Check Point Certified Security Administrator R81.20
Last Update Jan 25, 2025
Total Questions : 400
We are offering FREE 156-215.81 Checkpoint exam questions. All you do is to just go and sign up. Give your details, prepare 156-215.81 free exam questions and then go for complete pool of Check Point Certified Security Administrator R81.20 test questions that will help you more.
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?
Which of the following is considered a "Subscription Blade", requiring renewal every 1-3 years?
An administrator wishes to enable Identity Awareness on the Check Point firewalls. However they allow users to use company issued or personal laptops. Since the administrator cannot manage the personal laptops, which of the following methods would BEST suit this company?
Identity Awareness allows easy configuration for network access and auditing based on what three items?
Which of the following is NOT supported by Bridge Mode on the Check Point Security Gateway?
How is communication between different Check Point components secured in R80? As with all questions, select the best answer.
Which Identity Source(s) should be selected in Identity Awareness for when there is a requirement for a higher level of security for sensitive servers?
The “Hit count” feature allows tracking the number of connections that each rule matches. Will the Hit count feature work independently from logging and Track the hits even if the Track option is set to “None”?
When a Security Gateways sends its logs to an IP address other than its own, which deployment option is installed?
Fill in the blank: Each cluster, at a minimum, should have at least ___________ interfaces.
Which Check Point supported authentication scheme typically requires a user to possess a token?
When configuring Spoof Tracking, which tracking actions can an administrator select to be done when spoofed packets are detected?
Fill in the blank RADIUS Accounting gets_____data from requests generated by the accounting client
John is using Management HA. Which Smartcenter should be connected to for making changes?
What is the BEST command to view configuration details of all interfaces in Gaia CLISH?
You are going to perform a major upgrade. Which back up solution should you use to ensure your database can be restored on that device?
While enabling the Identity Awareness blade the Identity Awareness wizard does not automatically detect the windows domain Why does it not detect the windows domain?
Fill in the blanks: A Check Point software license consists of a__________ and _______.
Most Check Point deployments use Gaia but which product deployment utilizes special Check Point code (with unification in R81.10)?
What are the software components used by Autonomous Threat Prevention Profiles in R8I.20 and higher?
Which option, when applied to a rule, allows all encrypted and non-VPN traffic that matches the rule?
When configuring LDAP with User Directory integration, changes applied to a User Directory template are:
The default shell of the Gaia CLI is cli.sh. How do you change from the cli.sh shell to the advanced shell to run Linux commands?
If there is an Accept Implied Policy set to "First", what is the reason Jorge cannot see any logs?
Which type of Endpoint Identity Agent includes packet tagging and computer authentication?
Which of the following is used to extract state related information from packets and store that information in state tables?
The ______ software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware.
What are valid authentication methods for mutual authenticating the VPN gateways?
Fill in the blank: With the User Directory Software Blade, you can create user definitions on a(n) ___________ Server.
True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway
Vanessa is attempting to log into the Gaia Web Portal. She is able to login successfully. Then she tries the same username and password for SmartConsole but gets the message in the screenshot image below. She has checked that the IP address of the Server is correct and the username and password she used to login into Gaia is also correct.
What is the most likely reason?
What key is used to save the current CPView page in a filename format cpview_“cpview process ID”. cap”number of captures”?
What are the Threat Prevention software components available on the Check Point Security Gateway?
Identify the ports to which the Client Authentication daemon listens on by default?
What is the most recommended installation method for Check Point appliances?
Fill in the blanks: Default port numbers for an LDAP server is ______ for standard connections and _______ SSL connections.
When a SAM rule is required on Security Gateway to quickly block suspicious connections which are not restricted by the Security Policy, what actions does the administrator need to take?
For Automatic Hide NAT rules created by the administrator what is a TRUE statement?
Which SmartConsole application shows correlated logs and aggregated data to provide an overview of potential threats and attack patterns?
Which option will match a connection regardless of its association with a VPN community?
Gaia has two default user accounts that cannot be deleted. What are those user accounts?
Which of the following log queries would show only dropped packets with source address of 192.168.1.1 and destination address of 172.26.1.1?
Which of the following commands is used to monitor cluster members in CLI?
Which deployment adds a Security Gateway to an existing environment without changing IP routing?
Phase 1 of the two-phase negotiation process conducted by IKE operates in ______ mode.
When configuring LDAP User Directory integration, Changes applied to a User Directory template are:
Fill in the blank: To create policy for traffic to or from a particular location, use the _____________.
In the Check Point Security Management Architecture, which component(s) can store logs?
Which of the following is used to initially create trust between a Gateway and Security Management Server?
There are four policy types available for each policy package. What are those policy types?
Which of the following is NOT an advantage to using multiple LDAP servers?
How can the changes made by an administrator before publishing the session be seen by a superuser administrator?
You have successfully backed up your Check Point configurations without the OS information. What command would you use to restore this backup?
Which Threat Prevention Software Blade provides comprehensive protection against malicious and unwanted network traffic, focusing on application and server vulnerabilities?
You had setup the VPN Community NPN-Stores' with 3 gateways. There are some issues with one remote gateway(l .1.1.1) and an your local gateway. What will be the best log filter to see only the IKE Phase 2 agreed networks for both gateways.
The SmartEvent R80 Web application for real-time event monitoring is called:
Fill in the blanks: There are ________ types of software containers ________.
Which two Identity Awareness daemons are used to support identity sharing?
When URL Filtering is set, what identifying data gets sent to the Check Point Online Web Service?
In HTTPS Inspection policy, what actions are available in the "Actions" column of a rule?
Identity Awareness allows the Security Administrator to configure network access based on which of the following?
Fill in the blank: An identity server uses a ___________ for user authentication.
Gaia includes Check Point Upgrade Service Engine (CPUSE), which can directly receive updates for what components?
When configuring Anti-Spoofing, which tracking options can an Administrator select?
Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.
Which Security Blade needs to be enabled in order to sanitize and remove potentially malicious content from files, before those files enter the network?
What object type would you use to grant network access to an LDAP user group?
A network administrator has informed you that they have identified a malicious host on the network, and instructed you to block it. Corporate policy dictates that firewall policy changes cannot be made at this time. What tool can you use to block this traffic?
You are the Check Point administrator for Alpha Corp with an R80 Check Point estate. You have received a call by one of the management users stating that they are unable to browse the Internet with their new tablet connected to the company Wireless. The Wireless system goes through the Check Point Gateway. How do you review the logs to see what the problem may be?
Fill in the blanks: A ____ license requires an administrator to designate a gateway for attachment whereas a _____ license is automatically attached to a Security Gateway.
You have enabled "Extended Log" as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?
Which repositories are installed on the Security Management Server by SmartUpdate?