Administrator (CCSA) R80 156-215-80 Check Point Certified Security

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

156-215-80

Check Point Certified Security


Administrator (CCSA) R80
Exam:156-215-80
Demo Edition

1 http://www.examarea.com
156-215-80

QUESTION: 1
What are the three conflict resolution rules in the Threat Prevention Policy Layers?

A. Conflict on action, conflict on exception, and conflict on settings


B. Conflict on scope, conflict on settings, and conflict on exception
C. Conflict on settings, conflict on address, and conflict on exception
D. Conflict on action, conflict on destination, and conflict on settings

Answer: C

QUESTION: 2
DLP and Geo Policy are examples of what type of Policy?

A. Standard Policies
B. Shared Policies
C. Inspection Policies
D. Unified Policies

Answer: B

Explanation:
The Shared policies are installed with the Access Control Policy.

2 http://www.examarea.com
156-215-80

QUESTION: 3
Which one of the following is the preferred licensing model? Select the Best answer.

A. Local licensing because it ties the package license to the IP-address of the gateway
and has no dependency of the Security Management Server.
B. Central licensing because it ties the package license to the IP-address of the Security
Management Server and has no dependency of the gateway.
C. Local licensing because it ties the package license to the MAC-address of the gateway
management interface and has no Security Management Server dependency.
D. Central licensing because it ties the package license to the MAC-address of the
Security Management Server Mgmt- interface and has no dependency of the gateway.

Answer: B

Explanation:
Central License
A Central License is a license attached to the Security Management server IP address,
rather than the gateway IP address. The benefits of a Central License are:

QUESTION: 4
The security Gateway is installed on GAiA R80 The default port for the WEB User
Interface is_____________

3 http://www.examarea.com
156-215-80

A. TCP 18211
B. TCP 257
C. TCP 4433
D. TCP 443

Answer: D

QUESTION: 5
Which of the following is NOT a back up method?

A. Save backup
B. System backup
C. snapshot
D. Migrate

Answer: A

Explanation:
The built-in Gaia backup procedures:
Check Point provides three different procedures for backing up (and restoring) the
operating system and networking parameters on your appliances.

QUESTION: 6
Choose what BEST describes a Session.

A. Starts when an Administrator publishes all the changes made on SmartConsole.


B. Starts when an Administrator logs in to the Security Management Server through
SmartConsole and ends when it is published.
C. Sessions ends when policy is pushed to the Security Gateway.
D. Sessions locks the policy package for editing.

Answer: B

Explanation:
Administrator Collaboration
More than one administrator can connect to the Security Management Server at the same

4 http://www.examarea.com
156-215-80

time. Every administrator has their own username, and works in a session that is
independent of the other administrators.
When an administrator logs in to the Security Management Server through
SmartConsole, a new editing session starts. The changes that the administrator makes
during the session are only available to that administrator. Other administrators see a lock
icon on object and rules that are being edited.
To make changes available to all administrators, and to unlock the objects and rules that
are being edited, the administrator must publish the session.

QUESTION: 7
On the following graphic, you will find layers of policies.

What is a precedence of traffic inspection for the defined polices?

A. A packet arrives at the gateway, it is checked against the rules in the networks policy
layer and then if implicit Drop Rule drops the packet, it comes next to IPS layer and then
after accepting the packet it passes to Threat Prevention layer.
B. A packet arrives at the gateway, it is checked against the rules in the networks policy
layer and then if there is any rule which accepts the packet, it comes next to IPS layer and
then after accepting the packet it passes to Threat Prevention layer
C. A packet arrives at the gateway, it is checked against the rules in the networks policy
layer and then if there is any rule which accepts the packet, it comes next to Threat
Prevention layer and then after accepting the packet it passes to IPS layer.
D. A packet arrives at the gateway, it is checked against the rules in IPS policy layer and
then it comes next to the Network policy layer and then after accepting the packet it
passes to Threat Prevention layer.

Answer: B

Explanation:
To simplify Policy management, R80 organizes the policy into Policy Layers. A layer is a
set of rules, or a Rule Base. For example, when you upgrade to R80 from earlier versions:
When the gateway matches a rule in a layer, it starts to evaluate the rules in the next

5 http://www.examarea.com
156-215-80

layer. All layers are evaluated in parallel

QUESTION: 8
In which deployment is the security management server and Security Gateway installed
on the same appliance?

A. Bridge Mode
B. Remote
C. Standalone
D. Distributed

Answer: C

Explanation:
Installing StandaloneStandalone Deployment - The Security Management Server and the
Security Gateway are installed on the same computer or appliance.

QUESTION: 9
You manage a global network extending from your base in Chicago to Tokyo, Calcutta
and Dallas. Management wants a report detailing the current software level of each
Enterprise class Security Gateway. You plan to take the opportunity to create a proposal
outline, listing the most cost-effective way to upgrade your Gateways. Which two
SmartConsole applications will you use to create this report and outline?

A. SmartView Tracker and SmartView Monitor


B. SmartLSM and SmartUpdate
C. SmartDashboard and SmartView Tracker
D. SmartView Monitor and SmartUpdate

6 http://www.examarea.com
156-215-80

Answer: D

QUESTION: 10
Fill in the blank: RADIUS Accounting gets data from requests generated by the
accounting client

A. Destination
B. Identity
C. Payload
D. Location

Answer: B
Explanation:
How RADIUS Accounting Works with Identity AwarenessRADIUS Accounting gets
identity data from RADIUS Accounting Requests generated by the RADIUS accounting
client.

QUESTION: 11
A client has created a new Gateway object that will be managed at a remote location.
When the client attempts to install the Security Policy to the new Gateway object, the
object does not appear in the Install On check box. What should you look for?

A. Secure Internal Communications (SIC) not configured for the object.


B. A Gateway object created using the Check Point > Externally Managed VPN Gateway
option from the Network Objects dialog box.
C. Anti-spoofing not configured on the interfaces on the Gateway object.
D. A Gateway object created using the Check Point > Secure Gateway option in the
network objects, dialog box, but still needs to configure the interfaces for the Security
Gateway object.

Answer: B

QUESTION: 12
Choose the Best place to find a Security Management Server backup file named
backup_fw, on a Check Point Appliance.

7 http://www.examarea.com
156-215-80

A. /var/log/Cpbackup/backups/backup/backup_fw.tgs
B. /var/log/Cpbackup/backups/backup/backup_fw.tar
C. /var/log/Cpbackup/backups/backups/backup_fw.tar
D. /var/log/Cpbackup/backups/backup_fw.tgz

Answer: D

Explanation:
Gaia's Backup feature allows backing up the configuration of the Gaia OS and of the
Security Management server database, or restoring a previously saved configuration. The
configuration is saved to a .tgz file in the following directory: Gaia OS Version
Hardware Local Directory
R75.40 - R77.20
Check Point appliances
/var/log/CPbackup/backups/ Open Server /var/CPbackup/backups/ R77.30 Check Point
appliances /var/log/CPbackup/backups/ Open Server

QUESTION: 13
Joey wants to configure NTP on R80 Security Management Server. He decided to do this
via WebUI. What is the correct address to access the Web UI for Gaia platform via
browser?

A. https://<Device_IP_Address>
B. https://<Device_IP_Address>:443
C. https://<Device_IP_Address>:10000
D. https://<Device_IP_Address>:4434

Answer: A

Explanation:
Access to Web UI Gaia administration interface, initiate a connection from a browser to
the default administration IP address: Logging in to the WebUI Logging in To log in to
the WebUI: https://<Gaia IP address>

QUESTION: 14
Where can administrator edit a list of trusted SmartConsole clients in R80?

8 http://www.examarea.com
156-215-80

A. cpconfig on a Security Management Server, in the WebUI logged into a Security


Management Server.
B. Only using SmartConsole: Manage and Settings > Permissions and Administrators >
Advanced > Trusted Clients.
C. In cpconfig on a Security Management Server, in the WebUI logged into a Security
Management Server, in SmartConsole: Manage and Settings>Permissions and
Administrators>Advanced>Trusted Clients.
D. WebUI client logged to Security Management Server, SmartDashboard: Manage and
Settings>Permissions and Administrators>Advanced>Trusted Clients, via cpconfig on a
Security Gateway.

Answer: C

QUESTION: 15
Where can you trigger a failover of the cluster members?
Log in to Security Gateway CLI and run command clusterXL_admin down.
In SmartView Monitor right-click the Security Gateway member and select Cluster
member stop. Log into Security Gateway CLI and run command cphaprob down.

A. 1, 2, and 3
B. 2 and 3
C. 1 and 2
D. 1 and 3

Answer: C

Explanation:
How to Initiate Failover

9 http://www.examarea.com
156-215-80

QUESTION: 16
You want to reset SIC between smberlin and sgosaka.

10 http://www.examarea.com
156-215-80

In SmartDashboard, you choose sgosaka, Communication, Reset. On sgosaka, you start


cpconfig, choose Secure Internal Communication and enter the new SIC Activation Key.
The screen reads The SIC was successfully initialized and jumps back to the menu. When
trying to establish a connection, instead of a working connection, you receive this error
message:

What is the reason for this behavior?

A. The Gateway was not rebooted, which is necessary to change the SIC key.
B. You must first initialize the Gateway object in SmartDashboard (i.e., right-click on the
object, choose Basic Setup > Initialize).
C. The check Point services on the Gateway were not restarted because you are still in the
cpconfig utility.
D. The activation key contains letters that are on different keys on localized keyboards.
Therefore, the activation can not be typed in a matching fashion.

11 http://www.examarea.com
156-215-80

Answer: C

QUESTION: 17
Which of the following is NOT defined by an Access Role object?

A. Source Network
B. Source Machine
C. Source User
D. Source Server

Answer: D

QUESTION: 18
Fill in the blank: The collects logs and sends them to the .

A. Log server; security management server


B. Log server; Security Gateway
C. Security management server; Security Gateway
D. Security Gateways; log server

Answer: D

QUESTION: 19
Which rule is responsible for the user authentication failure?

A. Rule 4

12 http://www.examarea.com
156-215-80

B. Rule 6
C. Rule 3
D. Rule 5

Answer: C

QUESTION: 20
Look at the following screenshot and select the BEST answer.

A. Clients external to the Security Gateway can download archive files from FTP_Ext
server using FTP.
B. Internal clients can upload and download any-files to FTP_Ext-server using FTP.
C. Internal clients can upload and download archive-files to FTP_Ext server using FTP.
D. Clients external to the Security Gateway can upload any files to the FTP_Ext-server
using FTP.

Answer: A

13 http://www.examarea.com

You might also like