Your success in Check Point 156-215.80 is our sole target and we develop all our 156-215.80 braindumps in a way that facilitates the attainment of this target. Not only is our 156-215.80 study material the best you can find, it is also the most detailed and the most updated. 156-215.80 Practice Exams for Check Point CCSA 156-215.80 are written to the highest standards of technical accuracy.

Q1. Fill in the blank: The _____ software blade enables Application Security policies to allow, block, or limit website access based on user, group, and machine identities.

A. Application Control

B. Data Awareness

C. URL Filtering

D. Threat Emulation

Answer: A


Q2. Vanessa is a Firewall administrator. She wants to test a backup of her company’s production Firewall cluster Dallas_GW. She has a lab environment that is identical to her production environment. She decided to restore production backup via SmartConsole in lab environment. Which details she need to fill in System Restore window before she can click OK button and test the backup?

A. Server, SCP, Username, Password, Path, Comment, Member

B. Server, TFTP, Username, Password, Path, Comment, All Members

C. Server, Protocol, Username, Password, Path, Comment, All Members

D. Server, Protocol,Username, Password, Path, Comment, member

Answer: C


Q3. Bob and Joe both have Administrator Roles on their Gaia Platform. Bob logs in on the WebUI and then Joe logs in through CLI. Choose what BEST describes the following

scenario, where Bob and Joe are both logged in:

A. When Joe logs in, Bob will be log out automatically.

B. Since they both are log in on different interfaces, they both will be able to make changes.

C. If Joe tries to make changes, he won't, database will be locked.

D. Bob will be prompt that Joe logged in.

Answer: C


Q4. Which of the following is NOT a component of a Distinguished Name?

A. Organization Unit

B. Country

C. Common name

D. User container

Answer: D

Explanation:

Distinguished Name Components

CN=common name, OU=organizational unit, O=organization, L=locality,ST=state or province, C=country name


Q5. Fill in the blank: The IPS policy for pre-R80 gateways is installed during the _____ .

A. Firewall policy install

B. Threat Prevention policy install

C. Anti-bot policy install

D. Access Control policy install

Answer: A

Explanation:

The next time you install a policy on the gateway, the IPS profile is also installed on the gateway and the gateway immediately begins enforcing IPS protection on network traffic.


Q6. Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?

A. One machine, but itneeds to be installed using SecurePlatform for compatibility purposes.

B. One machine

C. Two machines

D. Three machines

Answer: C

Explanation:

One for Security Management Server and the other one for the Security Gateway.


Q7. Which default user has full read/write access?

A. Monitor

B. Altuser

C. Administrator

D. Superuser

Answer: C


Q8. Fill in the blanks: A security Policy is created in _____, stored in the _____, and Distributed to the various _____ .

A. Rule base, Security Management Server, Security Gateways

B. SmartConsole, Security Gateway, Security Management Servers

C. SmartConsole, Security Management Server, Security Gateways

D. The Check Point database, SmartConsole, Security Gateways

Answer: A