Leads4pass > CheckPoint > Checkpoint Certifications > 156-215.80 > 156-215.80 Online Practice Questions and Answers

156-215.80 Online Practice Questions and Answers

Questions 4

What Identity Agent allows packet tagging and computer authentication?

A. Endpoint Security Client

B. Full Agent

C. Light Agent

D. System Agent

Buy Now
Questions 5

In the Check Point Security Management Architecture, which component(s) can store logs?

A. SmartConsole

B. Security Management Server and Security Gateway

C. Security Management Server

D. SmartConsole and Security Management Server

Buy Now
Questions 6

What is the most recommended installation method for Check Point appliances?

A. SmartUpdate installation

B. DVD media created with Check Point ISOMorphic

C. USB media created with Check Point ISOMorphic

D. Cloud based installation

Buy Now
Questions 7

Which of these attributes would be critical for a site-to-site VPN?

A. Scalability to accommodate user groups

B. Centralized management

C. Strong authentication

D. Strong data encryption

Buy Now
Questions 8

What are types of Check Point APIs available currently as part of R80.10 code?

A. Security Gateway API, Management API, Threat Prevention API and Identity Awareness Web Services API

B. Management API, Threat Prevention API, Identity Awareness Web Services API and OPSEC SDK API

C. OSE API, OPSEC SDK API, Threat Prevention API and Policy Editor API

D. CPMI API, Management API, Threat Prevention API and Identity Awareness Web Services API

Buy Now
Questions 9

Session unique identifiers are passed to the web api using which http header option?

A. X-chkp-sid

B. Accept-Charset

C. Proxy-Authorization

D. Application

Buy Now
Questions 10

Which Check Point feature enables application scanning and the detection?

A. Application Dictionary

B. AppWiki

C. Application Library

D. CPApp

Buy Now
Questions 11

On the following graphic, you will find layers of policies.

What is a precedence of traffic inspection for the defined polices?

A. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and then if implicit Drop Rule drops the packet, it comes next to IPS layer and then after accepting the packet it passes to Threat Prevention layer.

B. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and then if there is any rule which accepts the packet, it comes next to IPS layer and then after accepting the packet it passes to Threat Prevention layer

C. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and then if there is any rule which accepts the packet, it comes next to Threat Prevention layer and then after accepting the packet it passes to IPS layer.

D. A packet arrives at the gateway, it is checked against the rules in IPS policy layer and then it comes next to the Network policy layer and then after accepting the packet it passes to Threat Prevention layer.

Buy Now
Questions 12

AdminA and AdminB are both logged in on SmartConsole. What does it mean if AdminB sees a locked icon on a rule? Choose the BEST answer.

A. Rule is locked by AdminA, because the save bottom has not been press.

B. Rule is locked by AdminA, because an object on that rule is been edited.

C. Rule is locked by AdminA, and will make it available if session is published.

D. Rule is locked by AdminA, and if the session is saved, rule will be available

Buy Now
Questions 13

An administrator wishes to enable Identity Awareness on the Check Point firewalls. However they allow users to use company issued or personal laptops. Since the administrator cannot manage the personal laptops, which of the following methods would BEST suit this company?

A. AD Query

B. Browser-Based Authentication

C. Identity Agents

D. Terminal Servers Agent

Buy Now
Exam Code: 156-215.80
Exam Name: Check Point Certified Security Administrator (CCSA)
Last Update: Jan 16, 2025
Questions: 535
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99