Logo Passei Direto
Material
Study with thousands of resources!

Text Material Preview

156-215.81.20 Check Point Certified Security Administrator R81.20 exam dumps
questions are the best material for you to test all the related Check Point exam
topics. By using the 156-215.81.20 exam dumps questions and practicing your
skills, you can increase your confidence and chances of passing the
156-215.81.20 exam.
Features of Dumpsinfo’s products
Instant Download
Free Update in 3 Months
Money back guarantee
PDF and Software
24/7 Customer Support
Besides, Dumpsinfo also provides unlimited access. You can get all
Dumpsinfo files at lowest price.
Check Point Certified Security Administrator R81.20 156-215.81.20 exam
free dumps questions are available below for you to study. 
Full version: 156-215.81.20 Exam Dumps Questions
1.Under which file is the proxy arp configuration stored?
A. $FWDIR/state/proxy_arp.conf on the management server
B. $FWDIR/conf/local.arp on the management server
C. $FWDIR/state/_tmp/proxy.arp on the security gateway
D. $FWDIR/conf/local.arp on the gateway
Answer: D
Explanation:
The file that stores the proxy arp configuration is $FWDIR/conf/local.arp on the gateway3. The other
files are not related to proxy arp configuration.
Reference: How to configure Proxy ARP for Manual NAT on Security Gateway, [Check Point CCSA -
R81: Practice Test & Explanation]
 1 / 20
https://www.dumpsinfo.com/unlimited-access/
https://www.dumpsinfo.com/exam/156-215-81-20
2.One of major features in R80.x SmartConsole is concurrent administration.
Which of the following is NOT possible considering that AdminA, AdminB, and AdminC are editing the
same Security Policy?
A. AdminC sees a lock icon which indicates that the rule is locked for editing by another administrator.
B. AdminA and AdminB are editing the same rule at the same time.
C. AdminB sees a pencil icon next the rule that AdminB is currently editing.
D. AdminA, AdminB and AdminC are editing three different rules at the same time.
Answer: B
Explanation:
One of the major features in R80.x SmartConsole is concurrent administration, which allows multiple
administrators to work on the same Security Policy at the same time12. However, only one
administrator can edit a rule at a time. If AdminA and AdminB are editing the same rule at the same
time, it will cause a conflict and prevent them from saving their changes12. Therefore, the correct
answer is B. AdminA and AdminB are editing the same rule at the same time.
3.Which of the following situations would not require a new license to be generated and installed?
A. The Security Gateway is upgraded.
B. The existing license expires.
C. The license is upgraded.
D. The IP address of the Security Management or Security Gateway has changed.
Answer: A
Explanation:
Upgrading the Security Gateway does not require a new license to be generated and installed. The
license is tied to the IP address or hostname of the Security Gateway, not the software version.
However, if the IP address or hostname changes, the existing license expires, or the license is
upgraded, a new license must be generated and installed12
Reference: Check Point R81, Managing and Installing license via SmartUpdate
4.In order to see real-time and historical graph views of Security Gateway statistics in SmartView
Monitor, what feature needs to be enabled on the Security Gateway?
A. Logging & Monitoring
B. None - the data is available by default
C. Monitoring Blade
D. SNMP
Answer: C
Explanation:
In order to see real-time and historical graph views of Security Gateway statistics in SmartView
Monitor, the Monitoring Blade feature needs to be enabled on the Security Gateway. The Monitoring
Blade is a software blade that collects and displays network and security performance data from the
Security Gateway, such as traffic, throughput, connections, CPU usage, memory usage, etc. The
Monitoring Blade can be enabled or disabled on each Security Gateway from the SmartConsole.
Reference: [Monitoring Blade], [SmartView Monitor]
5.What is the main difference between Static NAT and Hide NAT?
A. Static NAT only allows incoming connections to protect your network.
B. Static NAT allow incoming and outgoing connections. Hide NAT only allows outgoing connections.
C. Static NAT only allows outgoing connections. Hide NAT allows incoming and outgoing
connections.
 2 / 20
https://www.dumpsinfo.com/
D. Hide NAT only allows incoming connections to protect your network.
Answer: B
Explanation:
The main difference between Static NAT and Hide NAT is that Static NAT allows incoming and
outgoing connections, while Hide NAT only allows outgoing connections4. Static NAT translates a
single IP address to another single IP address, while Hide NAT translates a group of IP addresses to
a single IP address. Static NAT is used to expose internal servers to external networks, while Hide
NAT is used to hide internal hosts from external networks.
Reference: Check Point R81 Firewall Administration Guide
6.When installing a dedicated R80 SmartEvent server, what is the recommended size of the root
partition?
A. Any size
B. Less than 20GB
C. More than 10GB and less than 20 GB
D. At least 20GB
Answer: D
Explanation:
The correct answer is D because the recommended size of the root partition for a dedicated R80
SmartEvent server is at least 20GB2. Any size, less than 20GB, or more than 10GB and less than
20GB are not sufficient for the SmartEvent server.
Reference: Check Point R80.40 Installation and Upgrade Guide
7.How many users can have read/write access in Gaia Operating System at one time?
A. One
B. Three
C. Two
D. Infinite
Answer: A
Explanation:
Only one user can have read/write access in Gaia Operating System at one time2. This is to prevent
conflicts and errors when multiple users try to modify the same configuration settings.
Reference: Check Point Gaia Administration Guide
8.Which command is used to add users to or from existing roles?
A. add rba user <User Name> roles <List>
B. add user <User Name>
C. add rba user <User Name>
D. add user <User Name> roles <List>
Answer: A
Explanation:
The command add rba user <User Name> roles <List> is used to add users to or from existing roles.
RBA stands for Role-Based Administration, which is a feature that allows administrators to assign
different permissions and access levels to users based on their roles2.
Reference: 2: Check Point R81 Security Management Administration Guide, page 20.
9.Gaia includes Check Point Upgrade Service Engine (CPUSE), which can directly receive updates
for what components?
 3 / 20
https://www.dumpsinfo.com/
A. The Security Gateway (SG) and Security Management Server (SMS) software and the CPUSE
engine.
B. Licensed Check Point products for the Gala operating system and the Gaia operating system itself.
C. The CPUSE engine and the Gaia operating system.
D. The Gaia operating system only.
Answer: B
Explanation:
Gaia includes Check Point Upgrade Service Engine (CPUSE), which can directly receive updates for
licensed Check Point products for the Gaia operating system and the Gaia operating system itself.
CPUSE is an advanced tool that automates software updates and upgrades on Gaia platforms. It can
download and install packages such as hotfixes, Jumbo Hotfix Accumulators, minor versions, major
versions, and OS updates.
Reference: [CPUSE - Gaia Software Updates (including Gaia Software Updates Agent)], [Check Point
R81]
10.Can multiple administrators connect to a Security Management Server at the same time?
A. No, only one can be connected
B. Yes, all administrators can modify a network object at the same time
C. Yes, every administrator has their own username, and works in a session that is independent of
other administrators
D. Yes, but only one has the right to write
Answer: C
Explanation:
Multiple administrators can connect to a Security Management Server at the same time, and each
administrator has their own username and works in a session that is independent of other
administrators1. This allows concurrentadministration and prevents conflicts between different
administrators. The other options are incorrect. Only one administrator can be connected is false. All
administrators can modify a network object at the same time is false, as only one administrator can
lock and edit an object at a time. Only one has the right to write is false, as all administrators have
write permissions unless they are restricted by roles or permissions.
Reference: Security Management Server - Check Point Software
11.Which type of Check Point license is tied to the IP address of a specific Security Gateway and
cannot be transferred to a gateway that has a different IP address?
A. Formal
B. Central
C. Corporate
D. Local
Answer: D
Explanation:
Check Point licenses are divided into two types: central and local. Central licenses are managed by a
Security Management Server and can be attached to any Security Gateway managed by that server.
Local licenses are tied to the IP address of a specific Security Gateway and cannot be transferred to
a gateway that has a different IP address. Formal and corporate are not types of Check Point
licenses.
Reference: [Check Point R81 Licensing and Contract Administration Guide]
12.Which of the following is NOT an option to calculate the traffic direction?
A. Incoming
 4 / 20
https://www.dumpsinfo.com/
B. Internal
C. External
D. Outgoing
Answer: D
Explanation:
The options to calculate the traffic direction are Incoming, Internal, and External3. Outgoing is not an
option. Incoming traffic is traffic that enters the Security Gateway from an external network. Internal
traffic is traffic that originates and terminates in networks that are directly connected to the Security
Gateway. External traffic is traffic that originates or terminates in networks that are not directly
connected to the Security Gateway.
Reference: Check Point R81 Security Management Administration Guide
13.Fill in the blank: In Security Gateways R75 and above, SIC uses ______________ for encryption.
A. AES-128
B. AES-256
C. DES
D. 3DES
Answer: A
Explanation:
In Security Gateways R75 and above, SIC uses AES-128 for encryption. SIC stands for Secure
Internal Communication, which is a mechanism that establishes trust between Check Point
components, such as Security Gateways, Security Management Servers, Log Servers, etc. SIC uses
certificates to authenticate and encrypt the communication between the components. AES-128 is an
encryption algorithm that uses a 128-bit key to encrypt and decrypt data. The other options are
incorrect. AES-256 is an encryption algorithm that uses a 256-bit key, but it is not used by SIC. DES
and 3DES are older encryption algorithms that use 56-bit and 168-bit keys respectively, but they are
not used by SIC either.
Reference: [Secure Internal Communication (SIC) between Check Point components], AES -
Wikipedia, DES - Wikipedia, Triple DES - Wikipedia
14.Which command shows the installed licenses?
A. cplic print
B. print cplic
C. fwlic print
D. show licenses
Answer: A
Explanation:
The command that shows the installed licenses is cplic print. This command displays the license
information on a Check Point server or Security Gateway. It shows the license type, expiration date,
attached blades, etc. The other options are incorrect. print cplic is not a valid command. fwlic print is
not a valid command. show licenses is not a valid command.
Reference: [How to check license status on SecurePlatform / Gaia from CLI]
15.Check Point licenses come in two forms.
What are those forms?
A. Security Gateway and Security Management.
B. On-premise and Public Cloud
C. Central and Local.
D. Access Control and Threat Prevention.
 5 / 20
https://www.dumpsinfo.com/
Answer: C
Explanation:
This answer is correct because these are the two forms of Check Point licenses that are used to
activate the software blades on the Security Gateways and the Security Management Servers1. A
central license is a license that is attached to a Security Management Server and can be used to
manage multiple Security Gateways1. A local license is a license that is attached to a specific
Security Gateway and can only be used by that gateway1.
The other answers are not correct because they are either irrelevant or inaccurate options for Check
Point licenses forms. Security Gateway and Security Management are not license forms, but software
components that provide firewall, VPN, and other security features2. On-premise and Public Cloud
are not license forms, but deployment options for Check Point products3. Access Control and Threat
Prevention are not license forms, but software blades that provide different security functions.
Check Point License Guide
Check Point Software Blade Quick Licensing Guide
Check Point CloudGuard Network Security
[Check Point Software Blades]
16.In order for changes made to policy to be enforced by a Security Gateway, what action must an
administrator perform?
A. Publish changes
B. Save changes
C. Install policy
D. Install database
Answer: C
Explanation:
In order for changes made to policy to be enforced by a Security Gateway, an administrator must
perform Install Policy3. This action transfers the policy package from the Security Management
Server to the Security Gateway and activates it.
Reference: Check Point R81 Security Management Administration Guide
17.Which Security Blade needs to be enabled in order to sanitize and remove potentially malicious
content from files, before those files enter the network?
A. Threat Emulation
B. Anti-Malware
C. Anti-Virus
D. Threat Extraction
Answer: D
Explanation:
Threat Extraction is the Security Blade that needs to be enabled in order to sanitize and remove
potentially malicious content from files, before those files enter the network. It can strip out active
content, embedded objects, and other risky elements from documents and deliver a safe version of
the file to the user.
Reference: Remote Access VPN R81.20 Administration Guide, page 18.
18.How would you determine the software version from the CLI?
A. fw ver
B. fw stat
C. fw monitor
D. cpinfo
 6 / 20
https://www.dumpsinfo.com/
Answer: A
Explanation:
The command that can be used to determine the software version from the CLI is fw ver. This
command displays the version of the firewall module and the build number3. fw stat, fw monitor, and
cpinfo are not commands for software version identification.
Reference: Check Point R81 Command Line Interface Reference Guide, [156-315.81 Checkpoint
Exam Info and Free Practice Test - ExamTopics]
19.The default shell of the Gaia CLI is cli.sh.
How do you change from the cli.sh shell to the advanced shell to run Linux commands?
A. Execute the command 'enable' in the cli.sh shell
B. Execute the 'conf t' command in the cli.sh shell
C. Execute the command 'expert' in the cli.sh shell
D. Execute the 'exit' command in the cli.sh shell
Answer: C
Explanation:
The default shell of the Gaia CLI is cli.sh, which provides a limited set of commands for basic
configuration and troubleshooting. To change from the cli.sh shell to the advanced shell (also known
as expert mode) to run Linux commands, the administrator needs to execute the command ‘expert’
in the cli.sh shell
20.In SmartConsole, on which tab are Permissions and Administrators defined?
A. Manage and Settings
B. Logs and Monitor
C. Security Policies
D. Gateways and Servers
Answer: A
Explanation:
Permissions and Administrators are defined on the Manage and Settings tab in SmartConsole3. This
tab allows you to create and manage administrator accounts, roles, permissions, and authentication
methods for accessing SmartConsole and other Check Point management interfaces.
Reference: Check Point R81 Security Management Administration Guide
21.By default, which port does the WebUI listen on?
A. 8080
B. 80
C. 4434
D. 443
Answer: B
Explanation:
By default, the WebUI listens on port 80. The WebUI is a web-based interface that allows
administrators to configureand monitor Gaia OS settings and features from a web browser. The
WebUI uses the HTTP protocol to communicate with the Gaia machine, which by default uses port 80
as the standard port number. The other port numbers are not used by the WebUI by default, but they
can be changed by modifying the Gaia configuration file or using CLISH commands.
22.What is the order of NAT priorities?
A. IP pool NAT static NAT. hide NAT
 7 / 20
https://www.dumpsinfo.com/
B. Static NAT hide NAT, IP pool NAT
C. Static NAT, IP pool NAT hide NAT
D. Static NAT automatic NAT hide NAT
Answer: C
Explanation:
The order of NAT priorities is Static NAT, IP pool NAT, and hide NAT. Static NAT has the highest
priority because it is a one-to-one mapping of a private IP address to a public IP address. IP pool NAT
has the second highest priority because it is a one-to-many mapping of a private IP address to a pool
of public IP addresses. Hide NAT has the lowest priority because it is a many-to-one mapping of
multiple private IP addresses to a single public IP address1.
Reference: 1: Check Point R81 Security Gateway Administration Guide, page 23.
23.Fill in the blank: SmartConsole, SmartEvent GUI client, and ___________ allow viewing of billions
of
consolidated logs and shows them as prioritized security events.
A. SmartView Web Application
B. SmartTracker
C. SmartMonitor
D. SmartReporter
Answer: A
Explanation:
SmartConsole, SmartEvent GUI client, and SmartView Web Application allow viewing of billions of
consolidated logs and shows them as prioritized security events1. SmartView Web Application is a
web-based interface that provides access to SmartEvent reports and dashboards2.
Reference: Check Point R81 Security Management Administration Guide, Check Point R81
SmartEvent Administration Guide
24. Define Security Gateway to hide all internal networks behind the gateway’s external IP.
25.Security Zones do no work with what type of defined rule?
A. Application Control rule
B. Manual NAT rule
C. IPS bypass rule
D. Firewall rule
Answer: B
Explanation:
Security Zones are a feature of Application Control and Identity Awareness that allow you to define
groups of network objects based on their level of trust. Security Zones do not work with Manual NAT
rules, because Manual NAT rules are applied before the Application Control and Identity Awareness
policy is enforced1.
Reference: Check Point R81 Security Management Administration Guide
26.Both major kinds of NAT support Hide and Static NAT. However, one offers more flexibility.
Which statement is true?
A. Manual NAT can offer more flexibility than Automatic NAT.
B. Dynamic Network Address Translation (NAT) Overloading can offer more flexibility than Port
Address Translation.
C. Dynamic NAT with Port Address Translation can offer more flexibility than Network Address
Translation (NAT) Overloading.
 8 / 20
https://www.dumpsinfo.com/
D. Automatic NAT can offer more flexibility than Manual NAT.
Answer: A
Explanation:
Manual NAT can offer more flexibility than Automatic NAT because it allows the administrator to
define the NAT rules in any order and position1. Automatic NAT creates the NAT rules automatically
and places them at the top or bottom of the NAT Rule Base2.
Reference: Check Point R81 Firewall Administration Guide, Check Point R81 Security Management
Administration Guide
27.Identity Awareness lets an administrator easily configure network access and auditing based on
three items Choose the correct statement.
A. Network location, the identity of a user and the active directory membership.
B. Network location, the identity of a user and the identity of a machine.
C. Network location, the telephone number of a user and the UID of a machine
D. Geographical location, the identity of a user and the identity of a machine
Answer: B
Explanation:
Identity Awareness is a software blade that lets an administrator easily configure network access and
auditing based on three items: network location, the identity of a user, and the identity of a machine.
These items are used to identify and authenticate users and machines, and to enforce identity-based
policies. Network location refers to the IP address or subnet of the source or destination of the traffic.
The identity of a user can be obtained from various sources, such as Active Directory, LDAP, or
Captive Portal. The identity of a machine can be verified by using Secure Domain Logon or Identity
Agent.
28.Name the file that is an electronically signed file used by Check Point to translate the features in
the license into a code?
A. Both License (.lic) and Contract (.xml) files
B. cp.macro
C. Contract file (.xml)
D. license File (.lie)
Answer: B
Explanation:
The file that is an electronically signed file used by Check Point to translate the features in the license
into a code is cp.macro. This file contains a list of macros that define the license features and their
values. It is located in the $FWDIR/conf directory on the Security Management Server or Security
Gateway.
Reference: [Check Point R81 Licensing Guide], [Check Point R80.40 Licensing Guide]
29.What is required for a certificate-based VPN tunnel between two gateways with separate
management systems?
A. Shared Secret Passwords
B. Unique Passwords
C. Shared User Certificates
D. Mutually Trusted Certificate Authorities
Answer: D
Explanation:
This answer is correct because for a certificate-based VPN tunnel, both gateways need to have a
certificate issued by a certificate authority (CA) that they trust1. A CA is a trusted entity that verifies
 9 / 20
https://www.dumpsinfo.com/
the identity of the gateways and signs their certificates2. The gateways can either use the same CA
or different CAs, as long as they trust each other’s CA3. This way, the gateways can authenticate
each other using their certificates and establish a secure VPN tunnel.
The other answers are not correct because they are either irrelevant or incompatible with certificate-
based VPN tunnel. Shared secret passwords and unique passwords are used for pre-shared key
(PSK) authentication, which is a different method than certificate authentication4. PSK authentication
is less secure and more vulnerable to brute force attacks than certificate authentication. Shared user
certificates are not used for gateway authentication, but for user authentication, which is a different
level of authentication than gateway authentication. User authentication is optional and can be used
in addition to gateway authentication to provide more granular access control.
Configure server settings for P2S VPN Gateway connections - certificate authentication VPN
certificates and how they work
Create Certificate Based Site to Site VPN between 2 Check Point Gateways HowTo Set Up
Certificate Based VPNs with Check Point Appliances
30.Fill in the blank: ____________ is the Gaia command that turns the server off.
A. sysdown
B. exit
C. halt
D. shut-down
Answer: C
Explanation:
halt is the Gaia command that turns the server off. This command shuts down the operating system
and powers off the machine. Other commands that can be used to shut down the server are
shutdown and poweroff.
Reference: [Gaia Administration Guide R80.40]
31.A SAM rule Is implemented to provide what function or benefit?
A. Allow security audits.
B. Handle traffic as defined in the policy.
C. Monitor sequence activity.
D. Block suspicious activity.
Answer: D
Explanation:
A SAM (Suspicious Activity Monitoring) rule is implemented to provide the function or benefit of
blocking suspicious activity. A SAM rule is a rule that defines an action to be taken by the firewall
when it detects a suspicious activity, such as an attack, a scan, or a policy violation. The action can
be blocking, dropping, rejecting, or logging the traffic that triggered the suspicious activity. A SAM rule
can be created manually or automatically by other security features, such as IPS, Anti-Bot, or
SmartEvent.
Reference: [SAMRules], [Suspicious Activity Rules]
32.Fill in the blanks: Default port numbers for an LDAP server is ______ for standard connections and
_______ SSL connections.
A. 675, 389
B. 389, 636
C. 636, 290
D. 290, 675
Answer: B
 10 / 20
https://www.dumpsinfo.com/
Explanation:
The default port numbers for an LDAP server are 389 for standard connections and 636 for SSL
connections. LDAP (Lightweight Directory Access Protocol) is a protocol that allows access to
directory services over TCP/IP. Therefore, the correct answer is B. 389, 636.
33.Which software blade enables Access Control policies to accept, drop, or limit web site access
based on user, group, and/or machine?
A. Application Control
B. Data Awareness
C. Identity Awareness
D. Threat Emulation
Answer: A
Explanation:
Application Control is the software blade that enables Access Control policies to accept, drop, or limit
web site access based on user, group, and/or machine. Application Control allows you to define
granular rules for applications, web sites, web categories, web content types, and users. You can also
use Application Control to monitor and block risky applications and web usage.
Reference: [Application Control Administration Guide R80.40]
34.A Check Point Software license consists of two components, the Software Blade and the Software
Container. There are ______ types of Software Containers: ________.
A. Two; Security Management and Endpoint Security
B. Two; Endpoint Security and Security Gateway
C. Three; Security Management, Security Gateway, and Endpoint Security
D. Three; Security Gateway, Endpoint Security, and Gateway Management
Answer: C
Explanation:
A Check Point Software license consists of two components, the Software Blade and the Software
Container. There are three types of Software Containers: Security Management, Security Gateway,
and Endpoint Security1. A Software Blade is a specific security function that can be enabled or
disabled on a Software Container. A Software Container is a platform that runs one or more Software
Blades. Security Management is a container that manages the security policy and configuration of
Security Gateways. Security Gateway is a container that enforces the security policy on network
traffic. Endpoint Security is a container that protects endpoints from threats and data loss.
Reference: Check Point Licensing and Contract Operations User Guide
35.Fill in the blank: When a policy package is installed, ________ are also distributed to the target
installation Security Gateways.
A. User and objects databases
B. Network databases
C. SmartConsole databases
D. User databases
Answer: A
Explanation:
When a policy package is installed, user and objects databases are also distributed to the target
installation Security Gateways14. The user and objects databases contain information about network
objects, users, groups, services, VPN domains, and more14. Therefore, the correct answer is
A. User and objects databases.
 11 / 20
https://www.dumpsinfo.com/
36.True or False: In R80, more than one administrator can login to the Security Management Server
with write permission at the same time.
A. False, this feature has to be enabled in the Global Properties.
B. True, every administrator works in a session that is independent of the other administrators.
C. True, every administrator works on a different database that is independent of the other
administrators.
D. False, only one administrator can login with write permission.
Answer: B
Explanation:
The answer is B because in R80 and above, more than one administrator can login to the Security
Management Server with write permission at the same time. Every administrator works in a session
that is independent of the other administrators. This is called concurrent administration and it allows
multiple administrators to work on the same policy package simultaneously34
Reference: Check Point R80.10 Concurrent Administration, Check Point R80.40 Security
Management Administration Guide
37.Which option, when applied to a rule, allows traffic to VPN gateways in specific VPN communities?
A. All Connections (Clear or Encrypted)
B. Accept all encrypted traffic
C. Specific VPN Communities
D. All Site-to-Site VPN Communities
Answer: C
Explanation:
The option that allows traffic to VPN gateways in specific VPN communities is Specific VPN
Communities4. This option enables you to define which VPN communities are allowed in the rule. All
Connections (Clear or Encrypted) allows traffic to any destination, regardless of whether it is
encrypted or not. Accept all encrypted traffic allows traffic to any encrypted destination, regardless of
the VPN community. All Site-to-Site VPN Communities allows traffic to any site-to-site VPN gateway,
regardless of the VPN community4. Therefore, the correct answer is
C. Specific VPN Communities.
38.What Check Point technologies deny or permit network traffic?
A. Application Control, DLP
B. Packet Filtering, Stateful Inspection, Application Layer Firewall.
C. ACL, SandBlast, MPT
D. IPS, Mobile Threat Protection
Answer: B
Explanation:
Check Point technologies that deny or permit network traffic are packet filtering, stateful inspection,
and application layer firewall1, p. 15-16. Packet filtering is a basic firewall technique that examines
packets based on their source and destination addresses and ports2, p. 13. Stateful inspection is an
advanced firewall technique that tracks the state and context of network connections and inspects
packets based on their content and sequence2, p. 13. Application layer firewall is a firewall technique
that operates at the application layer of the OSI model and inspects packets based on their
application protocols and data2, p. 14.
Reference: Check Point CCSA - R81: Practice Test & Explanation, 156-315.81 Checkpoint Exam Info
and Free Practice Test
 12 / 20
https://www.dumpsinfo.com/
39.Gaia has two default user accounts that cannot be deleted.
What are those user accounts?
A. Admin and Default
B. Expert and Clish
C. Control and Monitor
D. Admin and Monitor
Answer: D
Explanation:
Gaia has two default user accounts that cannot be deleted. They are Admin and Monitor. Admin is the
user account that has full administrative privileges and can access both WebUI and CLI. Monitor is
the user account that has read-only privileges and can access only WebUI2. The other options are
not default user accounts in Gaia.
40.Fill in the blank: An identity server uses a______________to trust a Terminal Server Identity
Agent.
A. One-time password
B. Shared secret
C. Certificate
D. Token
Answer: B
41.The SmartEvent R80 Web application for real-time event monitoring is called:
A. SmartView Monitor
B. SmartEventWeb
C. There is no Web application for SmartEvent
D. SmartView
Answer: D
Explanation:
SmartView is the web application for real-time event monitoring in SmartEvent R80 and above. It
provides a unified view of security events across the network and allows for quick investigation and
response34.
Reference: SmartEvent R80.40 Administration Guide, SmartView
42.What are the two types of NAT supported by the Security Gateway?
A. Destination and Hide
B. Hide and Static
C. Static and Source
D. Source and Destination
Answer: B
Explanation:
The two types of NAT supported by the Security Gateway are hide NAT and static NAT. Hide NAT
translates many source IP addresses into one IP address, usually the external interface of the
gateway. Static NAT translates one source IP address into another IP address, usually a public IP
address34. The other options are not valid types of NAT.
Reference: Network Address Translation (NAT), Check Point CCSA - R81: Practice Test &
Explanation
 13 / 20
https://www.dumpsinfo.com/
43.When a SAM rule is required on Security Gateway to quickly block suspicious connections which
are not restricted by the Security Policy, what actions does the administrator need to take?
A. SmartView Monitorshould be opened and then the SAM rule/s can be applied immediately.
Installing policy is not required.
B. The policy type SAM must be added to the Policy Package and a new SAM rule must be applied.
Simply Publishing the changes applies the SAM rule on the firewall.
C. The administrator must work on the firewall CLI (for example with SSH and PuTTY) and the
command 'sam block' must be used with the right parameters.
D. The administrator should open the LOGS & MONITOR view and find the relevant log. Right
clicking on the log entry will show the Create New SAM rule option.
Answer: A
Explanation:
When a SAM rule is required on Security Gateway to quickly block suspicious connections which are
not restricted by the Security Policy, the administrator needs to take the following action: SmartView
Monitor should be opened and then the SAM rule/s can be applied immediately. Installing policy is not
required. SAM stands for Suspicious Activity Monitoring and is a feature that allows administrators to
block or limit connections from specific sources or destinations without modifying the security policy.
SAM rules can be created from SmartView Monitor or SmartEvent based on real-time network activity
or security events.
Reference: [Check Point R81 SmartView Monitor Administration Guide]
44. An Endpoint identity agent is a lightweight client installed on endpoint computers that
communicates with Identity Awareness gateways and provides reliable identity information. An
Endpoint identity agent does not use a shared secret, a token, or a certificate for user authentication.
Reference: Check Point CCSA - R81: Practice Test & Explanation, [Check Point Identity Awareness
Administration Guide R81]
45.Fill in the blank RADIUS protocol uses_____to communicate with the gateway
A. UDP
B. CCP
C. TDP
D. HTTP
Answer: A
Explanation:
RADIUS protocol uses UDP (User Datagram Protocol) to communicate with the gateway. UDP is a
connectionless protocol that does not require a handshake or acknowledgment before sending or
receiving data2.
Reference: 2: [Check Point R81 Identity Awareness Administration Guide], page 14.
46.Which software blade does NOT accompany the Threat Prevention policy?
A. IPS
B. Application Control and URL Filtering
C. Threat Emulation
D. Anti-virus
Answer: B
Explanation:
The Threat Prevention policy is a unified policy that manages three software blades: IPS, Anti-Virus,
 14 / 20
https://www.dumpsinfo.com/
and Threat Emulation7. The Threat Prevention policy enables you to configure settings and actions
for detecting and preventing various types of threats, such as malware, exploits, botnets,
etc. Application Control and URL Filtering are not part of the Threat Prevention policy, but they are
part of a separate policy that controls access to applications and websites based on categories,
users, groups, and machines
47.Which product correlates logs and detects security threats, providing a centralized display of
potential attack patterns from all network devices?
A. SmartDashboard
B. SmartEvent
C. SmartView Monitor
D. SmartUpdate
Answer: B
Explanation:
The product that correlates logs and detects security threats, providing a centralized display of
potential attack patterns from all network devices is SmartEvent. SmartEvent is a software blade that
analyzes logs from various sources such as Security Gateways, Endpoint Security Servers, Identity
Awareness Servers, etc. and generates security events based on predefined or custom rules.
SmartEvent provides a graphical interface for viewing and managing security events in real-time or
historical mode.
Reference: [Check Point R81 SmartEvent Administration Guide]
48.Which one of the following is a way that the objects can be manipulated using the new API
integration in R80 Management?
A. Microsoft Publisher
B. JSON
C. Microsoft Word
D. RC4 Encryption
Answer: B
Explanation:
The way that the objects can be manipulated using the new API integration in R80 Management is
JSON. JSON (JavaScript Object Notation) is a lightweight data-interchange format that is easy for
humans and machines to read and write. The R80 Management API uses JSON as the primary data
format for requests and responses. Therefore, the correct answer is B. JSON.
49.What is NOT an advantage of Stateful Inspection?
A. High Performance
B. Good Security
C. No Screening above Network layer
D. Transparency
Answer: C
Explanation:
The option that is NOT an advantage of Stateful Inspection is No Screening above Network layer.
Stateful Inspection is a firewall technology that inspects packets at all layers of the OSI model, from
layer 3 (Network) to layer 7 (Application). Stateful Inspection provides screening above Network layer,
such as checking TCP flags, sequence numbers, ports, and application protocols. The other options
are advantages of Stateful Inspection, as it provides high performance, good security, and
transparency for legitimate traffic.
Reference: Stateful Inspection Technology, Firewall Administration Guide
 15 / 20
https://www.dumpsinfo.com/
50.You are the Check Point administrator for Alpha Corp with an R80 Check Point estate. You have
received a call by one of the management users stating that they are unable to browse the Internet
with their new tablet connected to the company Wireless. The Wireless system goes through the
Check Point Gateway.
How do you review the logs to see what the problem may be?
A. Open SmartLog and connect remotely to the IP of the wireless controller
B. Open SmartView Tracker and filter the logs for the IP address of the tablet
C. Open SmartView Tracker and check all the IP logs for the tablet
D. Open SmartLog and query for the IP address of the Manager’s tablet
Answer: D
Explanation:
SmartLog is a unified log viewer that provides fast and easy access to logs from all Check Point
components3. It allows the administrator to query for any log field, such as the IP address of the
tablet, and filter the results by time, severity, blade, action, and more4. SmartView Tracker is a legacy
tool that displays network activity logs from Security Gateways and other Check Point devices. It does
not support remote connection to the wireless controller or querying for specific IP addresses.
Reference: SmartLog, SmartLog Queries, [SmartView Tracker]
51.You are asked to check the status of several user-mode processes on the management server
and gateway.
Which of the following processes can only be seen on a Management Server?
A. fwd
B. fwm
C. cpd
D. cpwd
Answer: B
Explanation:
The fwm process is responsible for managing the communication between the SmartConsole and the
Security Management Server. It can only be seen on a Management Server12.
Reference: Check Point Processes and Daemons, Check Point CCSA - R81: Practice Test &
Explanation
52.With URL Filtering, what portion of the traffic is sent to the Check Point Online Web Service for
analysis?
A. The complete communication is sent for inspection.
B. The IP address of the source machine.
C. The end user credentials.
D. The host portion of the URL.
Answer: D
Explanation:
With URL Filtering, only the host portion of the URL is sent to the Check Point Online Web Service for
analysis. The host portion is the part of the URL that identifies the web server, such as
www.example.com. The Check Point Online Web Service uses this information to categorize the URL
and return the appropriate action to the Security Gateway3. The other options are not sent to the
Check Point Online Web Service for analysis, as they may contain sensitive or irrelevant data.
53.To increase security, the administrator has modified the Core protection ‘Host Port Scan’ from
 16 / 20
https://www.dumpsinfo.com/
‘Medium’ to ‘High’ Predefined Sensitivity.
Which Policy should the administrator install after Publishing the changes?
A. The Access Control and Threat Prevention Policies.
B. The Access Control Policy.
C. The Access Control & HTTPS Inspection Policy.
D.The Threat Prevention Policy.
Answer: D
Explanation:
To increase security, the administrator has modified the Core protection ‘Host Port Scan’ from
‘Medium’ to ‘High’ Predefined Sensitivity. The administrator should install the Threat Prevention
Policy after Publishing the changes3. The Threat Prevention Policy defines how the Security Gateway
inspects and protects against threats such as port scans, bot attacks, and zero-day exploits4.
Reference: Check Point R81 Firewall Administration Guide, Check Point R81 Threat Prevention
Administration Guide
54.If there are two administrators logged in at the same time to the SmartConsole, and there are
objects locked for editing, what must be done to make them available to other administrators?
Choose the BEST answer
A. Save and install the Policy
B. Delete older versions of database
C. Revert the session.
D. Publish or discard the session
Answer: D
Explanation:
If there are two administrators logged in at the same time to the SmartConsole, and there are objects
locked for editing, the administrator who locked the objects must publish or discard the session to
make them available to other administrators. Publishing or discarding the session will save or discard
the changes made by the administrator and unlock the objects for editing by others3.
Reference: 3: Check Point R81 Security Management Administration Guide, page 18.
55.Which one of these features is NOT associated with the Check Point URL Filtering and Application
Control Blade?
A. Detects and blocks malware by correlating multiple detection engines before users are affected.
B. Configure rules to limit the available network bandwidth for specified users or groups.
C. Use UserCheck to help users understand that certain websites are against the company’s security
policy.
D. Make rules to allow or block applications and Internet sites for individual applications, categories,
and risk levels.
Answer: A
Explanation:
The correct answer is A because detecting and blocking malware by correlating multiple detection
engines before users are affected is not a feature of the Check Point URL Filtering and Application
Control Blade3. This feature is part of the Check Point Anti-Virus and Anti-Bot Blades3. The other
options are features of the Check Point URL Filtering and Application Control Blade3.
Reference: Check Point R81 URL Filtering and Application Control Administration Guide
56.What is the most recommended installation method for Check Point appliances?
A. SmartUpdate installation
B. DVD media created with Check Point ISOMorphic
 17 / 20
https://www.dumpsinfo.com/
C. USB media created with Check Point ISOMorphic
D. Cloud based installation
Answer: C
Explanation:
USB media created with Check Point ISOMorphic is the most recommended installation method for
Check Point appliances, as it provides a fast and easy way to install the Gaia operating system and
the latest software version4. SmartUpdate installation requires an existing Gaia installation and does
not support fresh installations4. DVD media created with Check Point ISOMorphic is less convenient
than USB media, as it requires burning the image to a DVD and inserting it into the appliance4. Cloud
based installation is not applicable for Check Point appliances, as it is intended for cloud
environments such as AWS or Azure4.
Reference: INSTALLATION AND UPGRADE GUIDE R81.10, Chassis R81 Installation and Upgrade
Guide, Check Point R81.10
57.Stateful Inspection compiles and registers connections where?
A. Connection Cache
B. State Cache
C. State Table
D. Network Table
Answer: C
Explanation:
Stateful Inspection compiles and registers connections in the State Table. The State Table is a
database that stores information about active connections and sessions on the Security Gateway.
The other options are not valid names for the database that stores connection information.
Reference: 1: Policy Types 2: CPUSE 3: SIC: [Software Containers]: [Stateful Inspection]
58.When configuring Spoof Tracking, which tracking actions can an administrator select to be done
when spoofed packets are detected?
A. Log, send snmp trap, email
B. Drop packet, alert, none
C. Log, alert, none
D. Log, allow packets, email
Answer: C
Explanation:
The tracking actions that can be selected when configuring Spoof Tracking are Log, alert, none.
Spoof Tracking is a feature that detects packets with spoofed source IP addresses and logs them in
SmartView Tracker. The administrator can choose to log only, log and alert, or do nothing when
spoofed packets are detected. The other options are not valid tracking actions for Spoof Tracking, as
they are either not available or not relevant for this feature.
Reference: [Spoof Tracking], [Firewall Administration Guide]
59.Fill in the blank: Service blades must be attached to a ______________.
A. Security Gateway
B. Management container
C. Management server
D. Security Gateway container
Answer: A
Explanation:
Service blades must be attached to a Security Gateway. A Security Gateway is a device that enforces
 18 / 20
https://www.dumpsinfo.com/
security policies on traffic that passes through it. A service blade is a software module that provides a
specific security function, such as firewall, VPN, IPS, etc. A Security Gateway can have one or more
service blades attached to it, depending on the license and hardware capabilities. The other options
are incorrect. A management container is a virtualized environment that hosts a Security
Management Server or a Log Server. A management server is a device that manages security
policies and distributes them to Security Gateways. A Security Gateway container is not a valid term
in Check Point terminology.
Reference: [Check Point R81 Security Management Administration Guide], [Check Point R81
CloudGuard Administration Guide]
60.What command would show the API server status?
A. cpm status
B. api restart
C. api status
D. show api status
Answer: D
Explanation:
The command api status shows the API server status, including whether it is enabled or not, the port
number, and the API version1.
Reference: Check Point R81 API Reference Guide
61.Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor
displays _____________ for the given VPN tunnel.
A. Down
B. No Response
C. Inactive
D. Failed
Answer: A
Explanation:
When tunnel test packets no longer invoke a response, SmartView Monitor displays Down for the
given VPN tunnel1. This means that the VPN tunnel is not operational and there is no IKE or IPsec
traffic passing through it. No Response, Inactive, and Failed are not valid statuses for VPN tunnels in
SmartView Monitor.
Reference: Smart View Monitor displays status for all S2S VPN tunnels - Phase1 UP
62.You have created a rule at the top of your Rule Base to permit Guest Wireless access to the
Internet. However, when guest users attempt to reach the Internet, they are not seeing the splash
page to accept your Terms of Service, and cannot access the Internet.
How can you fix this?
A. Right click Accept in the rule, select “More”, and then check “Enable Identity Captive Portal”
B. On the firewall object, Legacy Authentication screen, check “Enable Identity Captive Portal”
C. In the Captive Portal screen of Global Properties, check “Enable Identity Captive Portal”
 19 / 20
https://www.dumpsinfo.com/
D. On the Security Management Server object, check the box “Identity Logging”
Answer: A
Explanation:
Identity Captive Portal is a Check Point Identity Awareness web portal, to which users connect with
their web browser to log in and authenticate, when using Browser-Based Authentication2. To enable
Identity Captive Portal for a specific rule, you need to right click Accept in the rule, select “More”, and
then check “Enable Identity Captive Portal”3.
Reference: Identity Awareness Administration Guide R80, Identity awareness with captive portal in
Checkpoint R80
Powered by TCPDF (www.tcpdf.org)20 / 20
https://www.dumpsinfo.com/
http://www.tcpdf.org