You are on page 1of 27

CheckPoint.156-215.80.v2019-12-27.

q85

Exam Code: 156-215.80


Exam Name: Check Point Certified Security Administrator R80
Certification Provider: CheckPoint
Free Question Number: 85
Version: v2019-12-27
# of views: 1096
# of Questions views: 30291
https://www.freecram.net/torrent/CheckPoint.156-215.80.v2019-12-27.q85.html

NEW QUESTION: 1
Which is the correct order of a log flow processed by SmartEvent components:
A. Firewall > SmartEvent Server Database > Correlation Unit > Log Server > SmartEvent Client
B. Firewall > Correlation Unit > Log Server > SmartEvent Server Database > SmartEvent Client
C. Firewall > Log Server > SmartEvent Server Database > Correlation Unit > SmartEvent Client
D. Firewall > Log Server > Correlation Unit > SmartEvent Server Database > SmartEvent Client
Answer: (SHOW ANSWER)

NEW QUESTION: 2
As you review this Security Policy, what changes could you make to accommodate Rule 4?

A. Nothing at all
B. Modify the column VPN in Rule 2 to limit access to specific traffic.
C. Remove the service HTTP from the column Service in Rule 4.
D. Modify the columns Source or Destination in Rule 4
Answer: (SHOW ANSWER)

NEW QUESTION: 3
ABC Corp., and have recently returned from a training course on Check Point's new advanced
R80 management platform. You are presenting an in-house R80 Management to the other
administrators in ABC Corp.
How will you describe the new "Publish" button in R80 Management Console?
A. The Publish button takes any changes an administrator has made in their management
session, publishes a copy to the Check Point of R80, and then saves it to the R80 database.
B. The Publish button takes any changes an administrator has made in their management
session and publishes a copy to the Check Point Cloud of R80 and but does not save it to the
R80
C. The Publish button makes any changes an administrator has made in their management
session visible to all other administrator sessions and saves it to the Database.
D. The Publish button makes any changes an administrator has made in their management
session visible to the new Unified Policy session and saves it to the Database.
Answer: (SHOW ANSWER)
To make your changes available to other administrators, and to save the database before
installing a policy, you must publish the session. When you publish a session, a new database
version is created.

NEW QUESTION: 4
Which authentication scheme requires a user to possess a token?
A. TACACS
B. SecurID
C. Check Point password
D. RADIUS
Answer: B (LEAVE A REPLY)
SecurID
SecurID requires users to both possess a token authenticator and to supply a PIN or password

NEW QUESTION: 5
When LDAP is integrated with Check Point Security Management, it is then referred to as
_______
A. UserCheck
B. User Directory
C. User Administration
D. User Center
Answer: (SHOW ANSWER)
Check Point User Directory integrates LDAP, and other external user management technologies,
with the Check Point solution. If you have a large user count, we recommend that you use an
external user management database such as LDAP for enhanced Security Management Server
performance.

NEW QUESTION: 6
Which statement is NOT TRUE about Delta synchronization?
A. Using UDP Multicast or Broadcast on port 8116
B. Transfers changes in the Kernel tables between cluster members
C. Quicker than Full sync
D. Using UDP Multicast or Broadcast on port 8161
Answer: (SHOW ANSWER)

NEW QUESTION: 7
How would you deploy TE250X Check Point appliance just for email traffic and in-line mode
without a Check Point Security Gateway?
A. Install appliance TE250X on SpanPort on LAN switch in MTA mode
B. Install appliance TE250X in standalone mode and setup MTA
C. You can utilize only Check Point Cloud Services for this scenario
D. It is not possible, always Check Point SGW is needed to forward emails to SandBlast
appliance
Answer: (SHOW ANSWER)

NEW QUESTION: 8
What is also referred to as Dynamic NAT?
A. Automatic NAT
B. Static NAT
C. Manual NAT
D. Hide NAT
Answer: (SHOW ANSWER)

NEW QUESTION: 9
VPN gateways must authenticate to each other prior to exchanging information. What are the two
types of credentials used for authentication?
A. 3DES and MD5
B. Certificates and IPsec
C. Certificates and pre-shared secret
D. IPsec and VPN Domains
Answer: (SHOW ANSWER)

NEW QUESTION: 10

A. Go to Manage&Settings > Blades > HTTPS Inspection > Policy


B. Go to Application&url filtering blade > Https Inspection > Policy
C. Go to Application&url filtering blade > Advanced > Https Inspection > Policy
D. Go to Manage&Settings > Blades > HTTPS Inspection > Configure in SmartDashboard
Answer: (SHOW ANSWER)

NEW QUESTION: 11
Which one of the following is a way that the objects can be manipulated using the new API
integration in R80 Management?
A. Microsoft Publisher
B. JSON
C. Microsoft Word
D. RC4 Encryption
Answer: (SHOW ANSWER)

NEW QUESTION: 12
What happens if the identity of a user is known?
A. If the user credentials do not match an Access Role, the gateway moves onto the next rule.
B. If the user credentials do not match an Access Role, the system displays the Captive Portal.
C. If the user credentials do not match an Access Role, the system displays a sandbox.
D. If the user credentials do not match an Access Role, the traffic is automatically dropped.
Answer: (SHOW ANSWER)

NEW QUESTION: 13
In which scenario is it a valid option to transfer a license from one hardware device to another?
A. From an 4400 Appliance to a 2200 Appliance
B. From an IBM Open Server to a 2200 Appliance
C. From an IBM Open Server to an HP Open Server
D. From a 4400 Appliance to an HP Open Server
Answer: (SHOW ANSWER)

NEW QUESTION: 14
Which of the following is NOT an alert option?
A. SNMP
B. High alert
C. Mail
D. User defined alert
Answer: (SHOW ANSWER)
In Action, select:

NEW QUESTION: 15
In what way are SSL VPN and IPSec VPN different?
A. IPSec VPN uses an additional virtual adapter, SSL VPN uses the client network adapter only
B. IPSec VPN does not support two factor authentication, SSL VPN does support this
C. SSL VPN adds an extra VPN header to the packet, IPSec VPN does not
D. SSL VPN is using HTTPS in addition to IKE, whereas IPSec VPN is clientless
Answer: (SHOW ANSWER)

NEW QUESTION: 16
In the Network policy layer, the default action for the Implied last rule is ________ all traffic.
However, in the Application Control policy layer, the default action is ________ all traffic.
A. Accept; redirect
B. Drop; accept
C. Redirect; drop
D. Accept; drop
Answer: (SHOW ANSWER)

Valid 156-215.80 Dumps shared by PassTestKing.com for Helping Passing 156-215.80


Exam! PassTestKing.com now offer the newest 156-215.80 exam dumps, the
PassTestKing.com 156-215.80 exam questions have been updated and answers have
been corrected get the newest PassTestKing.com 156-215.80 dumps with Test Engine here:
https://www.passtestking.com/CheckPoint/156-215.80-practice-exam-dumps.html (527 Q&As
Dumps, 35%OFF Special Discount Code: freecram)

NEW QUESTION: 17
Which of these components does NOT require a Security Gateway R77 license?
A. SmartConsole
B. Check Point Gateway
C. SmartUpdate upgrading/patching
D. Security Management Server
Answer: (SHOW ANSWER)

NEW QUESTION: 18
You have discovered suspicious activity in your network. What is the BEST immediate action to
take?
A. Wait until traffic has been identified before making any changes.
B. Create a policy rule to block the traffic.
C. Create a suspicious action rule to block that traffic.
D. Contact ISP to block the traffic.
Answer: (SHOW ANSWER)
NEW QUESTION: 19
When doing a Stand-Alone Installation, you would install the Security Management Server with
which other Check Point architecture component?
A. None, Security Management Server would be installed by itself.
B. SmartConsole
C. SecureClient
D. Security Gateway
Answer: D (LEAVE A REPLY)
There are different deployment scenarios for Check Point software products.

NEW QUESTION: 20

A. AES-GCM-128
B. AES-GCM-256
C. AES-CBC-256
Answer: (SHOW ANSWER)

NEW QUESTION: 21
What are the advantages of a "shared policy" in R80?
A. Allows the administrator to install a policy on one Security Gateway and it gets installed on
another managed Security Gateway
B. Allows the administrator to share a policy between all the administrators managing the Security
Management Server
C. Allows the administrator to share a policy so that it is available to use in another Policy
Package
D. Allows the administrator to share a policy between all the users identified by the Security
Gateway
Answer: (SHOW ANSWER)

NEW QUESTION: 22
DLP and Geo Policy are examples of what type of Policy?
A. Standard Policies
B. Shared Policies
C. Inspection Policies
D. Unified Policies
Answer: (SHOW ANSWER)
The Shared policies are installed with the Access Control Policy.
NEW QUESTION: 23
If the first packet of an UDP session is rejected by a security policy, what does the firewall send to
the client?
A. Nothing
B. ICMP unreachable
C. TCP RST
D. TCP FIN
Answer: (SHOW ANSWER)

NEW QUESTION: 24
To view statistics on detected threats, which Threat Tool would an administrator use?
A. ThreatWiki
B. Profiles
C. IPS Protections
D. Protections
Answer: (SHOW ANSWER)

NEW QUESTION: 25
What is the difference between an event and a log?
A. Events are collected with SmartWorkflow from Trouble Ticket systems
B. A log entry becomes an event when it matches any rule defined in Event Policy
C. Logs and Events are synonyms
D. Events are generated at gateway according to Event Policy
Answer: (SHOW ANSWER)

NEW QUESTION: 26
The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?
A. Restart Daemons if they fail
B. Transfer messages between Firewall processes
C. Secure Internal Communication (SIC)
D. Pulls application monitoring status
Answer: (SHOW ANSWER)

NEW QUESTION: 27
What is the default shell for the command line interface?
A. Expert
B. Clish
C. Admin
D. Normal
Answer: (SHOW ANSWER)
The default shell of the CLI is called clish

NEW QUESTION: 28
You are working with multiple Security Gateways enforcing an extensive number of rules. To
simplify security administration, which action would you choose?
A. Run separate SmartConsole instances to login and configure each Security Gateway directly.
B. Create a separate Security Policy package for each remote Security Gateway.
C. Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.
D. Create network object that restrict all applicable rules to only certain networks.
Answer: B (LEAVE A REPLY)

NEW QUESTION: 29
The technical-support department has a requirement to access an intranet server. When
configuring a User Authentication rule to achieve this, which of the following should you
remember?
A. You can limit the authentication attempts in the User Properties' Authentication tab.
B. Once a user is first authenticated, the user will not be prompted for authentication again until
logging out.
C. You can only use the rule for Telnet, FTP, SMPT, and rlogin services.
D. The Security Gateway first checks if there is any rule that does not require authentication for
this type of connection before invoking the Authentication Security Server.
Answer: (SHOW ANSWER)

NEW QUESTION: 30
A. Install policy
B. Publish database
C. Save changes
D. Activate policy
Answer: (SHOW ANSWER)

NEW QUESTION: 31
You are the Check Point administrator for Alpha Corp with an R80 Check Point estate. You have
received a call by one of the management users stating that they are unable to browse the
Internet with their new tablet connected to the company Wireless. The Wireless system goes
through the Check Point Gateway. How do you review the logs to see what the problem may be?
A. Open SmartView Tracker and filter the logs for the IP address of the tablet
B. Open SmartView Tracker and check all the IP logs for the tablet
C. Open SmartLog and connect remotely to the IP of the wireless controller
D. Open SmartLog and query for the IP address of the Manager's tablet
Answer: (SHOW ANSWER)

Valid 156-215.80 Dumps shared by PassTestKing.com for Helping Passing 156-215.80


Exam! PassTestKing.com now offer the newest 156-215.80 exam dumps, the
PassTestKing.com 156-215.80 exam questions have been updated and answers have
been corrected get the newest PassTestKing.com 156-215.80 dumps with Test Engine here:
https://www.passtestking.com/CheckPoint/156-215.80-practice-exam-dumps.html (527 Q&As
Dumps, 35%OFF Special Discount Code: freecram)

NEW QUESTION: 32
Administrator wishes to update IPS from SmartConsole by clicking on the option "update now"
under the IPS tab. Which device requires internet access for the update to work?
A. Security Gateway
B. Device where SmartConsole is installed
C. SMS
D. SmartEvent
Answer: B (LEAVE A REPLY)
Updating IPS Manually
You can immediately update IPS with real-time information on attacks and all the latest
protections from the IPS website. You can only manually update IPS if a proxy is defined in
Internet Explorer settings.
To obtain updates of all the latest protections from the IPS website:
The LAN Settings window opens.
The settings for the Internet Explorer proxy server are configured.
If you chose to automatically mark new protections for Follow Up, you have the option to open the
Follow Up page directly to see the new protections.

NEW QUESTION: 33
Which of the following licenses are considered temporary?
A. Perpetual and Trial
B. Plug-and-play and Evaluation
C. Subscription and Perpetual
D. Evaluation and Subscription
Answer: (SHOW ANSWER)
Should be Trial or Evaluation, even Plug-and-play (all are synonyms ). Answer B is the best
choice.

NEW QUESTION: 34
What protocol is specifically used for clustered environments?
A. Clustered Protocol
B. Control Cluster Protocol
C. Cluster Control Protocol
D. Synchronized Cluster Protocol
Answer: (SHOW ANSWER)

NEW QUESTION: 35
Vanessa is a Firewall administrator. She wants to test a backup of her company's production
Firewall cluster Dallas_GW. She has a lab environment that is identical to her production
environment. She decided to restore production backup via SmartConsole in lab environment.
Which details she need to fill in System Restore window before she can click OK button and test
the backup?
A. Server, TFTP, Username, Password, Path, Comment, All Members
B. Server, Protocol, Username, Password, Path, Comment, Member
C. Server, Protocol, Username, Password, Path, Comment, All Members
D. Server, SCP, Username, Password, Path, Comment, Member
Answer: C (LEAVE A REPLY)

NEW QUESTION: 36
Which limitation of CoreXL is overcome by using (mitigated by) Multi-Queue?
A. Each NIC has several traffic queues that are handled by multiple CPU cores
B. There is no traffic queue to be handled
C. Several NICs can use one traffic queue by one CPU
D. Each NIC has one traffic queue that is handled by one CPU
Answer: A (LEAVE A REPLY)
NEW QUESTION: 37
Which of the following is the most secure means of authentication?
A. Password
B. Pre-shared secret
C. Certificate
D. Token
Answer: (SHOW ANSWER)

NEW QUESTION: 38
Which default user has full read/write access?
A. Monitor
B. Altuser
C. Superuser
D. Administrator
Answer: (SHOW ANSWER)

NEW QUESTION: 39
To install a brand new Check Point Cluster, the MegaCorp IT department bought 1 Smart-1 and 2
Security Gateway Appliances to run a cluster. Which type of cluster is it?
A. Distributed
B. Standalone
C. High Availability
D. Full HA Cluster
Answer: (SHOW ANSWER)

NEW QUESTION: 40

A. Auditor
B. Read Only All
C. Super User
D. Full Access
Answer: (SHOW ANSWER)
To create a new permission profile:
The New Profile window opens.

NEW QUESTION: 41
Which one of the following is true about Threat Extraction?
A. Works on all MS Office, Executables, and PDF files
B. Always delivers a file to user
C. Delivers file only if no threats found
D. Can take up to 3 minutes to complete
Answer: (SHOW ANSWER)

NEW QUESTION: 42
What port is used for communication to the User Center with SmartUpdate?
A. CPMI 200
B. TCP 8080
C. HTTP 80
D. HTTPS 443
Answer: (SHOW ANSWER)

NEW QUESTION: 43
Choose the Best place to find a Security Management Server backup file named backup_fw, on a
Check Point Appliance.
A. /var/log/Cpbackup/backups/backup/backup_fw.tgs
B. /var/log/Cpbackup/backups/backup/backup_fw.tar
C. /var/log/Cpbackup/backups/backups/backup_fw.tar
D. /var/log/Cpbackup/backups/backup_fw.tgz
Answer: (SHOW ANSWER)
Gaia's Backup feature allows backing up the configuration of the Gaia OS and of the Security
Management server database, or restoring a previously saved configuration.
The configuration is saved to a .tgz file in the following directory:
Gaia OS Version
Hardware
Local Directory
R75.40 - R77.20
Check Point appliances
/var/log/CPbackup/backups/
Open Server
/var/CPbackup/backups/
R77.30
Check Point appliances
/var/log/CPbackup/backups/
Open Server

NEW QUESTION: 44
Which feature in R77 permits blocking specific IP addresses for a specified time period?
A. Suspicious Activity Monitoring
B. Block Port Overflow
C. HTTP Methods
D. Local Interface Spoofing
Answer: (SHOW ANSWER)

NEW QUESTION: 45
What does it mean if Deyra sees the gateway status:

Choose the BEST answer.


A. SmartCenter Server cannot reach this Security Gateway
B. There is a blade reporting a problem
C. VPN software blade is reporting a malfunction
D. Security Gateway's MGNT NIC card is disconnected.
Answer: B (LEAVE A REPLY)

NEW QUESTION: 46
Which remote Access Solution is clientless?
A. Checkpoint Mobile
B. Endpoint Security Suite
C. SecuRemote
D. Mobile Access Portal
Answer: (SHOW ANSWER)

Valid 156-215.80 Dumps shared by PassTestKing.com for Helping Passing 156-215.80


Exam! PassTestKing.com now offer the newest 156-215.80 exam dumps, the
PassTestKing.com 156-215.80 exam questions have been updated and answers have
been corrected get the newest PassTestKing.com 156-215.80 dumps with Test Engine here:
https://www.passtestking.com/CheckPoint/156-215.80-practice-exam-dumps.html (527 Q&As
Dumps, 35%OFF Special Discount Code: freecram)

NEW QUESTION: 47
AdminA and AdminB are both logged in on SmartConsole. What does it mean if AdminB sees a
locked icon on a rule? Choose the BEST answer.
A. Rule is locked by AdminA, and if the session is saved, rule will be available
B. Rule is locked by AdminA, because an object on that rule is been edited.
C. Rule is locked by AdminA, and will make it available if session is published.
D. Rule is locked by AdminA, because the save bottom has not been press.
Answer: (SHOW ANSWER)

NEW QUESTION: 48
You have two rules, ten users, and two user groups in a Security Policy. You create database
version 1 for this configuration. You then delete two existing users and add a new user group.
You modify one rule and add two new rules to the Rule Base. You save the Security Policy and
create database version 2. After a while, you decide to roll back to version 1 to use the Rule
Base, but you want to keep your user database. How can you do this?
A. Restore the entire database, except the user database, and then create the new user and user
group.
B. Run fwm dbexport -1 filename. Restore the database. Then, run fwm dbimport -1 filename to
import the users.
C. Restore the entire database, except the user database.
D. Run fwm_dbexport to export the user database. Select restore the entire database in the
Database Revision screen. Then, run fwm_dbimport.
Answer: (SHOW ANSWER)

NEW QUESTION: 49
Which deployment adds a Security Gateway to an existing environment without changing IP
routing?
A. Distributed
B. Bridge Mode
C. Remote
D. Standalone
Answer: (SHOW ANSWER)

NEW QUESTION: 50

A. SmartView Tracker
B. SmartPortal
C. SmartDashboard
D. SmartUpdate
Answer: (SHOW ANSWER)

NEW QUESTION: 51
You want to reset SIC between smberlin and sgosaka.

In SmartDashboard, you choose sgosaka, Communication, Reset. On sgosaka, you start


cpconfig, choose Secure Internal Communication and enter the new SIC Activation Key. The
screen reads The SIC was successfully initialized and jumps back to the menu. When trying to
establish a connection, instead of a working connection, you receive this error message:
What is the reason for this behavior?
A. The activation key contains letters that are on different keys on localized keyboards. Therefore,
the activation can not be typed in a matching fashion.
B. The check Point services on the Gateway were not restarted because you are still in the
cpconfig utility.
C. The Gateway was not rebooted, which is necessary to change the SIC key.
D. You must first initialize the Gateway object in SmartDashboard (i.e., right-click on the object,
choose Basic Setup > Initialize).
Answer: (SHOW ANSWER)

NEW QUESTION: 52
Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs
the systems this way, how many machines will he need if he does NOT include a SmartConsole
machine in his calculations?
A. One machine, but it needs to be installed using SecurePlatform for compatibility purposes.
B. One machine
C. Two machines
D. Three machines
Answer: (SHOW ANSWER)
One for Security Management Server and the other one for the Security Gateway.

NEW QUESTION: 53
What is UserCheck?
A. Communication tool used to inform a user about a website or application they are trying to
access
B. Administrator tool used to monitor users on their network
C. Communication tool used to notify an administrator when a new user is created
D. Messaging tool user to verify a user's credentials
Answer: (SHOW ANSWER)

NEW QUESTION: 54
The __________ is used to obtain identification and security information about network users.
A. UserCheck
B. User server
C. User index
D. User Directory
Answer: (SHOW ANSWER)

NEW QUESTION: 55
What is the BEST method to deploy Identity Awareness for roaming users?
A. Use Office Mode
B. Use identity agents
C. Share user identities between gateways
D. Use captive portal
Answer: (SHOW ANSWER)
Using Endpoint Identity Agents give you:

NEW QUESTION: 56
You are the Security Administrator for MegaCorp. In order to see how efficient your firewall Rule
Base is, you would like to see how many often the particular rules match. Where can you see it?
Give the BEST answer.
A. In the SmartView Tracker, if you activate the column Matching Rate.
B. In SmartReporter, in the section Firewall Blade - Activity > Network Activity with information
concerning Top Matched Logged Rules.
C. It is not possible to see it directly. You can open SmartDashboard and select UserDefined in
the Track column. Afterwards, you need to create your own program with an external counter.
D. SmartReporter provides this information in the section Firewall Blade - Security > Rule Base
Analysis with information concerning Top Matched Logged Rules.
Answer: (SHOW ANSWER)

NEW QUESTION: 57
Which utility shows the security gateway general system information statistics like operating
system information and resource usage, and individual software blade statistics of VPN, Identity
Awareness and DLP?
A. cpconfig
B. fw ctl pstat
C. cpview
D. fw ctl multik stat
Answer: (SHOW ANSWER)
CPView Utility is a text based built-in utility that can be run ('cpview' command) on Security
Gateway / Security Management Server / Multi-Domain Security Management Server. CPView
Utility shows statistical data that contain both general system information (CPU, Memory, Disk
space) and information for different Software Blades (only on Security Gateway). The data is
continuously updated in easy to access views.
NEW QUESTION: 58
When a policy package is installed, ________ are also distributed to the target installation
Security Gateways.
A. User and objects databases
B. Network databases
C. SmartConsole databases
D. User databases
Answer: A (LEAVE A REPLY)
A policy package is a collection of different types of policies. After installation, the Security
Gateway enforces all the policies in the package. A policy package can have one or more of
these policy types:
The installation process:
If there are verification errors, the policy is not installed. If there are verification warnings (for
example, if anti-spoofing is not enabled for a Security Gateway with multiple interfaces), the policy
package is installed with a warning.

NEW QUESTION: 59
John is using Management HA. Which Smartcenter should be connected to for making changes?
A. primary Smartcenter
B. secondary Smartcenter
C. connect virtual IP of Smartcenter HA
D. active Smartcenter
Answer: (SHOW ANSWER)

NEW QUESTION: 60

A. Main
B. Authentication
C. Quick
D. High Alert
Answer: (SHOW ANSWER)
Phase I modes
Between Security Gateways, there are two modes for IKE phase I.
These modes only apply to IKEv1:

NEW QUESTION: 61
What is the SOLR database for?
A. Used for full text search and enables powerful matching capabilities
B. Enables powerful matching capabilities and writes data to the database
C. Serves GUI responsible to transfer request to the DLE server
D. Writes data to the database and full text search
Answer: (SHOW ANSWER)

Valid 156-215.80 Dumps shared by PassTestKing.com for Helping Passing 156-215.80


Exam! PassTestKing.com now offer the newest 156-215.80 exam dumps, the
PassTestKing.com 156-215.80 exam questions have been updated and answers have
been corrected get the newest PassTestKing.com 156-215.80 dumps with Test Engine here:
https://www.passtestking.com/CheckPoint/156-215.80-practice-exam-dumps.html (527 Q&As
Dumps, 35%OFF Special Discount Code: freecram)

NEW QUESTION: 62
Which of the following is NOT defined by an Access Role object?
A. Source User
B. Source Machine
C. Source Network
D. Source Server
Answer: (SHOW ANSWER)

NEW QUESTION: 63
Which utility allows you to configure the DHCP service on GAIA from the command line?
A. ifconfig
B. dhcp_cfg
C. sysconfig
D. cpconfig
Answer: (SHOW ANSWER)
Sysconfig Configuration Options
NEW QUESTION: 64
When logging in for the first time to a Security management Server through SmartConsole, a
fingerprint is saved to the:
A. Security Management Server's /home/.fgpt file and is available for future SmartConsole
authentications.
B. Windows registry is available for future Security Management Server authentications.
C. SmartConsole cache is available for future Security Management Server authentications.
D. There is no memory used for saving a fingerprint anyway.
Answer: C (LEAVE A REPLY)

NEW QUESTION: 65
What CLI utility allows an administrator to capture traffic along the firewall inspection chain?
A. show interface (interface) -chain
B. fw monitor
C. tcpdump /snoop
D. tcpdump
Answer: (SHOW ANSWER)

NEW QUESTION: 66
While in SmartView Tracker, Brady has noticed some very odd network traffic that he thinks could
be an intrusion. He decides to block the traffic for 60 minutes, but cannot remember all the steps.
What is the correct order of steps needed to set up the block?
1)Select Active Mode tab in SmartView Tracker.
2) Select Tools > Block Intruder.
3) Select Log Viewing tab in SmartView Tracker.
4) Set Blocking Timeout value to 60 minutes.
5) Highlight connection that should be blocked.
A. 3, 2, 5, 4
B. 1, 2, 5, 4
C. 1, 5, 2, 4
D. 3, 5, 2, 4
Answer: (SHOW ANSWER)

NEW QUESTION: 67
What are the two types of address translation rules?
A. Translated packet and untranslated packet
B. Untranslated packet and manipulated packet
C. Manipulated packet and original packet
D. Original packet and translated packet
Answer: (SHOW ANSWER)
NAT Rule Base
The NAT Rule Base has two sections that specify how the IP addresses are translated:

NEW QUESTION: 68
How Capsule Connect and Capsule Workspace differ?
A. Capsule Connect provides a Layer3 VPN. Capsule Workspace provides a Desktop with usable
applications
B. Capsule Connect does not require an installed application at client
C. Capsule Connect provides Business data isolation
D. Capsule Workspace can provide access to any application
Answer: (SHOW ANSWER)

NEW QUESTION: 69
Identity Awareness allows the Security Administrator to configure network access based on which
of the following?
A. Network location, identity of a user, and identity of a machine
B. Name of the application, identity of the user, and identity of the machine
C. Browser-Based Authentication, identity of a user, and network location
D. Identity of the machine, username, and certificate
Answer: (SHOW ANSWER)

NEW QUESTION: 70

A. file attributes
B. application
C. destination port
D. data type
Answer: (SHOW ANSWER)
Tracking Options

NEW QUESTION: 71
You have enabled "Full Log" as a tracking option to a security rule. However, you are still not
seeing any data type information. What is the MOST likely reason?
A. Logging has disk space issues. Change logging storage options on the logging server or
Security Management Server properties and install database.
B. Data Awareness is not enabled.
C. Identity Awareness is not enabled.
D. Logs are arriving from Pre-R80 gateways.
Answer: (SHOW ANSWER)
The most likely reason for the logs data to stop is the low disk space on the logging device, which
can be the Management Server or the Gateway Server.
NEW QUESTION: 72
Which of these attributes would be critical for a site-to-site VPN?
A. Strong data encryption
B. Strong authentication
C. Scalability to accommodate user groups
D. Centralized management
Answer: A (LEAVE A REPLY)

NEW QUESTION: 73
When a packet arrives at the gateway, the gateway checks it against the rules in the top Policy
Layer, sequentially from top to bottom, and enforces the first rule that matches a packet. Which of
the following statements about the order of rule enforcement is true?
A. If the Action is Accept, the gateway continues to check rules in the next Policy Layer down.
B. If the Action is Drop, the gateway applies the Implicit Clean-up Rule for that Policy Layer.
C. If the Action is Drop, the gateway continues to check rules in the next Policy Layer down.
D. If the Action is Accept, the gateway allows the packet to pass through the gateway.
Answer: (SHOW ANSWER)

NEW QUESTION: 74
What is the default time length that Hit Count Data is kept?
A. 3 month
B. 4 weeks
C. 12 months
D. 6 months
Answer: (SHOW ANSWER)
Keep Hit Count data up to - Select one of the time range options. The default is 6 months. Data is
kept in the Security Management Server database for this period and is shown in the Hits column.

NEW QUESTION: 75
When configuring Spoof Tracking, which tracking actions can an administrator select to be done
when spoofed packets are detected?
A. Log, send snmp trap, email
B. Drop packet, alert, none
C. Log, alert, none
D. Log, allow packets, email
Answer: (SHOW ANSWER)
Configure Spoof Tracking - select the tracking action that is done when spoofed packets are
detected:

NEW QUESTION: 76
Examine the following Rule Base.

What can we infer about the recent changes made to the Rule Base?
A. Rule 7 was created by the 'admin' administrator in the current session
B. 8 changes have been made by administrators since the last policy installation
C. The rules 1, 5 and 6 cannot be edited by the 'admin' administrator
D. Rule 1 and object webserver are locked by another administrator
Answer: (SHOW ANSWER)
On top of the print screen there is a number "8" which consists for the number of changes made
and not saved.
Session Management Toolbar (top of SmartConsole)

Valid 156-215.80 Dumps shared by PassTestKing.com for Helping Passing 156-215.80


Exam! PassTestKing.com now offer the newest 156-215.80 exam dumps, the
PassTestKing.com 156-215.80 exam questions have been updated and answers have
been corrected get the newest PassTestKing.com 156-215.80 dumps with Test Engine here:
https://www.passtestking.com/CheckPoint/156-215.80-practice-exam-dumps.html (527 Q&As
Dumps, 35%OFF Special Discount Code: freecram)

NEW QUESTION: 77
The Firewall kernel is replicated multiple times, therefore:
A. The Firewall kernel only touches the packet if the connection is accelerated
B. The Firewall can run different policies per core
C. The Firewall can run the same policy on all cores
D. The Firewall kernel is replicated only with new connections and deletes itself once the
connection times out
Answer: (SHOW ANSWER)

NEW QUESTION: 78
What is the purpose of the Stealth Rule?
A. To reduce the number of rules in the database.
B. To reduce the amount of logs for performance issues.
C. To hide the gateway from the Internet.
D. To prevent users from directly connecting to a Security Gateway.
Answer: (SHOW ANSWER)

NEW QUESTION: 79
What port is used for delivering logs from the gateway to the management server?
A. Port 18209
B. Port 257
C. Port 981
D. Port 258
Answer: (SHOW ANSWER)

NEW QUESTION: 80

A. Add rba user <User Name> roles <List>


B. Add rba user <User Name>
C. Add user <User Name> roles <List>
D. Add user <User Name>
Answer: (SHOW ANSWER)
Configuring Roles - CLI (rba)
NEW QUESTION: 81
Which of the following technologies extracts detailed information from packets and stores that
information in state tables?
A. Application Layer Firewall
B. INSPECT Engine
C. Stateful Inspection
D. Packet Filtering
Answer: C (LEAVE A REPLY)

NEW QUESTION: 82
As a Security Administrator, you must refresh the Client Authentication authorized time-out every
time a new user connection is authorized. How do you do this? Enable the Refreshable Timeout
setting:
A. in the Global Properties Authentication screen.
B. in the Gateway object's Authentication screen.
C. in the Limit tab of the Client Authentication Action Properties screen.
D. in the user object's Authentication screen.
Answer: (SHOW ANSWER)

NEW QUESTION: 83
By default, which port does the WebUI listen on?
A. 80
B. 4434
C. 443
D. 8080
Answer: (SHOW ANSWER)
To configure Security Management Server on Gaia:

NEW QUESTION: 84
A digital signature:
A. Provides a secure key exchange mechanism over the Internet.
B. Automatically exchanges shared keys.
C. Guarantees the authenticity and integrity of a message.
D. Decrypts data to its original form.
Answer: C (LEAVE A REPLY)

NEW QUESTION: 85
Which of the following is NOT a SecureXL traffic flow?
A. Medium Path
B. Accelerated Path
C. Fast Path
D. Slow Path
Answer: C (LEAVE A REPLY)
SecureXL is an acceleration solution that maximizes performance of the Firewall and does not
compromise security. When SecureXL is enabled on a Security Gateway, some CPU intensive
operations are processed by virtualized software instead of the Firewall kernel. The Firewall can
inspect and process connections more efficiently and accelerate throughput and connection rates.
These are the SecureXL traffic flows:
Slow path - Packets and connections that are inspected by the Firewall and are not processed by
SecureXL.
Accelerated path - Packets and connections that are offloaded to SecureXL and are not
processed by the Firewall.
Medium path - Packets that require deeper inspection cannot use the accelerated path. It is not
necessary for the Firewall to inspect these packets, they can be offloaded and do not use the
slow path. For example, packets that are inspected by IPS cannot use the accelerated path and
can be offloaded to the IPS PSL (Passive Streaming Library). SecureXL processes these packets
more quickly than packets on the slow path.
Valid 156-215.80 Dumps shared by PassTestKing.com for Helping Passing 156-215.80
Exam! PassTestKing.com now offer the newest 156-215.80 exam dumps, the
PassTestKing.com 156-215.80 exam questions have been updated and answers have
been corrected get the newest PassTestKing.com 156-215.80 dumps with Test Engine here:
https://www.passtestking.com/CheckPoint/156-215.80-practice-exam-dumps.html (527 Q&As
Dumps, 35%OFF Special Discount Code: freecram)

You might also like