Download Checkpoint.156-215.80.Pass4Sure.2019-04-29.119q.tqb

Vendor: Checkpoint
Exam Code: 156-215.80
Exam Name: Check Point Certified Security Administrator
Date: Apr 29, 2019
File Size: 4 MB

Demo Questions

Question 1
In R80 spoofing is defined as a method of:
  1. Disguising an illegal IP address behind an authorized IP address through Port Address Translation.
  2. Hiding your firewall from unauthorized users.
  3. Detecting people using false or wrong authentication logins
  4. Making packets appear as if they come from an authorized IP address.
Correct answer: D
Explanation:
IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack connections to your network. Attackers use IP spoofing to send malware and bots to your protected network, to execute DoS attacks, or to gain unauthorized access. Reference: http://dl3.checkpoint.com/paid/74/74d596decb6071a4ee642fbdaae7238f/CP_R80_SecurityManagement_AdminGuide.pdf?HashKey=1479584563_6f823c8ea1514609148aa4fec5425db2&xtn=.pdf
IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack connections to your network. Attackers use IP spoofing to send malware and bots to your protected network, to execute DoS attacks, or to gain unauthorized access. 
Reference: 
http://dl3.checkpoint.com/paid/74/74d596decb6071a4ee642fbdaae7238f/CP_R80_SecurityManagement_AdminGuide.pdf?HashKey=1479584563_6f823c8ea1514609148aa4fec5425db2&xtn=.pdf
Question 2
Which Check Point feature enables application scanning and the detection?
  1. Application Dictionary
  2. AppWiki
  3. Application Library
  4. CPApp
Correct answer: B
Explanation:
AppWiki Application Classification Library AppWiki enables application scanning and detection of more than 5,000 distinct applications and over 300,000 Web 2.0 widgets including instant messaging, social networking, video streaming, VoIP, games and more. Reference: https://www.checkpoint.com/products/application-control-software-blade/
AppWiki Application Classification Library 
AppWiki enables application scanning and detection of more than 5,000 distinct applications and over 300,000 Web 2.0 widgets including instant messaging, social networking, video streaming, VoIP, games and more. 
Reference: https://www.checkpoint.com/products/application-control-software-blade/
Question 3
Which of the following statements is TRUE about R80 management plug-ins?
  1. The plug-in is a package installed on the Security Gateway.
  2. Installing a management plug-in requires a Snapshot, just like any upgrade process.
  3. A management plug-in interacts with a Security Management Server to provide new features and support for new products.
  4. Using a plug-in offers full central management only if special licensing is applied to specific features of the plug-in.
Correct answer: C
EXAM SIMULATOR

How to Open TQB Files?

Use Taurus Exam Simulator to open TQB files

Taurus Exam Simulator


Taurus Exam Simulator for Windows/macOS/Linus

Download

Taurus Exam Studio
Enjoy a 20% discount on Taurus Exam Studio!

You now have the chance to acquire Exam Studio at a discounted rate of 20%.

Get Now!
-->