Download Checkpoint.156-215.80.PracticeDumps.2018-05-18.212q.vcex

Download Exam

File Info

Exam Check Point Certified Security Administrator
Number 156-215.80
File Name Checkpoint.156-215.80.PracticeDumps.2018-05-18.212q.vcex
Size 11 MB
Posted May 18, 2018
Download Checkpoint.156-215.80.PracticeDumps.2018-05-18.212q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%



Exam Hub discount


Demo Questions

Question 1

What is the order of NAT priorities?


  1. Static NAT, IP pool NAT, hide NAT
  2. IP pool NAT, static NAT, hide NAT
  3. Static NAT, automatic NAT, hide NAT
  4. Static NAT, hide NAT, IP pool NAT
Correct answer: A
Explanation:
The order of NAT priorities are: Static NAT IP Pool NAT Hide NAT Since Static NAT has all of the advantages of IP Pool NAT and more, it has a higher priority than the other NAT methods. Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_Firewall_WebAdmin/6724.htm#o6919
The order of NAT priorities are: 
  1. Static NAT 
  2. IP Pool NAT 
  3. Hide NAT 
Since Static NAT has all of the advantages of IP Pool NAT and more, it has a higher priority than the other NAT methods. 
Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_Firewall_WebAdmin/6724.htm#o6919



Question 2

Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?


  1. UserCheck
  2. Active Directory Query
  3. Account Unit Query
  4. User Directory Query
Correct answer: B
Explanation:
: AD Query extracts user and computer identity information from the Active Directory Security Event Logs. The system generates a Security Event log entry when a user or computer accesses a network resource. For example, this occurs when a user logs in, unlocks a screen, or accesses a network drive. Reference : https://sc1.checkpoint.com/documents/R76/CP_R76_IdentityAwareness_AdminGuide/62402.htm
: AD Query extracts user and computer identity information from the Active Directory Security Event Logs. The system generates a Security Event log entry when a user or computer accesses a network resource. For example, this occurs when a user logs in, unlocks a screen, or accesses a network drive. 
Reference : https://sc1.checkpoint.com/documents/R76/CP_R76_IdentityAwareness_AdminGuide/62402.htm



Question 3

Ken wants to obtain a configuration lock from other administrator on R80 Security Management Server. He can do this via WebUI or a via CLI. Which command should be use in CLI? Choose the correct answer. 


  1. remove database lock
  2. The database feature has one command lock database override. 
  3. override database lock
  4. The database feature has two commands: lock database override and unlock database. Both will work.
Correct answer: D
Explanation:
Use the database feature to obtain the configuration lock. The database feature has two commands: lock database [override]. unlock database The commands do the same thing: obtain the configuration lock from another administrator.   Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_Gaia_WebAdmin/75697.htm#o73091
Use the database feature to obtain the configuration lock. The database feature has two commands: 
  • lock database [override]. 
  • unlock database 
The commands do the same thing: obtain the configuration lock from another administrator.
   
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_Gaia_WebAdmin/75697.htm#o73091



Question 4

Examine the following Rule Base. 
(Click the Exhibits button)
    
What can we infer about the recent changes made to the Rule Base?


  1. Rule 7 was created by the 'admin' administrator in the current session
  2. 8 changes have been made by administrators since the last policy installation
  3. Te rules 1, 5 and 6 cannot be edited by the 'admin' administrator
  4. Rule 1 and object webserver are locked by another administrator
Correct answer: D
Explanation:
Explantation: On top of the print screen there is a number "8" which consists for the number of changes made and not saved.Session Management Toolbar (top of SmartConsole)    Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/CP_R80_SecMGMT/117948
Explantation: On top of the print screen there is a number "8" which consists for the number of changes made and not saved.
Session Management Toolbar (top of SmartConsole) 
   
Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/CP_R80_SecMGMT/117948



Question 5

ALPHA Corp has a new administrator who logs into the Gaia Portal to make some changes. He realizes that even though he has logged in as an administrator, he is unable to make any changes because all configuration options are greyed out as shown in the screenshot image below. What is the likely cause for this? 
(Click the Exhibits button)
   


  1. The Gaia /bin/confd is locked by another administrator from a SmartConsole session.
  2. The database is locked by another administrator SSH session.
  3. The Network address of his computer is in the blocked hosts.
  4. The IP address of his computer is not in the allowed hosts.
Correct answer: B
Explanation:
There is a lock on top left side of the screen. B is the logical answer.
There is a lock on top left side of the screen. B is the logical answer.



Question 6

Administrator Kofi has just made some changes on his Management Server and then clicks on the Publish button in SmartConsole but then gets the error message shown in the screenshot below. 
Where can the administrator check for more information on these errors? 
(Click the Exhibits button)
  


  1. The Log and Monitor section in SmartConsole
  2. The Validations section in SmartConsole
  3. The Objects section in SmartConsole
  4. The Policies section in SmartConsole
Correct answer: B
Explanation:
Validation Errors The validations pane in SmartConsole shows configuration error messages. Examples of errors are object names that are not unique, and the use of objects that are not valid in the Rule Base. To publish, you must fix the errors. Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/CP_R80_SecMGMT/126197
Validation Errors 
The validations pane in SmartConsole shows configuration error messages. Examples of errors are object names that are not unique, and the use of objects that are not valid in the Rule Base. 
To publish, you must fix the errors. 
Reference: 
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/CP_R80_SecMGMT/126197



Question 7

You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?


  1. Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.
  2. Create a separate Security Policy package for each remote Security Gateway.
  3. Create network object that restrict all applicable rules to only certain networks.
  4. Run separate SmartConsole instances to login and configure each Security Gateway directly.
Correct answer: B



Question 8

Harriet wants to protect sensitive information from intentional loss when users browse to a specific URL: https://personal.mymail.com, which blade will she enable to achieve her goal?


  1. DLP
  2. SSL Inspection
  3. Application Control
  4. URL Filtering
Correct answer: A
Explanation:
Check Point revolutionizes DLP by combining technology and processes to move businesses from passive detection to active Data Loss Prevention. Innovative MultiSpect™ data classification combines user, content and process information to make accurate decisions, while UserCheck™ technology empowers users to remediate incidents in real time. Check Point’s self-educating network-based DLP solution frees IT/security personnel from incident handling and educates users on proper data handling policies—protecting sensitive corporate information from both intentional and unintentional loss. Reference: https://www.checkpoint.com/downloads/product-related/datasheets/DLP-software-blade-datasheet.pdf
Check Point revolutionizes DLP by combining technology and processes to move businesses from passive detection to active Data Loss Prevention. Innovative MultiSpect™ data classification combines user, content and process information to make accurate decisions, while UserCheck™ technology empowers users to remediate incidents in real time. Check Point’s self-educating network-based DLP solution frees IT/security personnel from incident handling and educates users on proper data handling policies—protecting sensitive corporate information from both intentional and unintentional loss. 
Reference: https://www.checkpoint.com/downloads/product-related/datasheets/DLP-software-blade-datasheet.pdf



Question 9

To optimize Rule Base efficiency the most hit rules should be where?


  1. Removed from the Rule Base.
  2. Towards the middle of the Rule Base.
  3. Towards the top of the Rule Base.
  4. Towards the bottom of the Rule Base.
Correct answer: C
Explanation:
It is logical that if lesser rules are checked for the matched rule to be found the lesser CPU cycles the device is using. Checkpoint match a session from the first rule on top till the last on the bottom.
It is logical that if lesser rules are checked for the matched rule to be found the lesser CPU cycles the device is using. Checkpoint match a session from the first rule on top till the last on the bottom.



Question 10

Which of the following is NOT a license activation method?


  1. SmartConsole Wizard
  2. Online Activation
  3. License Activation Wizard
  4. Offline Activation
Correct answer: A









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files