It is impossible to pass Check-Point 156-215.80 exam without any help in the short term. Come to Examcollection soon and find the most advanced, correct and guaranteed Check-Point 156-215.80 practice questions. You will get a surprising result by our Avant-garde Check Point Certified Security Administrator practice guides.
Free 156-215.80 Demo Online For Check-Point Certifitcation:
NEW QUESTION 1
What key is used to save the current CPView page in a filename format cpview_"cpview process ID".cap"number of captures"?
Answer: B
NEW QUESTION 2
Review the following screenshot and select the BEST answer.
Answer: C
NEW QUESTION 3
Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use her iPad to access the internal Finance Web server. Because the iPad is not a member of the Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter her AD credentials in the Captive Portal and then get the same access as on her office computer. Her access to resources is based on rules in the R77 Firewall Rule Base.
To make this scenario work, the IT administrator must:
1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity Sources.
2) In the Portal Settings window in the User Access section, make sure that Name and password login is selected.
3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network destinations. Select accept as the Action.
4) Install policy.
Ms McHanry tries to access the resource but is unable. What should she do?
Answer: A
NEW QUESTION 4
Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?
Answer: B
Explanation:
AD Query extracts user and computer identity information from the Active Directory Security Event Logs. The system generates a Security Event log entry when a user or computer accesses a network resource. For example, this occurs when a user logs in, unlocks a screen, or accesses a network drive.
Reference : https://sc1.checkpoint.com/documents/R76/CP_R76_IdentityAwareness_AdminGuide/62402.htm
NEW QUESTION 5
What is the BEST command to view configuration details of all interfaces in Gaia CLISH?
Answer: D
NEW QUESTION 6
Fill the blank. IT is Best Practice to have a _____ rule at the end of each policy layer.
Answer: A
NEW QUESTION 7
Joey wants to configure NTP on R80 Security Management Server. He decided to do this via WebUI. What is the correct address to access the Web UI for Gaia platform via browser?
Answer: A
Explanation:
Access to Web UI Gaia administration interface, initiate a connection from a browser to the default administration IP address: Logging in to the WebUI
Logging in
To log in to the WebUI:
Enter this URL in your browser: https://<Gaia IP address>
Enter your user name and password. References:
NEW QUESTION 8
You are conducting a security audit. While reviewing configuration files and logs, you notice logs accepting POP3 traffic, but you do not see a rule allowing POP3 traffic in the Rule Base. Which of the following is the
most likely cause?
Answer: C
NEW QUESTION 9
Fill in the blanks: A Check Point software license consists of a _____ and ______.
Answer: B
Explanation:
Check Point's licensing is designed to be scalable and modular. To this end, Check Point offers both predefined packages as well as the ability to custom build a solution tailored to the needs of the Network Administrator. This is accomplished by the use of the following license components:
Software Blades
Container
NEW QUESTION 10
Choose the SmartLog property that is TRUE.
Answer: D
NEW QUESTION 11
What are the three essential components of the Check Point Security Management Architecture?
Answer: A
Explanation:
Standalone deployment - Security Gateway and the Security Management server are installed on the same machine.
Distributed deployment - Security Gateway and the Security Management server are installed on different machines.
Deployments
Basic deployments:
Assume an environment with gateways on different sites. Each Security Gateway connects to the Internet on one side, and to a LAN on the other.
You can create a Virtual Private Network (VPN) between the two Security Gateways, to secure all communication between them.
The Security Management server is installed in the LAN, and is protected by a Security Gateway. The Security Management server manages the Security Gateways and lets remote users connect securely to the corporate network. SmartDashboard can be installed on the Security Management server or another computer.
There can be other OPSEC-partner modules (for example, an Anti-Virus Server) to complete the network security with the Security Management server and its Security Gateways.
NEW QUESTION 12
The fw monitor utility is used to troubleshoot which of the following problems?
Answer: B
NEW QUESTION 13
To optimize Rule Base efficiency, the most hit rules should be where?
Answer: C
Explanation:
It is logical that if lesser rules are checked for the matched rule to be found the lesser CPU cycles the device is using. Checkpoint match a session from the first rule on top till the last on the bottom.
NEW QUESTION 14
Which of the following is NOT a VPN routing option available in a star community?
Answer: A
Explanation:
SmartConsole
For simple hubs and spokes (or if there is only one Hub), the easiest way is to configure a VPN star community in R80 SmartConsole:
On the Star Communitywindow, in the:
Center Gateways section, select the Security Gateway that functions as the "Hub".
Satellite Gateways section, select Security Gateways as the "spokes", or satellites.
On the VPN Routing page, Enable VPN routing for satellites section, select one of these options:
To center and to other Satellites through center - This allows connectivity between the Security Gateways, for example if the spoke Security Gateways are DAIP Security Gateways, and the Hub is a Security Gateway with a static IP address.
To center, or through the center to other satellites, to internet and other VPN targets - This allows connectivity between the Security Gateways as well as the ability to inspect all communication passing through the Hub to the Internet.
Create an appropriate Access Control Policy rule.
NAT the satellite Security Gateways on the Hub if the Hub is used to route connections from Satellites to the Internet.
The two Dynamic Objects (DAIP Security Gateways) can securely route communication through the Security Gateway with the static IP address.
NEW QUESTION 15
After the initial installation the First Time Configuration Wizard should be run. Select the BEST answer.
Answer: B
Explanation:
Check Point Security Gateway and Check Point Security Management require running the First Time Configuration Wizard in order to be configured correctly. The First Time Configuration Wizard is available in Gaia Portal and also through CLI.
To invoke the First Time Configuration Wizard through CLI, run the config_system command from the Exp shell.
NEW QUESTION 16
In the Check Point three-tiered architecture, which of the following is NOT a function of the Security Management Server (Security Management Server)?
Answer: A
NEW QUESTION 17
An internal router is sending UDP keep-alive packets that are being encapsulated with GRE and sent through your R77 Security Gateway to a partner site. A rule for GRE traffic is configured for ACCEPT/LOG. Although the keep-alive packets are being sent every minute, a search through the SmartView Tracker logs for GRE traffic only shows one entry for the whole day (early in the morning after a Policy install).
Your partner site indicates they are successfully receiving the GRE encapsulated keep-alive packets on the 1-minute interval.
If GRE encapsulation is turned off on the router, SmartView Tracker shows a log entry for the UDP keep-alive packet every minute.
Which of the following is the BEST Explanation: for this behavior?
Answer: C
NEW QUESTION 18
Which command is used to obtain the configuration lock in Gaia?
Answer: A
Explanation:
Obtaining a Configuration Lock
lock database override
unlock database
NEW QUESTION 19
Which of the following describes how Threat Extraction functions?
Answer: B
NEW QUESTION 20
Message digests use which of the following?
Answer: D
NEW QUESTION 21
Fill in the blank: Authentication rules are defined for ____ .
Answer: A
NEW QUESTION 22
Fill in the blank: The IPS policy for pre-R80 gateways is installed during the _____.
Answer: B
Explanation:
https://sc1.checkpoint.com/documents/R80/CP_R80BC_ThreatPrevention/html_frameset.htm?topic=documents
NEW QUESTION 23
Which directory holds the SmartLog index files by default?
Answer: A
NEW QUESTION 24
......
Thanks for reading the newest 156-215.80 exam dumps! We recommend you to try the PREMIUM Dumpscollection.com 156-215.80 dumps in VCE and PDF here: https://www.dumpscollection.net/dumps/156-215.80/ (485 Q&As Dumps)