156-215.80 Dumps

156-215.80 Free Practice Test

Check-Point 156-215.80: Check Point Certified Security Administrator

QUESTION 21

- (Exam Topic 2)
Which of the following is NOT a set of Regulatory Requirements related to Information Security?

Correct Answer: A
ISO 37001 - Anti-bribery management systems

QUESTION 22

- (Exam Topic 2)
Which of the following is NOT a back up method?

Correct Answer: A
The built-in Gaia backup procedures:
Snapshot Management
System Backup (and System Restore)
Save/Show Configuration (and Load Configuration)
Check Point provides three different procedures for backing up (and restoring) the operating system and networking parameters on your appliances.
Snapshot (Revert)
Backup (Restore)
upgrade_export (Migrate) References:

QUESTION 23

- (Exam Topic 2)
Which command is used to obtain the configuration lock in Gaia?

Correct Answer: A
Obtaining a Configuration Lock
lock database override
unlock database

QUESTION 24

- (Exam Topic 4)
What does it mean if Deyra sees the gateway status
156-215.80 dumps exhibit
Choose the BEST answer.

Correct Answer: A

QUESTION 25

- (Exam Topic 1)
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ____ .

Correct Answer: B
To enable Identity Awareness:
Log in to SmartDashboard.
From the Network Objects tree, expand the Check Point branch.
Double-click the Security Gateway on which to enable Identity Awareness.
In the Software Blades section, select Identity Awareness on the Network Security tab.
The Identity Awareness
Configuration wizard opens.
Select one or more options. These options set the methods for acquiring identities of managed and unmanaged assets.
AD Query - Lets the Security Gateway seamlessly identify Active Directory users and computers
Browser-Based Authentication - Sends users to a Web page to acquire identities from unidentified users. If Transparent Kerberos Authentication is configured, AD users may be identified transparently.