Last Updated on September 23, 2021 by Admin 3

156-215.80 : Check Point Certified Security Administrator (CCSA R80) : Part 25

  1. The “Hit count” feature allows tracking the number of connections that each rule matches. Will the Hit count feature work independently from logging and Track the hits even if the Track option is set to “None”?

    • No, it will not work independently. Hit Count will be shown only for rules with Track options set as Log or alert
    • Yes, it will work independently as long as “analyze all rules” tick box is enabled on the Security Gateway
    • No, it will not work independently because hit count requires all rules to be logged
    • Yes, it will work independently because when you enable Hit Count, the SMS collects the data from supported Security Gateways
  2. How many layers make up the TCP/IP model?

    • 2
    • 7
    • 6
    • 6
  3. In SmartConsole, objects are used to represent physical and virtual network components and also some logical components. These objects are divided into several categories. Which of the following is NOT an objects category?

    • Limit
    • IP Address
    • Custom Application / Site
    • Network Object
  4. Which of the following is used to enforce changes made to a Rule Base?

    • Publish database
    • Save changes
    • Install policy
    • Activate policy
  5. What is UserCheck?

    • Messaging tool used to verify a user’s credentials
    • Communication tool used to inform a user about a website or application they are trying to access
    • Administrator tool used to monitor users on their network
    • Communication tool used to notify an administrator when a new user is created
  6. When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?

    • None, Security Management Server would be installed by itself.
    • SmartConsole
    • SecureClient
    • SmartEvent
  7. An Endpoint identity agent uses a ___________ for user authentication.

    • Shared secret
    • Token
    • Username/password or Kerberos Ticket
    • Certificate
  8. What is the purpose of a Stealth Rule?

    • A rule used to hide a server’s IP address from the outside world.
    • A rule that allows administrators to access SmartDashboard from any device.
    • To drop any traffic destined for the firewall that is not otherwise explicitly allowed.
    • A rule at the end of your policy to drop any traffic that is not explicitly allowed.
  9. To view the policy installation history for each gateway, which Access Tool in SmartConsole would an administrator use?

    • Revision History
    • Gateway installations
    • Installation history
    • Gateway history
  10. Which SmartConsole tab shows logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?

    • Gateway and Servers
    • Logs and Monitor
    • Manage and Settings
    • Security Policies
  11. Which of the following is NOT a valid deployment option for R80?

    • All-in-one (stand-alone)
    • Log server
    • SmartEvent
    • Multi-domain management server
  12. You have created a rule at the top of your Rule Base to permit Guest Wireless access to the Internet. However, when guest users attempt to reach the Internet, they are not seeing the splash page to accept your Terms of Service, and cannot access the Internet. How can you fix this?

    156-215.80 Check Point Certified Security Administrator (CCSA R80) Part 25 Q12 064
    156-215.80 Check Point Certified Security Administrator (CCSA R80) Part 25 Q12 064
    •  Right click Accept in the rule, select “More”, and then check “Enable Identity Captive Portal”
    • On the firewall object, Legacy Authentication screen, check “Enable Identity Captive Portal”
    • In the Captive Portal screen of Global Properties, check “Enable Identity Captive Portal”
    • On the Security Management Server object, check the box “Identity Logging”
  13. Identity Awareness allows the Security Administrator to configure network access based on which of the following?

    • Name of the application, identity of the user, and identity of the machine
    • Identity of the machine, username, and certificate
    • Network location, identity of a user, and identity of a machine
    • Browser-Based Authentication, identity of a user, and network location
  14. Which option will match a connection regardless of its association with a VPN community?

    • All Site-to-Site VPN Communities
    • Accept all encrypted traffic
    • All Connections (Clear or Encrypted)
    • Specific VPN Communities
  15. Which of the following is NOT a tracking log option in R80.x?

    • Log
    • Full Log
    • Detailed Log
    • Extended Log
  16. Which information is included in the “Extended Log” tracking option, but is not included in the “Log” tracking option?

    • file attributes
    • application information
    • destination port
    • data type information
  17. Where is the “Hit Count” feature enabled or disabled in SmartConsole?

    • On the Policy Package
    • On each Security Gateway
    • On the Policy layer
    • In Global Properties for the Security Management Server
  18. Which tool is used to enable cluster membership on a Gateway?

    • SmartUpdate
    • cpconfig
    • SmartConsole
    • sysconfig
  19. Which key is created during Phase 2 of a site-to-site VPN?

    • Pre-shared secret
    • Diffie-Hellman Public Key
    • Symmetrical IPSec key
    • Diffie-Hellman Private Key
  20. Each cluster, at a minimum, should have at least ___________ interfaces.

    • Five
    • Two
    • Three
    • Four