156-215.80 Check Point Certified Security Administrator R80 Exam

By
With
Comments Off on 156-215.80 Check Point Certified Security Administrator R80 Exam

Exam Name Check Point Certified Security Administrator (CCSA) R80
Exam Code 156-215.80
Exam Price $250 (USD)
Duration 90 mins
Number of Questions 90
Passing Score 70%
Books / Training CCSM Training
Schedule Exam Pearson VUE
Sample Questions Check Point CCSA Sample Questions
Practice Exam Check Point 156-215.80 Certification Practice Exam

Use this quick start guide to collect all the information about Check Point CCSA (156-215.80) Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the 156-215.80 Security Administrator exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual Check Point CCSA R80 certification exam.

The Check Point CCSA certification is mainly targeted to those candidates who want to build their career in Security domain. The Check Point Certified Security Administrator (CCSA) R80 exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of Check Point CCSA R80.

Topic Details
Introduction to Check Point Architecture 1. Performance-based
Identify the basic functions of the Web UI.
Create and confirm admin users for the network.
Configure network messages.
Confirm existing network configuration settings.
Install and tour the GUI.

2. Knowledge-based
Describe the key elements of Check Point’s unified, 3-tiered architecture.
Interpret the concept of a firewall and understand the mechanisms used for controlling network traffic.
Recognize SmartConsole features, functions and tools.
Understand Check Point deployment options.

Security Policy Management 1. Performance-based
Create multiple administrators and apply different roles/permissions for concurrent administration.
Create and configure network, host and gateway objects.
Evaluate and manipulate rules in a unified Access Control security policy.
Apply policy layers and analyze how they affect traffic inspection.
Prepare and schedule backups for the gateway.

2. Knowledge-based
Describe the essential elements of a unified security policy.
Understand how traffic inspection takes place in a unified security policy.
Summarize how administration roles and permissions assist in managing policy.
Recall how to implement Check Point backup techniques.

Check Point Security Solutions 1. Performance-based
Evaluate and manage different Check Point security solutions deployed for network access control.
Evaluate and manage Check Point security solutions for threat protection.
Examine how the Compliance blade monitors your Check Point security infrastructure.
Validate existing licenses for products installed on your network.

2. Knowledge-based
Recognize Check Point security solutions & products and the way they protect your network.
Understand licensing and contract requirements for Check Point security solutions.

Traffic Visibility 1. Performance-based
Generate network traffic and use traffic visibility tools to monitor the data.
Compare and contrast various tools available for viewing traffic

2. Knowledge-based
Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements.
Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow patterns or security activities.

Basic Concepts of VPN 1. Performance-based
Configure and deploy a site-to-site VPN.
Test the VPN connection and analyze the tunnel traffic.

2. Knowledge-based
Understand VPN deployments and Check Point Communities.
Understand how to analyze and interpret VPN tunnel traffic.

Managing User’s Access

1. Performance-based
Create and define user access for a guest wireless user.
Test Identity Awareness connection.

2. Knowledge-based
Recognize how to define users and user groups for your environment.
Understand how to manage user access for internal users and guests.

Working with Cluster XL 1. Performance-based

Install and configure ClusterXL with a High Availability configuration.

2. Knowledge-based
Describe the basic concept of ClusterXL technology and its advantages.
Administrator Task Implementation 1. Performance-based
Review rule-base performance for policy control.

2. Knowledge-based
Understand how to perform periodic administrator tasks as specified in Administrator job descriptions.
SmartEvent Reports

1. Performance-based
Generate reports that effectively summarize network activity.

2. Knowledge-based
Recognize how to effectively create, customize and generate network activity reports.

To ensure success in Check Point CCSA R80 certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for Security Administrator (156-215.80) exam.

QUESTION 1
Which of the following is NOT an integral part of VPN communication within a network?

A. VPN key
B. VPN community
C. VPN trust entities
D. VPN domain

Answer: A

QUESTION 2
Vanessa is firewall administrator in her company; her company is using Check Point firewalls on central and
remote locations, which are managed centrally by R80 Security Management Server. One central location has
an installed R77.30 Gateway on Open server. Remote location is using Check Point UTM-1 570 series
appliance with R71. Which encryption is used in Secure Internal Communication (SIC) between central
management and firewall on each location?

A. On central firewall AES128 encryption is used for SIC, on Remote firewall 3DES encryption is used for SIC.
B. On both firewalls, the same encryption is used for SIC. This is AES-GCM-256.
C. The Firewall Administrator can choose which encryption suite will be used by SIC.
D. On central firewall AES256 encryption is used for SIC, on Remote firewall AES128 encryption is used for SIC.

Answer: A

QUESTION 3
Which of the following is NOT a SecureXL traffic flow?

A. Medium Path
B. Accelerated Path
C. High Priority Path
D. Slow Path

Answer: C

QUESTION 4
Which of the following Automatically Generated Rules NAT rules have the lowest implementation priority?

A. Machine Hide NAT
B. Address Range Hide NAT
C. Network Hide NAT
D. Machine Static NAT

Answer: B,C

Examkingdom Check Point 156-215.80 Exam, Certkingdom CheckPoint 156-215.80 PDF

MCTS Training, MCITP Trainnig

Best Check Point 156-215.80 Certification, Check Point 156-215.80 Training at certkingdom.com

Click to rate this post!
[Total: 0 Average: 0]