Act now and download your Check-Point 156-215.80 test today! Do not waste time for the worthless Check-Point 156-215.80 tutorials. Download Rebirth Check-Point Check Point Certified Security Administrator exam with real questions and answers and begin to learn Check-Point 156-215.80 with a classic professional.
Online 156-215.80 free questions and answers of New Version:
NEW QUESTION 1
You are going to upgrade from R77 to R80. Before the upgrade, you want to back up the system so that, if there are any problems, you can easily restore to the old version with all configuration and management files intact. What is the BEST backup method in this scenario?
Answer: C
Explanation:
2. Snapshot Management
The snapshot creates a binary image of the entire root (lv_current) disk partition. This includes Check Point products, configuration, and operating system.
Starting in R77.10, exporting an image from one machine and importing that image on another machine of the same type is supported.
The log partition is not included in the snapshot. Therefore, any locally stored FireWall logs will not be save
NEW QUESTION 2
You have successfully backed up your Check Point configurations without the OS information. What command would you use to restore this backup?
Answer: A
NEW QUESTION 3
Which of the following is NOT a back up method?
Answer: A
Explanation:
The built-in Gaia backup procedures:
Snapshot Management
System Backup (and System Restore)
Save/Show Configuration (and Load Configuration)
Check Point provides three different procedures for backing up (and restoring) the operating system and networking parameters on your appliances.
Snapshot (Revert)
Backup (Restore)
upgrade_export (Migrate) References:
NEW QUESTION 4
What must a Security Administrator do to comply with a management requirement to log all traffic accepted through the perimeter Security Gateway?
Answer: A
NEW QUESTION 5
Two administrators Dave and Jon both manage R80 Management as administrators for ABC Corp. Jon logged into the R80 Management and then shortly after Dave logged in to the same server. They are both in the Security Policies view. From the screenshots below, why does Dave not have the rule no.6 in his SmartConsole view even though Jon has it his in his SmartConsole view?
Answer: D
Explanation:
When an administrator logs in to the Security Management Server through SmartConsole, a new editing session starts. The changes that the administrator makes during the session are only available to that administrator. Other administrators see a lock icon on object and rules that are being edited. To make changes available to all administrators, and to unlock the objects and rules that are being edited, the administrator must publish the session.
NEW QUESTION 6
The security Gateway is installed on GAiA R80 The default port for the WEB User Interface is ____.
Answer: D
NEW QUESTION 7
You work as a security administrator for a large company. CSO of your company has attended a security conference where he has learnt how hackers constantly modify their strategies and techniques to evade detection and reach corporate resources. He wants to make sure that his company has the right protections in place. Check Point has been selected for the security vendor. Which Check Point products protects BEST against malware and zero-day attacks while ensuring quick delivery of safe content to your users?
Answer: D
Explanation:
SandBlast Zero-Day Protection
Hackers constantly modify their strategies and techniques to evade detection and reach corporate resources. Zero-day exploit protection from Check Point provides a deeper level of inspection so you can prevent more malware and zero-day attacks, while ensuring quick delivery of safe content to your users.
NEW QUESTION 8
How do you configure an alert in SmartView Monitor?
Answer: B
NEW QUESTION 9
Which of the following is NOT a valid option when configuring access for Captive Portal?
Answer: A
NEW QUESTION 10
Where can administrator edit a list of trusted SmartConsole clients in R80?
Answer: C
NEW QUESTION 11
Which method below is NOT one of the ways to communicate using the Management API’s?
Answer: D
NEW QUESTION 12
Which of the following is NOT an advantage to using multiple LDAP servers?
Answer: B
NEW QUESTION 13
NAT can NOT be configured on which of the following objects?
Answer: A
NEW QUESTION 14
Which path below is available only when CoreXL is enabled?
Answer: C
NEW QUESTION 15
Ken wants to obtain a configuration lock from other administrator on R80 Security Management Server. He can do this via WebUI or a via CLI. Which command should be use in CLI? Choose the correct answer.
Answer: D
Explanation:
Use the database feature to obtain the configuration lock. The database feature has two commands:
lock database [override].
unlock database
The commands do the same thing: obtain the configuration lock from another administrator.
NEW QUESTION 16
Traffic from source 192.168.1.1 is going to www.google.com. The Application Control Blade on the gateway is inspecting the traffic. Assuming acceleration is enable which path is handling the traffic?
Answer: A
NEW QUESTION 17
What is the purpose of Captive Portal?
Answer: C
Explanation:
Captive Portal – a simple method that authenticates users through a web interface before granting them access to Intranet resources. When users try to access a protected resource, they get a web page that
must be filled out to continue.
Reference : https://www.checkpoint.com/products/identity-awareness-software-blade/
NEW QUESTION 18
You have just installed your Gateway and want to analyze the packet size distribution of your traffic with SmartView Monitor.
Unfortunately, you get the message:
“There are no machines that contain Firewall Blade and SmartView Monitor”.
What should you do to analyze the packet size distribution of your traffic? Give the BEST answer.
Answer: D
NEW QUESTION 19
Which of the following uses the same key to decrypt as it does to encrypt?
Answer: D
NEW QUESTION 20
You have configured SNX on the Security Gateway. The client connects to the Security Gateway and the user enters the authentication credentials. What must happen after authentication that allows the client to connect to the Security Gateway's VPN domain?
Answer: A
NEW QUESTION 21
Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?
Answer: D
NEW QUESTION 22
What is the benefit of Manual NAT over Automatic NAT?
Answer: C
NEW QUESTION 23
What is the purpose of the Clean-up Rule?
Answer: A
NEW QUESTION 24
......
P.S. 2passeasy now are offering 100% pass ensure 156-215.80 dumps! All 156-215.80 exam questions have been updated with correct answers: https://www.2passeasy.com/dumps/156-215.80/ (485 New Questions)