Checkpoint 156-215.80 Exam Questions
Check Point Certified Security Administrator (CCSA R80) (Page 20 )

Updated On: 21-Feb-2026

When attempting to start a VPN tunnel, in the logs the error 'no proposal chosen' is seen numerous times. No other VPN-related log entries are present. Which phase of the VPN negotiations has failed?

  1. IKE Phase 1
  2. IPSEC Phase 2
  3. IPSEC Phase 1
  4. IKE Phase 2

Answer(s): A



Which command is used to add users to or from existing roles?

  1. Add rba user <User Name> roles <List>
  2. Add rba user <User Name>
  3. Add user <User Name> roles <List>
  4. Add user <User Name>

Answer(s): A

Explanation:

Configuring Roles - CLI (rba)


Reference:

https://sc1.checkpoint.com/documents/R76/CP_R76_Gaia_WebAdmin/73101.htm



You are the administrator for Alpha Corp. You have logged into your R80 Management server. You are making some changes in the Rule Base and notice that rule No.6 has a pencil icon next to it.


What does this mean?

  1. The rule No.6 has been marked for deletion in your Management session.
  2. The rule No.6 has been marked for deletion in another Management session.
  3. The rule No.6 has been marked for editing in your Management session.
  4. The rule No.6 has been marked for editing in another Management session.

Answer(s): C



Which type of the Check Point license ties the package license to the IP address of the Security Management Server?

  1. Local
  2. Central
  3. Corporate
  4. Formal

Answer(s): B



What is NOT an advantage of Packet Filtering?

  1. Low Security and No Screening above Network Layer
  2. Application Independence
  3. High Performance
  4. Scalability

Answer(s): A

Explanation:

Packet Filter Advantages and Disadvantages


Reference:

https://www.checkpoint.com/smb/help/utm1/8.2/7078.htm






Post your Comments and Discuss Checkpoint 156-215.80 exam dumps with other Community members:

Join the 156-215.80 Discussion