It is more faster and easier to pass the Check Point 156-215.80 exam by using Precise Check Point Check Point Certified Security Administrator questuins and answers. Immediate access to the Down to date 156-215.80 Exam and find the same core area 156-215.80 questions with professionally verified answers, then PASS your exam with a high score now.

Q17. Which type of Endpoint Identity Agent includes packet tagging and computer authentication?

A. Full

B. Light

C. Custom

D. Complete

Answer: A

Explanation:

Endpoint Identity Agents – dedicated client agents installed on users’ computers that acquire and report identities to the Security Gateway.


Q18. Which options are given on features, when editing a Role on Gaia Platform?

A. Read/Write, Read Only

B. Read/Write, Read only, None

C. Read/Write, None

D. Read Only, None

Answer: B

Explanation:

RolesRole-based administration (RBA) lets you create administrative roles for users. With RBA, an administrator can allowGaia users to access specified features by including those features in a role and assigning that role to users. Each role can include a combination of administrative (read/write) access to some features, monitoring (readonly) access to other features, andno access to other features.

You can also specify which access mechanisms (WebUI or the CLI) are available to the user.

 

Note - When users log in to the WebUI, they see only those features that they have read- only or read/write access to. If they have read-only access to a feature, they can see the settings pages, but cannot change the settings.

Gaia includes these predefined roles:

You cannot delete or change the predefined roles.

 

Note - Do not define a new user for external users. An external user is one that is defined on an authentication server (such as RADIUS or TACACS) and not on the local Gaia system.


Q19. Which Threat Prevention Software Blade provides comprehensive against malicious and unwanted network traffic, focusing on application and server vulnerabilities?

A. Anti-Virus

B. IPS

C. Anti-Spam

D. Anti-bot

Answer: B

Explanation:

The IPS Software Blade provides a complete Intrusion Prevention System security solution, providing comprehensive network protection against malicious and unwanted network traffic, including:


Q20. The security Gateway is installed on GAiA R80 The default port for the WEB User Interface is _____.

A. TCP 18211

B. TCP 257

C. TCP 4433

D. TCP 443

Answer: D


Q21. Which policy type is used to enforce bandwidth and traffic control rules?

A. Threat Emulation

B. Access Control

C. QoS

D. Threat Prevention

Answer: C

Explanation:

Check Point's QoS SolutionQoS is a policy-based QoS management solution from Check Point Software Technologies Ltd., satisfies your needsfor a bandwidth management solution. QoS is a unique, software-only based application that manages traffic end-to-end across networks, by distributing enforcement throughout network hardware and software.


Q22. Fill in the blank: A(n) _____ rule is created by an administrator and is located before the first and before last rules in the Rule Base.

A. Firewall drop

B. Explicit

C. Implicit accept

D. Implicit drop

E. Implied

Answer: E

Explanation:

This is the order that rules are enforced:


Q23. What is the default shell for the command line interface?

A. Expert

B. Clish

C. Admin

D. Normal

Answer: B

Explanation:

The default shell of the CLI is called clish


Q24. What does ExternalZone represent in the presented rule?

 

A. The Internet.

B. Interfaces that administrator has defined to be part of External Security Zone.

C. External interfaces on all security gateways.

D. External interfaces of specific gateways.

Answer: B

Explanation:

Configuring Interfaces

Configure the Security Gateway 80 interfaces in the Interfaces tab in the Security Gateway window.

To configure the interfaces:

The Security Gateway windowopens. The Edit window opens.