Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following 156-215.80 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-215.80 Exam Dumps - Check Point Certified Security Administrator R80

Go to page:
Question # 9

Which set of objects have an Authentication tab?

A.

Templates, Users

B.

Users, Networks

C.

Users, User Group

D.

Networks, Hosts

Full Access
Question # 10

Which the following type of authentication on Mobile Access can NOT be used as the first authentication method?

A.

Dynamic ID

B.

RADIUS

C.

Username and Password

D.

Certificate

Full Access
Question # 11

You find that Users are not prompted for authentication when they access their Web servers, even though you have created an HTTP rule via User Authentication. Choose the BEST reason why.

A.

You checked the cache password on desktop option in Global Properties.

B.

Another rule that accepts HTTP without authentication exists in the Rule Base.

C.

You have forgotten to place the User Authentication Rule before the Stealth Rule.

D.

Users must use the SecuRemote Client, to use the User Authentication Rule.

Full Access
Question # 12

Fill in the blank: Gaia can be configured using the _______ or ______ .

A.

Gaia; command line interface

B.

WebUI; Gaia Interface

C.

Command line interface; WebUI

D.

Gaia Interface; GaiaUI

Full Access
Question # 13

Match the following commands to their correct function. Each command has one function only listed.

A.

C1>F6; C2>F4; C3>F2; C4>F5

B.

C1>F2; C2>F1; C3>F6; C4>F4

C.

C1>F2; C2>F4; C3>F1; C4>F5

D.

C1>F4; C2>F6; C3>F3; C4>F5

Full Access
Question # 14

When launching SmartDashboard, what information is required to log into R77?

A.

User Name, Management Server IP, certificate fingerprint file

B.

User Name, Password, Management Server IP

C.

Password, Management Server IP

D.

Password, Management Server IP, LDAP Server IP

Full Access
Question # 15

You want to establish a VPN, using certificates. Your VPN will exchange certificates with an external partner. Which of the following activities sh you do first?

A.

Create a new logical-server object to represent your partner's CA

B.

Exchange exported CA keys and use them to create a new server object to represent your partner's Certificate Authority (CA)

C.

Manually import your partner's Certificate Revocation List.

D.

Manually import your partner's Access Control List.

Full Access
Question # 16

Look at the screenshot below. What CLISH command provides this output?

A.

show configuration all

B.

show confd configuration

C.

show confd configuration all

D.

show configuration

Full Access
Go to page: