Pre-Summer Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

156-215.81 Check Point Certified Security Administrator R81.20 CCSA (156-215.81.20) Questions and Answers

Questions 4

What is the BEST command to view configuration details of all interfaces in Gaia CLISH?

Options:

A.

ifconfig -a

B.

show interfaces

C.

show interfaces detail

D.

show configuration interface

Buy Now
Questions 5

When should you generate new licenses?

Options:

A.

Before installing contract files.

B.

After an RMA procedure when the MAC address or serial number of the appliance changes.

C.

When the existing license expires, license is upgraded or the IP-address where the license is tied changes.

D.

Only when the license is upgraded.

Buy Now
Questions 6

If there are two administrators logged in at the same time to the SmartConsole, and there are objects locked for editing, what must be done to make them available to other administrators? Choose the BEST answer

Options:

A.

Save and install the Policy

B.

Delete older versions of database

C.

Revert the session.

D.

Publish or discard the session

Buy Now
Questions 7

In SmartConsole, on which tab are Permissions and Administrators defined?

Options:

A.

Manage and Settings

B.

Logs and Monitor

C.

Security Policies

D.

Gateways and Servers

Buy Now
Questions 8

If the Active Security Management Server fails or if it becomes necessary to change the Active to Standby, the following steps must be taken to prevent data loss. Providing the Active Security Management Server is responsible, which of these steps should NOT be performed:

Options:

A.

Rename the hostname of the Standby member to match exactly the hostname of the Active member.

B.

Change the Standby Security Management Server to Active.

C.

Change the Active Security Management Server to Standby.

D.

Manually synchronize the Active and Standby Security Management Servers.

Buy Now
Questions 9

To quickly review when Threat Prevention signatures were last updated, which Threat Tool would an administrator use?

Options:

A.

Protections

B.

IPS Protections

C.

Profiles

D.

ThreatWiki

Buy Now
Questions 10

You have enabled "Extended Log" as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?

Options:

A.

Identity Awareness is not enabled.

B.

Log Trimming is enabled.

C.

Logging has disk space issues

D.

Content Awareness is not enabled.

Buy Now
Questions 11

Which tool is used to enable ClusterXL?

Options:

A.

SmartUpdate

B.

cpconfig

C.

SmartConsole

D.

sysconfig

Buy Now
Questions 12

Examine the sample Rule Base.

156-215.81 Question 12

What will be the result of a verification of the policy from SmartConsole?

Options:

A.

No errors or Warnings

B.

Verification Error. Empty Source-List in Rule 5 (Mail Inbound)

C.

Verification Error. Rule 4 (Web Inbound) hides Rule 6 (Webmaster access)

D.

Verification Error. Rule 7 (Clean-Up Rule) hides Implicit Clean-up Rule

Buy Now
Questions 13

In the Check Point Security Management Architecture, which component(s) can store logs?

Options:

A.

Security Management Server and Security Gateway

B.

SmartConsole

C.

SmartConsole and Security Management Server

D.

Security Management Server

Buy Now
Questions 14

: 370

What technologies are used to deny or permit network traffic?

Options:

A.

Stateful Inspection. Firewall Blade, and URL'Application Blade

B.

Packet Filtenng. Stateful Inspection, and Application Layer Firewall

C.

Firewall Blade. URL/Application Blade and IPS

D.

Stateful Inspection. URL/Application Blade, and Threat Prevention

Buy Now
Questions 15

What is UserCheck?

Options:

A.

Messaging tool user to verify a user’s credentials

B.

Communication tool used to inform a user about a website or application they are trying to access

C.

Administrator tool used to monitor users on their network

D.

Communication tool used to notify an administrator when a new user is created

Buy Now
Questions 16

Secure Internal Communication (SIC) is handled by what process?

Options:

A.

CPM

B.

HTTPS

C.

FWD

D.

CPD

Buy Now
Questions 17

True or False: The destination server for Security Gateway logs depends on a Security Management Server configuration.

Options:

A.

False, log servers are configured on the Log Server General Properties

B.

True, all Security Gateways will only forward logs with a SmartCenter Server configuration

C.

True, all Security Gateways forward logs automatically to the Security Management Server

D.

False, log servers are enabled on the Security Gateway General Properties

Buy Now
Questions 18

Fill in the blank: An identity server uses a ___________ for user authentication.

Options:

A.

Shared secret

B.

Certificate

C.

One-time password

D.

Token

Buy Now
Questions 19

The competition between stateful inspection and proxies was based on performance, protocol support, and security. Considering stateful Inspections and Proxies, which statement is correct?

Options:

A.

Stateful Inspection is limited to Layer 3 visibility, with no Layer 4 to Layer 7 visibility capabilities.

B.

When it comes to performance, proxies were significantly faster than stateful inspection firewalls.

C.

Proxies offer far more security because of being able to give visibility of the payload (the data).

D.

When it comes to performance, stateful inspection was significantly faster than proxies.

Buy Now
Questions 20

Which one of the following is a way that the objects can be manipulated using the new API integration in R80 Management?

Options:

A.

Microsoft Publisher

B.

JSON

C.

Microsoft Word

D.

RC4 Encryption

Buy Now
Questions 21

Name the file that is an electronically signed file used by Check Point to translate the features in the license into a code?

Options:

A.

Both License (.lic) and Contract (.xml) files

B.

cp.macro

C.

Contract file (.xml)

D.

license File (.lie)

Buy Now
Questions 22

Which command shows the installed licenses?

Options:

A.

cplic print

B.

print cplic

C.

fwlic print

D.

show licenses

Buy Now
Questions 23

Which of the following is NOT a tracking log option in R80.x?

Options:

A.

Log

B.

Full Log

C.

Detailed Log

D.

Extended Log

Buy Now
Questions 24

Which option, when applied to a rule, allows all encrypted and non-VPN traffic that matches the rule?

Options:

A.

All Site-to-Site VPN Communities

B.

Accept all encrypted traffic

C.

All Connections (Clear or Encrypted)

D.

Specific VPN Communities

Buy Now
Questions 25

When configuring LDAP User Directory integration, Changes applied to a User Directory template are:

Options:

A.

Reflected immediately for all users who are using template.

B.

Not reflected for any users unless the local user template is changed.

C.

Reflected for all users who are using that template and if the local user template is changed as well.

D.

Not reflected for any users who are using that template.

Buy Now
Questions 26

Which Threat Prevention Software Blade provides comprehensive protection against malicious and unwanted network traffic, focusing on application and server vulnerabilities?

Options:

A.

IPS

B.

Anti-Virus

C.

Anti-Spam

D.

Anti-bot

Buy Now
Questions 27

Gaia has two default user accounts that cannot be deleted. What are those user accounts?

Options:

A.

Admin and Default

B.

Expert and Clish

C.

Control and Monitor

D.

Admin and Monitor

Buy Now
Questions 28

Which type of Check Point license ties the package license to the IP address of the Security Management Server?

Options:

A.

Central

B.

Corporate

C.

Local

D.

Formal

Buy Now
Questions 29

Which of the following is considered a "Subscription Blade", requiring renewal every 1-3 years?

Options:

A.

IPS blade

B.

IPSEC VPN Blade

C.

Identity Awareness Blade

D.

Firewall Blade

Buy Now
Questions 30

Name the authentication method that requires token authenticator.

Options:

A.

SecureID

B.

Radius

C.

DynamicID

D.

TACACS

Buy Now
Questions 31

When enabling tracking on a rule, what is the default option?

Options:

A.

Accounting Log

B.

Extended Log

C.

Log

D.

Detailed Log

Buy Now
Questions 32

Which Check Point supported authentication scheme typically requires a user to possess a token?

Options:

A.

RADIUS

B.

Check Point password

C.

TACACS

D.

SecurlD

Buy Now
Questions 33

Log query results can be exported to what file format?

Options:

A.

Word Document (docx)

B.

Comma Separated Value (csv)

C.

Portable Document Format (pdf)

D.

Text (txt)

Buy Now
Questions 34

Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?

Options:

A.

ThreatWiki

B.

Whitelist Files

C.

AppWiki

D.

IPS Protections

Buy Now
Questions 35

Which method below is NOT one of the ways to communicate using the Management API’s?

Options:

A.

Typing API commands using the “mgmt_cli” command

B.

Typing API commands from a dialog box inside the SmartConsole GUI application

C.

Typing API commands using Gaia’s secure shell (clash)19+

D.

Sending API commands over an http connection using web-services

Buy Now
Questions 36

True or False: More than one administrator can log into the Security Management Server with SmartConsole with write permission at the same time.

Options:

A.

True, every administrator works on a different database that Is independent of the other administrators

B.

False, this feature has to be enabled in the Global Properties.

C.

True, every administrator works in a session that is independent of the other administrators

D.

False, only one administrator can login with write permission

Buy Now
Questions 37

Session unique identifiers are passed to the web api using which http header option?

Options:

A.

X-chkp-sid

B.

Accept-Charset

C.

Proxy-Authorization

D.

Application

Buy Now
Questions 38

If an administrator wants to restrict access to a network resource only allowing certain users to access it, and only when they are on a specific network what is the best way to accomplish this?

Options:

A.

Create an inline layer where the destination is the target network resource Define sub-rules allowing only specific sources to access the target resource

B.

Use a "New Legacy User at Location", specifying the LDAP user group that the users belong to, at the desired location

C.

Create a rule allowing only specific source IP addresses access to the target network resource.

D.

Create an Access Role object, with specific users or user groups specified, and specific networks defined Use this access role as the "Source" of an Access Control rule

Buy Now
Questions 39

Which back up method uses the command line to create an image of the OS?

Options:

A.

System backup

B.

Save Configuration

C.

Migrate

D.

snapshot

Buy Now
Questions 40

Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ___________.

Options:

A.

Captive Portal and Transparent Kerberos Authentication

B.

UserCheck

C.

User Directory

D.

Captive Portal

Buy Now
Questions 41

Which of the following commands is used to monitor cluster members?

Options:

A.

cphaprob state

B.

cphaprob status

C.

cphaprob

D.

cluster state

Buy Now
Questions 42

What needs to be configured if the NAT property ‘Translate destination on client side’ is not enabled in Global properties?

Options:

A.

A host route to route to the destination IP

B.

Use the file local.arp to add the ARP entries for NAT to work

C.

Nothing, the Gateway takes care of all details necessary

D.

Enabling ‘Allow bi-directional NAT’ for NAT to work correctly

Buy Now
Questions 43

Which statement is NOT TRUE about Delta synchronization?

Options:

A.

Using UDP Multicast or Broadcast on port 8161

B.

Using UDP Multicast or Broadcast on port 8116

C.

Quicker than Full sync

D.

Transfers changes in the Kernel tables between cluster members

Buy Now
Questions 44

Which of the following is NOT a valid deployment option for R80?

Options:

A.

All-in-one (stand-alone)

B.

CloudGuard

C.

Distributed

D.

Bridge Mode

Buy Now
Questions 45

What are valid authentication methods for mutual authenticating the VPN gateways?

Options:

A.

Pre-shared Secret and PKI Certificates

B.

PKI Certificates and Kerberos Tickets

C.

Pre-Shared Secrets and Kerberos Ticket

D.

PKI Certificates and DynamiciD OTP

Buy Now
Questions 46

Security Gateway software blades must be attached to what?

Options:

A.

Security Gateway

B.

Security Gateway container

C.

Management server

D.

Management container

Buy Now
Questions 47

In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?

Options:

A.

Accounting

B.

Suppression

C.

Accounting/Suppression

D.

Accounting/Extended

Buy Now
Questions 48

Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?

Options:

A.

Active Directory Query

B.

User Directory Query

C.

Account Unit Query

D.

UserCheck

Buy Now
Questions 49

The purpose of the Communication Initialization process is to establish a trust between the Security Management Server and the Check Point gateways. Which statement best describes this Secure Internal

Communication (SIC)?

Options:

A.

After successful initialization, the gateway can communicate with any Check Point node that possesses a SIC certificate signed by the same ICA.

B.

Secure Internal Communications authenticates the security gateway to the SMS before http communications are allowed.

C.

A SIC certificate is automatically generated on the gateway because the gateway hosts a subordinate CA to the SMS ICA.

D.

New firewalls can easily establish the trust by using the expert password defined on the SMS and the SMS IP address.

Buy Now
Questions 50

What is a reason for manual creation of a NAT rule?

Options:

A.

In R80 all Network Address Translation is done automatically and there is no need for manually defined NAT-rules.

B.

Network Address Translation of RFC1918-compliant networks is needed to access the Internet.

C.

Network Address Translation is desired for some services, but not for others.

D.

The public IP-address is different from the gateway’s external IP

Buy Now
Questions 51

When configuring Anti-Spoofing, which tracking options can an Administrator select?

Options:

A.

Log, Alert, None

B.

Log, Allow Packets, Email

C.

Drop Packet, Alert, None

D.

Log, Send SNMP Trap, Email

Buy Now
Questions 52

The ______ software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware.

Options:

A.

Next Generation Threat Prevention

B.

Next Generation Threat Emulation

C.

Next Generation Threat Extraction

D.

Next Generation Firewall

Buy Now
Questions 53

To ensure that VMAC mode is enabled, which CLI command you should run on all cluster members? Choose the best answer.

Options:

A.

fw ctl set int fwha vmac global param enabled

B.

fw ctl get int fwha vmac global param enabled; result of command should return value 1

C.

cphaprob –a if

D.

fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1

Buy Now
Questions 54

Application Control/URL filtering database library is known as:

Options:

A.

Application database

B.

AppWiki

C.

Application-Forensic Database

D.

Application Library

Buy Now
Questions 55

What does it mean if Deyra sees the gateway status:

156-215.81 Question 55

Choose the BEST answer.

Options:

A.

SmartCenter Server cannot reach this Security Gateway

B.

There is a blade reporting a problem

C.

VPN software blade is reporting a malfunction

D.

Security Gateway’s MGNT NIC card is disconnected.

Buy Now
Questions 56

You had setup the VPN Community NPN-Stores' with 3 gateways. There are some issues with one remote gateway(l .1.1.1) and an your local gateway. What will be the best log filter to see only the IKE Phase 2 agreed networks for both gateways.

Options:

A.

action:”Key Install" AND 1.1.1.1 AND Quick Mode

B.

Blade:”VPN”AND VPN-Stores AND Main Mode

C.

action:”Key Install” AND 1.1.1.1 AND Main Mode

D.

Blade:”VPN”AND VPN-Stores AND Quick Mode

Buy Now
Questions 57

Which policy type is used to enforce bandwidth and traffic control rules?

Options:

A.

Access Control

B.

Threat Emulation

C.

Threat Prevention

D.

QoS

Buy Now
Questions 58

Phase 1 of the two-phase negotiation process conducted by IKE operates in ______ mode.

Options:

A.

Main

B.

Authentication

C.

Quick

D.

High Alert

Buy Now
Questions 59

In a Distributed deployment, the Security Gateway and the Security Management software are installed on what platforms?

Options:

A.

Different computers or appliances.

B.

The same computer or appliance.

C.

Both on virtual machines or both on appliances but not mixed.

D.

In Azure and AWS cloud environments.

Buy Now
Questions 60

URL Filtering cannot be used to:

Options:

A.

Control Bandwidth issues

B.

Control Data Security

C.

Improve organizational security

D.

Decrease legal liability

Buy Now
Questions 61

Fill in the blank: When a policy package is installed, ________ are also distributed to the target installation Security Gateways.

Options:

A.

User and objects databases

B.

Network databases

C.

SmartConsole databases

D.

User databases

Buy Now
Questions 62

What is the most recommended installation method for Check Point appliances?

Options:

A.

SmartUpdate installation

B.

DVD media created with Check Point ISOMorphic

C.

USB media created with Check Point ISOMorphic

D.

Cloud based installation

Buy Now
Questions 63

Administrator Dave logs into R80 Management Server to review and makes some rule changes. He notices that there is a padlock sign next to the DNS rule in the Rule Base.

156-215.81 Question 63

What is the possible explanation for this?

Options:

A.

DNS Rule is using one of the new feature of R80 where an administrator can mark a rule with the padlock icon to let other administrators know it is important.

B.

Another administrator is logged into the Management and currently editing the DNS Rule.

C.

DNS Rule is a placeholder rule for a rule that existed in the past but was deleted.

D.

This is normal behavior in R80 when there are duplicate rules in the Rule Base.

Buy Now
Questions 64

What is the BEST method to deploy Identity Awareness for roaming users?

Options:

A.

Use Office Mode

B.

Use identity agents

C.

Share user identities between gateways

D.

Use captive portal

Buy Now
Questions 65

Which two of these Check Point Protocols are used by ?

Options:

A.

ELA and CPD

B.

FWD and LEA

C.

FWD and CPLOG

D.

ELA and CPLOG

Buy Now
Questions 66

When should you generate new licenses?

Options:

A.

Before installing contract files.

B.

After a device upgrade.

C.

When the existing license expires, license is upgraded or the IP-address associated with the license changes.

D.

Only when the license is upgraded.

Buy Now
Questions 67

When installing a dedicated R80 SmartEvent server, what is the recommended size of the root partition?

Options:

A.

Any size

B.

Less than 20GB

C.

More than 10GB and less than 20 GB

D.

At least 20GB

Buy Now
Questions 68

Which of the following is the most secure means of authentication?

Options:

A.

Password

B.

Certificate

C.

Token

D.

Pre-shared secret

Buy Now
Questions 69

Fill in the blanks: A Check Point software license consists of a__________ and _______.

Options:

A.

Software blade; software container

B.

Software package: signature

C.

Signature; software blade

D.

Software container software package

Buy Now
Questions 70

Which of the following is a valid deployment option?

Options:

A.

CloudSec deployment

B.

Disliked deployment

C.

Router only deployment

D.

Standalone deployment

Buy Now
Questions 71

Which of the following is NOT an identity source used for Identity Awareness?

Options:

A.

Remote Access

B.

UserCheck

C.

AD Query

D.

RADIUS

Buy Now
Questions 72

In SmartConsole, objects are used to represent physical and virtual network components and also some logical components. These objects are divided into several categories. Which of the following is NOT an objects category?

Options:

A.

Limit

B.

Resource

C.

Custom Application / Site

D.

Network Object

Buy Now
Questions 73

Which of the following describes how Threat Extraction functions?

Options:

A.

Detect threats and provides a detailed report of discovered threats

B.

Proactively detects threats

C.

Delivers file with original content

D.

Delivers PDF versions of original files with active content removed

Buy Now
Questions 74

What are the three deployment considerations for a secure network?

Options:

A.

Distributed, Bridge Mode, and Remote

B.

Bridge Mode, Remote, and Standalone

C.

Remote, Standalone, and Distributed

D.

Standalone, Distributed, and Bridge Mode

Buy Now
Questions 75

A security zone is a group of one or more network interfaces from different centrally managed gateways. What is considered part of the zone?

Options:

A.

The zone is based on the network topology and determined according to where the interface leads to.

B.

Security Zones are not supported by Check Point firewalls.

C.

The firewall rule can be configured to include one or more subnets in a zone.

D.

The local directly connected subnet defined by the subnet IP and subnet mask.

Buy Now
Questions 76

What are the two elements of address translation rules?

Options:

A.

Original packet and translated packet

B.

Manipulated packet and original packet

C.

Translated packet and untranslated packet

D.

Untranslated packet and manipulated packet

Buy Now
Questions 77

What is the default shell for the Gaia command line interface?

Options:

A.

Admin

B.

Clish

C.

Expert

D.

Bash

Buy Now
Questions 78

In SmartEvent, a correlation unit (CU) is used to do what?

Options:

A.

Collect security gateway logs, Index the logs and then compress the logs.

B.

Receive firewall and other software blade logs in a region and forward them to the primary log server.

C.

Analyze log entries and identify events.

D.

Send SAM block rules to the firewalls during a DOS attack.

Buy Now
Questions 79

Which Check Point Software Wade provides visibility of users, groups and machines while also providing access control through identity-based policies?

Options:

A.

Firewall

B.

Identity Awareness

C.

Application Control

D.

URL Filtering

Buy Now
Questions 80

What is the difference between SSL VPN and IPSec VPN?

Options:

A.

IPSec VPN does not require installation of a resident VPN client

B.

SSL VPN requires installation of a resident VPN client

C.

SSL VPN and IPSec VPN are the same

D.

IPSec VPN requires installation of a resident VPN client and SSL VPN requires only an installed Browser

Buy Now
Questions 81

Which is a suitable command to check whether Drop Templates are activated or not?

Options:

A.

fw ctl get int activate_drop_templates

B.

fwaccel stat

C.

fwaccel stats

D.

fw ctl templates –d

Buy Now
Questions 82

An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office. Both offices are protected by Check Point Security Gateway managed by the same Security Management Server (SMS). While configuring the VPN community to specify the pre-shared secret, the administrator did not find a box to input the pre-shared secret. Why does it not allow him to specify the pre-shared secret?

Options:

A.

The Gateway is an SMB device

B.

The checkbox “Use only Shared Secret for all external members” is not checked

C.

Certificate based Authentication is the only authentication method available between two Security Gateway managed by the same SMS

D.

Pre-shared secret is already configured in Global Properties

Buy Now
Questions 83

Which SmartConsole application shows correlated logs and aggregated data to provide an overview of potential threats and attack patterns?

Options:

A.

SmartEvent

B.

SmartView Tracker

C.

SmartLog

D.

SmartView Monitor

Buy Now
Questions 84

When a gateway requires user information for authentication, what order does it query servers for user information?

Options:

A.

First - Internal user database, then LDAP servers in order of priority, finally the generic external user profile

B.

First the Internal user database, then generic external user profile, finally LDAP servers in order of priority.

C.

First the highest priority LDAP server, then the internal user database, then lower priority LDAP servers, finally the generic external profile

D.

The external generic profile, then the internal user database finally the LDAP servers in order of priority.

Buy Now
Questions 85

To provide updated malicious data signatures to all Threat Prevention blades, the Threat Prevention gateway does what with the data?

Options:

A.

Cache the data to speed up its own function.

B.

Share the data to the ThreatCloud for use by other Threat Prevention blades.

C.

Log the traffic for Administrator viewing.

D.

Delete the data to ensure an analysis of the data is done each time.

Buy Now
Questions 86

URL Filtering employs a technology, which educates users on web usage policy in real time. What is the name of that technology?

Options:

A.

WebCheck

B.

UserCheck

C.

Harmony Endpoint

D.

URL categorization

Buy Now
Questions 87

Name the pre-defined Roles included in Gaia OS.

Options:

A.

AdminRole, and MonitorRole

B.

ReadWriteRole, and ReadyOnly Role

C.

AdminRole, cloningAdminRole, and Monitor Role

D.

AdminRole

Buy Now
Questions 88

What is the Transport layer of the TCP/IP model responsible for?

Options:

A.

It transports packets as datagrams along different routes to reach their destination.

B.

It manages the flow of data between two hosts to ensure that the packets are correctly assembled and delivered to the target application.

C.

It defines the protocols that are used to exchange data between networks and how host programs interact with the Application layer.

D.

It deals with all aspects of the physical components of network connectivity and connects with different network types.

Buy Now
Questions 89

The Network Operations Center administrator needs access to Check Point Security devices mostly for troubleshooting purposes. You do not want to give her access to the expert mode, but she still should be able to run tcpdump. How can you achieve this requirement?

Options:

A.

Add tcpdump to CLISH using add command.Create a new access role.Add tcpdump to the role.Create new user with any UID and assign role to the user.

B.

Add tcpdump to CLISH using add command.Create a new access role.Add tcpdump to the role.Create new user with UID 0 and assign role to the user.

C.

Create a new access role.Add expert-mode access to the role.Create new user with UID 0 and assign role to the user.

D.

Create a new access role.Add expert-mode access to the role.Create new user with any UID and assign role to the user.

Buy Now
Questions 90

Is it possible to have more than one administrator connected to a Security Management Server at once?

Options:

A.

Yes, but only if all connected administrators connect with read-only permissions.

B.

Yes, but objects edited by one administrator will be locked for editing by others until the session is published.

C.

No, only one administrator at a time can connect to a Security Management Server

D.

Yes, but only one of those administrators will have write-permissions. All others will have read-only permission.

Buy Now
Questions 91

Which of the following is used to extract state related information from packets and store that information in state tables?

Options:

A.

STATE Engine

B.

TRACK Engine

C.

RECORD Engine

D.

INSPECT Engine

Buy Now
Questions 92

Fill in the blank: The position of an implied rule is manipulated in the __________________ window.

Options:

A.

NAT

B.

Firewall

C.

Global Properties

D.

Object Explorer

Buy Now
Questions 93

Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?

Options:

A.

UDP port 265

B.

TCP port 265

C.

UDP port 256

D.

TCP port 256

Buy Now
Questions 94

Which of the following is used to enforce changes made to a Rule Base?

Options:

A.

Publish database

B.

Save changes

C.

Install policy

D.

Activate policy

Buy Now
Questions 95

Fill in the blank: A(n)_____rule is created by an administrator and configured to allow or block traffic based on specified criteria.

Options:

A.

Inline

B.

Explicit

C.

Implicit drop

D.

Implicit accept

Buy Now
Questions 96

In HTTPS Inspection policy, what actions are available in the "Actions" column of a rule?

Options:

A.

"Inspect", "Bypass"

B.

"Inspect", "Bypass", "Categorize"

C.

"Inspect", "Bypass", "Block"

D.

"Detect", "Bypass"

Buy Now
Questions 97

Fill in the blank: Back up and restores can be accomplished through_________.

Options:

A.

SmartConsole, WebUI, or CLI

B.

WebUI, CLI, or SmartUpdate

C.

CLI, SmartUpdate, or SmartBackup

D.

SmartUpdate, SmartBackup, or SmartConsole

Buy Now
Questions 98

Which option will match a connection regardless of its association with a VPN community?

Options:

A.

All Site-to-Site VPN Communities

B.

Accept all encrypted traffic

C.

All Connections (Clear or Encrypted)

D.

Specific VPN Communities

Buy Now
Questions 99

How many users can have read/write access in Gaia Operating System at one time?

Options:

A.

One

B.

Three

C.

Two

D.

Infinite

Buy Now
Questions 100

How are the backups stored in Check Point appliances?

Options:

A.

Saved as*.tar under /var/log/CPbackup/backups

B.

Saved as*tgz under /var/CPbackup

C.

Saved as*tar under /var/CPbackup

D.

Saved as*tgz under /var/log/CPbackup/backups

Buy Now
Questions 101

Name one limitation of using Security Zones in the network?

Options:

A.

Security zones will not work in Automatic NAT rules

B.

Security zone will not work in Manual NAT rules

C.

Security zones will not work in firewall policy layer

D.

Security zones cannot be used in network topology

Buy Now
Questions 102

Choose what BEST describes users on Gaia Platform.

Options:

A.

There are two default users and neither can be deleted.

B.

There are two default users and one cannot be deleted.

C.

There is one default user that can be deleted.

D.

There is one default user that cannot be deleted.

Buy Now
Questions 103

Check Point ClusterXL Active/Active deployment is used when:

Options:

A.

Only when there is Multicast solution set up

B.

There is Load Sharing solution set up

C.

Only when there is Unicast solution set up

D.

There is High Availability solution set up

Buy Now
Questions 104

What SmartEvent component creates events?

Options:

A.

Consolidation Policy

B.

Correlation Unit

C.

SmartEvent Policy

D.

SmartEvent GUI

Buy Now
Questions 105

Which GUI tool can be used to view and apply Check Point licenses?

Options:

A.

cpconfig

B.

Management Command Line

C.

SmartConsole

D.

SmartUpdate

Buy Now
Questions 106

The CDT utility supports which of the following?

Options:

A.

Major version upgrades to R77.30

B.

Only Jumbo HFA’s and hotfixes

C.

Only major version upgrades to R80.10

D.

All upgrades

Buy Now
Questions 107

What is the default shell for the command line interface?

Options:

A.

Clish

B.

Admin

C.

Normal

D.

Expert

Buy Now
Questions 108

Using ClusterXL, what statement is true about the Sticky Decision Function?

Options:

A.

Can only be changed for Load Sharing implementations

B.

All connections are processed and synchronized by the pivot

C.

Is configured using cpconfig

D.

Is only relevant when using SecureXL

Buy Now
Questions 109

What is the purpose of the Stealth Rule?

Options:

A.

To prevent users from directly connecting to a Security Gateway.

B.

To reduce the number of rules in the database.

C.

To reduce the amount of logs for performance issues.

D.

To hide the gateway from the Internet.

Buy Now
Questions 110

What protocol is specifically used for clustered environments?

Options:

A.

Clustered Protocol

B.

Synchronized Cluster Protocol

C.

Control Cluster Protocol

D.

Cluster Control Protocol

Buy Now
Questions 111

Which one of the following is the preferred licensing model? Select the BEST answer

Options:

A.

Local licensing because it ties the package license to the IP-address of the gateway and has no dependency of the Security Management Server.

B.

Central licensing because it ties the package license to the IP-address of the Security Management Server and has no dependency on the gateway.

C.

Central licensing because it ties the package license to the MAC-address of the Security Management Server's Mgmt-interface and has no dependency

on the gateway.

D.

Local licensing because it ties the package license to the MAC-address of the gateway management interface and has no Security Management Server

dependency.

Buy Now
Questions 112

What are the three types of UserCheck messages?

Options:

A.

inform, ask, and block

B.

block, action, and warn

C.

action, inform, and ask

D.

ask, block, and notify

Buy Now
Questions 113

When an encrypted packet is decrypted, where does this happen?

Options:

A.

Security policy

B.

Inbound chain

C.

Outbound chain

D.

Decryption is not supported

Buy Now
Questions 114

The default shell of the Gaia CLI is cli.sh. How do you change from the cli.sh shell to the advanced shell to run Linux commands?

Options:

A.

Execute the command 'enable' in the cli.sh shell

B.

Execute the 'conf t' command in the cli.sh shell

C.

Execute the command 'expert' in the cli.sh shell

D.

Execute the 'exit' command in the cli.sh shell

Buy Now
Questions 115

You are asked to check the status of several user-mode processes on the management server and gateway. Which of the following processes can only be seen on a Management Server?

Options:

A.

fwd

B.

fwm

C.

cpd

D.

cpwd

Buy Now
Questions 116

There are four policy types available for each policy package. What are those policy types?

Options:

A.

Access Control, Threat Prevention, Mobile Access and HTTPS Inspection

B.

Access Control, Custom Threat Prevention, Autonomous Threat Prevention and HTTPS Inspection

C.

There are only three policy types: Access Control, Threat Prevention and NAT.

D.

Access Control, Threat Prevention, NAT and HTTPS Inspection

Buy Now
Questions 117

Fill in the bank: In Office mode, a Security Gateway assigns a remote client to an IP address once___________.

Options:

A.

the user connects and authenticates

B.

office mode is initiated

C.

the user requests a connection

D.

the user connects

Buy Now
Questions 118

Both major kinds of NAT support Hide and Static NAT. However, one offers more flexibility. Which statement is true?

Options:

A.

Manual NAT can offer more flexibility than Automatic NAT.

B.

Dynamic Network Address Translation (NAT) Overloading can offer more flexibility than Port Address Translation.

C.

Dynamic NAT with Port Address Translation can offer more flexibility than Network Address Translation (NAT) Overloading.

D.

Automatic NAT can offer more flexibility than Manual NAT.

Buy Now
Questions 119

Which icon in the WebUI indicates that read/write access is enabled?

Options:

A.

Eyeglasses

B.

Pencil

C.

Padlock

D.

Book

Buy Now
Questions 120

Which Threat Prevention profile uses sanitization technology?

Options:

A.

Cloud/data Center

B.

perimeter

C.

Sandbox

D.

Guest Network

Buy Now
Questions 121

You want to set up a VPN tunnel to a external gateway. You had to make sure that the IKE P2 SA will only be established between two subnets and not all subnets defined in the default VPN domain of your gateway.

Options:

A.

In the SmartConsole create a dedicated VPN Community for both Gateways. On the Management add the following line to the $FWDIR/conf/user.def.FWI file subnet_for_range_and_peer = { );

B.

In the SmartConsole create a dedicated VPN Community for both Gateways. Selecting the local gateway in the Community you can set the VPN Domain to 'User defined' and put in the local network.

C.

In the SmartConsole create a dedicated VPN Community for both Gateways. On the Gateway add the following line to the $FWDlR/cont/user.def.FW1 file subnet_for_range_and_peer = { };

D.

In the SmartConsole create a dedicated VPN Community for both Gateways. Go to Security Policies / Access Control and create an in-line layer rule with source and destination containing the two networks used for the IKE P2 SA. Put the name of the Community in the VPN column.

Buy Now
Questions 122

After the initial installation on Check Point appliance, you notice that the Management interface and default gateway are incorrect. Which commands could you use to set the IP to 192.168.80.200/24 and default gateway to 192.168.80.1.

Options:

A.

set interface Mgmt ipv4-address 192.168.80.200 mask-length 24set static-route default nexthop gateway address 192.168.80.1 onsave config

B.

add interface Mgmt ipv4-address 192.168.80.200 255.255.255.0add static-route 0.0.0.0.0.0.0.0 gw 192.168.80.1 onsave config

C.

set interface Mgmt ipv4-address 192.168.80.200 255.255.255.0add static-route 0.0.0.0.0.0.0.0 gw 192.168.80.1 onsave config

D.

add interface Mgmt ipv4-address 192.168.80.200 mask-length 24add static-route default nexthop gateway address 192.168.80.1 onsave config

Buy Now
Questions 123

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?

Options:

A.

Detects and blocks malware by correlating multiple detection engines before users are affected.

B.

Configure rules to limit the available network bandwidth for specified users or groups.

C.

Use UserCheck to help users understand that certain websites are against the company’s security policy.

D.

Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.

Buy Now
Exam Code: 156-215.81
Exam Name: Check Point Certified Security Administrator R81.20 CCSA (156-215.81.20)
Last Update: Mar 12, 2025
Questions: 411

PDF + Testing Engine

$66  $164.99

Testing Engine

$50  $124.99
buy now 156-215.81 testing engine

PDF (Q&A)

$42  $104.99
buy now 156-215.81 pdf