Download Check Point Certified Security Administrator.156-215.80.CertKiller.2019-01-21.230q.vcex

Vendor: Checkpoint
Exam Code: 156-215.80
Exam Name: Check Point Certified Security Administrator
Date: Jan 21, 2019
File Size: 7 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ________ .
  1. User Directory
  2. Captive Portal and Transparent Kerberos Authentication
  3. Captive Portal
  4. UserCheck
Correct answer: B
Explanation:
To enable Identity Awareness: 1. Log in to SmartDashboard. 2. From the Network Objects tree, expand the Check Point branch. 3. Double-click the Security Gateway on which to enable Identity Awareness. 4. In the Software Blades section, select Identity Awareness on the Network Security tab. The Identity Awareness Configuration wizard opens. 5. Select one or more options. These options set the methods for acquiring identities of managed and unmanaged assets. AD Query - Lets the Security Gateway seamlessly identify Active Directory users and computers. Browser-Based Authentication - Sends users to a Web page to acquire identities from unidentified users. If Transparent Kerberos Authentication is configured, AD users may be identified transparently. Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_IdentityAwareness_AdminGuide/62050.htm
To enable Identity Awareness: 
1. Log in to SmartDashboard. 
2. From the Network Objects tree, expand the Check Point branch. 
3. Double-click the Security Gateway on which to enable Identity Awareness. 
4. In the Software Blades section, select Identity Awareness on the Network Security tab. 
The Identity Awareness Configuration wizard opens. 
5. Select one or more options. These options set the methods for acquiring identities of managed and unmanaged assets. 
  • AD Query - Lets the Security Gateway seamlessly identify Active Directory users and computers. 
  • Browser-Based Authentication - Sends users to a Web page to acquire identities from unidentified users. If Transparent Kerberos Authentication is configured, AD users may be identified transparently. 
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_IdentityAwareness_AdminGuide/62050.htm
Question 2
Which default user has full read/write access?
  1. Monitor
  2. Altuser
  3. Administrator
  4. Superuser
Correct answer: C
Question 3
Fill in the blank: The _________ collects logs and sends them to the _________ .
  1. Log server; security management server
  2. Log server; Security Gateway
  3. Security management server; Security Gateway
  4. Security Gateways; log server
Correct answer: D
Question 4
The security Gateway is installed on GAiA R80 The default port for the WEB User Interface is _______ .
  1. TCP 18211
  2. TCP 257
  3. TCP 4433
  4. TCP 443
Correct answer: D
Question 5
Fill in the blank: To build an effective Security Policy, use a ________ and _______ rule.
  1. Cleanup; stealth
  2. Stealth; implicit
  3. Cleanup; default
  4. Implicit; explicit
Correct answer: A
Question 6
Which type of Check Point license is tied to the IP address of a specific Security Gateway and cannot be transferred to a gateway that has a different IP address?
  1. Central
  2. Corporate
  3. Formal
  4. Local
Correct answer: D
Question 7
Which utility shows the security gateway general system information statistics like operating system information and resource usage, and individual software blade statistics of VPN, Identity Awareness and DLP?
  1. cpconfig
  2. fw ctl pstat
  3. cpview
  4. fw ctl multik stat
Correct answer: C
Explanation:
CPView Utility is a text based built-in utility that can be run ('cpview' command) on Security Gateway / Security Management Server / Multi-Domain Security Management Server. CPView Utility shows statistical data that contain both general system information (CPU, Memory, Disk space) and information for different Software Blades (only on Security Gateway). The data is continuously updated in easy to access views. Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk101878
CPView Utility is a text based built-in utility that can be run ('cpview' command) on Security Gateway / Security Management Server / Multi-Domain Security Management Server. CPView Utility shows statistical data that contain both general system information (CPU, Memory, Disk space) and information for different Software Blades (only on Security Gateway). The data is continuously updated in easy to access views. 
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk101878
Question 8
The following graphic shows:
  
  1. View from SmartLog for logs initiated from source address 10.1.1.202
  2. View from SmartView Tracker for logs of destination address 10.1.1.202
  3. View from SmartView Tracker for logs initiated from source address 10.1.1.202
  4. View from SmartView Monitor for logs initiated from source address 10.1.1.202
Correct answer: C
Question 9
In R80, Unified Policy is a combination of
  1. Access control policy, QoS Policy, Desktop Security Policy and endpoint policy.
  2. Access control policy, QoS Policy, Desktop Security Policy and Threat Prevention Policy.
  3. Firewall policy, address Translation and application and URL filtering, QoS Policy, Desktop Security Policy and Threat Prevention Policy.
  4. Access control policy, QoS Policy, Desktop Security Policy and VPN policy.
Correct answer: D
Explanation:
D is the best answer given the choices. Unified Policy In R80 the Access Control policy unifies the policies of these pre-R80 Software Blades:Firewall and VPN Application Control and URL Filtering Identity Awareness Data Awareness Mobile Access Security Zones Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/P_R80_SecMGMT/126197&anchor=o129934
D is the best answer given the choices. 
Unified Policy 
In R80 the Access Control policy unifies the policies of these pre-R80 Software Blades:
  • Firewall and VPN 
  • Application Control and URL Filtering 
  • Identity Awareness 
  • Data Awareness 
  • Mobile Access 
  • Security Zones 
Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/P_R80_SecMGMT/126197&anchor=o129934
Question 10
The command __________ provides the most complete restoration of a R80 configuration.
  1. upgrade_import
  2. cpconfig
  3. fwm dbimport -p <export file>
  4. cpinfo -recover
Correct answer: A
Explanation:
(Should be "migrate import") "migrate import" Restores backed up configuration for R80 version, in previous versions the command was " upgrade_import ". Reference: http://dl3.checkpoint.com/paid/08/08586e2852acc054809517b267402a35/CP_R80_Gaia_InstallationAndUpgradeGuide.pdf?HashKey=1479700086_4553ede4b53a7882cd8052eed7c347be&xtn=.pdf
(Should be "migrate import") 
"migrate import" Restores backed up configuration for R80 version, in previous versions the command was " upgrade_import ". 
Reference: http://dl3.checkpoint.com/paid/08/08586e2852acc054809517b267402a35/CP_R80_Gaia_InstallationAndUpgradeGuide.pdf?HashKey=1479700086_4553ede4b53a7882cd8052eed7c347be&xtn=.pdf
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!