Check Point 156-215.80 Check Point Certified Security Administrator R80 Online Training
Check Point 156-215.80 Online Training
The questions for 156-215.80 were last updated at Apr 12,2025.
- Exam Code: 156-215.80
- Exam Name: Check Point Certified Security Administrator R80
- Certification Provider: Check Point
- Latest update: Apr 12,2025
Examine the following Rule Base.
What can we infer about the recent changes made to the Rule Base?
- A . Rule 7 was created by the ‘admin’ administrator in the current session
- B . 8 changes have been made by administrators since the last policy installation
- C . Te rules 1, 5 and 6 cannot be edited by the ‘admin’ administrator
- D . Rule 1 and object webserver are locked by another administrator
ALPHA Corp has a new administrator who logs into the Gaia Portal to make some changes. He realizes that even though he has logged in as an administrator, he is unable to make any changes because all configuration options are greyed out as shown in the screenshot image below.
What is the likely cause for this?
- A . The Gaia /bin/confdis locked by another administrator from a SmartConsole session.
- B . The database is locked by another administrator SSH session.
- C . The Network address of his computer is in the blocked hosts.
- D . The IP address of his computer is not in the allowed hosts.
Administrator Kofi has just made some changes on his Management Server and then clicks on the Publish button in SmartConsole but then gets the error message shown in the screenshot below.
Where can the administrator check for more information on these errors?
- A . The Log and Monitor section in SmartConsole
- B . The Validations section in SmartConsole
- C . The Objects section in SmartConsole
- D . The Policies section in SmartConsole
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?
- A . Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.
- B . Create a separate Security Policy package for each remote Security Gateway.
- C . Create network objects that restrict all applicable rules to only certain networks.
- D . Run separate SmartConsole instances to login and configure each Security Gateway directly.
Harriet wants to protect sensitive information from intentional loss when users browse to a specific URL: https://personal.mymail.com, which blade will she enable to achieve her goal?
- A . DLP
- B . SSL Inspection
- C . Application Control
- D . URL Filtering
To optimize Rule Base efficiency the most hit rules should be where?
- A . Removed from the Rule Base.
- B . Towards the middle of the Rule Base.
- C . Towards the top of the Rule Base.
- D . Towards the bottom of the Rule Base.
Which of the following is NOT a license activation method?
- A . SmartConsole Wizard
- B . Online Activation
- C . License Activation Wizard
- D . Offline Activation
Which policy type has its own Exceptions section?
- A . Thread Prevention
- B . Access Control
- C . Threat Emulation
- D . Desktop Security
By default, which port does the WebUI listen on?
B. 4434
C. 443
D. 8080
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
- A . None, Security Management Server would be installed by itself.
- B . SmartConsole
- C . SecureClient
- D . Security Gateway