156-215.81.20 Online Practice Questions

Home / Check Point / 156-215.81.20

Latest 156-215.81.20 Exam Practice Questions

The practice questions for 156-215.81.20 exam was last updated on 2025-04-26 .

Viewing page 1 out of 28 pages.

Viewing questions 1 out of 143 questions.

Question#1

Fill in the blank: Once a certificate is revoked from the Security GateWay by the Security Management Server, the certificate information is _______.

A. Sent to the Internal Certificate Authority.
B. Sent to the Security Administrator.
C. Stored on the Security Management Server.
D. Stored on the Certificate Revocation List.

Explanation:
Once a certificate is revoked from the Security Gateway by the Security Management Server, the certificate information is stored on the Certificate Revocation List (CRL)1, p. 47. The CRL is a list of certificates that have been revoked before their expiration date4.
Reference: Check Point CCSA - R81: Practice Test & Explanation, Free Check Point CCSA Sample Questions and Study Guide

Question#2

Which of the following is the most secure means of authentication?

A. Password
B. Certificate
C. Token
D. Pre-shared secret

Explanation:
Certificate is the most secure means of authentication among the given options2. A certificate is a digital document that contains information about the identity of a user or a device, and is signed by a trusted authority. A certificate can be used to prove the identity of a user or a device without revealing any sensitive information, such as passwords or tokens. Password, token, and pre-shared secret are less secure means of authentication because they can be easily compromised, stolen, or guessed by attackers.
Reference: Secure User Authentication Methods - freeCodeCamp.org, What is the Most Secure Authentication Method for Your Organization …

Question#3

What are the software components used by Autonomous Threat Prevention Profiles in R8I.20 and higher?

A. Sandbox, ThreatCloud, Zero Phishing, Sanitization, C&C Protection, JPS, File and URL Reputation
B. IPS, Threat Emulation and Threat Extraction
C. Sandbox, ThreatCloud, Sanitization, C&C Protection, IPS
D. IPS, Anti-Bot, Anti-Virus, SandBlast and Macro Extraction

Explanation:
This answer is correct because these are the software components that are used by the pre-defined Autonomous Threat Prevention Profiles in R81.20 and higher1. These profiles provide zero-maintenance protection from zero-day threats and continuously and autonomously ensure that your protection is up-to-date with the latest cyber threats and prevention technologies2.
The other answers are not correct because they either include software components that are not part of the Autonomous Threat Prevention Profiles, such as Sandbox, ThreatCloud, Zero Phishing, Sanitization, C&C Protection, JPS, File and URL Reputation, or they omit some of the software components that are part of the Autonomous Threat Prevention Profiles, such as Anti-Bot, Anti-Virus, and Macro Extraction.
Autonomous Threat Prevention Management - Check Point Software
Check Point Quantum R81.20 (Titan) Release
Threat Prevention R81.20 Best Practices - Check Point Software
Check Point R81

Question#4

What are the three types of UserCheck messages?

A. inform, ask, and block
B. block, action, and warn
C. action, inform, and ask
D. ask, block, and notify

Explanation:
The three types of UserCheck messages are inform, ask, and block. Inform messages notify users about security events and do not require any user action. Ask messages prompt users to choose whether to allow or block an action. Block messages prevent users from performing an action and display a reason1.
Reference: Check Point R81 Logging and Monitoring Administration Guide

Question#5

Gaia has two default user accounts that cannot be deleted.
What are those user accounts?

A. Admin and Default
B. Expert and Clish
C. Control and Monitor
D. Admin and Monitor

Explanation:
Gaia has two default user accounts that cannot be deleted. They are Admin and Monitor. Admin is the user account that has full administrative privileges and can access both WebUI and CLI. Monitor is the user account that has read-only privileges and can access only WebUI2. The other options are not default user accounts in Gaia.

Exam Code: 156-215.81.20Q & A: 401 Q&AsUpdated:  2025-04-26

 Get All 156-215.81.20 Q&As