Administrator (CCSA) R80 156-215-80 Check Point Certified Security
Administrator (CCSA) R80 156-215-80 Check Point Certified Security
Administrator (CCSA) R80 156-215-80 Check Point Certified Security
1 http://www.examarea.com
156-215-80
QUESTION: 1
What are the three conflict resolution rules in the Threat Prevention Policy Layers?
Answer: C
QUESTION: 2
DLP and Geo Policy are examples of what type of Policy?
A. Standard Policies
B. Shared Policies
C. Inspection Policies
D. Unified Policies
Answer: B
Explanation:
The Shared policies are installed with the Access Control Policy.
2 http://www.examarea.com
156-215-80
QUESTION: 3
Which one of the following is the preferred licensing model? Select the Best answer.
A. Local licensing because it ties the package license to the IP-address of the gateway
and has no dependency of the Security Management Server.
B. Central licensing because it ties the package license to the IP-address of the Security
Management Server and has no dependency of the gateway.
C. Local licensing because it ties the package license to the MAC-address of the gateway
management interface and has no Security Management Server dependency.
D. Central licensing because it ties the package license to the MAC-address of the
Security Management Server Mgmt- interface and has no dependency of the gateway.
Answer: B
Explanation:
Central License
A Central License is a license attached to the Security Management server IP address,
rather than the gateway IP address. The benefits of a Central License are:
QUESTION: 4
The security Gateway is installed on GAiA R80 The default port for the WEB User
Interface is_____________
3 http://www.examarea.com
156-215-80
A. TCP 18211
B. TCP 257
C. TCP 4433
D. TCP 443
Answer: D
QUESTION: 5
Which of the following is NOT a back up method?
A. Save backup
B. System backup
C. snapshot
D. Migrate
Answer: A
Explanation:
The built-in Gaia backup procedures:
Check Point provides three different procedures for backing up (and restoring) the
operating system and networking parameters on your appliances.
QUESTION: 6
Choose what BEST describes a Session.
Answer: B
Explanation:
Administrator Collaboration
More than one administrator can connect to the Security Management Server at the same
4 http://www.examarea.com
156-215-80
time. Every administrator has their own username, and works in a session that is
independent of the other administrators.
When an administrator logs in to the Security Management Server through
SmartConsole, a new editing session starts. The changes that the administrator makes
during the session are only available to that administrator. Other administrators see a lock
icon on object and rules that are being edited.
To make changes available to all administrators, and to unlock the objects and rules that
are being edited, the administrator must publish the session.
QUESTION: 7
On the following graphic, you will find layers of policies.
A. A packet arrives at the gateway, it is checked against the rules in the networks policy
layer and then if implicit Drop Rule drops the packet, it comes next to IPS layer and then
after accepting the packet it passes to Threat Prevention layer.
B. A packet arrives at the gateway, it is checked against the rules in the networks policy
layer and then if there is any rule which accepts the packet, it comes next to IPS layer and
then after accepting the packet it passes to Threat Prevention layer
C. A packet arrives at the gateway, it is checked against the rules in the networks policy
layer and then if there is any rule which accepts the packet, it comes next to Threat
Prevention layer and then after accepting the packet it passes to IPS layer.
D. A packet arrives at the gateway, it is checked against the rules in IPS policy layer and
then it comes next to the Network policy layer and then after accepting the packet it
passes to Threat Prevention layer.
Answer: B
Explanation:
To simplify Policy management, R80 organizes the policy into Policy Layers. A layer is a
set of rules, or a Rule Base. For example, when you upgrade to R80 from earlier versions:
When the gateway matches a rule in a layer, it starts to evaluate the rules in the next
5 http://www.examarea.com
156-215-80
QUESTION: 8
In which deployment is the security management server and Security Gateway installed
on the same appliance?
A. Bridge Mode
B. Remote
C. Standalone
D. Distributed
Answer: C
Explanation:
Installing StandaloneStandalone Deployment - The Security Management Server and the
Security Gateway are installed on the same computer or appliance.
QUESTION: 9
You manage a global network extending from your base in Chicago to Tokyo, Calcutta
and Dallas. Management wants a report detailing the current software level of each
Enterprise class Security Gateway. You plan to take the opportunity to create a proposal
outline, listing the most cost-effective way to upgrade your Gateways. Which two
SmartConsole applications will you use to create this report and outline?
6 http://www.examarea.com
156-215-80
Answer: D
QUESTION: 10
Fill in the blank: RADIUS Accounting gets data from requests generated by the
accounting client
A. Destination
B. Identity
C. Payload
D. Location
Answer: B
Explanation:
How RADIUS Accounting Works with Identity AwarenessRADIUS Accounting gets
identity data from RADIUS Accounting Requests generated by the RADIUS accounting
client.
QUESTION: 11
A client has created a new Gateway object that will be managed at a remote location.
When the client attempts to install the Security Policy to the new Gateway object, the
object does not appear in the Install On check box. What should you look for?
Answer: B
QUESTION: 12
Choose the Best place to find a Security Management Server backup file named
backup_fw, on a Check Point Appliance.
7 http://www.examarea.com
156-215-80
A. /var/log/Cpbackup/backups/backup/backup_fw.tgs
B. /var/log/Cpbackup/backups/backup/backup_fw.tar
C. /var/log/Cpbackup/backups/backups/backup_fw.tar
D. /var/log/Cpbackup/backups/backup_fw.tgz
Answer: D
Explanation:
Gaia's Backup feature allows backing up the configuration of the Gaia OS and of the
Security Management server database, or restoring a previously saved configuration. The
configuration is saved to a .tgz file in the following directory: Gaia OS Version
Hardware Local Directory
R75.40 - R77.20
Check Point appliances
/var/log/CPbackup/backups/ Open Server /var/CPbackup/backups/ R77.30 Check Point
appliances /var/log/CPbackup/backups/ Open Server
QUESTION: 13
Joey wants to configure NTP on R80 Security Management Server. He decided to do this
via WebUI. What is the correct address to access the Web UI for Gaia platform via
browser?
A. https://<Device_IP_Address>
B. https://<Device_IP_Address>:443
C. https://<Device_IP_Address>:10000
D. https://<Device_IP_Address>:4434
Answer: A
Explanation:
Access to Web UI Gaia administration interface, initiate a connection from a browser to
the default administration IP address: Logging in to the WebUI Logging in To log in to
the WebUI: https://<Gaia IP address>
QUESTION: 14
Where can administrator edit a list of trusted SmartConsole clients in R80?
8 http://www.examarea.com
156-215-80
Answer: C
QUESTION: 15
Where can you trigger a failover of the cluster members?
Log in to Security Gateway CLI and run command clusterXL_admin down.
In SmartView Monitor right-click the Security Gateway member and select Cluster
member stop. Log into Security Gateway CLI and run command cphaprob down.
A. 1, 2, and 3
B. 2 and 3
C. 1 and 2
D. 1 and 3
Answer: C
Explanation:
How to Initiate Failover
9 http://www.examarea.com
156-215-80
QUESTION: 16
You want to reset SIC between smberlin and sgosaka.
10 http://www.examarea.com
156-215-80
A. The Gateway was not rebooted, which is necessary to change the SIC key.
B. You must first initialize the Gateway object in SmartDashboard (i.e., right-click on the
object, choose Basic Setup > Initialize).
C. The check Point services on the Gateway were not restarted because you are still in the
cpconfig utility.
D. The activation key contains letters that are on different keys on localized keyboards.
Therefore, the activation can not be typed in a matching fashion.
11 http://www.examarea.com
156-215-80
Answer: C
QUESTION: 17
Which of the following is NOT defined by an Access Role object?
A. Source Network
B. Source Machine
C. Source User
D. Source Server
Answer: D
QUESTION: 18
Fill in the blank: The collects logs and sends them to the .
Answer: D
QUESTION: 19
Which rule is responsible for the user authentication failure?
A. Rule 4
12 http://www.examarea.com
156-215-80
B. Rule 6
C. Rule 3
D. Rule 5
Answer: C
QUESTION: 20
Look at the following screenshot and select the BEST answer.
A. Clients external to the Security Gateway can download archive files from FTP_Ext
server using FTP.
B. Internal clients can upload and download any-files to FTP_Ext-server using FTP.
C. Internal clients can upload and download archive-files to FTP_Ext server using FTP.
D. Clients external to the Security Gateway can upload any files to the FTP_Ext-server
using FTP.
Answer: A
13 http://www.examarea.com