Checkpoint 156-215.80 Exam Questions
Check Point Certified Security Administrator (CCSA R80) (Page 3 )

Updated On: 21-Feb-2026

Which of the following Automatically Generated Rules NAT rules have the lowest implementation priority?

  1. Machine Hide NAT
  2. Address Range Hide NAT
  3. Network Hide NAT
  4. Machine Static NAT

Answer(s): B,C

Explanation:

SmartDashboard organizes the automatic NAT rules in this order:
1. Static NAT rules for Firewall, or node (computer or server) objects
2. Hide NAT rules for Firewall, or node objects
3. Static NAT rules for network or address range objects
4. Hide NAT rules for network or address range objects


Reference:

https://sc1.checkpoint.com/documents/R77/CP_R77_Firewall_WebAdmin/6724.htm



VPN gateways authenticate using __________and ____________.

  1. Passwords; tokens
  2. Certificates; pre-shared secrets
  3. Certificates; passwords
  4. Tokens; pre-shared secrets

Answer(s): B

Explanation:

VPN gateways authenticate using Digital Certificates and Pre-shared secrets.


Reference:

https://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/85469.htm



In R80 spoofing is defined as a method of:

  1. Disguising an illegal IP address behind an authorized IP address through Port Address Translation.
  2. Hiding your firewall from unauthorized users.
  3. Detecting people using false or wrong authentication logins
  4. Making packets appear as if they come from an authorized IP address.

Answer(s): D

Explanation:

IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack connections to your network. Attackers use IP spoofing to send malware and bots to your protected network, to execute DoS attacks, or to gain unauthorized access.


Reference:

http://dl3.checkpoint.com/paid/74/74d596decb6071a4ee642fbdaae7238f/CP_R80_SecurityManagement_AdminGuide.pdf?HashKey=1479584563_6f823c8ea1514609148aa4fec5425db2&xtn=.pdf



The _________is used to obtain identification and security information about network users.

  1. User Directory
  2. User server
  3. UserCheck
  4. User index

Answer(s): A


Reference:

https://www.checkpoint.com/downloads/product-related/datasheets/DS_UserDirectorySWB.pdf



Which Check Point feature enables application scanning and the detection?

  1. Application Dictionary
  2. AppWiki
  3. Application Library
  4. CPApp

Answer(s): B

Explanation:

AppWiki Application Classification Library
AppWiki enables application scanning and detection of more than 5,000 distinct applications and over 300,000 Web 2.0 widgets including instant messaging, social networking, video streaming, VoIP, games and more.


Reference:

https://www.checkpoint.com/products/application-control-software-blade/






Post your Comments and Discuss Checkpoint 156-215.80 exam dumps with other Community members:

Join the 156-215.80 Discussion