156-215.80 Dumps [NEW] Best Check Point Certified Security Administrator Study Guide
Our latest 156-215.80 dumps will be the best study guide for your exam preparation. Great for your Check Point Certified Security Administrator exam. The real 156-215.80 exam questions 535 are the best ingredients for you to test all your relevant skills. Practice carefully, and successfully pass the CheckPoint 156-215.80 exam, very easy.
The following questions and answers are from the latest 156-215.80 free dumps. It will help you understand the validity of the latest 156-215.80 dumps.
Question 1:
Customer\’s R80 management server needs to be upgraded to R80.10. What is the best upgrade method when the management server is not connected to the Internet?
A. Export R80 configuration, clean install R80.10 and import the configuration
B. CPUSE online upgrade
C. CPUSE offline upgrade
D. SmartUpdate upgrade
Correct Answer: C
Question 2:
SmartEvent does NOT use which of the following procedures to identity events:
A. Matching a log against each event definition
B. Create an event candidate
C. Matching a log against local exclusions
D. Matching a log against global exclusions
Correct Answer: C
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_SmartEvent_AdminGuide/17401.htm
Question 3:
John is using Management HA. Which Smartcenter should be connected to for making changes?
A. secondary Smartcenter
B. active Smartcenter
C. connect virtual IP of Smartcenter HA
D. primary Smartcenter
Correct Answer: B
Question 4:
Which path below is available only when CoreXL is enabled?
A. Slow path
B. Firewall path
C. Medium path
D. Accelerated path
Correct Answer: C
Question 5:
What SmartEvent component creates events?
A. Consolidation Policy
B. Correlation Unit
C. SmartEvent Policy
D. SmartEvent GUI
Correct Answer: B
Question 6:
When an encrypted packet is decrypted, where does this happen?
A. Security policy
B. Inbound chain
C. Outbound chain
D. Decryption is not supported
Correct Answer: A
Question 7:
Which of the following is NOT a component of Check Point Capsule?
A. Capsule Docs
B. Capsule Cloud
C. Capsule Enterprise
D. Capsule Workspace
Correct Answer: C
Reference: https://www.checkpoint.com/download/products/sg-capsule-solution.pdf
Question 8:
What is the best sync method in the ClusterXL deployment?
A. Use 1 cluster 1st sync
B. Use 1 dedicated sync interface
C. Use 3 clusters 1st sync 2nd sync 3rd sync
D. Use 2 clusters 1st sync 2nd sync
Correct Answer: B
Question 9:
Can multiple administrators connect to a Security Management Server at the same time?
A. No, only one can be connected
B. Yes, all administrators can modify a network object at the same time
C. Yes, every administrator has their own username, and works in a session that is independent of other administrators
D. Yes, but only one has the right to write
Correct Answer: C
Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/CP_R80_SecMGMT/124265
Question 10:
In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?
A. Accounting
B. Suppression
C. Accounting/Suppression
D. Accounting/Extended
Correct Answer: C
Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_LoggingAndMonitoring/html_frameset.htm?topic=documents/R80/CP_R80_LoggingAndMonitoring/131914
Question 11:
To ensure that VMAC mode is enabled, which CLI command you should run on all cluster members? Choose the best answer.
A. fw ctl set int fwha vmac global param enabled
B. fw ctl get int fwha vmac global param enabled; result of command should return value 1
C. cphaprob
Correct Answer: B
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7292.htm
Question 12:
What is the SOLR database for?
A. Used for full text search and enables powerful matching capabilities
B. Writes data to the database and full text search
C. Serves GUI responsible to transfer request to the DLE server
D. Enables powerful matching capabilities and writes data to the database
Correct Answer: A
Reference: https://en.wikipedia.org/wiki/Apache_Solr
Question 13:
Which of the following commands is used to monitor cluster members?
A. cphaprob state
B. cphaprob status
C. cphaprob
D. cluster state
Correct Answer: A
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7298.htm
Question 14:
Which of the following is NOT a tracking option? (Select three)
A. Partial log
B. Log
C. Network log
D. Full log
Correct Answer: ACD
Reference: https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_LoggingAndMonitoring_AdminGuide/html_frameset.htm?topic=documents/R80.10/WebAdminGuides/EN/ CP_R80.10_LoggingAndMonitoring_AdminGuide/131914
Question 15:
Which command shows the installed licenses?
A. cplic print
B. print cplic
C. fwlic print
D. show licenses
Correct Answer: A