Summer Sale Coupon - 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sbfdisc

Note! 156-215.80 has been withdrawn.

156-215.80 Practice Exam Questions with Answers Check Point Certified Security Administrator R80 Certification

Question # 6

What are the three tabs available in SmartView Tracker?

A.

Network & Endpoint, Management, and Active

B.

Network, Endpoint, and Active

C.

Predefined, All Records, Custom Queries

D.

Endpoint, Active, and Custom Queries

Full Access
Question # 7

Study the Rule base and Client Authentication Action properties screen.

156-215.80 question answer

156-215.80 question answer

After being authenticated by the Security Gateways, a user starts a HTTP connection to a Web site. What happens when the user tries to FTP to another site using the command line? The:

A.

user is prompted for authentication by the Security Gateways again.

B.

FTP data connection is dropped after the user is authenticated successfully.

C.

user is prompted to authenticate from that FTP site only, and does not need to enter his username and password for Client Authentication

D.

FTP connection is dropped by Rule 2.

Full Access
Question # 8

You want to define a selected administrator's permission to edit a layer. However, when you click the + sign in the “Select additional profile that will be able edit this layer” you do not see anything. What is the most likely cause of this problem? Select the BEST answer.

156-215.80 question answer

A.

“Edit layers by Software Blades” is unselected in the Permission Profile

B.

There are no permission profiles available and you need to create one first.

C.

All permission profiles are in use.

D.

“Edit layers by selected profiles in a layer editor” is unselected in the Permission profile.

Full Access
Question # 9

Which of the following is NOT an alert option?

A.

SNMP

B.

High alert

C.

Mail

D.

User defined alert

Full Access
Question # 10

The default method for destination NAT is _____________, where NAT occurs on the Inbound interface closest to the client.

A.

Destination side

B.

Source side

C.

Server side

D.

Client side

Full Access
Question # 11

Sally has a Hot Fix Accumulator (HFA) she wants to install on her Security Gateway which operates with GAiA, but she cannot SCP the HFA to the system. She can SSH into the Security Gateway, but she has never been able to SCP files to it. What would be the most likely reason she cannot do so?

A.

She needs to edit /etc/SSHd/SSHd_config and add the Standard Mode account.

B.

She needs to run sysconfig and restart the SSH process.

C.

She needs to edit /etc/scpusers and add the Standard Mode account.

D.

She needs to run cpconfig to enable the ability to SCP files.

Full Access
Question # 12

The most important part of a site-to-site VPN deployment is the ________ .

A.

Internet

B.

Remote users

C.

Encrypted VPN tunnel

D.

VPN gateways

Full Access
Question # 13

Office mode means that:

A.

SecureID client assigns a routable MAC address. After the user authenticates for a tunnel, the VPN gateway assigns a routable IP address to the remote client.

B.

Users authenticate with an Internet browser and use secure HTTPS connection.

C.

Local ISP (Internet service Provider) assigns a non-routable IP address to the remote user.

D.

Allows a security gateway to assign a remote client an IP address. After the user authenticates for a tunnel, the VPN gateway assigns a routable IP address to the remote client.

Full Access
Question # 14

Your manager requires you to setup a VPN to a new business partner site. The administrator from the partner site gives you his VPN settings and you notice that he setup AES 128 for IKE phase 1 and AES 256 for IKE phase 2. Why is this a problematic setup?

A.

The two algorithms do not have the same key length and so don't work together. You will get the error … No proposal chosen…

B.

All is fine as the longest key length has been chosen for encrypting the data and a shorter key length for higher performance for setting up the tunnel.

C.

Only 128 bit keys are used for phase 1 keys which are protecting phase 2, so the longer key length in phase 2 only costs performance and does not add security due to a shorter key in phase 1.

D.

All is fine and can be used as is.

Full Access
Question # 15

Which deployment adds a Security Gateway to an existing environment without changing IP routing?

A.

Distributed

B.

Bridge Mode

C.

Remote

D.

Standalone

Full Access
Question # 16

Fill in the blank: Service blades must be attached to a ______________.

A.

Security Gateway

B.

Management container

C.

Management server

D.

Security Gateway container

Full Access
Question # 17

What is the purpose of a Stealth Rule?

A.

A rule used to hide a server's IP address from the outside world.

B.

A rule that allows administrators to access SmartDashboard from any device.

C.

To drop any traffic destined for the firewall that is not otherwise explicitly allowed.

D.

A rule at the end of your policy to drop any traffic that is not explicitly allowed.

Full Access
Question # 18

How do you manage Gaia?

A.

Through CLI and WebUI

B.

Through CLI only

C.

Through SmartDashboard only

D.

Through CLI, WebUI, and SmartDashboard

Full Access
Question # 19

When logging in for the first time to a Security management Server through SmartConsole, a fingerprint is saved to the:

A.

Security Management Server’s /home/.fgpt file and is available for future SmartConsole authentications.

B.

Windows registry is available for future Security Management Server authentications.

C.

There is no memory used for saving a fingerprint anyway.

D.

SmartConsole cache is available for future Security Management Server authentications.

Full Access
Question # 20

When configuring Spoof Tracking, which tracking actions can an administrator select to be done when spoofed packets are detected?

A.

Log, send snmp trap, email

B.

Drop packet, alert, none

C.

Log, alert, none

D.

Log, allow packets, email

Full Access
Question # 21

Can multiple administrators connect to a Security Management Server at the same time?

A.

No, only one can be connected

B.

Yes, all administrators can modify a network object at the same time

C.

Yes, every administrator has their own username, and works in a session that is independent of other administrators

D.

Yes, but only one has the right to write

Full Access
Question # 22

To view the policy installation history for each gateway, which tool would an administrator use?

A.

Revisions

B.

Gateway installations

C.

Installation history

D.

Gateway history

Full Access
Question # 23

Which of the following Windows Security Events will NOT map a username to an IP address in Identity Awareness?

A.

Kerberos Ticket Renewed

B.

Kerberos Ticket Requested

C.

Account Logon

D.

Kerberos Ticket Timed Out

Full Access
Question # 24

Which of the following is used to enforce changes made to a Rule Base?

A.

Publish database

B.

Save changes

C.

Install policy

D.

Activate policy

Full Access
Question # 25

When using Monitored circuit VRRP, what is a priority delta?

A.

When an interface fails the priority changes to the priority delta

B.

When an interface fails the delta claims the priority

C.

When an interface fails the priority delta is subtracted from the priority

D.

When an interface fails the priority delta decides if the other interfaces takes over

Full Access
Question # 26

After the initial installation on Check Point appliance, you notice that the Management interface and default gateway are incorrect. Which commands could you use to set the IP to 192.168.80.200/24 and default gateway to 192.168.80.1.

A.

set interface Mgmt ipv4-address 192.168.80.200 mask-length 24set static-route default nexthop gateway address 192.168.80.1 onsave config

B.

add interface Mgmt ipv4-address 192.168.80.200 255.255.255.0add static-route 0.0.0.0.0.0.0.0 gw 192.168.80.1 onsave config

C.

set interface Mgmt ipv4-address 192.168.80.200 255.255.255.0add static-route 0.0.0.0.0.0.0.0 gw 192.168.80.1 onsave config

D.

add interface Mgmt ipv4-address 192.168.80.200 mask-length 24add static-route default nexthop gateway address 192.168.80.1 onsave config

Full Access
Question # 27

What object type would you use to grant network access to an LDAP user group?

A.

Access Role

B.

User Group

C.

SmartDirectory Group

D.

Group Template

Full Access
Question # 28

Where is the “Hit Count” feature enabled or disabled in SmartConsole?

A.

On the Policy Package

B.

On each Security Gateway

C.

On the Policy layer

D.

In Global Properties for the Security Management Server

Full Access
Question # 29

Identify the ports to which the Client Authentication daemon listens on by default?

A.

259, 900

B.

256, 257

C.

8080, 529

D.

80, 256

Full Access
Question # 30

Which tool is used to enable ClusterXL?

A.

SmartUpdate

B.

cpconfig

C.

SmartConsole

D.

sysconfig

Full Access
Question # 31

True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway

A.

True, CLI is the prefer method for Licensing

B.

False, Central License are handled via Security Management Server

C.

False, Central License are installed via Gaia on Security Gateways

D.

True, Central License can be installed with CPLIC command on a Security Gateway

Full Access
Question # 32

What is the appropriate default Gaia Portal address?

A.

HTTP://[IPADDRESS]

B.

HTTPS://[IPADDRESS]:8080

C.

HTTPS://[IPADDRESS]:4434

D.

HTTPS://[IPADDRESS]

Full Access
Question # 33

There are 4 ways to use the Management API for creating host object with R80 Management API. Which one is NOT correct?

A.

Using Web Services

B.

Using Mgmt_cli tool

C.

Using CLISH

D.

Using SmartConsole GUI console

Full Access
Question # 34

Which Threat Prevention Software Blade provides protection from malicious software that can infect your network computers?

A.

Anti-Malware

B.

IPS

C.

Anti-bot

D.

Anti-Spam

Full Access
Question # 35

Which command shows the installed licenses?

A.

cplic print

B.

print cplic

C.

fwlic print

D.

show licenses

Full Access
Question # 36

Which of the following is NOT an attribute of packet acceleration?

A.

Source address

B.

Protocol

C.

Destination port

D.

Application Awareness

Full Access
Question # 37

What is Consolidation Policy?

A.

The collective name of the Security Policy, Address Translation, and IPS Policies.

B.

The specific Policy written in SmartDashboard to configure which log data is stored in the SmartReporter database.

C.

The collective name of the logs generated by SmartReporter.

D.

A global Policy used to share a common enforcement policy for multiple Security Gateways.

Full Access
Question # 38

The Firewall kernel is replicated multiple times, therefore:

A.

The Firewall kernel only touches the packet if the connection is accelerated

B.

The Firewall can run different policies per core

C.

The Firewall kernel is replicated only with new connections and deletes itself once the connection times out

D.

The Firewall can run the same policy on all cores

Full Access
Question # 39

Vanessa is expecting a very important Security Report. The Document should be sent as an attachment via e-mail. An e-mail with Security_report.pdf file was delivered to her e-mail inbox. When she opened the PDF file, she noticed that the file is basically empty and only few lines of text are in it. The report is missing some graphs, tables and links. Which component of SandBlast protection is her company using on a Gateway?

A.

SandBlast Threat Emulation

B.

SandBlast Agent

C.

Check Point Protect

D.

SandBlast Threat Extraction

Full Access
Question # 40

Which of the following are available SmartConsole clients which can be installed from the R77 Windows CD? Read all answers and select the most complete and valid list.

A.

SmartView Tracker, SmartDashboard, CPINFO, SmartUpdate, SmartView Status

B.

SmartView Tracker, SmartDashboard, SmartLSM, SmartView Monitor

C.

SmartView Tracker, CPINFO, SmartUpdate

D.

Security Policy Editor, Log Viewer, Real Time Monitor GUI

Full Access
Question # 41

Which of the following authentication methods can be configured in the Identity Awareness setup wizard?

A.

Check Point Password

B.

TACACS

C.

LDAP

D.

Windows password

Full Access
Question # 42

Which remote Access Solution is clientless?

A.

Checkpoint Mobile

B.

Endpoint Security Suite

C.

SecuRemote

D.

Mobile Access Portal

Full Access
Question # 43

Which of the following is NOT an option for internal network definition of Anti-spoofing?

A.

Specific – derived from a selected object

B.

Route-based – derived from gateway routing table

C.

Network defined by the interface IP and Net Mask

D.

Not-defined

Full Access
Question # 44

Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use her iPad to access the internal Finance Web server. Because the iPad is not a member of the Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter her AD credentials in the Captive Portal and then get the same access as on her office computer. Her access to resources is based on rules in the R77 Firewall Rule Base.

To make this scenario work, the IT administrator must:

1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity Sources.

2) In the Portal Settings window in the User Access section, make sure that Name and password login is selected.

3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network destinations. Select accept as the Action.

4) Install policy.

Ms McHanry tries to access the resource but is unable. What should she do?

A.

Have the security administrator select the Action field of the Firewall Rule “Redirect HTTP connections to an authentication (captive) portal”.

B.

Have the security administrator reboot the firewall.

C.

Have the security administrator select Any for the Machines tab in the appropriate Access Role.

D.

Install the Identity Awareness agent on her iPad.

Full Access
Question # 45

As a Security Administrator, you must refresh the Client Authentication authorized time-out every time a new user connection is authorized. How do you do this? Enable the Refreshable Timeout setting:

A.

in the user object's Authentication screen.

B.

in the Gateway object's Authentication screen.

C.

in the Limit tab of the Client Authentication Action Properties screen.

D.

in the Global Properties Authentication screen.

Full Access
Question # 46

Which is the correct order of a log flow processed by SmartEvent components:

A.

Firewall > Correlation Unit > Log Server > SmartEvent Server Database > SmartEvent Client

B.

Firewall > SmartEvent Server Database > Correlation Unit > Log Server > SmartEvent Client

C.

Firewall > Log Server > SmartEvent Server Database > Correlation Unit > SmartEvent Client

D.

Firewall > Log Server > Correlation Unit > SmartEvent Server Database > SmartEvent Client

Full Access
Question # 47

A client has created a new Gateway object that will be managed at a remote location. When the client attempts to install the Security Policy to the new Gateway object, the object does not appear in the Install On check box. What should you look for?

A.

Secure Internal Communications (SIC) not configured for the object.

B.

A Gateway object created using the Check Point > Externally Managed VPN Gateway option from the Network Objects dialog box.

C.

Anti-spoofing not configured on the interfaces on the Gateway object.

D.

A Gateway object created using the Check Point > Secure Gateway option in the network objects, dialog box, but still needs to configure the interfaces for the Security Gateway object.

Full Access
Question # 48

Packet acceleration (SecureXL) identifies connections by several attributes. Which of the attributes is NOT used for identifying connection?

A.

Source Address

B.

Destination Address

C.

TCP Acknowledgment Number

D.

Source Port

Full Access
Question # 49

An internal router is sending UDP keep-alive packets that are being encapsulated with GRE and sent through your R77 Security Gateway to a partner site. A rule for GRE traffic is configured for ACCEPT/LOG. Although the keep-alive packets are being sent every minute, a search through the SmartView Tracker logs for GRE traffic only shows one entry for the whole day (early in the morning after a Policy install).

Your partner site indicates they are successfully receiving the GRE encapsulated keep-alive packets on the 1-minute interval.

If GRE encapsulation is turned off on the router, SmartView Tracker shows a log entry for the UDP keep-alive packet every minute.

Which of the following is the BEST explanation for this behavior?

A.

The setting Log does not capture this level of detail for GRE. Set the rule tracking action to Audit since certain types of traffic can only be tracked this way.

B.

The log unification process is using a LUUID (Log Unification Unique Identification) that has become corrupt. Because it is encrypted, the R77 Security Gateway cannot distinguish between GRE sessions. This is a known issue with GRE. Use IPSEC instead of the non-standard GRE protocol for encapsulation.

C.

The Log Server log unification process unifies all log entries from the Security Gateway on a specific connection into only one log entry in the SmartView Tracker. GRE traffic has a 10 minute session timeout, thus each keep-alive packet is considered part of the original logged connection at the beginning of the day.

D.

The Log Server is failing to log GRE traffic properly because it is VPN traffic. Disable all VPN configuration to the partner site to enable proper logging.

Full Access
Question # 50

What is the command to see cluster status in cli expert mode?

A.

fw ctl stat

B.

clusterXL stat

C.

clusterXL status

D.

cphaprob stat

Full Access
Question # 51

What is the purpose of Priority Delta in VRRP?

A.

When a box is up, Effective Priority = Priority + Priority Delta

B.

When an Interface is up, Effective Priority = Priority + Priority Delta

C.

When an Interface fails, Effective Priority = Priority - Priority Delta

D.

When a box fails, Effective Priority = Priority - Priority Delta

Full Access
Question # 52

You have enabled “Full Log” as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?

A.

Logging has disk space issues. Change logging storage options on the logging server or Security Management Server properties and install database.

B.

Data Awareness is not enabled.

C.

Identity Awareness is not enabled.

D.

Logs are arriving from Pre-R80 gateways.

Full Access
Question # 53

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned a static IP address 10.0.0.19.

John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his desktop with a static IP (10.0.0.19). He wants to move around the organization and continue to have access to the HR Web Server.

To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the policy.

2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.

3) Changes from static IP address to DHCP for the client PC.

What should John request when he cannot access the web server from his laptop?

A.

John should lock and unlock his computer

B.

Investigate this as a network connectivity issue

C.

The access should be changed to authenticate the user instead of the PC

D.

John should install the Identity Awareness Agent

Full Access
Question # 54

What are the two high availability modes?

A.

Load Sharing and Legacy

B.

Traditional and New

C.

Active and Standby

D.

New and Legacy

Full Access
Question # 55

Web Control Layer has been set up using the settings in the following dialogue:

156-215.80 question answer

Consider the following policy and select the BEST answer.

156-215.80 question answer

A.

Traffic that does not match any rule in the subpolicy is dropped.

B.

All employees can access only Youtube and Vimeo.

C.

Access to Youtube and Vimeo is allowed only once a day.

D.

Anyone from internal network can access the internet, expect the traffic defined in drop rules 5.2, 5.5 and 5.6.

Full Access
Question # 56

Which command is used to add users to or from existing roles?

A.

Add rba user roles

B.

Add rba user

C.

Add user roles

D.

Add user

Full Access
Question # 57

Fill in the blank: Each cluster has __________ interfaces.

A.

Five

B.

Two

C.

Three

D.

Four

Full Access
Question # 58

Joey wants to configure NTP on R80 Security Management Server. He decided to do this via WebUI. What is the correct address to access the Web UI for Gaia platform via browser?

A.

https://

B.

https:// :443

C.

https:// :10000

D.

https:// :4434

Full Access
Question # 59

Which utility shows the security gateway general system information statistics like operating system information and resource usage, and individual software blade statistics of VPN, Identity Awareness and DLP?

A.

cpconfig

B.

fw ctl pstat

C.

cpview

D.

fw ctl multik stat

Full Access
Question # 60

Which utility allows you to configure the DHCP service on GAIA from the command line?

A.

ifconfig

B.

dhcp_cfg

C.

sysconfig

D.

cpconfig

Full Access
Question # 61

When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?

A.

None, Security Management Server would be installed by itself.

B.

SmartConsole

C.

SecureClient

D.

Security Gateway

Full Access
Question # 62

Fill in the blanks: The _________ collects logs and sends them to the _________ .

A.

Log server; security management server

B.

Log server; Security Gateway

C.

Security management server; Security Gateway

D.

Security Gateways; log server

Full Access
Question # 63

Which of the following ClusterXL modes uses a non-unicast MAC address for the cluster IP address?

A.

High Availability

B.

Load Sharing Multicast

C.

Load Sharing Pivot

D.

Master/Backup

Full Access
Question # 64

DLP and Geo Policy are examples of what type of Policy?

A.

Standard Policies

B.

Shared Policies

C.

Inspection Policies

D.

Unified Policies

Full Access
Question # 65

Choose what BEST describes the Policy Layer Traffic Inspection.

A.

If a packet does not match any of the inline layers, the matching continues to the next Layer.

B.

If a packet matches an inline layer, it will continue matching the next layer.

C.

If a packet does not match any of the inline layers, the packet will be matched against the Implicit Clean-up Rule.

D.

If a packet does not match a Network Policy Layer, the matching continues to its inline layer.

Full Access
Question # 66

In which deployment is the security management server and Security Gateway installed on the same appliance?

A.

Bridge Mode

B.

Remote

C.

Standalone

D.

Distributed

Full Access
Question # 67

What is the default shell for the command line interface?

A.

Expert

B.

Clish

C.

Admin

D.

Normal

Full Access
Question # 68

When a packet arrives at the gateway, the gateway checks it against the rules in the top Policy Layer, sequentially from top to bottom, and enforces the first rule that matches a packet. Which of the following statements about the order of rule enforcement is true?

A.

If the Action is Accept, the gateway allows the packet to pass through the gateway.

B.

If the Action is Drop, the gateway continues to check rules in the next Policy Layer down.

C.

If the Action is Accept, the gateway continues to check rules in the next Policy Layer down.

D.

If the Action is Drop, the gateway applies the Implicit Clean-up Rule for that Policy Layer.

Full Access
Question # 69

Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?

A.

UserCheck

B.

Active Directory Query

C.

Account Unit Query

D.

User Directory Query

Full Access
Question # 70

Which default user has full read/write access?

A.

Monitor

B.

Altuser

C.

Administrator

D.

Superuser

Full Access
Question # 71

What will be the effect of running the following command on the Security Management Server?

156-215.80 question answer

A.

Remove the installed Security Policy.

B.

Remove the local ACL lists.

C.

No effect.

D.

Reset SIC on all gateways.

Full Access
Question # 72

Fill in the blank: The IPS policy for pre-R80 gateways is installed during the _______ .

A.

Firewall policy install

B.

Threat Prevention policy install

C.

Anti-bot policy install

D.

Access Control policy install

Full Access
Question # 73

Joey is using the computer with IP address 192.168.20.13. He wants to access web page “www.CheckPoint.com”, which is hosted on Web server with IP address 203.0.113.111. How many rules on Check Point Firewall are required for this connection?

A.

Two rules – first one for the HTTP traffic and second one for DNS traffic.

B.

Only one rule, because Check Point firewall is a Packet Filtering firewall

C.

Two rules – one for outgoing request and second one for incoming replay.

D.

Only one rule, because Check Point firewall is using Stateful Inspection technology.

Full Access
Question # 74

The fw monitor utility is used to troubleshoot which of the following problems?

A.

Phase two key negotiation

B.

Address translation

C.

Log Consolidation Engine

D.

User data base corruption

Full Access
Question # 75

Which Check Point software blade provides protection from zero-day and undiscovered threats?

A.

Firewall

B.

Threat Emulation

C.

Application Control

D.

Threat Extraction

Full Access
Question # 76

What is the default shell of Gaia CLI?

A.

Monitor

B.

CLI.sh

C.

Read-only

D.

Bash

Full Access