Check Point 156-215.81.20 Check Point Certified Security Administrator R81.20 Online Training
Check Point 156-215.81.20 Online Training
The questions for 156-215.81.20 were last updated at May 12,2025.
- Exam Code: 156-215.81.20
- Exam Name: Check Point Certified Security Administrator R81.20
- Certification Provider: Check Point
- Latest update: May 12,2025
When using Monitored circuit VRRP, what is a priority delta?
- A . When an interface fails the priority changes to the priority delta
- B . When an interface fails the delta claims the priority
- C . When an interface fails the priority delta is subtracted from the priority
- D . When an interface fails the priority delta decides if the other interfaces takes over
Which of the following is NOT an option to calculate the traffic direction?
- A . Incoming
- B . Internal
- C . External
- D . Outgoing
When an encrypted packet is decrypted, where does this happen?
- A . Security policy
- B . Inbound chain
- C . Outbound chain
- D . Decryption is not supported
Which of the following is NOT a component of Check Point Capsule?
- A . Capsule Docs
- B . Capsule Cloud
- C . Capsule Enterprise
- D . Capsule Workspace
You have successfully backed up your Check Point configurations without the OS information.
What command would you use to restore this backup?
- A . restore_backup
- B . import backup
- C . cp_merge
- D . migrate import
What is the best sync method in the ClusterXL deployment?
- A . Use 1 cluster + 1st sync
- B . Use 1 dedicated sync interface
- C . Use 3 clusters + 1st sync + 2nd sync + 3rd sync
- D . Use 2 clusters + 1st sync + 2nd sync
Can multiple administrators connect to a Security Management Server at the same time?
- A . No, only one can be connected
- B . Yes, all administrators can modify a network object at the same time
- C . Yes, every administrator has their own username, and works in a session that is independent of other administrators
- D . Yes, but only one has the right to write
What Identity Agent allows packet tagging and computer authentication?
- A . Endpoint Security Client
- B . Full Agent
- C . Light Agent
- D . System Agent
In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log.
Which of the following options can you add to each Log, Detailed Log and Extended Log?
- A . Accounting
- B . Suppression
- C . Accounting/Suppression
- D . Accounting/Extended
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher.
How can you enable them?
- A . fw ctl multik dynamic_dispatching on
- B . fw ctl multik dynamic_dispatching set_mode 9
- C . fw ctl multik set_mode 9
- D . fw ctl miltik pq enable