The latest Check Point Certified Security Administrator (CCSA) 156-215.80 certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the Check Point Certified Security Administrator (CCSA) 156-215.80 exam and earn Check Point Certified Security Administrator (CCSA) 156-215.80 certification.
Exam Question 111
Which SmartConsole component can Administrators use to track changes to the Rule Base?
A. WebUI
B. SmartView Tracker
C. SmartView Monitor
D. SmartReporter
Correct Answer:
B. SmartView Tracker
Exam Question 112
Which rule is responsible for the user authentication failure?
A. Rule 4
B. Rule 6
C. Rule 3
D. Rule 5
Correct Answer:
C. Rule 3
Exam Question 113
Which of the following is a hash algorithm?
A. 3DES
B. IDEA
C. DES
D. MD5
Correct Answer:
D. MD5
Exam Question 114
What is the appropriate default Gaia Portal address?
A. HTTP://[IPADDRESS]
B. HTTPS://[IPADDRESS]:8080
C. HTTPS://[IPADDRESS]:4434
D. HTTPS://[IPADDRESS]
Correct Answer:
D. HTTPS://[IPADDRESS]
Exam Question 115
Your boss wants you to closely monitor an employee suspected of transferring company secrets to the competition. The IT department discovered the suspect installed a WinSCP client in order to use encrypted communication. Which of the following methods is BEST to accomplish this task?
A. Use SmartView Tracker to follow his actions by filtering log entries that feature the WinSCP destination port. Then, export the corresponding entries to a separate log file for documentation.
B. Use SmartDashboard to add a rule in the firewall Rule Base that matches his IP address, and those of potential targets and suspicious protocols. Apply the alert action or customized messaging.
C. Watch his IP in SmartView Monitor by setting an alert action to any packet that matches your Rule Base and his IP address for inbound and outbound traffic.
D. Send the suspect an email with a keylogging Trojan attached, to get direct information about his wrongdoings.
Correct Answer:
A. Use SmartView Tracker to follow his actions by filtering log entries that feature the WinSCP destination port. Then, export the corresponding entries to a separate log file for documentation.
Exam Question 116
Match the following commands to their correct function. Each command has one function only listed.
Command | Function |
---|---|
C1 cp_admin_convert | F1: export and import different revisions of the database. |
C2 cpca_client | F2: export and import policy package. |
C3 cp_merge | F3: transfer Log data to an external database. |
C4 cpwd_admin | F4: execute operations on the ICA. |
F5: invokes and monitors critical processes such as Check Point daemons on the local machine. | |
F6: automatically export administrator definitions that were created in cpconfig to SmartDashboard. |
A. C1>F6; C2>F4; C3>F2; C4>F5
B. C1>F2; C2>F1; C3>F6; C4>F4
C. C1>F2; C2>F4; C3>F1; C4>F5
D. C1>F4; C2>F6; C3>F3; C4>F5
Correct Answer:
A. C1>F6; C2>F4; C3>F2; C4>F5
Exam Question 117
MegaCorp’s security infrastructure separates Security Gateways geographically. You must request a central license for one remote Security Gateway.
How do you apply the license?
A. Using the remote Gateway’s IP address, and attaching the license to the remote Gateway via SmartUpdate.
B. Using your Security Management Server’s IP address, and attaching the license to the remote Gateway via SmartUpdate.
C. Using the remote Gateway’s IP address, and applying the license locally with command cplic put
.
D. Using each of the Gateway’s IP addresses, and applying the licenses on the Security Management Server with the command cprlic put
.
Correct Answer:
B. Using your Security Management Server’s IP address, and attaching the license to the remote Gateway via SmartUpdate.
Exam Question 118
A digital signature:
A. Guarantees the authenticity and integrity of a message.
B. Automatically exchanges shared keys.
C. Decrypts data to its original form.
D. Provides a secure key exchange mechanism over the Internet.
Correct Answer:
A. Guarantees the authenticity and integrity of a message.
Exam Question 119
According to Check Point Best Practice, when adding a 3rd party gateway to a Check Point security solution what object SHOULD be added? A(n):
A. Interoperable Device
B. Network Node
C. Externally managed gateway
D. Gateway
Correct Answer:
A. Interoperable Device
Exam Question 120
You find a suspicious connection from a problematic host. You decide that you want to block everything from that whole network, not just the problematic host. You want to block this for an hour while you investigate further, but you do not want to add any rules to the Rule Base. How do you achieve this?
A. Use dbedit
to script the addition of a rule directly into the Rule Bases_5_0.fws
configuration file.
B. Select Block intruder from the Tools menu in SmartView Tracker.
C. Create a Suspicious Activity Rule in Smart Monitor.
D. Add a temporary rule using SmartDashboard and select hide rule.
Correct Answer:
C. Create a Suspicious Activity Rule in Smart Monitor.