Download Check Point Certified Security Administrator.PracticeTest.156-215.80.2020-06-18.1e.131q.vcex


Download Exam

File Info

Exam Check Point Certified Security Administrator NGX
Number 156-215
File Name Check Point Certified Security Administrator.PracticeTest.156-215.80.2020-06-18.1e.131q.vcex
Size 2.23 Mb
Posted June 18, 2020
Downloads 1



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%


 
 



Demo Questions

Question 1
Which of the following is NOT a SecureXL traffic flow?

  • A: Medium Path
  • B: Accelerated Path
  • C: High Priority Path 
  • D: Slow Path



Question 2
VPN gateways authenticate using ___________ and ___________ .

  • A: Passwords; tokens
  • B: Certificates; pre-shared secrets 
  • C: Certificates; passwords
  • D: Tokens; pre-shared secrets



Question 3
Which of the following statements is TRUE about R80 management plug-ins?

  • A: The plug-in is a package installed on the Security Gateway.
  • B: Installing a management plug-in requires a Snapshot, just like any upgrade process.
  • C: A management plug-in interacts with a Security Management Server to provide new features and support for new products.
  • D: Using a plug-in offers full central management only if special licensing is applied to specific features of the plug-in.



Question 4
You are the senior Firewall administrator for ABC Corp., and have recently returned from a training course on Check Point's new advanced R80 management platform. You are presenting an in-house overview of the new features of Check Point R80 Management to the other administrators in ABC Corp. 

  

How will you describe the new “Publish” button in R80 Management Console?

  • A: The Publish button takes any changes an administrator has made in their management session, publishes a copy to the Check Point of R80, and then saves it to the R80 database.
  • B: The Publish button takes any changes an administrator has made in their management session and publishes a copy to the Check Point Cloud of R80 and but does not save it to the R80
  • C: The Publish button makes any changes an administrator has made in their management session visible to all other administrator sessions and saves it to the Database.
  • D: The Publish button makes any changes an administrator has made in their management session visible to the new Unified Policy session and saves it to the Database.



Question 5
With the User Directory Software Blade, you can create R80 user definitions on a(an) ___________ Server.

  • A: NT domain
  • B: SMTP
  • C: LDAP
  • D: SecurID



Question 6
You have enabled “Extended Log” as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?

  • A: Logging has disk space issues. Change logging storage options on the logging server or Security Management Server properties and install database.
  • B: Content Awareness is not enabled.
  • C: Identity Awareness is not enabled.
  • D: Log Trimming is enabled.



Question 7
What is the order of NAT priorities?

  • A: Static NAT, IP pool NAT, hide NAT
  • B: IP pool NAT, static NAT, hide NAT
  • C: Static NAT, automatic NAT, hide NAT
  • D: Static NAT, hide NAT, IP pool NAT



Question 8
Ken wants to obtain a configuration lock from other administrator on R80 Security Management Server Operating System. He can do this via WebUI or via CLI. 
Which command should he use in CLI? 


  • A: remove database lock
  • B: The database feature has one command: lock database override. 
  • C: override database lock
  • D: The database feature has two commands: lock database override and unlock database. Both will work.



Question 9
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?

  • A: Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.
  • B: Create a separate Security Policy package for each remote Security Gateway.
  • C: Create network objects that restrict all applicable rules to only certain networks.
  • D: Run separate SmartConsole instances to login and configure each Security Gateway directly.



Question 10
Harriet wants to protect sensitive information from intentional loss when users browse to a specific URL: https://personal.mymail.com, which blade will she enable to achieve her goal?

  • A: DLP
  • B: SSL Inspection
  • C: Application Control
  • D: URL Filtering









CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset