It is impossible to pass Check Point 156-215.80 exam without any help in the short term. Come to Examcollection soon and find the most advanced, correct and guaranteed Check Point 156-215.80 practice questions. You will get a surprising result by our Improve Check Point Certified Security Administrator practice guides.

Q33. At what point is the Internal Certificate Authority (ICA) created?

A. Upon creation of a certificate

B. During the primary Security Management Server installation process.

C. When an administrator decides to create one.

D. When an administrator initially logs into SmartConsole.

Answer: B

Explanation:

Introductionto the ICAThe ICA is a Certificate Authority which is an integral part of the Check Point product suite. It is fully compliant with X.509 standards for both certificates and CRLs. See the relevant X.509 and PKI documentation, as well as RFC 2459 standards for more information. You can read more about Check Point and PKI in the R76 VPN

Administration Guide.

The ICA is located on the Security Management server. It is created during the installation process, when the Security Management server is configured.


Q34. Which Check Point software blade provides protection from zero-day and undiscovered threats?

A. Firewall

B. Threat Emulation

C. Application Control

D. Threat Extraction

Answer: D

Explanation:

SandBlast Threat Emulation

As part of the Next Generation Threat Extraction software bundle (NGTX), the SandBlast Threat Emulation capability prevents infections from undiscovered exploits zero-day and targeted attacks. This innovative solution quickly inspects files and runs them in a virtual sandbox to discover malicious behavior. Discovered malware is prevented from entering the network.


Q35. What is the purpose of Captive Portal?

A. It provides remote access to SmartConsole

B. It manages user permission in SmartConsole

C. It authenticates users, allowing them access to the Internet and corporate resources

D. It authenticates users, allowing them access to the Gaia OS

Answer: C

Explanation:

Reference :https://www.checkpoint.com/products/identity-awareness-software-blade/


Q36. The most important part of a site-to-site VPN deployment is the _____ .

A. Internet

B. Remote users

C. Encrypted VPN tunnel

D. VPN gateways

Answer: C

Explanation:

Site to Site VPNThe basis of Site to Site VPN is the encrypted VPN tunnel. Two Security Gateways negotiate a link and create a VPN tunnel and each tunnel can contain more than one VPN connection. One Security Gateway can maintain more than one VPN tunnel at the same time.


Q37. Which of the following is NOT a back up method?

A. Save backup

B. System backup

C. snapshot

D. Migrate

Answer: A

Explanation:

The built-in Gaiabackup procedures:

Check Point provides three different procedures for backing up (and restoring) the operating system and networking parameters on yourappliances.


Q38. Fill in the blank: RADIUS Accounting gets _____ data from requests generated by the accounting client

A. Destination

B. Identity

C. Payload

D. Location

Answer: B

Explanation:

How RADIUS Accounting Works with Identity AwarenessRADIUS Accounting gets identity data from RADIUS Accounting Requests generated by the RADIUS accounting client.


Q39. In the Check Point three-tiered architecture, which of the following is NOT a function of the Security Management Server (Security Management Server)?

A. Display policies and logs on the administrator's workstation.

B. Verify and compile Security Policies.

C. Processing andsending alerts such as SNMP traps and email notifications.

D. Store firewall logs to hard drive storage.

Answer: A


Q40. In the R80 SmartConsole, on which tab are Permissions and Administrators defined?

A. Security Policies

B. Logs and Monitor

C. Manage and Settings

D. Gateway and Servers

Answer: C