♥♥ 2018 NEW RECOMMEND ♥♥
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Cause all that matters here is passing the Check Point 156-215.80 exam. Cause all that you need is a high score of 156-215.80 Check Point Certified Security Administrator exam. The only one thing you need to do is downloading Ucertify 156-215.80 exam study guides now. We will not let you down with our money-back guarantee.
Q9. Which utility allows you to configure the DHCP service on GAIA from the command line?
Sysconfig Configuration Options Menu Item
DHCP Server Configuration
Configure SecurePlatform DHCP Server.
DHCP Relay Configuration Setup DHCP Relay.
NOTE:Question must be wrong because no answer is possible for GAIA system, this must be SPLAT version.
DHCP CLI configuration for GAIA reference:https://sc1.checkpoint.com/documents/R76/CP_R76_Gaia_WebAdmin/73181.ht m#o80096
Q10. Web Control Layer has been set up using the settings in the following dialogue:
Consider the following policy and select the BEST answer.
A. Traffic that does not match any rule in the subpolicy is dropped.
B. All employees can access only Youtube and Vimeo.
C. Access to Youtube and Vimeo is allowed only once a day.
D. Anyone from internal network can access theinternet, expect the traffic defined in drop rules 5.2, 5.5 and 5.6.
Policy Layers and Sub-PoliciesR80 introduces the concept of layers and sub-policies, allowing you to segment your policy according to your network segments orbusiness units/functions. In addition, you can also assign granular privileges by layer or sub-policy to distribute workload and tasks to the most qualified administrators
Q11. Fill in the blank: To build an effective Security Policy, use a _____ and _____ rule.
A. Cleanup; stealth
B. Stealth; implicit
C. Cleanup; default
D. Implicit; explicit
Q12. Which type of Check Point license is tied to the IP address of a specific Security Gateway and cannot be transferred to a gateway that has a different IP address?
Q13. Choose the Best place to find a Security Management Server backup file named backup_fw, on a Check Point Appliance.
Gaia's Backup feature allows backing upthe configuration of the Gaia OS and of the Security Management server database, or restoring a previously saved configuration. The configuration is saved to a .tgz file in the following directory:
Gaia OS Version Hardware
Local Directory R75.40 - R77.20
Check Point appliances
Check Point appliances
/var/log/CPbackup/backups/ Open Server
Q14. Two administrators Dave and Jon both manage R80 Management as administrators for Alpha Corp. Jon logged into the R80 Management and then shortly after Dave logged in to the same server. They are both in the Security Policies view. From the screenshots below, why does Dave not have the rule no.6 in his SmartConsole view even though Jon has it his in his SmartConsole view?
A. Jon is currently editing rule no.6 but has Published part of his changes.
B. Dave is currently editing rule no.6 and has marked this rule for deletion.
C. Dave is currently editing rule no.6 and has deleted it from his Rule Base.
D. Jon is currently editing rule no.6 but has not yet Published his changes.
When an administrator logs in to the Security Management Server through SmartConsole, a new editing session starts. Thechanges that the administrator makes during the session are only available to that administrator. Other administrators see a lock icon on object and rules that are being edited. To make changes available to all administrators, and to unlock the objects andrules that are being edited, the administrator must publish the session.
Q15. Packages and licenses are loaded from all of theses sources EXCEPT
A. Download Center Web site
C. User Center
D. Check Point DVD
Packages and licenses are loaded into these repositories from severalsources:
Q16. To optimize Rule Base efficiency the most hit rules should be where?
A. Removed from the Rule Base.
B. Towards the middle of theRule Base.
C. Towards the top of the Rule Base.
D. Towards the bottom of the Rule Base.
It is logical that if lesser rules are checked for the matched rule to be found the lesser CPU cycles the device is using. Checkpoint match a session from the first rule on top till the last on the bottom.