Checkpoint 156-215.80 Exam Practice Questions (P. 4)
- Full Access (536 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #31
Examine the following Rule Base.

What can we infer about the recent changes made to the Rule Base?

What can we infer about the recent changes made to the Rule Base?
- ARule 7 was created by the 'admin' administrator in the current session
- B8 changes have been made by administrators since the last policy installation
- CTe rules 1, 5 and 6 cannot be edited by the 'admin' administrator
- DRule 1 and object webserver are locked by another administrator
Correct Answer:
D
Explantation:
On top of the print screen there is a number "8" which consists for the number of changes made and not saved.
Session Management Toolbar (top of SmartConsole)

Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/CP_R80_SecMGMT/117948
D
Explantation:
On top of the print screen there is a number "8" which consists for the number of changes made and not saved.
Session Management Toolbar (top of SmartConsole)

Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/CP_R80_SecMGMT/117948
send
light_mode
delete
Question #32
ALPHA Corp has a new administrator who logs into the Gaia Portal to make some changes. He realizes that even though he has logged in as an administrator, he is unable to make any changes because all configuration options are greyed out as shown in the screenshot image below. What is the likely cause for this?


- AThe Gaia /bin/confd is locked by another administrator from a SmartConsole session.
- BThe database is locked by another administrator SSH session.Most Voted
- CThe Network address of his computer is in the blocked hosts.
- DThe IP address of his computer is not in the allowed hosts.
Correct Answer:
B
There is a lock on top left side of the screen. B is the logical answer.
B
There is a lock on top left side of the screen. B is the logical answer.
send
light_mode
delete
Question #33
Administrator Kofi has just made some changes on his Management Server and then clicks on the Publish button in SmartConsole but then gets the error message shown in the screenshot below.
Where can the administrator check for more information on these errors?

Where can the administrator check for more information on these errors?

- AThe Log and Monitor section in SmartConsole
- BThe Validations section in SmartConsole
- CThe Objects section in SmartConsole
- DThe Policies section in SmartConsole
Correct Answer:
B
Validation Errors -
The validations pane in SmartConsole shows configuration error messages. Examples of errors are object names that are not unique, and the use of objects that are not valid in the Rule Base.
To publish, you must fix the errors.
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/CP_R80_SecMGMT/126197
B
Validation Errors -
The validations pane in SmartConsole shows configuration error messages. Examples of errors are object names that are not unique, and the use of objects that are not valid in the Rule Base.
To publish, you must fix the errors.
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/CP_R80_SecMGMT/126197
send
light_mode
delete
Question #34
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?
- AEliminate all possible contradictory rules such as the Stealth or Cleanup rules.
- BCreate a separate Security Policy package for each remote Security Gateway.
- CCreate network objects that restrict all applicable rules to only certain networks.
- DRun separate SmartConsole instances to login and configure each Security Gateway directly.
Correct Answer:
B
B
send
light_mode
delete
Question #35
Harriet wants to protect sensitive information from intentional loss when users browse to a specific URL: https://personal.mymail.com, which blade will she enable to achieve her goal?
- ADLP
- BSSL Inspection
- CApplication Control
- DURL Filtering
Correct Answer:
A
Check Point revolutionizes DLP by combining technology and processes to move businesses from passive detection to active Data Loss Prevention. Innovative
MultiSpectג„¢ data classification combines user, content and process information to make accurate decisions, while UserCheckג„¢ technology empowers users to remediate incidents in real time. Check Point's self-educating network-based DLP solution frees IT/security personnel from incident handling and educates users
ג€"
on proper data handling policies
protecting sensitive corporate information from both intentional and unintentional loss.
Reference:
https://www.checkpoint.com/downloads/product-related/datasheets/DLP-software-blade-datasheet.pdf
A
Check Point revolutionizes DLP by combining technology and processes to move businesses from passive detection to active Data Loss Prevention. Innovative
MultiSpectג„¢ data classification combines user, content and process information to make accurate decisions, while UserCheckג„¢ technology empowers users to remediate incidents in real time. Check Point's self-educating network-based DLP solution frees IT/security personnel from incident handling and educates users
ג€"
on proper data handling policies
protecting sensitive corporate information from both intentional and unintentional loss.
Reference:
https://www.checkpoint.com/downloads/product-related/datasheets/DLP-software-blade-datasheet.pdf
send
light_mode
delete
Question #36
To optimize Rule Base efficiency the most hit rules should be where?
- ARemoved from the Rule Base.
- BTowards the middle of the Rule Base.
- CTowards the top of the Rule Base.
- DTowards the bottom of the Rule Base.
Correct Answer:
C
It is logical that if lesser rules are checked for the matched rule to be found the lesser CPU cycles the device is using. Checkpoint match a session from the first rule on top till the last on the bottom.
C
It is logical that if lesser rules are checked for the matched rule to be found the lesser CPU cycles the device is using. Checkpoint match a session from the first rule on top till the last on the bottom.
send
light_mode
delete
Question #37
Which of the following is NOT a license activation method?
- ASmartConsole Wizard
- BOnline Activation
- CLicense Activation Wizard
- DOffline Activation
Correct Answer:
A
A
send
light_mode
delete
Question #38
Which policy type has its own Exceptions section?
- AThread PreventionMost Voted
- BAccess Control
- CThreat Emulation
- DDesktop Security
Correct Answer:
A
The Exceptions Groups pane lets you define exception groups. When necessary, you can create exception groups to use in the Rule Base. An exception group contains one or more defined exceptions. This option facilitates ease-of-use so you do not have to manually define exceptions in multiple rules for commonly required exceptions. You can choose to which rules you want to add exception groups. This means they can be added to some rules and not to others, depending on necessity.
Reference:
https://sc1.checkpoint.com/documents/R77/CP_R77_ThreatPrevention_WebAdmin/82209.htm#o97030
A
The Exceptions Groups pane lets you define exception groups. When necessary, you can create exception groups to use in the Rule Base. An exception group contains one or more defined exceptions. This option facilitates ease-of-use so you do not have to manually define exceptions in multiple rules for commonly required exceptions. You can choose to which rules you want to add exception groups. This means they can be added to some rules and not to others, depending on necessity.
Reference:
https://sc1.checkpoint.com/documents/R77/CP_R77_ThreatPrevention_WebAdmin/82209.htm#o97030
send
light_mode
delete
Question #39
By default, which port does the WebUI listen on?
- A80
- B4434
- C443
- D8080
Correct Answer:
C
To configure Security Management Server on Gaia:
✑ Open a browser to the WebUI: https://<Gaia management IP address>
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_Gaia_IUG/html_frameset.htm?topic=documents/R80/CP_R80_Gaia_IUG/132120
C
To configure Security Management Server on Gaia:
✑ Open a browser to the WebUI: https://<Gaia management IP address>
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_Gaia_IUG/html_frameset.htm?topic=documents/R80/CP_R80_Gaia_IUG/132120
send
light_mode
delete
Question #40
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
- ANone, Security Management Server would be installed by itself.
- BSmartConsole
- CSecureClient
- DSecurity Gateway
Correct Answer:
D
There are different deployment scenarios for Check Point software products.
✑ Standalone Deployment - The Security Management Server and the Security Gateway are installed on the same computer or appliance.
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_Installation_and_Upgrade_Guide-webAdmin/86429.htm
D
There are different deployment scenarios for Check Point software products.
✑ Standalone Deployment - The Security Management Server and the Security Gateway are installed on the same computer or appliance.
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_Installation_and_Upgrade_Guide-webAdmin/86429.htm
send
light_mode
delete
All Pages