156-215.80 Dumps [NEW] Best Check Point Certified Security Administrator Study Guide

Our latest 156-215.80 dumps will be the best study guide for your exam preparation. Great for your Check Point Certified Security Administrator exam. The real 156-215.80 exam questions 535 are the best ingredients for you to test all your relevant skills. Practice carefully, and successfully pass the CheckPoint 156-215.80 exam, very easy.

The following questions and answers are from the latest 156-215.80 free dumps. It will help you understand the validity of the latest 156-215.80 dumps.

Question 1:

Customer\’s R80 management server needs to be upgraded to R80.10. What is the best upgrade method when the management server is not connected to the Internet?

A. Export R80 configuration, clean install R80.10 and import the configuration

B. CPUSE online upgrade

C. CPUSE offline upgrade

D. SmartUpdate upgrade

Correct Answer: C


Question 2:

SmartEvent does NOT use which of the following procedures to identity events:

A. Matching a log against each event definition

B. Create an event candidate

C. Matching a log against local exclusions

D. Matching a log against global exclusions

Correct Answer: C

Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_SmartEvent_AdminGuide/17401.htm


Question 3:

John is using Management HA. Which Smartcenter should be connected to for making changes?

A. secondary Smartcenter

B. active Smartcenter

C. connect virtual IP of Smartcenter HA

D. primary Smartcenter

Correct Answer: B


Question 4:

Which path below is available only when CoreXL is enabled?

A. Slow path

B. Firewall path

C. Medium path

D. Accelerated path

Correct Answer: C


Question 5:

What SmartEvent component creates events?

A. Consolidation Policy

B. Correlation Unit

C. SmartEvent Policy

D. SmartEvent GUI

Correct Answer: B


Question 6:

When an encrypted packet is decrypted, where does this happen?

A. Security policy

B. Inbound chain

C. Outbound chain

D. Decryption is not supported

Correct Answer: A


Question 7:

Which of the following is NOT a component of Check Point Capsule?

A. Capsule Docs

B. Capsule Cloud

C. Capsule Enterprise

D. Capsule Workspace

Correct Answer: C

Reference: https://www.checkpoint.com/download/products/sg-capsule-solution.pdf


Question 8:

What is the best sync method in the ClusterXL deployment?

A. Use 1 cluster 1st sync

B. Use 1 dedicated sync interface

C. Use 3 clusters 1st sync 2nd sync 3rd sync

D. Use 2 clusters 1st sync 2nd sync

Correct Answer: B


Question 9:

Can multiple administrators connect to a Security Management Server at the same time?

A. No, only one can be connected

B. Yes, all administrators can modify a network object at the same time

C. Yes, every administrator has their own username, and works in a session that is independent of other administrators

D. Yes, but only one has the right to write

Correct Answer: C

Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/CP_R80_SecMGMT/124265


Question 10:

In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?

A. Accounting

B. Suppression

C. Accounting/Suppression

D. Accounting/Extended

Correct Answer: C

Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_LoggingAndMonitoring/html_frameset.htm?topic=documents/R80/CP_R80_LoggingAndMonitoring/131914


Question 11:

To ensure that VMAC mode is enabled, which CLI command you should run on all cluster members? Choose the best answer.

A. fw ctl set int fwha vmac global param enabled

B. fw ctl get int fwha vmac global param enabled; result of command should return value 1

C. cphaprob

Correct Answer: B

Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7292.htm


Question 12:

What is the SOLR database for?

A. Used for full text search and enables powerful matching capabilities

B. Writes data to the database and full text search

C. Serves GUI responsible to transfer request to the DLE server

D. Enables powerful matching capabilities and writes data to the database

Correct Answer: A

Reference: https://en.wikipedia.org/wiki/Apache_Solr


Question 13:

Which of the following commands is used to monitor cluster members?

A. cphaprob state

B. cphaprob status

C. cphaprob

D. cluster state

Correct Answer: A

Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7298.htm


Question 14:

Which of the following is NOT a tracking option? (Select three)

A. Partial log

B. Log

C. Network log

D. Full log

Correct Answer: ACD

Reference: https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_LoggingAndMonitoring_AdminGuide/html_frameset.htm?topic=documents/R80.10/WebAdminGuides/EN/ CP_R80.10_LoggingAndMonitoring_AdminGuide/131914


Question 15:

Which command shows the installed licenses?

A. cplic print

B. print cplic

C. fwlic print

D. show licenses

Correct Answer: A