Exam Details

  • Exam Code
    :156-215.80
  • Exam Name
    :Check Point Certified Security Administrator (CCSA)
  • Certification
    :Checkpoint Certifications
  • Vendor
    :CheckPoint
  • Total Questions
    :535 Q&As
  • Last Updated
    :May 01, 2025

CheckPoint Checkpoint Certifications 156-215.80 Questions & Answers

  • Question 151:

    Which utility shows the security gateway general system information statistics like operating system information and resource usage, and individual software blade statistics of VPN, Identity Awareness and DLP?

    A. cpconfig

    B. fw ctl pstat

    C. cpview

    D. fw ctl multik stat

  • Question 152:

    Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ________ .

    A. User Directory

    B. Captive Portal and Transparent Kerberos Authentication

    C. Captive Portal

    D. UserCheck

  • Question 153:

    What are the three conflict resolution rules in the Threat Prevention Policy Layers?

    A. Conflict on action, conflict on exception, and conflict on settings

    B. Conflict on scope, conflict on settings, and conflict on exception

    C. Conflict on settings, conflict on address, and conflict on exception

    D. Conflict on action, conflict on destination, and conflict on settings

  • Question 154:

    What does the "unknown" SIC status shown on SmartConsole mean?

    A. The SMS can contact the Security Gateway but cannot establish Secure Internal Communication.

    B. SIC activation key requires a reset.

    C. The SIC activation key is not known by any administrator.

    D. There is no connection between the Security Gateway and SMS.

  • Question 155:

    Kofi, the administrator of the ALPHA Corp network wishes to change the default Gaia WebUI Portal port number currently set on the default HTTPS port. Which CLISH commands are required to be able to change this TCP port?

    A. set web ssl-port

    B. set Gaia-portal

    C. set Gaia-portal https-port

    D. set web https-port

  • Question 156:

    Choose what BEST describes the Policy Layer Traffic Inspection.

    A. If a packet does not match any of the inline layers, the matching continues to the next Layer.

    B. If a packet matches an inline layer, it will continue matching the next layer.

    C. If a packet does not match any of the inline layers, the packet will be matched against the Implicit Clean-up Rule.

    D. If a packet does not match a Network Policy Layer, the matching continues to its inline layer.

  • Question 157:

    Tina is a new administrator who is currently reviewing the new Check Point R80 Management console interface. In the Gateways view, she is reviewing the Summary screen as in the screenshot below. What as an 'Open Server'?

    A. Check Point software deployed on a non-Check Point appliance.

    B. The Open Server Consortium approved Server Hardware used for the purpose of Security and Availability.

    C. A check Point Management Server deployed using the Open Systems Interconnection (OSI) Server and Security deployment model.

    D. A check Point Management Server software using the Open SSL.

  • Question 158:

    Packages and licenses are loaded from all of these sources EXCEPT

    A. Download Center Web site

    B. UserUpdate

    C. User Center

    D. Check Point DVD

  • Question 159:

    Which of the following technologies extracts detailed information from packets and stores that information in state tables?

    A. INSPECT Engine

    B. Stateful Inspection

    C. Packet Filtering

    D. Application Layer Firewall

  • Question 160:

    On the following graphic, you will find layers of policies.

    What is a precedence of traffic inspection for the defined polices?

    A. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and then if implicit Drop Rule drops the packet, it comes next to IPS layer and then after accepting the packet it passes to Threat Prevention layer.

    B. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and then if there is any rule which accepts the packet, it comes next to IPS layer and then after accepting the packet it passes to Threat Prevention layer

    C. A packet arrives at the gateway, it is checked against the rules in the networks policy layer and then if there is any rule which accepts the packet, it comes next to Threat Prevention layer and then after accepting the packet it passes to IPS layer.

    D. A packet arrives at the gateway, it is checked against the rules in IPS policy layer and then it comes next to the Network policy layer and then after accepting the packet it passes to Threat Prevention layer.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CheckPoint exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 156-215.80 exam preparations and CheckPoint certification application, do not hesitate to visit our Vcedump.com to find your solutions here.