Answer: B
Explanation:
Central License
A Central License is a license attached to the Security Management server IP address, rather
than the gateway IP address. The benefits of a Central License are:
Only one IP address is needed for all licenses.
A license can be taken from one gateway and given to another.
The new license remains valid when changing the gateway IP address. There is no need to
create and install a new license.
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_Installation_and_Upgrade_Guide-
webAdmin/13128.htm#o13527
QUESTION 48
Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs
the systems this way, how many machines will he need if he does NOT include a SmartConsole
machine in his calculations?
A. One machine, but it needs to be installed using SecurePlatform for compatibility purposes.
B. One machine
C. Two machines
D. Three machines
Answer: C
Explanation:
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 22
http://www.passleader.com
One for Security Management Server and the other one for the Security Gateway.
QUESTION 49
Fill in the blank: A new license should be generated and installed in all of the following situations
EXCEPT when ________ .
Answer: A
Explanation:
There is no need to generate new license in this situation, just need to detach license from wrong
Security Gateway and attach it to the right one.
QUESTION 50
What is the default shell for the command line interface?
A. Expert
B. Clish
C. Admin
D. Normal
Answer: B
Explanation:
The default shell of the CLI is called clish
https://sc1.checkpoint.com/documents/R76/CP_R76_Gaia_WebAdmin/75697.htm
QUESTION 51
When you upload a package or license to the appropriate repository in SmartUpdate, where is the
package or license stored
A. Security Gateway
B. Check Point user center
C. Security Management Server
D. SmartConsole installed device
Answer: C
Explanation:
SmartUpdate installs two repositories on the Security Management server:
License & Contract Repository, which is stored on all platforms in the directory $FWDIR\conf\.
Package Repository, which is stored:
- on Windows machines in C:\SUroot.
- on UNIX machines in /var/suroot.
The Package Repository requires a separate license, in addition to the license for the Security
Management server. This license should stipulate the number of nodes that can be managed in
the Package Repository.
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_Installation_and_Upgrade_Guide-
webAdmin/13128.htm#o13527
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 23
http://www.passleader.com
QUESTION 52
Fill in the blank: The tool _______ generates a R80 Security Gateway configuration report.
A. infoCP
B. infoview
C. cpinfo
D. fw cpinfo
Answer: C
Explanation:
CPInfo is an auto-updatable utility that collects diagnostics data on a customer's machine at the
time of execution and uploads it to Check Point servers (it replaces the standalone cp_uploader
utility for uploading files to Check Point servers).
The CPinfo output file allows analyzing customer setups from a remote location. Check Point
support engineers can open the CPinfo file in a demo mode, while viewing actual customer
Security Policies and Objects. This allows the in-depth analysis of customer's configuration and
environment settings.
When contacting Check Point Support, collect the cpinfo files from the Security Management
server and Security Gateways involved in your case.
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails
=&solutionid=sk92739
QUESTION 53
Which of the following commands can be used to remove site-to-site IPSEC Security
Associations (SA)?
A. vpn tu
B. vpn ipsec remove -l
C. vpn debug ipsec
D. fw ipsec tu
Answer: A
Explanation:
vpn tu
Description Launch the TunnelUtil tool which is used to control VPN tunnels.
Usage vpn tu
vpn tunnelutil
Example vpn tu
Output
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 24
http://www.passleader.com
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_CLI_WebAdmin/12467.htm#o12627
QUESTION 54
Which of the following is NOT an authentication scheme used for accounts created through
SmartConsole?
A. Security questions
B. Check Point password
C. SecurID
D. RADIUS
Answer: A
Explanation:
Explanation:
Authentication Schemes :- Check Point Password
- Operating System Password
- RADIUS
- SecurID
- TACAS
- Undefined If a user with an undefined authentication scheme is matched to a Security Rule with
some form of authentication, access is always denied.
Reference:
http://dl3.checkpoint.com/paid/71/How_to_Configure_Client_Authentication.pdf?HashKey=14796
92369_23bc7cdfbeb67c147ec7bb882d557fd4&xtn=.pdf
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 25
http://www.passleader.com
QUESTION 55
Which pre-defined Permission Profile should be assigned to an administrator that requires full
access to audit all configurations without modifying them?
A. Auditor
B. Read Only All
C. Super User
D. Full Access
Answer: B
Explanation:
To create a new permission profile:
1. In SmartConsole, go to Manage & Settings > Permissions and Administrators > Permission
Profiles.
2. Click New Profile.
The New Profile window opens.
3. Enter a unique name for the profile.
4. Select a profile type:
Read/Write All - Administrators can make changes
Auditor (Read Only All) - Administrators can see information but cannot make changes
Customized - Configure custom settings
5. Click OK.
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=docu
ments/R80/CP_R80_SecMGMT/124265
QUESTION 56
Packages and licenses are loaded from all of theses sources EXCEPT
Answer: B
Explanation:
Packages and licenses are loaded into these repositories from several sources:
the Download Center web site (packages)
the Check Point DVD (packages)
the User Center (licenses)
by importing a file (packages and licenses)
by running the cplic command line
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_Installation_and_Upgrade_Guide-
webAdmin/13128.htm
QUESTION 57
Which of the following technologies extracts detailed information from packets and stores that
information in state tables?
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 26
http://www.passleader.com
A. INSPECT Engine
B. Stateful Inspection
C. Packet Filtering
D. Application Layer Firewall
Answer: B
Explanation:
Reference: https://www.checkpoint.com/smb/help/utm1/8.2/7080.htm
QUESTION 58
On the following graphic, you will find layers of policies.
A. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and
then if implicit Drop Rule drops the packet, it comes next to IPS layer and then after accepting the
packet it passes to Threat Prevention layer.
B. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and
then if there is any rule which accepts the packet, it comes next to IPS layer and then after
accepting the packet it passes to Threat Prevention layer
C. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and
then if there is any rule which accepts the packet, it comes next to Threat Prevention layer and
then after accepting the packet it passes to IPS layer.
D. A packet arrives at the gateway, it is checked against the rules in IPS policy layer and then it
comes next to the Network policy layer and then after accepting the packet it passes to Threat
Prevention layer.
Answer: B
Explanation:
To simplify Policy management, R80 organizes the policy into Policy Layers. A layer is a set of
rules, or a Rule Base.
For example, when you upgrade to R80 from earlier versions:
Gateways that have the Firewall and the Application Control Software Blades enabled will have
their Access Control Policy split into two ordered layers: Network and Applications.
When the gateway matches a rule in a layer, it starts to evaluate the rules in the next layer.
Gateways that have the IPS and Threat Emulation Software Blades enabled will have their Threat
Prevention policies split into two parallel layers: IPS and Threat Prevention.
All layers are evaluated in parallel
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=docu
ments/R80/CP_R80_SecMGMT/126197
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 27
http://www.passleader.com
QUESTION 59
Tina is a new administrator who is currently reviewing the new Check Point R80 Management
console interface. In the Gateways view, she is reviewing the Summary screen as in the
screenshot below. What as an 'Open Server'?
Answer: A
Explanation:
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_Installation_and_Upgrade_Guide-
webAdmin/index.html
QUESTION 60
Choose the BEST describes the Policy Layer Traffic Inspection?
A. If a packet does not match any of the inline layers, the matching continues to the next Layer.
B. If a packet matches an inline layer, it will continue matching the next layer.
C. If a packet does not match any of the inline layers, the packet will be matched against the Implicit
Clean-up Rule.
D. If a packet does not match a Network Policy Layer, the matching continues to its inline layer.
Answer: B
Explanation:
Reference: https://community.checkpoint.com/thread/1092
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 28
http://www.passleader.com
QUESTION 61
What are the three conflict resolution rules in the Threat Prevention Policy Layers?
Answer: C
QUESTION 62
What does the "unknown" SIC status shown on SmartConsole mean?
A. The SMS can contact the Security Gateway but cannot establish Secure Internal Communication.
B. SIC activation key requires a reset.
C. The SIC activation key is not known by any administrator.
D. There is no connection between the Security Gateway and SMS.
Answer: D
Explanation:
The most typical status is Communicating. Any other status indicates that the SIC communication
is problematic. For example, if the SIC status is Unknown then there is no connection between
the Gateway and the Security Management server. If the SIC status is Not Communicating, the
Security Management server is able to contact the gateway, but SIC communication cannot be
established.
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_SecMan_WebAdmin/html_frameset.htm?to
pic=documents/R76/CP_R76_SecMan_WebAdmin/118037
QUESTION 63
Kofi, the administrator of the ALPHA Corp network wishes to change the default Gaia WebUI
Portal port number currently set on the default HTTPS port. Which CLISH commands are
required to be able to change this TCP port?
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 29
http://www.passleader.com
A. set web ssl-port <new port number>
B. set Gaia-portal <new port number>
C. set Gaia-portal https-port <new port number>
D. set web https-port <new port number>
Answer: A
Explanation:
1. Explanation:
In Clish
E. Connect to command line on Security Gateway / each Cluster member.
F. Log in to Clish.
G. Set the desired port (e.g., port 4434):
HostName> set web ssl-port <Port_Number>
H. Save the changes:
HostName> save config
I. Verify that the configuration was saved:
[Expert@HostName]# grep 'httpd:ssl_port' /config/db/initial Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails
=&solutionid=sk83482
QUESTION 64
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities
using ________ .
A. User Directory
B. Captive Portal and Transparent Kerberos Authentication
C. Captive Portal
D. UserCheck
Answer: B
Explanation:
To enable Identity Awareness:
1. Log in to SmartDashboard.
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 30
http://www.passleader.com
2. From the Network Objects tree, expand the Check Point branch.
3. Double-click the Security Gateway on which to enable Identity Awareness.
4. In the Software Blades section, select Identity Awareness on the Network Security tab.
The Identity Awareness Configuration wizard opens.
5. Select one or more options. These options set the methods for acquiring identities of managed
and unmanaged assets.
AD Query -Lets the Security Gateway seamlessly identify Active Directory users and computers.
Browser-Based Authentication -Sends users to a Web page to acquire identities from unidentified
users. If Transparent Kerberos Authentication is configured, AD users may be identified
transparently.
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_IdentityAwareness_AdminGuide/62050.htm
QUESTION 65
Which default user has full read/write access?
A. Monitor
B. Altuser
C. Administrator
D. Superuser
Answer: C
QUESTION 66
Fill in the blank: The _________ collects logs and sends them to the _________ .
Answer: D
QUESTION 67
The security Gateway is installed on GAiA R80 The default port for the WEB User Interface is
_______ .
A. TCP 18211
B. TCP 257
C. TCP 4433
D. TCP 443
Answer: D
QUESTION 68
Fill in the blank: To build an effective Security Policy, use a ________ and _______ rule.
A. Cleanup; stealth
B. Stealth; implicit
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 31
http://www.passleader.com
C. Cleanup; default
D. Implicit; explicit
Answer: A
QUESTION 69
Which type of Check Point license is tied to the IP address of a specific Security Gateway and
cannot be transferred to a gateway that has a different IP address?
A. Central
B. Corporate
C. Formal
D. Local
Answer: D
QUESTION 70
Which utility shows the security gateway general system information statistics like operating
system information and resource usage, and individual software blade statistics of VPN, Identity
Awareness and DLP?
A. cpconfig
B. fw ctl pstat
C. cpview
D. fw ctl multik stat
Answer: C
Explanation:
CPView Utility is a text based built-in utility that can be run ('cpview' command) on Security
Gateway / Security Management Server / Multi-Domain Security Management Server. CPView
Utility shows statistical data that contain both general system information (CPU, Memory, Disk
space) and information for different Software Blades (only on Security Gateway). The data is
continuously updated in easy to access views.
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails
=&solutionid=sk101878
QUESTION 71
The following graphic shows:
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 32
http://www.passleader.com
A. View from SmartLog for logs initiated from source address 10.1.1.202
B. View from SmartView Tracker for logs of destination address 10.1.1.202
C. View from SmartView Tracker for logs initiated from source address 10.1.1.202
D. View from SmartView Monitor for logs initiated from source address 10.1.1.202
Answer: C
QUESTION 72
In R80, Unified Policy is a combination of
A. Access control policy, QoS Policy, Desktop Security Policy and endpoint policy.
B. Access control policy, QoS Policy, Desktop Security Policy and Threat Prevention Policy.
C. Firewall policy, address Translation and application and URL filtering, QoS Policy, Desktop
Security Policy and Threat Prevention Policy.
D. Access control policy, QoS Policy, Desktop Security Policy and VPN policy.
Answer: D
Explanation:
D is the best answer given the choices.
Unified Policy
In R80 the Access Control policy unifies the policies of these pre-R80 Software Blades:
Firewall and VPN
Application Control and URL Filtering
Identity Awareness
Data Awareness
Mobile Access
Security Zones
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=docu
ments/R80/CP_R80_SecMGMT/126197&anchor=o129934
QUESTION 73
Fill in the blank: The command __________ provides the most complete restoration of a R80
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 33
http://www.passleader.com
configuration.
A. upgrade_import
B. cpconfig
C. fwm dbimport -p <export file>
D. cpinfo -recover
Answer: A
Explanation:
(Should be "migrate import")
"migrate import" Restores backed up configuration for R80 version, in previous versions the
command was " upgrade_import ".
QUESTION 74
The Gaia operating system supports which routing protocols?
Answer: A
Explanation:
The Advanced Routing Suite
The Advanced Routing Suite CLI is available as part of the Advanced Networking Software
Blade.
For organizations looking to implement scalable, fault-tolerant, secure networks, the Advanced
Networking blade enables them to run industry-standard dynamic routing protocols including
BGP, OSPF, RIPv1, and RIPv2 on security gateways. OSPF, RIPv1, and RIPv2 enable dynamic
routing over a single autonomous system--like a single department, company, or service provider-
-to avoid network failures. BGP provides dynamic routing support across more complex networks
involving multiple autonomous systems--such as when a company uses two service providers or
divides a network into multiple areas with different administrators responsible for the performance
of each.
QUESTION 75
Joey wants to configure NTP on R80 Security Management Server. He decided to do this via
WebUI. What is the correct address to access the Web UI for Gaia platform via browser?
A. https://<Device_IP_Address>
B. https://<Device_IP_Address>:443
C. https://<Device_IP_Address>:10000
D. https://<Device_IP_Address>:4434
Answer: A
Explanation:
Access to Web UI Gaia administration interface, initiate a connection from a browser to the
default administration IP address:
Logging in to the WebUI
Logging in
To log in to the WebUI:
1. Enter this URL in your browser:
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 34
http://www.passleader.com
https://<Gaia IP address>
2. Enter your user name and password.
Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_Gaia_AdminWebAdminGuide/
html_frameset.htm?topic=documents/R77/CP_R77_Gaia_AdminWebAdminGuide/75930
QUESTION 76
Which application should you use to install a contract file?
A. SmartView Monitor
B. WebUI
C. SmartUpdate
D. SmartProvisioning
Answer: C
Explanation:
Using SmartUpdate: If you already use an NGX R65 (or higher) Security Management / Provider-
1 / Multi-Domain Management Server, SmartUpdate allows you to import the service contract file
that you have downloaded in Step #3.
Open SmartUpdate and from the Launch Menu select 'Licenses & Contracts' -> 'Update ' -> 'From
File...' and provide the path to the file you have downloaded in Step #3:
Contracts
Note: If SmartUpdate is connected to the Internet, you can download the service contract file
directly from the UserCenter without going through the download and import steps.
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails
=&solutionid=sk33089
QUESTION 77
Which feature is NOT provided by all Check Point Mobile Access solutions?
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 35
http://www.passleader.com
B. Granular access control
C. Strong user authentication
D. Secure connectivity
Answer: A
Explanation:
Types of Solutions
All of Check Point's Remote Access solutions provide:
Enterprise-grade, secure connectivity to corporate resources.
Strong user authentication.
Granular access control.
Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/83586.htm
QUESTION 78
You work as a security administrator for a large company. CSO of your company has attended a
security conference where he has learnt how hackers constantly modify their strategies and
techniques to evade detection and reach corporate resources. He wants to make sure that his
company has the right protections in place. Check Point has been selected for the security
vendor. Which Check Point products protects BEST against malware and zero-day attacks while
ensuring quick delivery of safe content to your users?
Answer: D
Explanation:
SandBlast Zero-Day Protection
Hackers constantly modify their strategies and techniques to evade detection and reach
corporate resources. Zero-day exploit protection from Check Point provides a deeper level of
inspection so you can prevent more malware and zero-day attacks, while ensuring quick delivery
of safe content to your users.
Reference: https://www.checkpoint.com/products-solutions/zero-day-protection/
QUESTION 79
Fill in the blank: Each cluster has __________ interfaces.
A. Five
B. Two
C. Three
D. Four
Answer: C
Explanation:
Each cluster member has three interfaces: one external interface, one internal interface, and one
for synchronization. Cluster member interfaces facing in each direction are connected via a
switch, router, or VLAN switch.
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7292.htm
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 36
http://www.passleader.com
QUESTION 80
What are the three essential components of the Check Point Security Management Architecture?
Answer: A
Explanation:
Deployments
Basic deployments:
Standalone deployment -Security Gateway and the Security Management server are installed on
the same machine.
Distributed deployment -Security Gateway and the Security Management server are installed on
different machines.
Assume an environment with gateways on different sites. Each Security Gateway connects to the
Internet on one side, and to a LAN on the other.
You can create a Virtual Private Network (VPN) between the two Security Gateways, to secure all
communication between them.
The Security Management server is installed in the LAN, and is protected by a Security Gateway.
The Security Management server manages the Security Gateways and lets remote users connect
securely to the corporate network. SmartDashboard can be installed on the Security Management
server or another computer.
There can be other OPSEC-partner modules (for example, an Anti-Virus Server) to complete the
network security with the Security Management server and its Security Gateways.
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 37
http://www.passleader.com
Reference:
https://sc1.checkpoint.com/documents/R77/CP_R77_SecurityManagement_WebAdminGuide/
html_frameset.htm?topic=documents/R77/CP_R77_SecurityManagement_WebAdminGuide/118
037
QUESTION 81
What are the two types of address translation rules?
Answer: D
Explanation:
NAT Rule Base
The NAT Rule Base has two sections that specify how the IP addresses are translated:
Original Packet
Translated Packet
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_Firewall_WebAdmin/6724.htm
QUESTION 82
You are unable to login to SmartDashboard. You log into the management server and run
#cpwd_admin list with the following output:
What reason could possibly BEST explain why you are unable to connect to SmartDashboard?
A. CDP is down
B. SVR is down
C. FWM is down
D. CPSM is down
Answer: C
Explanation:
The correct answer would be FWM (is the process making available communication between
SmartConsole applications and Security Management Server.). STATE is T (Terminate = Down)
Explanation :
Symptoms
SmartDashboard fails to connect to the Security Management server.
1. Verify if the FWM process is running. To do this, run the command:
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 38
http://www.passleader.com
[Expert@HostName:0]# ps -aux | grep fwm
2. If the FWM process is not running, then try force-starting the process with the following
command:
[Expert@HostName:0]# cpwd_admin start -name FWM -path "$FWDIR/bin/fwm" -command
"fwm" Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails
=&solutionid=sk97638
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails
=&solutionid=sk12120
QUESTION 83
What does ExternalZone represent in the presented rule?
A. The Internet.
B. Interfaces that administrator has defined to be part of External Security Zone.
C. External interfaces on all security gateways.
D. External interfaces of specific gateways.
Answer: B
Explanation:
Explanation:
Configuring Interfaces
Configure the Security Gateway 80 interfaces in the Interfaces tab in the Security Gateway
window.
To configure the interfaces:
1. From the Devices window, double-click the Security Gateway 80.
The Security Gateway window opens.
2. Select the Interfaces tab.
3. Select Use the following settings. The interface settings open.
4. Select the interface and click Edit.
The Edit window opens.
5. From the IP Assignment section, configure the IP address of the interface:
1. Select Static IP.
2. Enter the IP address and subnet mask for the interface.
6. In Security Zone, select Wireless, DMS, External, or Internal. Security zone is a type of zone,
created by a bridge to easily create segments, while maintaining IP addresses and router
configurations. Security zones let you choose if to enable or not the firewall between segments.
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_SmartProvisioning_WebAdmin/16741.htm
QUESTION 84
Fill in the blank: The R80 utility fw monitor is used to troubleshoot _____________
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 39
http://www.passleader.com
Answer: C
Explanation:
Check Point's FW Monitor is a powerful built-in tool for capturing network traffic at the packet
level. The FW Monitor utility captures network packets at multiple capture points along the
FireWall inspection chains. These captured packets can be inspected later using the WireShark
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails
=&solutionid=sk30583
QUESTION 85
What are the two high availability modes?
Answer: D
Explanation:
ClusterXL has four working modes. This section briefly describes each mode and its relative
advantages and disadvantages.
Load Sharing Multicast Mode
Load Sharing Unicast Mode
New High Availability Mode
High Availability Legacy Mode
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7292.htm#o7363
QUESTION 86
Fill in the blank: The R80 feature ________ permits blocking specific IP addresses for a specified
time period.
Answer: C
Explanation:
Explanation :
Suspicious Activity Rules Solution
Suspicious Activity Rules is a utility integrated into SmartView Monitor that is used to modify
access privileges upon detection of any suspicious network activity (for example, several
attempts to gain unauthorized access).
The detection of suspicious activity is based on the creation of Suspicious Activity rules.
Suspicious Activity rules are Firewall rules that enable the system administrator to instantly block
suspicious connections that are not restricted by the currently enforced security policy. These
rules, once set (usually with an expiration date), can be applied immediately without the need to
perform an Install Policy operation.
QUESTION 87
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 40
http://www.passleader.com
Which Threat Prevention Software Blade provides comprehensive against malicious and
unwanted network traffic, focusing on application and server vulnerabilities?
A. Anti-Virus
B. IPS
C. Anti-Spam
D. Anti-bot
Answer: B
Explanation:
The IPS Software Blade provides a complete Intrusion Prevention System security solution,
providing comprehensive network protection against malicious and unwanted network traffic,
including:
Malware attacks
Dos and DDoS attacks
Application and server vulnerabilities
Insider threats
Unwanted application traffic, including IM and P2P
Reference: https://www.checkpoint.com/products/ips-software-blade/
QUESTION 88
What is the purpose of Captive Portal?
Answer: C
Explanation:
Captive Portal ?a simple method that authenticates users through a web interface before granting
them access to Intranet resources. When users try to access a protected resource, they get a
web page that must be filled out to continue.
Reference : https://www.checkpoint.com/products/identity-awareness-software-blade/
QUESTION 89
While enabling the Identity Awareness blade the Identity Awareness wizard does not
automatically detect the windows domain. Why does it not detect the windows domain?
Answer: B
Explanation:
To enable Identity Awareness:
1. Log in to SmartDashboard.
2. From the Network Objects tree, expand the Check Point branch.
3. Double-click the Security Gateway on which to enable Identity Awareness.
4. In the Software Blades section, select Identity Awareness on the Network Security tab.
The Identity Awareness Configuration wizard opens.
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 41
http://www.passleader.com
5. Select one or more options. These options set the methods for acquiring identities of managed
and unmanaged assets.
AD Query -Lets the Security Gateway seamlessly identify Active Directory users and computers.
Browser-Based Authentication -Sends users to a Web page to acquire identities from unidentified
users. If Transparent Kerberos Authentication is configured, AD users may be identified
transparently.
Terminal Servers -Identify users in a Terminal Server environment (originating from one IP
address).
See Choosing Identity Sources.
Note -When you enable Browser-Based Authentication on a Security Gateway that is on an IP
Series appliance, make sure to set the Voyager management application port to a port other than
443 or 80.
6. Click Next.
The Integration With Active Directory window opens.
When SmartDashboard is part of the domain, SmartDashboard suggests this domain
automatically. If you select this domain, the system creates an LDAP Account Unit with all of the
domain controllers in the organization's Active Directory.
QUESTION 90
View the rule below. What does the lock-symbol in the left column mean? Select the BEST
answer.
Answer: B
Explanation:
Administrator Collaboration
More than one administrator can connect to the Security Management Server at the same time.
Every administrator has their own username, and works in a session that is independent of the
other administrators.
When an administrator logs in to the Security Management Server through SmartConsole, a new
editing session starts. The changes that the administrator makes during the session are only
available to that administrator. Other administrators see a lock icon on object and rules that are
being edited.
To make changes available to all administrators, and to unlock the objects and rules that are
being edited, the administrator must publish the session.
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=docu
ments/R80/CP_R80_SecMGMT/124265
QUESTION 91
When attempting to start a VPN tunnel, in the logs the error 'no proposal chosen' is seen
numerous times. No other VPN-related log entries are present. Which phase of the VPN
negotiations has failed?
A. IKE Phase 1
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 42
http://www.passleader.com
B. IPSEC Phase 2
C. IPSEC Phase 1
D. IKE Phase 2
Answer: D
QUESTION 92
Which command is used to add users to or from existing roles?
Answer: A
Explanation:
Configuring Roles -CLI (rba)
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_Gaia_WebAdmin/73101.htm
QUESTION 93
You are the administrator for Alpha Corp. You have logged into your R80 Management server.
You are making some changes in the Rule Base and notice that rule No.6 has a pencil icon next
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 43
http://www.passleader.com
to it.
A. The rule No.6 has been marked for deletion in your Management session.
B. The rule No.6 has been marked for deletion in another Management session.
C. The rule No.6 has been marked for editing in your Management session.
D. The rule No.6 has been marked for editing in another Management session.
Answer: C
QUESTION 94
Which type of the Check Point license ties the package license to the IP address of the Security
Management Server?
A. Local
B. Central
C. Corporate
D. Formal
Answer: B
QUESTION 95
What is NOT an advantage of Packet Filtering?
Answer: A
Explanation:
Packet Filter Advantages and Disadvantages
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 44
http://www.passleader.com
Reference: https://www.checkpoint.com/smb/help/utm1/8.2/7078.htm
QUESTION 96
In the Check Point three-tiered architecture, which of the following is NOT a function of the
Security Management Server (Security Management Server)?
Answer: A
QUESTION 97
Web Control Layer has been set up using the settings in the following dialogue:
A. Traffic that does not match any rule in the subpolicy is dropped.
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 45
http://www.passleader.com
B. All employees can access only Youtube and Vimeo.
C. Access to Youtube and Vimeo is allowed only once a day.
D. Anyone from internal network can access the internet, expect the traffic defined in drop rules 5.2,
5.5 and 5.6.
Answer: D
Explanation:
Explanation:
Policy Layers and Sub-Policies
R80 introduces the concept of layers and sub-policies, allowing you to segment your policy
according to your network segments or business units/functions. In addition, you can also
assign granular privileges by layer or sub-policy to distribute workload and tasks to the most
qualified administrators With layers, the rule base is organized into a set of security rules. These
set of rules or layers, are inspected in the order in which they are defined, allowing control over
the rule base flow and the security functionalities that take precedence. If an "accept" action is
performed across a layer, the inspection will continue to the next layer. For example, a
compliance layer can be created to overlay across a cross-section of rules.
Sub-policies are sets of rules that are created for a specific network segment, branch office or
business unit, so if a rule is matched, inspection will continue through this subset of rules before it
moves on to the next rule.
Sub-policies and layers can be managed by specific administrators, according to their
permissions profiles. This facilitates task delegation and workload distribution.
Reference: https://community.checkpoint.com/docs/DOC-1065
QUESTION 98
Which of the following are types of VPN communicates?
Answer: D
QUESTION 99
Fill in the blank: RADIUS protocol uses ______ to communicate with the gateway.
A. UDP
B. TDP
C. CCP
D. HTTP
Answer: A
Explanation:
Parameters:
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 46
http://www.passleader.com
Reference:
https://sc1.checkpoint.com/documents/R76SP/CP_R76SP_Security_System_WebAdminGuide/1
05209.htm
QUESTION 100
When a packet arrives at the gateway, the gateway checks it against the rules in the top Policy
Layer, sequentially from top to bottom, and enforces the first rule that matches a packet. Which of
the following statements about the order of rule enforcement is true?
A. If the Action is Accept, the gateway allows the packet to pass through the gateway.
B. If the Action is Drop, the gateway continues to check rules in the next Policy Layer down.
C. If the Action is Accept, the gateway continues to check rules in the next Policy Layer down.
D. If the Action is Drop, the gateway applies the Implicit Clean-up Rule for that Policy Layer.
Answer: C
QUESTION 101
Office mode means that:
A. SecureID client assigns a routable MAC address. After the user authenticates for a tunnel, the
VPN gateway assigns a routable IP address to the remote client.
B. Users authenticate with an Internet browser and use secure HTTPS connection.
C. Local ISP (Internet service Provider) assigns a non-routable IP address to the remote user.
D. Allows a security gateway to assign a remote client an IP address. After the user authenticates for
a tunnel, the VPN gateway assigns a routable IP address to the remote client.
Answer: D
Explanation:
Office Mode enables a Security Gateway to assign internal IP addresses to SecureClient users.
This IP address will not be exposed to the public network, but is encapsulated inside the VPN
tunnel between the client and the Gateway. The IP to be used externally should be assigned to
the client in the usual way by the Internet Service provider used for the Internet connection. This
mode allows a Security Administrator to control which addresses are used by remote clients
inside the local network and makes them part of the local network. The mechanism is based on
an IKE protocol extension through which the Security Gateway can send an internal IP address to
the client.
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails
=&solutionid=sk30545
QUESTION 102
Administrator wishes to update IPS from SmartConsole by clicking on the option "update now"
under the IPS tab. Which device requires internet access for the update to work?
A. Security Gateway
B. Device where SmartConsole is installed
C. SMS
D. SmartEvent
Answer: B
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 47
http://www.passleader.com
Explanation:
Updating IPS Manually
You can immediately update IPS with real-time information on attacks and all the latest
protections from the IPS website. You can only manually update IPS if a proxy is defined in
Internet Explorer settings.
To obtain updates of all the latest protections from the IPS website:
1. Configure the settings for the proxy server in Internet Explorer.
1.In Microsoft Internet Explorer, open Tools > Internet Options > Connections tab > LAN Settings.
The LAN Settings window opens.
2.Select Use a proxy server for your LAN.
3.Configure the IP address and port number for the proxy server.
4.Click OK.
The settings for the Internet Explorer proxy server are configured.
2. In the IPS tab, select Download Updates and click Update Now.
If you chose to automatically mark new protections for Follow Up, you have the option to open the
Follow Up page directly to see the new protections.
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_IPS_AdminGuide/12850.htm
QUESTION 103
Jack works for a managed service provider and he has been tasked to create 17 new policies for
several new customers. He does not have much time. What is the BEST way to do this with R80
security management?
A. Create a text-file with mgmt_cli script that creates all objects and policies. Open the file in
SmartConsole Command Line to run it.
B. Create a text-file with Gaia CLI -commands in order to create all objects and policies. Run the file
in CLISH with command load configuration.
C. Create a text-file with DBEDIT script that creates all objects and policies. Run the file in the
command line of the management server using command dbedit -f.
D. Use Object Explorer in SmartConsole to create the objects and Manage Policies from the menu to
create the policies.
Answer: A
Explanation:
Did you know: mgmt_cli can accept csv files as inputs using the --batch option.
The first row should contain the argument names and the rows below it should hold the values for
these parameters.
So an equivalent solution to the powershell script could look like this:
data.csv:
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 48
http://www.passleader.com
https://sc1.checkpoint.com/documents/R80/APIs/#gui-cli/add-access-rule
QUESTION 104
When Identity Awareness is enabled, which identity source(s) is(are) used for Application
Control?
A. RADIUS
B. Remote Access and RADIUS
C. AD Query
D. AD Query and Browser-based Authentication
Answer: D
Explanation:
Identity Awareness gets identities from these acquisition sources:
AD Query
Browser-Based Authentication
Endpoint Identity Agent
Terminal Servers Identity Agent
Remote Access
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_IdentityAwareness_AdminGuide/62007.htm
QUESTION 105
Which of the following is NOT a back up method?
A. Save backup
B. System backup
C. snapshot
D. Migrate
Answer: A
Explanation:
The built-in Gaia backup procedures:
Snapshot Management
System Backup (and System Restore)
Save/Show Configuration (and Load Configuration)
Check Point provides three different procedures for backing up (and restoring) the operating
system and networking parameters on your appliances.
Snapshot (Revert)
Backup (Restore)
upgrade_export (Migrate)
QUESTION 106
Which of the following is NOT an advantage to using multiple LDAP servers?
A. You achieve a faster access time by placing LDAP servers containing the database at remote sites
B. Information on a user is hidden, yet distributed across several servers
C. You achieve compartmentalization by allowing a large number of users to be distributed across
several servers
D. You gain High Availability by replicating the same information on several servers
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 49
http://www.passleader.com
Answer: B
QUESTION 107
Which Check Point software blade prevents malicious files from entering a network using virus
signatures and anomaly-based protections from ThreatCloud?
A. Firewall
B. Application Control
C. Anti-spam and Email Security
D. Antivirus
Answer: D
Explanation:
The enhanced Check Point Antivirus Software Blade uses real-time virus signatures and
anomaly-based protections from ThreatCloudTM, the first collaborative network to fight
cybercrime, to detect and block malware at the gateway before users are affected.
Reference: https://www.checkpoint.com/products/antivirus-software-blade/
QUESTION 108
What is the default method for destination NAT?
A. Destination side
B. Source side
C. Server side
D. Client side
Answer: D
Explanation:
Client Side NAT -destination is NAT`d by the inbound kernel
QUESTION 109
Choose what BEST describes a Session.
Answer: B
Explanation:
Administrator Collaboration
More than one administrator can connect to the Security Management Server at the same time.
Every administrator has their own username, and works in a session that is independent of the
other administrators.
When an administrator logs in to the Security Management Server through SmartConsole, a new
editing session starts. The changes that the administrator makes during the session are only
available to that administrator. Other administrators see a lock icon on object and rules that are
being edited.
To make changes available to all administrators, and to unlock the objects and rules that are
being edited, the administrator must publish the session.
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 50
http://www.passleader.com
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=docu
ments/R80/CP_R80_SecMGMT/117948
QUESTION 110
Which of the following is NOT a VPN routing option available in a star community?
Answer: AD
Explanation:
SmartConsole
For simple hubs and spokes (or if there is only one Hub), the easiest way is to configure a VPN
star community in R80 SmartConsole:
1. On the Star Community window, in the:
E. Center Gateways section, select the Security Gateway that functions as the "Hub".
F. Satellite Gateways section, select Security Gateways as the "spokes", or satellites.
2. On the VPN Routing page, Enable VPN routing for satellites section, select one of these
options:
G. To center and to other Satellites through center -This allows connectivity between the Security
Gateways, for example if the spoke Security Gateways are DAIP Security Gateways, and the Hub
is a Security Gateway with a static IP address.
H. To center, or through the center to other satellites, to internet and other VPN targets -This
allows connectivity between the Security Gateways as well as the ability to inspect all
communication passing through the Hub to the Internet.
3. Create an appropriate Access Control Policy rule.
4. NAT the satellite Security Gateways on the Hub if the Hub is used to route connections from
Satellites to the Internet.
The two Dynamic Objects (DAIP Security Gateways) can securely route communication through
the Security Gateway with the static IP address.
Reference: https://sc1.checkpoint.com/documents/R80/CP_R80BC_VPN/html_frameset.htm
QUESTION 111
What is the default shell of Gaia CLI?
A. Monitor
B. CLI.sh
C. Read-only
D. Bash
Answer: B
Explanation:
This chapter gives an introduction to the Gaia command line interface (CLI).
The default shell of the CLI is called clish.
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_Gaia_WebAdmin/75697.htm
QUESTION 112
Which of the following licenses are considered temporary?
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 51
http://www.passleader.com
A. Perpetual and Trial
B. Plug-and-play and Evaluation
C. Subscription and Perpetual
D. Evaluation and Subscription
Answer: B
Explanation:
Explanation:
Should be Trial or Evaluation, even Plug-and-play (all are synonyms ). Answer B is the best
choise.
QUESTION 113
Where can administrator edit a list of trusted SmartConsole clients in R80?
A. cpconfig on a Security Management Server, in the WebUI logged into a Security Management
Server.
B. Only using SmartConsole: Manage and Settings > Permissions and Administrators > Advanced >
Trusted Clients.
C. In cpconfig on a Security Management Server, in the WebUI logged into a Security Management
Server, in SmartConsole: Manage and Settings>Permissions and
Administrators>Advanced>Trusted Clients.
D. WebUI client logged to Security Management Server, SmartDashboard: Manage and
Settings>Permissions and Administrators>Advanced>Trusted Clients, via cpconfig on a Security
Gateway.
Answer: C
QUESTION 114
Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is
________ all traffic. However, in the Application Control policy layer, the default action is
________ all traffic.
A. Accept; redirect
B. Accept; drop
C. Redirect; drop
D. Drop; accept
Answer: D
QUESTION 115
Vanessa is a Firewall administrator. She wants to test a backup of her company's production
Firewall cluster Dallas_GW. She has a lab environment that is identical to her production
environment. She decided to restore production backup via SmartConsole in lab environment.
Which details she need to fill in System Restore window before she can click OK button and test
the backup?
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 52
http://www.passleader.com
Answer: C
QUESTION 116
On the following picture an administrator configures Identity Awareness:
Answer: B
Explanation:
To enable Identity Awareness:
1. Log in to R80 SmartConsole.
2. From the Gateways & Servers view, double-click the Security Gateway on which to enable
Identity Awareness.
3. On the Network Security tab, select Identity Awareness.
The Identity Awareness Configuration wizard opens.
4. Select one or more options. These options set the methods for acquiring identities of managed
and unmanaged assets.
AD Query -Lets the Security Gateway seamlessly identify Active Directory users and computers.
Browser-Based Authentication -Sends users to a Web page to acquire identities from unidentified
users. If Transparent Kerberos Authentication is configured, AD users may be identified
transparently.
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 53
http://www.passleader.com
Terminal Servers -Identify users in a Terminal Server environment (originating from one IP
address).
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80BC_IdentityAwareness/html_frameset.htm?to
pic=documents/R80/CP_R80BC_IdentityAwareness/62050
QUESTION 117
What does it mean if Bob gets this result on an object search?Refer to the image below. Choose
the BEST answer.
Answer: B
QUESTION 118
Why would an administrator see the message below?
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 54
http://www.passleader.com
A. A new Policy Package created on both the Management and Gateway will be deleted and must be
packed up first before proceeding.
B. A new Policy Package created on the Management is going to be installed to the existing
Gateway.
C. A new Policy Package created on the Gateway is going to be installed on the existing
Management.
D. A new Policy Package created on the Gateway and transferred to the management will be
overwritten by the Policy Package currently on the Gateway but can be restored from a periodic
backup on the Gateway.
Answer: B
QUESTION 119
Fill in the blank: The _________ software blade enables Application Security policies to allow,
block, or limit website access based on user, group, and machine identities.
A. Application Control
B. Data Awareness
C. URL Filtering
D. Threat Emulation
Answer: A
QUESTION 120
At what point is the Internal Certificate Authority (ICA) created?
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 55
http://www.passleader.com
D. When an administrator initially logs into SmartConsole.
Answer: B
Explanation:
Introduction to the ICA
The ICA is a Certificate Authority which is an integral part of the Check Point product suite. It is
fully compliant with X.509 standards for both certificates and CRLs. See the relevant X.509 and
PKI documentation, as well as RFC 2459 standards for more information. You can read more
about Check Point and PKI in the R76 VPN Administration Guide.
The ICA is located on the Security Management server. It is created during the installation
process, when the Security Management server is configured.
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_SecMan_WebAdmin/html_frameset.htm?to
pic=documents/R76/CP_R76_SecMan_WebAdmin/13118
QUESTION 121
In which VPN community is a satellite VPN gateway not allowed to create a VPN tunnel with
another satellite VPN gateway?
A. Pentagon
B. Combined
C. Meshed
D. Star
Answer: D
Explanation:
VPN communities are based on Star and Mesh topologies. In a Mesh community, there are VPN
connections between each Security Gateway. In a Star community, satellites have a VPN
connection with the center Security Gateway, but not to each other.
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_Firewall_WebAdmin/92709.htm
QUESTION 122
Which information is included in the "Full Log" tracking option, but is not included in the "Log"
tracking option?
A. file attributes
B. application information
C. destination port
D. data type information
Answer: D
Explanation:
Tracking Options
Network Log -Generates a log with only basic Firewall information: Source, Destination, Source
Port, Destination Port, and Protocol.
Log -Equivalent to the Network Log option, but also includes the application name (for example,
Dropbox), and application information (for example, the URL of the Website). This is the default
Tracking option.
Full Log -Equivalent to the log option, but also records data for each URL request made.
-If suppression is not selected, it generates a complete log (as defined in pre-R80 management).
-If suppression is selected, it generates an extended log (as defined in pre-R80 management).
None -Do not generate a log.
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 56
http://www.passleader.com
Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_LoggingAndMonitoring/
html_frameset.htm?topic=documents/R80/CP_R80_LoggingAndMonitoring/131914
QUESTION 123
In the R80 SmartConsole, on which tab are Permissions and Administrators defined?
A. Security Policies
B. Logs and Monitor
C. Manage and Settings
D. Gateway and Servers
Answer: C
QUESTION 124
Which type of Endpoint Identity Agent includes packet tagging and computer authentication?
A. Full
B. Light
C. Custom
D. Complete
Answer: A
Explanation:
Endpoint Identity Agents ?dedicated client agents installed on users' computers that acquire and
report identities to the Security Gateway.
QUESTION 125
Fill in the blanks: The Application Layer Firewalls inspect traffic through the ________ layer(s) of
the TCP/IP model and up to and including the ________ layer.
A. Lower; Application
B. First two; Internet
C. First two; Transport
D. Upper; Application
Answer: A
QUESTION 126
There are two R77.30 Security Gateways in the Firewall Cluster. They are named FW_A and
FW_B. The cluster is configured to work as HA (High availability) with default cluster
configuration. FW_A is configured to have higher priority than FW_B. FW_A was active and
processing the traffic in the morning. FW_B was standby. Around 1100 am, its interfaces went
down and this caused a failover. FW_B became active. After an hour, FW_A's interface issues
were resolved and it became operational. When it re-joins the cluster, will it become active
automatically?
A. No, since "maintain current active cluster member" option on the cluster object properties is
enabled by default
B. No, since "maintain current active cluster member" option is enabled by default on the Global
Properties
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 57
http://www.passleader.com
C. Yes, since "Switch to higher priority cluster member" option on the cluster object properties is
enabled by default
D. Yes, since "Switch to higher priority cluster member" option is enabled by default on the Global
Properties
Answer: A
Explanation:
What Happens When a Security Gateway Recovers?In a Load Sharing configuration, when the
failed Security Gateway in a cluster recovers, all connections are redistributed among all active
members. High Availability and Load Sharing in ClusterXL ClusterXL Administration Guide R77
Versions | 31 In a High Availability configuration, when the failed Security Gateway in a cluster
recovers, the recovery method depends on the configured cluster setting. The options are:
- Maintain Current Active Security Gateway means that if one member passes on control to a
lower priority member, control will be returned to the higher priority member only if the lower
priority member fails. This mode is recommended if all members are equally capable of
processing traffic, in order to minimize the number of failover events.
- Switch to Higher Priority Security Gateway means that if the lower priority member has control
and the higher priority member is restored, then control will be returned to the higher priority
member. This mode is recommended if one member is better equipped for handling connections,
so it will be the default Security Gateway.
QUESTION 127
After the initial installation the First Time Configuration Wizard should be run. Select the BEST
answer.
A. First Time Configuration Wizard can be run from the Unified SmartConsole.
B. First Time Configuration Wizard can be run from the command line or from the WebUI.
C. First time Configuration Wizard can only be run from the WebUI.
D. Connection to the internet is required before running the First Time Configuration wizard.
Answer: B
Explanation:
Explanation:
Check Point Security Gateway and Check Point Security Management require running the First
Time Configuration Wizard in order to be configured correctly. The First Time Configuration
Wizard is available in Gaia Portal and also through CLI.
To invoke the First Time Configuration Wizard through CLI, run the config_system command from
the Expert shell.
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails
=&solutionid=sk111119
QUESTION 128
In order to modify Security Policies the administrator can use which of the following tools?Select
the BEST answer.
A. Command line of the Security Management Server or mgmt_cli.exe on any Windows computer.
B. SmartConsole and WebUI on the Security Management Server.
C. mgmt_cli or WebUI on Security Gateway and SmartConsole on the Security Management Server.
D. SmartConsole or mgmt_cli on any computer where SmartConsole is installed.
Answer: D
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 58
http://www.passleader.com
QUESTION 129
Which of the following is NOT an element of VPN Simplified Mode and VPN Communities?
Answer: A
Explanation:
Migrating from Traditional Mode to Simplified Mode To migrate from Traditional Mode VPN to
Simplified Mode:
1. On the Global Properties > VPN page, select one of these options:
- Simplified mode to all new Firewall Policies
- Traditional or Simplified per new Firewall Policy
2. Click OK.
3. From the R80 SmartConsole Menu, select Manage policies.
The Manage Policies window opens.
4. Click New.
The New Policy window opens.
5. Give a name to the new policy and select Access Control.
In the Security Policy Rule Base, a new column marked VPN shows and the Encrypt option is no
longer available in the Action column. You are now working in Simplified Mode.
QUESTION 130
Fill in the blanks: A Check Point software license consists of a _______ and _______ .
Answer: B
Explanation:
Check Point's licensing is designed to be scalable and modular. To this end, Check Point offers
both predefined packages as well as the ability to custom build a solution tailored to the needs of
the Network Administrator. This is accomplished by the use of of the following license
components:
Software Blades
Container
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails
=&solutionid=sk11054
QUESTION 131
Fill in the blank: Once a license is activated, a ________ should be installed.
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 59
http://www.passleader.com
D. License Contract file
Answer: C
Explanation:
Service Contract File
Following the activation of the license, a Service Contract File should be installed. This file
contains important information about all subscriptions purchased for a specific device and is
installed via SmartUpdate. A detailed explanation of the Service Contract File can be found in
sk33089.
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails
=&solutionid=sk11054
QUESTION 132
Which policy type is used to enforce bandwidth and traffic control rules?
A. Threat Emulation
B. Access Control
C. QoS
D. Threat Prevention
Answer: C
Explanation:
Check Point's QoS Solution
QoS is a policy-based QoS management solution from Check Point Software Technologies Ltd.,
satisfies your needs for a bandwidth management solution. QoS is a unique, software-only based
application that manages traffic end-to-end across networks, by distributing enforcement
throughout network hardware and software.
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_QoS_AdminGuide/index.html
QUESTION 133
Bob and Joe both have Administrator Roles on their Gaia Platform. Bob logs in on the WebUI and
then Joe logs in through CLI. Choose what BEST describes the following scenario, where Bob
and Joe are both logged in:
Answer: C
QUESTION 134
Fill in the blank: When LDAP is integrated with Check Point Security Management, it is then
referred to as _______
A. UserCheck
B. User Directory
C. User Administration
D. User Center
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 60
http://www.passleader.com
Answer: B
Explanation:
Check Point User Directory integrates LDAP, and other external user management technologies,
with the Check Point solution. If you have a large user count, we recommend that you use an
external user management database such as LDAP for enhanced Security Management Server
performance.
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=docu
ments/R80/CP_R80_SecMGMT/118981
QUESTION 135
Which Check Point software blade provides protection from zero-day and undiscovered threats?
A. Firewall
B. Threat Emulation
C. Application Control
D. Threat Extraction
Answer: D
Explanation:
SandBlast Threat Emulation
As part of the Next Generation Threat Extraction software bundle (NGTX), the SandBlast Threat
Emulation capability prevents infections from undiscovered exploits zero-day and targeted
attacks. This innovative solution quickly inspects files and runs them in a virtual sandbox to
discover malicious behavior.
Discovered malware is prevented from entering the network.
Reference: https://www.checkpoint.com/products/next-generation-threat-prevention/
QUESTION 136
Which of the completed statements is NOT true?The WebUI can be used to manage user
accounts and:
Answer: D
Explanation:
Users
Use the WebUI and CLI to manage user accounts. You can:
Add users to your Gaia system.
Edit the home directory of the user.
Edit the default shell for a user.
Give a password to a user.
Give privileges to users.
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_Gaia_WebAdmin/73101.htm
QUESTION 137
Look at the following screenshot and select the BEST answer.
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 61
http://www.passleader.com
A. Clients external to the Security Gateway can download archive files from FTP_Ext server using
FTP.
B. Internal clients can upload and download any-files to FTP_Ext-server using FTP.
C. Internal clients can upload and download archive-files to FTP_Ext server using FTP.
D. Clients external to the Security Gateway can upload any files to the FTP_Ext-server using FTP.
Answer: A
QUESTION 138
Fill in the blanks: A security Policy is created in _________ , stored in the _________ , and
Distributed to the various __________ .
Answer: C
QUESTION 139
Look at the screenshot below. What CLISH command provides this output?
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 62
http://www.passleader.com
Answer: D
Explanation:
QUESTION 140
Which authentication scheme requires a user to possess a token?
A. TACACS
B. SecurID
C. Check Point password
D. RADIUS
Answer: B
Explanation:
SecurID
SecurID requires users to both possess a token authenticator and to supply a PIN or password.
QUESTION 141
If there is an Accept Implied Policy set to "First", what is the reason Jorge cannot see any logs?
Answer: A
Explanation:
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 63
http://www.passleader.com
Implied Rules are configured only on Global Properties.
QUESTION 142
The most important part of a site-to-site VPN deployment is the ________ .
A. Internet
B. Remote users
C. Encrypted VPN tunnel
D. VPN gateways
Answer: C
Explanation:
Site to Site VPN
The basis of Site to Site VPN is the encrypted VPN tunnel. Two Security Gateways negotiate a
link and create a VPN tunnel and each tunnel can contain more than one VPN connection. One
Security Gateway can maintain more than one VPN tunnel at the same time.
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_Firewall_WebAdmin/92709.htm
QUESTION 143
R80 Security Management Server can be installed on which of the following operating systems?
A. Gaia only
B. Gaia, SPLAT, Windows Server only
C. Gaia, SPLAT, Windows Server and IPSO only
D. Gaia and SPLAT only
Answer: A
Explanation:
R80 can be installed only on GAIA OS.
Supported Check Point Installations All R80 servers are supported on the Gaia Operating
System:
- Security Management Server
- Multi-Domain Security Management Server
- Log Server
- Multi-Domain Log Server
- SmartEvent Server
QUESTION 144
What port is used for delivering logs from the gateway to the management server?
A. Port 258
B. Port 18209
C. Port 257
D. Port 981
Answer: C
QUESTION 145
The organization's security manager wishes to back up just the Gaia operating system
parameters. Which command can be used to back up only Gaia operating system parameters like
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 64
http://www.passleader.com
interface details, Static routes and Proxy ARP entries?
A. show configuration
B. backup
C. migrate export
D. upgrade export
Answer: B
Explanation:
3. System Backup (and System Restore)
System Backup can be used to backup current system configuration. A backup creates a
compressed file that contains the Check Point configuration including the networking and
operating system parameters, such as routing and interface configuration etc., but unlike a
snapshot, it does not include the operating system, product binaries, and hotfixes.
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails
=&solutionid=sk108902
QUESTION 146
Choose what BEST describes users on Gaia Platform.
Answer: B
Explanation:
Exlantion: These users are created by default and cannot be deleted:
admin --Has full read/write capabilities for all Gaia features, from the WebUI and the CLI. This
user has a User ID of 0, and therefore has all of the privileges of a root user.
monitor --Has read-only capabilities for all features in the WebUI and the CLI, and can change its
own password. You must give a password for this user before the account can be used.
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_Gaia_WebAdmin/73101.htm
QUESTION 147
You are going to upgrade from R77 to R80. Before the upgrade, you want to back up the system
so that, if there are any problems, you can easily restore to the old version with all configuration
and management files intact. What is the BEST backup method in this scenario?
A. backup
B. Database Revision
C. snapshot
D. migrate export
Answer: C
Explanation:
2. Snapshot Management
The snapshot creates a binary image of the entire root (lv_current) disk partition. This includes
Check Point products, configuration, and operating system.
Starting in R77.10, exporting an image from one machine and importing that image on another
machine of the same type is supported.
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 65
http://www.passleader.com
The log partition is not included in the snapshot. Therefore, any locally stored FireWall logs will
not be saved.
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails
=&solutionid=sk108902
QUESTION 148
The IT Management team is interested in the new features of the Check Point R80 Management
and wants to upgrade but they are concerned that the existing R77.30 Gaia Gateways cannot be
managed by R80 because it is so different. As the administrator responsible for the Firewalls,
how can you answer or confirm these concerns?
A. R80 Management contains compatibility packages for managing earlier versions of Check Point
Gateways prior to R80. Consult the R80 Release Notes for more information.
B. R80 Management requires the separate installation of compatibility hotfix packages for managing
the earlier versions of Check Point Gateways prior to R80. Consult the R80 Release Notes for
more information.
C. R80 Management was designed as a completely different Management system and so can only
monitor Check Point Gateways prior to R80.
D. R80 Management cannot manage earlier versions of Check Point Gateways prior to R80. Only
R80 and above Gateways can be managed. Consult the R80 Release Notes for more information.
Answer: A
Explanation:
QUESTION 149
Provide very wide coverage for all products and protocols, with noticeable performance impact.
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 66
http://www.passleader.com
How could you tune the profile in order to lower the CPU load still maintaining security at good
level?Select the BEST answer.
Answer: B
QUESTION 150
Fill in the blank: A _______ is used by a VPN gateway to send traffic as if it were a physical
interface.
Answer: A
Explanation:
Route Based VPN
VPN traffic is routed according to the routing settings (static or dynamic) of the Security Gateway
operating system. The Security Gateway uses a VTI (VPN Tunnel Interface) to send the VPN
traffic as if it were a physical interface. The VTIs of Security Gateways in a VPN community
connect and can support dynamic routing protocols.
Reference: http://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/13868.htm
QUESTION 151
Fill in the blank: The ________ feature allows administrators to share a policy with other policy
packages.
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 67
http://www.passleader.com
C. Concurrent policy packages
D. Concurrent policies
Answer: A
QUESTION 152
You want to define a selected administrator's permission to edit a layer. However, when you click
the + sign in the "Select additional profile that will be able edit this layer" you do not see anything.
What is the most likely cause of this problem?Select the BEST answer.
Answer: B
QUESTION 153
Which of the following is NOT an alert option?
A. SNMP
B. High alert
C. Mail
D. User defined alert
Answer: B
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 68
http://www.passleader.com
Explanation:
In Action, select:
none -No alert.
log -Sends a log entry to the database.
alert -Opens a pop-up window to your desktop.
mail -Sends a mail alert to your Inbox.
snmptrap -Sends an SNMP alert.
useralert -Runs a script. Make sure a user-defined action is available. Go to SmartDashboard >
Global Properties > Log and Alert > Alert Commands.
QUESTION 154
Fill in the blanks: A High Availability deployment is referred to as a ______ cluster and a Load
Sharing deployment is referred to as a ________ cluster.
A. Standby/standby; active/active
B. Active/active; standby/standby
C. Active/active; active/standby;
D. Active/standby; active/active
Answer: D
Explanation:
In a High Availability cluster, only one member is active (Active/Standby operation).
ClusterXL Load Sharing distributes traffic within a cluster so that the total throughput of multiple
members is increased. In Load Sharing configurations, all functioning members in the cluster are
active, and handle network traffic (Active/Active operation).
Reference:
https://sc1.checkpoint.com/documents/R77/CP_R77_ClusterXL_WebAdminGuide/7292.htm
QUESTION 155
AdminA and AdminB are both logged in on SmartConsole. What does it mean if AdminB sees a
locked icon on a rule?Choose the BEST answer.
A. Rule is locked by AdminA, because the save bottom has not been press.
B. Rule is locked by AdminA, because an object on that rule is been edited.
C. Rule is locked by AdminA, and will make it available if session is published.
D. Rule is locked by AdminA, and if the session is saved, rule will be available
Answer: C
QUESTION 156
Which of the following is TRUE about the Check Point Host object?
A. Check Point Host has no routing ability even if it has more than one interface installed.
B. When you upgrade to R80 from R77.30 or earlier versions, Check Point Host objects are converted
to gateway objects.
C. Check Point Host is capable of having an IP forwarding mechanism.
D. Check Point Host can act as a firewall.
Answer: A
Explanation:
A Check Point host is a host with only one interface, on which Check Point software has been
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 69
http://www.passleader.com
installed, and which is managed by the Security Management server. It is not a routing
mechanism and is not capable of IP forwarding.
QUESTION 157
Which of the following is NOT a set of Regulatory Requirements related to Information Security?
A. ISO 37001
B. Sarbanes Oxley (SOX)
C. HIPPA
D. PCI
Answer: A
Explanation:
ISO 37001 -Anti-bribery management systems
QUESTION 158
Which command is used to obtain the configuration lock in Gaia?
Answer: A
Explanation:
Obtaining a Configuration Lock
lock database override
unlock database
QUESTION 159
Joey is using the computer with IP address 192.168.20.13. He wants to access web page
"www.Check Point.com", which is hosted on Web server with IP address 203.0.113.111. How
many rules on Check Point Firewall are required for this connection?
A. Two rules ?first one for the HTTP traffic and second one for DNS traffic.
B. Only one rule, because Check Point firewall is a Packet Filtering firewall
C. Two rules ?one for outgoing request and second one for incoming replay.
D. Only one rule, because Check Point firewall is using Stateful Inspection technology.
Answer: D
QUESTION 160
Fill in the blank: Licenses can be added to the License and Contract repository ________ .
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 70
http://www.passleader.com
Answer: A
QUESTION 161
Fill in the blank: A(n) _____ rule is created by an administrator and is located before the first and
before last rules in the Rule Base.
A. Firewall drop
B. Explicit
C. Implicit accept
D. Implicit drop
E. Implied
Answer: E
Explanation:
This is the order that rules are enforced:
1. First Implied Rule: You cannot edit or delete this rule and no explicit rules can be placed before
it.
2. Explicit Rules: These are rules that you create.
3. Before Last Implied Rules: These implied rules are applied before the last explicit rule.
4. Last Explicit Rule: We recommend that you use the Cleanup rule as the last explicit rule.
5. Last Implied Rules: Implied rules that are configured as Last in Global Properties.
6. Implied Drop Rule: Drops all packets without logging.
QUESTION 162
Fill in the blank: The IPS policy for pre-R80 gateways is installed during the _______ .
Answer: B
QUESTION 163
Fill in the blank: RADIUS Accounting gets ______ data from requests generated by the
accounting client
A. Destination
B. Identity
C. Payload
D. Location
Answer: B
Explanation:
How RADIUS Accounting Works with Identity Awareness RADIUS Accounting gets identity data
from RADIUS Accounting Requests generated by the RADIUS accounting client.
QUESTION 164
Fill in the blank: The R80 SmartConsole, SmartEvent GUI client, and _______ consolidate billions
of logs and shows them as prioritized security events.
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 71
http://www.passleader.com
A. SmartMonitor
B. SmartView Web Application
C. SmartReporter
D. SmartTracker
Answer: B
Explanation:
Event Analysis with SmartEvent
The SmartEvent Software Blade is a unified security event management and analysis solution
that delivers real-time, graphical threat management information. SmartConsole, SmartView Web
Application, and the SmartEvent GUI client consolidate billions of logs and show them as
prioritized security events so you can immediately respond to security incidents, and do the
necessary actions to prevent more attacks. You can customize the views to monitor the events
that are most important to you. You can move from a high level view to detailed forensic analysis
in a few clicks. With the free-text search and suggestions, you can quickly run data analysis and
identify critical security events.
QUESTION 165
Which Check Point software blade provides visibility of users, groups and machines while also
providing access control through identity-based policies?
A. Firewall
B. Identity Awareness
C. Application Control
D. URL Filtering
Answer: B
Explanation:
Check Point Identity Awareness Software Blade provides granular visibility of users, groups and
machines, providing unmatched application and access control through the creation of accurate,
identity-based policies. Centralized management and monitoring allows for policies to be
managed from a single, unified console.
QUESTION 166
How many users can have read/write access in Gaia at one time?
A. Infinite
B. One
C. Three
D. Two
Answer: B
QUESTION 167
Which SmartConsole component can Administrators use to track changes to the Rule Base?
A. SmartView Monitor
B. SmartReporter
C. WebUI
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 72
http://www.passleader.com
D. SmartView Tracker
Answer: D
QUESTION 168
UDP packets are delivered if they are ___________.
Answer: B
QUESTION 169
The INSPECT engine inserts itself into the kernel between which two OSI model layers?
Answer: C
QUESTION 170
What is a Consolidation Policy?
A. A global Policy used to share a common enforcement policy for multiple Security Gateways.
B. The collective name of the logs generated by SmartReporter.
C. The collective name of the Security Policy, Address Translation, and IPS Policies.
D. The specific Policy written in SmartDashboard to configure which log data is stored in the
SmartReporter database.
Answer: D
QUESTION 171
Which of the following statements regarding SecureXL and CoreXL is TRUE?
Answer: A
QUESTION 172
Of the three mechanisms Check Point uses for controlling traffic, which enables firewalls to
incorporate layer 4 awareness in packet inspection?
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 73
http://www.passleader.com
A. IPS
B. Packet filtering
C. Stateful Inspection
D. Application Intelligence
Answer: C
QUESTION 173
Which of the following statements about Bridge mode is TRUE?
A. When managing a Security Gateway in Bridge mode, it is possible to use a bridge interface for
Network Address Translation.
B. Assuming a new installation, bridge mode requires changing the existing IP routing of the network.
C. All ClusterXL modes are supported.
D. A bridge must be configured with a pair of interfaces.
Answer: D
QUESTION 174
Which SmartConsole component can Administrators use to track remote administrative activities?
A. WebUI
B. Eventia Reporter
C. SmartView Monitor
D. SmartView Tracker
Answer: D
QUESTION 175
UDP packets are delivered if they are _________.
Answer: A
QUESTION 176
The Check Point Security Gateway's virtual machine (kernel) exists between which two layers of
the OSI model?
Answer: D
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 74
http://www.passleader.com
QUESTION 177
You are a security architect and need to design a secure firewall, VPN and IPS solution. Where
would be the best place to install IPS in the topology if the internal network is already protected?
Answer: A
QUESTION 178
You are running the Security Gateway on SecurePlatform and configure SNX with default
settings. The client fails to connect to the Security Gateway. What is wrong?
Answer: D
QUESTION 179
The Internal Certificate Authority (ICA) CANNOT be used for:
Answer: B
QUESTION 180
The command fw fetch causes the:
A. Security Management Server to retrieve the IP addresses of the target Security Gateway.
B. Security Gateway to retrieve the compiled policy and inspect code from the Security Management
Server and install it to the kernel.
C. Security Gateway to retrieve the user database information from the tables on the Security
Management Server
D. Security Management Server to retrieve the debug logs of the target Security Gateway
Answer: B
QUESTION 181
Using the output below, what type of VPN Community is configured for fw-stlouis?
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 75
http://www.passleader.com
A. Traditional
B. Meshed
C. Domain-Based
D. Star
Answer: B
QUESTION 182
Which of the following is NOT supported with office mode?
A. Transparent mode
B. L2TP
C. Secure Client
D. SSL Network Extender
Answer: A
QUESTION 183
Which of the following SSL Network Extender server-side prerequisites is NOT correct?
Answer: B
QUESTION 184
You wish to configure an IKE VPN between two R75 Security Gateways, to protect two networks.
The network behind one Gateway is 10.1(5)0.0/16, and network 19(2)168.9.0/24 is behind the
peer's Gateway. Which type of address translation should you use to ensure the two networks
access each other through the VPN tunnel?
A. Hide NAT
B. Static NAT
C. Manual NAT
D. None
Answer: D
Get Latest & Actual 156-215.80 Exam's Question and Answers from Passleader. 76
http://www.passleader.com