Month End Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following 156-215.80 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-215.80 Exam Dumps - Check Point Certified Security Administrator R80

Go to page:
Question # 65

Study the Rule base and Client Authentication Action properties screen.

After being authenticated by the Security Gateways, a user starts a HTTP connection to a Web site. What happens when the user tries to FTP to another site using the command line? The:

A.

user is prompted for authentication by the Security Gateways again.

B.

FTP data connection is dropped after the user is authenticated successfully.

C.

user is prompted to authenticate from that FTP site only, and does not need to enter his username and password for Client Authentication

D.

FTP connection is dropped by Rule 2.

Full Access
Question # 66

You are the Security Administrator for MegaCorp. In order to see how efficient your firewall Rule Base is, you would like to see how many often the particular rules match. Where can you see it? Give the BEST answer.

A.

In the SmartView Tracker, if you activate the column Matching Rate.

B.

In SmartReporter, in the section Firewall Blade – Activity > Network Activity with information concerning Top Matched Logged Rules.

C.

SmartReporter provides this information in the section Firewall Blade – Security > Rule Base Analysis with information concerning Top Matched Logged Rules.

D.

It is not possible to see it directly. You can open SmartDashboard and select UserDefined in the Track column. Afterwards, you need to create your own program with an external counter.

Full Access
Question # 67

You are conducting a security audit. While reviewing configuration files and logs, you notice logs accepting POP3 traffic, but you do not see a rule allowing POP3 traffic in the Rule Base. Which of the following is the most likely cause?

A.

The POP3 rule is disabled.

B.

POP3 is accepted in Global Properties.

C.

The POP3 rule is hidden.

D.

POP3 is one of 3 services (POP3, IMAP, and SMTP) accepted by the default mail object in R77.

Full Access
Question # 68

You have enabled “Full Log” as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?

A.

Logging has disk space issues. Change logging storage options on the logging server or Security Management Server properties and install database.

B.

Data Awareness is not enabled.

C.

Identity Awareness is not enabled.

D.

Logs are arriving from Pre-R80 gateways.

Full Access
Question # 69

What are the two types of address translation rules?

A.

Translated packet and untranslated packet

B.

Untranslated packet and manipulated packet

C.

Manipulated packet and original packet

D.

Original packet and translated packet

Full Access
Question # 70

Fill in the blank: With the User Directory Software Blade, you can create R80 user definitions on a(an) ___________ Server.

A.

NT domain

B.

SMTP

C.

LDAP

D.

SecurID

Full Access
Question # 71

What will be the effect of running the following command on the Security Management Server?

A.

Remove the installed Security Policy.

B.

Remove the local ACL lists.

C.

No effect.

D.

Reset SIC on all gateways.

Full Access
Question # 72

The Gaia operating system supports which routing protocols?

A.

BGP, OSPF, RIP

B.

BGP, OSPF, EIGRP, PIM, IGMP

C.

BGP, OSPF, RIP, PIM, IGMP

D.

BGP, OSPF, RIP, EIGRP

Full Access
Go to page: