CheckPoint 156-215-80 practice test

Check Point Certified Security Administrator R80 Exam


Question 1

When should you generate new licenses?
A. Before installing contract files.
B. After a device upgrade.
C. When the existing license expires, license is upgraded or the IP-address associated with
the license changes.
D. Only when the license is upgraded.
220/221
Questions & Answers PDF
P-

Answer:

B
221/221

Discussions

Question 2

Which of the following situations would not require a new license to be generated and
installed?

  • A. The Security Gateway is upgraded.
  • B. The existing license expires.
  • C. The license is upgraded.
  • D. The IP address of the Security Management or Security Gateway has changed.
Answer:

A

Discussions

Question 3

An administrator wishes to enable Identity Awareness on the Check Point firewalls. However
they allow users to use company issued or personal laptops. Since the administrator cannot
manage the personal laptops, which of the following methods would BEST suit this
company?

  • A. AD Query
  • B. Browser-Based Authentication
  • C. Identity Agents
  • D. Terminal Servers Agent
Answer:

B

Discussions

Question 4

In ____________ NAT, the ____________ is translated.

  • A. Hide; source
  • B. Static; source
  • C. Simple; source
  • D. Hide; destination 219/221 Questions & Answers PDF P-
Answer:

A

Discussions

Question 5

When a Security Gateway sends its logs to an IP address other than its own, which
deployment option is installed?

  • A. Distributed
  • B. Standalone
  • C. Bridge Mode
  • D. Targeted
Answer:

A

Discussions

Question 6

Which of the following is considered to be the more secure and preferred VPN authentication
method?

  • A. Password
  • B. Certificate
  • C. MD5
  • D. Pre-shared secret
Answer:

B

Discussions

Question 7

To quickly review when Threat Prevention signatures were last updated, which Threat Tool
would an administrator use?

  • A. Protections
  • B. IPS Protections
  • C. Profiles 218/221 Questions & Answers PDF P-
  • D. ThreatWiki
Answer:

B

Discussions

Question 8

Which back up method uses the command line to create an image of the OS?

  • A. System backup
  • B. Save Configuration
  • C. Migrate
  • D. snapshot
Answer:

D

Discussions

Question 9

Which repositories are installed on the Security Management Server by SmartUpdate?

  • A. License and Update
  • B. Package Repository and Licenses
  • C. Update and License & Contract
  • D. License & Contract and Package Repository
Answer:

D

Discussions

Question 10

What data MUST be supplied to the SmartConsole System Restore window to restore a
backup?
217/221
Questions & Answers PDF
P-

  • A. Server, Username, Password, Path, Version
  • B. Username, Password, Path, Version
  • C. Server, Protocol, Username, Password, Destination Path
  • D. Server, Protocol, Username, Password, Path
Answer:

D

Discussions
To page 2