Download Checkpoint.156-215.80.PracticeDumps.2018-06-10.220q.vcex

Download Exam

File Info

Exam Check Point Certified Security Administrator
Number 156-215.80
File Name Checkpoint.156-215.80.PracticeDumps.2018-06-10.220q.vcex
Size 5 MB
Posted Jun 10, 2018
Download Checkpoint.156-215.80.PracticeDumps.2018-06-10.220q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%



Exam Hub discount


Demo Questions

Question 1

The following graphic shows:
   


  1. View from SmartLog for logs initiated from source address 10.1.1.202
  2. View from SmartView Tracker for logs of destination address 10.1.1.202
  3. View from SmartView Tracker for logs initiated from source address 10.1.1.202
  4. View from SmartView Monitor for logs initiated from source address 10.1.1.202
Correct answer: C



Question 2

In R80, Unified Policy is a combination of


  1. Access control policy, QoS Policy, Desktop Security Policy and endpoint policy.
  2. Access control policy, QoS Policy, Desktop Security Policy and Threat Prevention Policy.
  3. Firewall policy, address Translation and application and URL filtering, QoS Policy, Desktop Security Policy and Threat Prevention Policy.
  4. Access control policy, QoS Policy, Desktop Security Policy and VPN policy.
Correct answer: D
Explanation:
D is the best answer given the choices. Unified Policy In R80 the Access Control policy unifies the policies of these pre-R80 Software Blades:Firewall and VPN Application Control and URL Filtering Identity Awareness Data Awareness Mobile Access Security Zones Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/P_R80_SecMGMT/126197&anchor=o129934
D is the best answer given the choices. 
Unified Policy 
In R80 the Access Control policy unifies the policies of these pre-R80 Software Blades:
  • Firewall and VPN 
  • Application Control and URL Filtering 
  • Identity Awareness 
  • Data Awareness 
  • Mobile Access 
  • Security Zones 
Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/P_R80_SecMGMT/126197&anchor=o129934



Question 3

Fill in the blank: The command __________ provides the most complete restoration of a R80 configuration.


  1. upgrade_import
  2. cpconfig
  3. fwm dbimport -p <export file>
  4. cpinfo -recover
Correct answer: A
Explanation:
(Should be "migrate import") "migrate import" Restores backed up configuration for R80 version, in previous versions the command was " upgrade_import ". Reference: http://dl3.checkpoint.com/paid/08/08586e2852acc054809517b267402a35/CP_R80_Gaia_InstallationAndUpgradeGuide.pdf?HashKey=1479700086_4553ede4b53a7882cd8052eed7c347be&xtn=.pdf
(Should be "migrate import") 
"migrate import" Restores backed up configuration for R80 version, in previous versions the command was " upgrade_import ". 
Reference: http://dl3.checkpoint.com/paid/08/08586e2852acc054809517b267402a35/CP_R80_Gaia_InstallationAndUpgradeGuide.pdf?HashKey=1479700086_4553ede4b53a7882cd8052eed7c347be&xtn=.pdf



Question 4

The Gaia operating system supports which routing protocols?


  1. BGP, OSPF, RIP
  2. BGP, OSPF, EIGRP, PIM, IGMP
  3. BGP, OSPF, RIP, PIM, IGMP
  4. BGP, OSPF, RIP, EIGRP
Correct answer: A
Explanation:
The Advanced Routing Suite The Advanced Routing Suite CLI is available as part of the Advanced Networking Software Blade. For organizations looking to implement scalable, fault-tolerant, secure networks, the Advanced Networking blade enables them to run industry-standard dynamic routing protocols including BGP, OSPF, RIPv1, and RIPv2 on security gateways. OSPF, RIPv1, and RIPv2 enable dynamic routing over a single autonomous system—like a single department, company, or service provider—to avoid network failures. BGP provides dynamic routing support across more complex networks involving multiple autonomous systems—such as when a company uses two service providers or divides a network into multiple areas with different administrators responsible for the performance of each. Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_SecurePlatform_AdvancedRouting_WebAdmin/html_frameset.htm
The Advanced Routing Suite 
The Advanced Routing Suite CLI is available as part of the Advanced Networking Software Blade. 
For organizations looking to implement scalable, fault-tolerant, secure networks, the Advanced Networking blade enables them to run industry-standard dynamic routing protocols including BGP, OSPF, RIPv1, and RIPv2 on security gateways. OSPF, RIPv1, and RIPv2 enable dynamic routing over a single autonomous system—like a single department, company, or service provider—to avoid network failures. BGP provides dynamic routing support across more complex networks involving multiple autonomous systems—such as when a company uses two service providers or divides a network into multiple areas with different administrators responsible for the performance of each. 
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_SecurePlatform_AdvancedRouting_WebAdmin/html_frameset.htm



Question 5

Joey wants to configure NTP on R80 Security Management Server. He decided to do this via WebUI. What is the correct address to access the Web UI for Gaia platform via browser?


  1. https://<Device_IP_Address>
  2. https://<Device_IP_Address>:443
  3. https://<Device_IP_Address>:10000
  4. https://<Device_IP_Address>:4434
Correct answer: A
Explanation:
Access to Web UI Gaia administration interface, initiate a connection from a browser to the default administration IP address: Logging in to the WebUI Logging in To log in to the WebUI:Enter this URL in your browser:https://<Gaia IP address>Enter your user name and password. Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_Gaia_AdminWebAdminGuide/html_frameset.htm?topic=documents/R77/CP_R77_Gaia_AdminWebAdminGuide/75930
Access to Web UI Gaia administration interface, initiate a connection from a browser to the default administration IP address: 
Logging in to the WebUI 
Logging in 
To log in to the WebUI:
  1. Enter this URL in your browser:
    https://<Gaia IP address>
  2. Enter your user name and password. 
Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_Gaia_AdminWebAdminGuide/html_frameset.htm?topic=documents/R77/CP_R77_Gaia_AdminWebAdminGuide/75930



Question 6

Which application should you use to install a contract file?


  1. SmartView Monitor
  2. WebUI
  3. SmartUpdate
  4. SmartProvisioning
Correct answer: C
Explanation:
Using SmartUpdate: If you already use an NGX R65 (or higher) Security Management / Provider-1 / Multi-Domain Management Server, SmartUpdate allows you to import the service contract file that you have downloaded in Step #3. Open SmartUpdate and from the Launch Menu select 'Licenses & Contracts' -> 'Update Contracts' -> 'From File...' and provide the path to the file you have downloaded in Step #3:   Note: If SmartUpdate is connected to the Internet, you can download the service contract file directly from the UserCenter without going through the download and import steps.Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk33089
Using SmartUpdate: If you already use an NGX R65 (or higher) Security Management / Provider-1 / Multi-Domain Management Server, SmartUpdate allows you to import the service contract file that you have downloaded in Step #3. 
Open SmartUpdate and from the Launch Menu select 'Licenses & Contracts' -> 'Update Contracts' -> 'From File...' and provide the path to the file you have downloaded in Step #3:
   
Note: If SmartUpdate is connected to the Internet, you can download the service contract file directly from the UserCenter without going through the download and import steps.
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk33089



Question 7

Which feature is NOT provided by all Check Point Mobile Access solutions?


  1. Support for IPv6
  2. Granular access control
  3. Strong user authentication
  4. Secure connectivity
Correct answer: A
Explanation:
Types of Solutions All of Check Point's Remote Access solutions provide:Enterprise-grade, secure connectivity to corporate resources. Strong user authentication. Granular access control. Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/83586.htm
Types of Solutions 
All of Check Point's Remote Access solutions provide:
  • Enterprise-grade, secure connectivity to corporate resources. 
  • Strong user authentication. 
  • Granular access control. 
Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/83586.htm



Question 8

You work as a security administrator for a large company. CSO of your company has attended a security conference where he has learnt how hackers constantly modify their strategies and techniques to evade detection and reach corporate resources. He wants to make sure that his company has the right protections in place. Check Point has been selected for the security vendor. Which Check Point products protects BEST against malware and zero-day attacks while ensuring quick delivery of safe content to your users?


  1. IPS and Application Control
  2. IPS, anti-virus and anti-bot
  3. IPS, anti-virus and e-mail security
  4. SandBlast
Correct answer: D
Explanation:
SandBlast Zero-Day Protection Hackers constantly modify their strategies and techniques to evade detection and reach corporate resources. Zero-day exploit protection from Check Point provides a deeper level of inspection so you can prevent more malware and zero-day attacks, while ensuring quick delivery of safe content to your users. Reference: https://www.checkpoint.com/products-solutions/zero-day-protection/
SandBlast Zero-Day Protection 
Hackers constantly modify their strategies and techniques to evade detection and reach corporate resources. Zero-day exploit protection from Check Point provides a deeper level of inspection so you can prevent more malware and zero-day attacks, while ensuring quick delivery of safe content to your users. 
Reference: https://www.checkpoint.com/products-solutions/zero-day-protection/



Question 9

Fill in the blank: Each cluster has __________ interfaces.


  1. Five
  2. Two
  3. Three
  4. Four
Correct answer: C
Explanation:
Each cluster member has three interfaces: one external interface, one internal interface, and one for synchronization. Cluster member interfaces facing in each direction are connected via a switch, router, or VLAN switch. Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7292.htm
Each cluster member has three interfaces: one external interface, one internal interface, and one for synchronization. Cluster member interfaces facing in each direction are connected via a switch, router, or VLAN switch. 
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7292.htm



Question 10

What are the three essential components of the Check Point Security Management Architecture?


  1. SmartConsole, Security Management Server, Security Gateway
  2. SmartConsole, SmartUpdate, Security Gateway
  3. Security Management Server,  Security Gateway, Command Line Interface
  4. WebUI, SmartConsole, Security Gateway
Correct answer: A
Explanation:
Deployments Basic deployments:Standalone deployment - Security Gateway and the Security Management server are installed on the same machine. Distributed deployment - Security Gateway and the Security Management server are installed on different machines.     Assume an environment with gateways on different sites. Each Security Gateway connects to the Internet on one side, and to a LAN on the other. You can create a Virtual Private Network (VPN) between the two Security Gateways, to secure all communication between them. The Security Management server is installed in the LAN, and is protected by a Security Gateway. The Security Management server manages the Security Gateways and lets remote users connect securely to the corporate network. SmartDashboard can be installed on the Security Management server or another computer. There can be other OPSEC-partner modules (for example, an Anti-Virus Server) to complete the network security with the Security Management server and its Security Gateways. Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_SecurityManagement_WebAdminGuide/html_frameset.htm?topic=documents/R77/CP_R77_SecurityManagement_WebAdminGuide/118037
Deployments 
Basic deployments:
  • Standalone deployment - Security Gateway and the Security Management server are installed on the same machine. 
  • Distributed deployment - Security Gateway and the Security Management server are installed on different machines. 
    
Assume an environment with gateways on different sites. Each Security Gateway connects to the Internet on one side, and to a LAN on the other. 
You can create a Virtual Private Network (VPN) between the two Security Gateways, to secure all communication between them. 
The Security Management server is installed in the LAN, and is protected by a Security Gateway. The Security Management server manages the Security Gateways and lets remote users connect securely to the corporate network. SmartDashboard can be installed on the Security Management server or another computer. 
There can be other OPSEC-partner modules (for example, an Anti-Virus Server) to complete the network security with the Security Management server and its Security Gateways. 
Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_SecurityManagement_WebAdminGuide/html_frameset.htm?topic=documents/R77/CP_R77_SecurityManagement_WebAdminGuide/118037









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files