BASE
EXAM DUMPS
CHECK POINT
156-215.81.20
28% OFF Automatically For You
Check Point Certified Security Administrator
R81.20
,1.Which is a suitable command to check whether Drop Templates are activated or
not?
A. fw ctl get int activate_drop_templates
B. fwaccel stat
C. fwaccel stats
D. fw ctl templates Cd
Answer: B
Explanation:
The command fwaccel stat shows the status of SecureXL, including whether Drop
Templates are enabled or not1.
Reference: Check Point SecureXL R81 Administration Guide
ng
ni
2.Please choose correct command syntax to add an “emailserver1” host with IP
ar
Le
address 10.50.23.90 using GAiA management CLI?
r
fo
A. hostname myHost12 ip-address 10.50.23.90
ls
ia
B. mgmt add host name ip-address 10.50.23.90
er
at
M
C. add host name emailserver1 ip-address 10.50.23.90
ve
si
D. mgmt add host name emailserver1 ip-address 10.50.23.90 eh
en
Answer: D
pr
om
Explanation:
-C
The correct syntax for adding a host using GAiA management CLI is mgmt add host
2)
.0
name <name> ip-address <ip-address>2.
11
(V
Reference: Check Point GAiA R81 Command Line Interface Reference Guide
ps
um
D
m
xa
E
3.The CDT utility supports which of the following?
0
.2
A. Major version upgrades to R77.30
81
5.
B. Only Jumbo HFA’s and hotfixes
21
6-
15
C. Only major version upgrades to R80.10
nt
D. All upgrades
oi
P
ck
Answer: D
he
Explanation:
C
The CDT utility supports all upgrades, including major version upgrades, Jumbo
HFA’s, and hotfixes3.
Reference: Check Point Upgrade Service Engine (CPUSE) - Gaia Deployment Agent
4.Using ClusterXL, what statement is true about the Sticky Decision Function?
A. Can only be changed for Load Sharing implementations
B. All connections are processed and synchronized by the pivot
C. Is configured using cpconfig
D. Is only relevant when using SecureXL
,Answer: A
Explanation:
The Sticky Decision Function (SDF) can only be changed for Load Sharing
implementations, not for High Availability implementations4.
Reference: Check Point ClusterXL R81 Administration Guide
5.What command would show the API server status?
A. cpm status
B. api restart
C. api status
D. show api status
Answer: D
ng
ni
Explanation:
ar
Le
The command api status shows the API server status, including whether it is enabled
r
fo
or not, the port number, and the API version1.
ls
ia
Reference: Check Point R81 API Reference Guide
er
at
M
ve
si
en
eh
6.How Capsule Connect and Capsule Workspace differ?
pr
om
A. Capsule Connect provides a Layer3 VPN. Capsule Workspace provides a Desktop
-C
with usable applications
2)
.0
B. Capsule Workspace can provide access to any application
11
(V
C. Capsule Connect provides Business data isolation
ps
um
D. Capsule Connect does not require an installed application at client
D
m
Answer: A
xa
E
Explanation:
0
.2
Capsule Connect provides a Layer 3 VPN that allows users to access corporate
81
5.
resources securely from their mobile devices2. Capsule Workspace provides a secure
21
6-
15
container on the mobile device that isolates business data and applications from
nt
personal data and applications3. Capsule Workspace also provides a desktop with
oi
P
ck
usable applications such as email, calendar, contacts, documents, and web
he
applications3.
C
Reference: Check Point Capsule Connect, Check Point Capsule Workspace
7.Which of the following is a new R80.10 Gateway feature that had not been available
in R77.X and older?
A. The rule base can be built of layers, each containing a set of the security rules.
Layers are inspected in the order in which they are defined, allowing control over the
rule base flow and which security functionalities take precedence.
B. Limits the upload and download throughput for streaming media in the company to
1 Gbps.
, C. Time object to a rule to make the rule active only during specified times.
D. Sub Policies are sets of rules that can be created and attached to specific rules. If
the rule is matched, inspection will continue in the sub policy attached to it rather than
in the next rule.
Answer: D
Explanation:
Sub Policies are a new feature in R80.10 Gateway that allow creating and attaching
sets of rules to specific rules in the main policy4. Sub Policies are useful for
delegating permissions, managing large rule bases, and applying different inspection
profiles4. The other options are not new features in R80.10 Gateway.
Reference: Check Point R80.10 Security Management Administration Guide
ng
ni
8.What are the three components for Check Point Capsule?
ar
Le
A. Capsule Docs, Capsule Cloud, Capsule Connect
r
fo
B. Capsule Workspace, Capsule Cloud, Capsule Connect
ls
ia
C. Capsule Workspace, Capsule Docs, Capsule Connect
er
at
M
D. Capsule Workspace, Capsule Docs, Capsule Cloud
ve
si
Answer: D eh
en
Explanation:
pr
om
The three components for Check Point Capsule are Capsule Workspace, Capsule
-C
Docs, and Capsule Cloud123. Capsule Workspace provides a secure container on
2)
.0
the mobile device that isolates business data and applications from personal data and
11
(V
applications2. Capsule Docs protects business documents everywhere they go with
ps
um
encryption and access control1. Capsule Cloud provides cloud-based security
D
m
services to protect mobile users from threats3.
xa
E
Reference: Check Point Capsule, Check Point Capsule Workspace, Mobile Secure
0
.2
Workspace with Capsule
81
5.
21
6-
15
nt
9.Full synchronization between cluster members is handled by Firewall Kernel.
oi
P
ck
Which port is used for this?
he
A. UDP port 265
C
B. TCP port 265
C. UDP port 256
D. TCP port 256
Answer: B
Explanation:
The port used for full synchronization between cluster members is TCP port 2654.
This port is used by the Firewall Kernel to send and receive synchronization data,
such as connection tables, NAT tables, and VPN keys4. UDP port 8116 is used by
the Cluster Control Protocol (CCP) for internal communications between cluster
members4.