Check Point 156-215.81.20 Check Point Certified Security Administrator R81.20 Online Training
Check Point 156-215.81.20 Online Training
The questions for 156-215.81.20 were last updated at Aug 13,2025.
- Exam Code: 156-215.81.20
- Exam Name: Check Point Certified Security Administrator R81.20
- Certification Provider: Check Point
- Latest update: Aug 13,2025
Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.
- A . Down
- B . No Response
- C . Inactive
- D . Failed
Which of the following is the most secure means of authentication?
- A . Password
- B . Certificate
- C . Token
- D . Pre-shared secret
What is the BEST command to view configuration details of all interfaces in Gaia CLISH?
- A . ifconfig -a
- B . show interfaces
- C . show interfaces detail
- D . show configuration interface
Fill in the blank: Authentication rules are defined for ____________.
- A . User groups
- B . Users using UserCheck
- C . Individual users
- D . All users in the database
Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?
- A . ThreatWiki
- B . Whitelist Files
- C . AppWiki
- D . IPS Protections
Which of the following is an authentication method used for Identity Awareness?
- A . SSL
- B . Captive Portal
- C . PKI
- D . RSA
The SIC Status “Unknown” means
- A . There is connection between the gateway and Security Management Server but it is not trusted.
- B . The secure communication is established.
- C . There is no connection between the gateway and Security Management Server.
- D . The Security Management Server can contact the gateway, but cannot establish SIC.
What is a reason for manual creation of a NAT rule?
- A . In R80 all Network Address Translation is done automatically and there is no need for manually defined NAT-rules.
- B . Network Address Translation of RFC1918-compliant networks is needed to access the Internet.
- C . Network Address Translation is desired for some services, but not for others.
- D . The public IP-address is different from the gateway’s external IP
Which of the following commands is used to verify license installation?
- A . Cplic verify license
- B . Cplic print
- C . Cplic show
- D . Cplic license
To enforce the Security Policy correctly, a Security Gateway requires:
- A . a routing table
- B . awareness of the network topology
- C . a Demilitarized Zone
- D . a Security Policy install