Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > CheckPoint > Checkpoint Certifications > 156-215.81.20 > 156-215.81.20 Online Practice Questions and Answers

156-215.81.20 Online Practice Questions and Answers

Questions 4

What are the two deployment options available for a security gateway?

A. Bridge and Switch

B. Local and Remote

C. Cloud and Router

D. Standalone and Distributed

Buy Now

Correct Answer: D

Questions 5

A security zone is a group of one or more network interfaces from different centrally managed gateways. What is considered part of the zone?

A. Security Zones are not supported by Check Point firewalls.

B. The firewall rule can be configured to include one or more subnets in a zone.

C. The zone is based on the network topology and determined according to where the interface leads to.

D. The local directly connected subnet defined by the subnet IP and subnet mask.

Buy Now

Correct Answer: C

Questions 6

What is UserCheck?

A. Messaging tool used to verify a user's credentials.

B. Communication tool used to inform a user about a website or application they are trying to access.

C. Communication tool used to notify an administrator when a new user is created.

D. Administrator tool used to monitor users on their network.

Buy Now

Correct Answer: B

Questions 7

Which path below is available only when CoreXL is enabled?

A. Slow path

B. Firewall path

C. Medium path

D. Accelerated path

Buy Now

Correct Answer: C

Questions 8

What protocol is specifically used for clustered environments?

A. Clustered Protocol

B. Synchronized Cluster Protocol

C. Control Cluster Protocol

D. Cluster Control Protocol

Buy Now

Correct Answer: D

Reference: https://downloads.checkpoint.com/fileserver/SOURCE/direct/ID/5990/FILE/sk31085_Cluster_Control_Protocol_Functionality.pdf

Questions 9

The Captive Portal tool:

A. Acquires identities from unidentified users.

B. Is only used for guest user authentication.

C. Allows access to users already identified.

D. Is deployed from the Identity Awareness page in the Global Properties settings.

Buy Now

Correct Answer: A

Questions 10

What are the steps to configure the HTTPS Inspection Policy?

A. Go to ManageandSettings > Blades > HTTPS Inspection > Configure in SmartDashboard

B. Go to Applicationandurl filtering blade > Advanced > Https Inspection > Policy

C. Go to ManageandSettings > Blades > HTTPS Inspection > Policy

D. Go to Applicationandurl filtering blade > Https Inspection > Policy

Buy Now

Correct Answer: C

Questions 11

Harriet wants to protect sensitive information from intentional loss when users browse to a specific URL: https://personal.mymail.com, which blade will she enable to achieve her goal?

A. DLP

B. SSL Inspection

C. Application Control

D. URL Filtering

Buy Now

Correct Answer: A

Check Point revolutionizes DLP by combining technology and processes to move businesses from passive detection to active Data Loss Prevention. Innovative MultiSpectTM data classification combines user, content and process information to make accurate decisions, while UserCheckTM technology empowers users to remediate incidents in real time. Check Point's self-educating network-based DLP solution frees IT/security personnel from incident handling and educates users on proper data handling policies--protecting sensitive corporate information from both intentional and unintentional loss.

Reference: https://www.checkpoint.com/downloads/product-related/datasheets/DLP-software-blade-datasheet.pdf

Questions 12

Tina is a new administrator who is currently reviewing the new Check Point R80 Management console interface. In the Gateways view, she is reviewing the Summary screen as in the screenshot below. What as an 'Open Server'?

A. Check Point software deployed on a non-Check Point appliance.

B. The Open Server Consortium approved Server Hardware used for the purpose of Security and Availability.

C. A check Point Management Server deployed using the Open Systems Interconnection (OSI) Server and Security deployment model.

D. A check Point Management Server software using the Open SSL.

Buy Now

Correct Answer: A

Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_Installation_and_Upgrade_Guide-webAdmin/index.html

Questions 13

Which Check Point software blade prevents malicious files from entering a network using virus signatures and anomaly-based protections from ThreatCloud?

A. Firewall

B. Application Control

C. Anti-spam and Email Security

D. Antivirus

Buy Now

Correct Answer: D

The enhanced Check Point Antivirus Software Blade uses real-time virus signatures and anomaly-based protections from ThreatCloudTM, the first collaborative network to fight cybercrime, to detect and block malware at the gateway before

users are affected.

Reference: https://www.checkpoint.com/products/antivirus-software-blade/

Exam Code: 156-215.81.20
Exam Name: Check Point Certified Security Administrator - R81.20 (CCSA)
Last Update: Jun 09, 2025
Questions: 677

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.