Pass4itsure > CheckPoint > CCSA R80 > 156-215.80 > 156-215.80 Online Practice Questions and Answers

156-215.80 Online Practice Questions and Answers

Questions 4

When an encrypted packet is decrypted, where does this happen?

A. Security policy

B. Inbound chain

C. Outbound chain

D. Decryption is not supported

Buy Now
Questions 5

Which of the following is NOT a tracking option? (Select three)

A. Partial log

B. Log

C. Network log

D. Full log

Buy Now
Questions 6

To view statistics on detected threats, which Threat Tool would an administrator use?

A. Protections

B. IPS Protections

C. Profiles

D. ThreatWiki

Buy Now
Questions 7

Which Check Point software blade provides Application Security and identity control?

A. Identity Awareness

B. Data Loss Prevention

C. URL Filtering

D. Application Control

Buy Now
Questions 8

Which of the following is NOT supported by Bridge Mode Check Point Security Gateway

A. Antivirus

B. Data Loss Prevention

C. NAT

D. Application Control

Buy Now
Questions 9

Fill in the blank: It is Best Practice to have a _____ rule at the end of each policy layer.

A. Explicit Drop

B. Implied Drop

C. Explicit CleanUp

D. Implicit Drop

Buy Now
Questions 10

When launching SmartDashboard, what information is required to log into R77?

A. User Name, Management Server IP, certificate fingerprint file

B. User Name, Password, Management Server IP

C. Password, Management Server IP

D. Password, Management Server IP, LDAP Server IP

Buy Now
Questions 11

In R80 spoofing is defined as a method of:

A. Disguising an illegal IP address behind an authorized IP address through Port Address Translation.

B. Hiding your firewall from unauthorized users.

C. Detecting people using false or wrong authentication logins

D. Making packets appear as if they come from an authorized IP address.

Buy Now
Questions 12

What is the default time length that Hit Count Data is kept?

A. 3 month

B. 4 weeks

C. 12 months

D. 6 months

Buy Now
Questions 13

Fill in the blank: The R80 utility fw monitor is used to troubleshoot _____________

A. User data base corruption

B. LDAP conflicts

C. Traffic issues

D. Phase two key negotiation

Buy Now
Exam Code: 156-215.80
Exam Name: Check Point Certified Security Administrator
Last Update: Dec 19, 2024
Questions: 535
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99