Tens of thousands of competitors, pages of hard questions and unsatisfied exam preparation situations… Do not worried about all those annoying things! We, help you with your CCSA R80 156-215.80 Check Point Certified Security Administrator exam. We will assist you clear the 156-215.80 exam with CCSA R80 156-215.80 vce. We 156-215.80 actual tests are the most comprehensive ones.

Visit our site to get more 156-215.80 Q and As:https://www.dumps4sure.com/156-215-80.html (535 QAs Dumps)
Question 1:

Under which file is the proxy arp configuration stored?

A. $FWDIR/state/proxy_arp.conf on the management server

B. $FWDIR/conf/local.arp on the management server

C. $FWDIR/state/_tmp/proxy.arp on the security gateway

D. $FWDIR/conf/local.arp on the gateway

Correct Answer: D

Reference: https://sc1.checkpoint.com/documents/R76SP.10/CP_R76SP.10_Security_System_AdministrationGuide/105233.htm

Question 2:

SmartEvent does NOT use which of the following procedures to identity events:

A. Matching a log against each event definition

B. Create an event candidate

C. Matching a log against local exclusions

D. Matching a log against global exclusions

Correct Answer: C

Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_SmartEvent_AdminGuide/17401.htm

Question 3:

John is using Management HA. Which Smartcenter should be connected to for making changes?

A. secondary Smartcenter

B. active Smartcenter

C. connect virtual IP of Smartcenter HA

D. primary Smartcenter

Correct Answer: B

Question 4:

Which path below is available only when CoreXL is enabled?

A. Slow path

B. Firewall path

C. Medium path

D. Accelerated path

Correct Answer: C

Question 5:

Which of the following describes how Threat Extraction functions?

A. Detect threats and provides a detailed report of discovered threats

B. Proactively detects threats

C. Delivers file with original content

D. Delivers PDF versions of original files with active content removed

Correct Answer: B

Question 6:

The SmartEvent R80 Web application for real-time event monitoring is called:

A. SmartView Monitor

B. SmartEventWeb

C. There is no Web application for SmartEvent

D. SmartView

Correct Answer: B

Question 7:

When using Monitored circuit VRRP, what is a priority delta?

A. When an interface fails the priority changes to the priority delta

B. When an interface fails the delta claims the priority

C. When an interface fails the priority delta is subtracted from the priority

D. When an interface fails the priority delta decides if the other interfaces takes over

Correct Answer: C

Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_Gaia_WebAdmin/87911.htm

Question 8:

When an encrypted packet is decrypted, where does this happen?

A. Security policy

B. Inbound chain

C. Outbound chain

D. Decryption is not supported

Correct Answer: A

Question 9:

Which of the following is NOT a component of Check Point Capsule?

A. Capsule Docs

B. Capsule Cloud

C. Capsule Enterprise

D. Capsule Workspace

Correct Answer: C

Reference: https://www.checkpoint.com/download/products/sg-capsule-solution.pdf

Question 10:

Can multiple administrators connect to a Security Management Server at the same time?

A. No, only one can be connected

B. Yes, all administrators can modify a network object at the same time

C. Yes, every administrator has their own username, and works in a session that is independent of other administrators

D. Yes, but only one has the right to write

Correct Answer: C

Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/CP_R80_SecMGMT/124265

Question 11:

In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?

A. Accounting

B. Suppression

C. Accounting/Suppression

D. Accounting/Extended

Correct Answer: C

Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_LoggingAndMonitoring/html_frameset.htm?topic=documents/R80/CP_R80_LoggingAndMonitoring/131914

Question 12:

Which two of these Check Point Protocols are used by _____ ?

A. ELA and CPD

B. FWD and LEA



Correct Answer: B

Question 13:

Which of the following commands is used to monitor cluster members?

A. cphaprob state

B. cphaprob status

C. cphaprob

D. cluster state

Correct Answer: A

Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7298.htm

Question 14:

Fill in the blank: An LDAP server holds one or more ______________.

A. Server Units

B. Administrator Units

C. Account Units

D. Account Servers

Correct Answer: C

Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_SecurityManagement_WebAdminGuide/html_frameset.htm?topic=documents/R77/CP_R77_SecurityManagement_WebAdminGuide/94041

Question 15:

Which of the following is NOT a tracking option? (Select three)

A. Partial log

B. Log

C. Network log

D. Full log

Correct Answer: ACD

Reference: https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_LoggingAndMonitoring_AdminGuide/html_frameset.htm?topic=documents/R80.10/WebAdminGuides/EN/ CP_R80.10_LoggingAndMonitoring_AdminGuide/131914

Visit our site to get more 156-215.80 Q and As:https://www.dumps4sure.com/156-215-80.html (535 QAs Dumps)

Recommended Posts