Month End Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following 156-215.80 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-215.80 Exam Dumps - Check Point Certified Security Administrator R80

Go to page:
Question # 25

Check Point ClusterXL Active/Active deployment is used when:

A.

Only when there is Multicast solution set up

B.

There is Load Sharing solution set up

C.

Only when there is Unicast solution set up

D.

There is High Availability solution set up

Full Access
Question # 26

Fill in the blank: ____________ is the Gaia command that turns the server off.

A.

sysdown

B.

exit

C.

halt

D.

shut-down

Full Access
Question # 27

When connected to the Check Point R80 Management Server using the SmartConsole the first administrator to connect has a lock on:

A.

Only the objects being modified in the Management Database and other administrators can connect to make changes using a special session as long as they all connect from the same LAN network.

B.

The entire Management Database and other administrators can connect to make changes only if the first administrator switches to Read-only.

C.

The entire Management Database and all sessions and other administrators can connect only as Read-only.

D.

Only the objects being modified in his session of the Management Database and other administrators can connect to make changes using different sessions.

Full Access
Question # 28

Using ClusterXL, what statement is true about the Sticky Decision Function?

A.

Can only be changed for Load Sharing implementations

B.

All connections are processed and synchronized by the pivot

C.

Is configured using cpconfig

D.

Is only relevant when using SecureXL

Full Access
Question # 29

Fill in the blanks: There are ________ types of software containers ________.

A.

Three; security management, Security Gateway, and endpoint security

B.

Three; Security gateway, endpoint security, and gateway management

C.

Two; security management and endpoint security

D.

Two; endpoint security and Security Gateway

Full Access
Question # 30

Fill in the blank: To build an effective Security Policy, use a ________ and _______ rule.

A.

Cleanup; stealth

B.

Stealth; implicit

C.

Cleanup; default

D.

Implicit; explicit

Full Access
Question # 31

Which of the following is NOT an authentication scheme used for accounts created through SmartConsole?

A.

Security questions

B.

Check Point password

C.

SecurID

D.

RADIUS

Full Access
Question # 32

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned a static IP address 10.0.0.19.

John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his desktop with a static IP (10.0.0.19). He wants to move around the organization and continue to have access to the HR Web Server.

To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the policy.

2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.

3) Changes from static IP address to DHCP for the client PC.

What should John request when he cannot access the web server from his laptop?

A.

John should lock and unlock his computer

B.

Investigate this as a network connectivity issue

C.

The access should be changed to authenticate the user instead of the PC

D.

John should install the Identity Awareness Agent

Full Access
Go to page: