Download Checkpoint.156-215.80.NewDumps.2018-05-18.212q.tqb

Download Exam

File Info

Exam Check Point Certified Security Administrator
Number 156-215.80
File Name Checkpoint.156-215.80.NewDumps.2018-05-18.212q.tqb
Size 12 MB
Posted May 18, 2018
Download Checkpoint.156-215.80.NewDumps.2018-05-18.212q.tqb

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

What is the order of NAT priorities?


  1. Static NAT, IP pool NAT, hide NAT
  2. IP pool NAT, static NAT, hide NAT
  3. Static NAT, automatic NAT, hide NAT
  4. Static NAT, hide NAT, IP pool NAT
Correct answer: A
Explanation:
The order of NAT priorities are: Static NAT IP Pool NAT Hide NAT Since Static NAT has all of the advantages of IP Pool NAT and more, it has a higher priority than the other NAT methods. Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_Firewall_WebAdmin/6724.htm#o6919
The order of NAT priorities are: 
  1. Static NAT 
  2. IP Pool NAT 
  3. Hide NAT 
Since Static NAT has all of the advantages of IP Pool NAT and more, it has a higher priority than the other NAT methods. 
Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_Firewall_WebAdmin/6724.htm#o6919



Question 2

Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?


  1. UserCheck
  2. Active Directory Query
  3. Account Unit Query
  4. User Directory Query
Correct answer: B
Explanation:
: AD Query extracts user and computer identity information from the Active Directory Security Event Logs. The system generates a Security Event log entry when a user or computer accesses a network resource. For example, this occurs when a user logs in, unlocks a screen, or accesses a network drive. Reference : https://sc1.checkpoint.com/documents/R76/CP_R76_IdentityAwareness_AdminGuide/62402.htm
: AD Query extracts user and computer identity information from the Active Directory Security Event Logs. The system generates a Security Event log entry when a user or computer accesses a network resource. For example, this occurs when a user logs in, unlocks a screen, or accesses a network drive. 
Reference : https://sc1.checkpoint.com/documents/R76/CP_R76_IdentityAwareness_AdminGuide/62402.htm



Question 3

Ken wants to obtain a configuration lock from other administrator on R80 Security Management Server. He can do this via WebUI or a via CLI. Which command should be use in CLI? Choose the correct answer. 


  1. remove database lock
  2. The database feature has one command lock database override. 
  3. override database lock
  4. The database feature has two commands: lock database override and unlock database. Both will work.
Correct answer: D
Explanation:
Use the database feature to obtain the configuration lock. The database feature has two commands: lock database [override]. unlock database The commands do the same thing: obtain the configuration lock from another administrator.    Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_Gaia_WebAdmin/75697.htm#o73091
Use the database feature to obtain the configuration lock. The database feature has two commands: 
  • lock database [override]. 
  • unlock database 
The commands do the same thing: obtain the configuration lock from another administrator.
   
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_Gaia_WebAdmin/75697.htm#o73091









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files