Check Point 156-215.81.20 Check Point Certified Security Administrator R81.20 Online Training
Check Point 156-215.81.20 Online Training
The questions for 156-215.81.20 were last updated at Aug 14,2025.
- Exam Code: 156-215.81.20
- Exam Name: Check Point Certified Security Administrator R81.20
- Certification Provider: Check Point
- Latest update: Aug 14,2025
Which configuration element determines which traffic should be encrypted into a VPN tunnel vs. sent in the clear?
- A . The firewall topologies
- B . NAT Rules
- C . The Rule Base
- D . The VPN Domains
You have discovered suspicious activity in your network.
What is the BEST immediate action to take?
- A . Create a policy rule to block the traffic.
- B . Create a suspicious action rule to block that traffic.
- C . Wait until traffic has been identified before making any changes.
- D . Contact ISP to block the traffic.
Tom has connected to the Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored shortly afterward.
What will happen to the changes already made?
- A . Tom will have to reboot his SmartConsole computer, clear the cache, and restore changes.
- B . Tom will have to reboot his SmartConsole computer, and access the Management cache store on that computer, which is only accessible after a reboot.
- C . Tom’s changes will be lost since he lost connectivity and he will have to start again.
- D . Tom’s changes will have been stored on the Management when he reconnects and he will not lose any of his work.
Which GUI tool can be used to view and apply Check Point licenses?
- A . cpconfig
- B . Management Command Line
- C . SmartConsole
- D . SmartUpdate
How would you determine the software version from the CLI?
- A . fw ver
- B . fw stat
- C . fw monitor
- D . cpinfo
In R80 Management, apart from using SmartConsole, objects or rules can also be modified using:
- A . 3rd Party integration of CLI and API for Gateways prior to R80.
- B . A complete CLI and API interface using SSH and custom CPCode integration.
- C . 3rd Party integration of CLI and API for Management prior to R80.
- D . A complete CLI and API interface for Management with 3rd Party integration.
When connected to the Check Point R80 Management Server using the SmartConsole the first administrator to connect has a lock on:
- A . Only the objects being modified in the Management Database and other administrators can connect to make changes using a special session as long as they all connect from the same LAN network.
- B . The entire Management Database and other administrators can connect to make changes only if the first administrator switches to Read-only.
- C . The entire Management Database and all sessions and other administrators can connect only as Read-only.
- D . Only the objects being modified in his session of the Management Database and other administrators can connect to make changes using different sessions.
Which is NOT an encryption algorithm that can be used in an IPSEC Security Association (Phase 2)?
- A . AES-GCM-256
- B . AES-CBC-256
- C . AES-GCM-128
Fill in the blank: To create policy for traffic to or from a particular location, use the _____________.
- A . DLP shared policy
- B . Geo policy shared policy
- C . Mobile Access software blade
- D . HTTPS inspection
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?
- A . Security Gateway IP-address cannot be changed without re-establishing the trust
- B . The Security Gateway name cannot be changed in command line without re-establishing trust
- C . The Security Management Server name cannot be changed in SmartConsole without re-establishing trust
- D . The Security Management Server IP-address cannot be changed without re-establishing the trust