Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 13
Total 123 questions
Exam Code: 156-215.81                Update: Oct 16, 2025
Exam Name: Check Point Certified Security Administrator R81.20 CCSA (156-215.81.20)

Checkpoint Check Point Certified Security Administrator R81.20 CCSA (156-215.81.20) 156-215.81 Exam Dumps: Updated Questions & Answers (October 2025)

Question # 1

When using Automatic Hide NAT, what is enabled by default?

A.

Source Port Address Translation (PAT)

B.

Static NAT

C.

Static Route

D.

HTTPS Inspection

Question # 2

You can see the following graphic:

What is presented on it?

A.

Properties of personal. p12 certificate file issued for user John.

B.

Shared secret properties of John’s password.

C.

VPN certificate properties of the John’s gateway.

D.

Expired. p12 certificate properties for user John.

Question # 3

Which software blade enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine?

A.

Application Control

B.

Data Awareness

C.

Identity Awareness

D.

Threat Emulation

Question # 4

You are the Check Point administrator for Alpha Corp with an R80 Check Point estate. You have received a call by one of the management users stating that they are unable to browse the Internet with their new tablet connected to the company Wireless. The Wireless system goes through the Check Point Gateway. How do you review the logs to see what the problem may be?

A.

Open SmartLog and connect remotely to the IP of the wireless controller

B.

Open SmartView Tracker and filter the logs for the IP address of the tablet

C.

Open SmartView Tracker and check all the IP logs for the tablet

D.

Open SmartLog and query for the IP address of the Manager’s tablet

Question # 5

A Check Point Software license consists of two components, the Software Blade and the Software Container. There are ______ types of Software Containers: ________.

A.

Two; Security Management and Endpoint Security

B.

Two; Endpoint Security and Security Gateway

C.

Three; Security Management, Security Gateway, and Endpoint Security

D.

Three; Security Gateway, Endpoint Security, and Gateway Management

Question # 6

The “Hit count” feature allows tracking the number of connections that each rule matches. Will the Hit count feature work independently from logging and Track the hits even if the Track option is set to “None”?

A.

No, it will not work independently. Hit Count will be shown only for rules with Track options set as Log or alert

B.

Yes, it will work independently as long as “analyze all rules” tick box is enabled on the Security Gateway

C.

No, it will not work independently because hit count requires all rules to be logged

D.

Yes, it will work independently because when you enable Hit Count, the SMS collects the data from supported Security Gateways

Question # 7

What are the two elements of address translation rules?

A.

Original packet and translated packet

B.

Manipulated packet and original packet

C.

Translated packet and untranslated packet

D.

Untranslated packet and manipulated packet

Question # 8

Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.

A.

Symmetric routing

B.

Failovers

C.

Asymmetric routing

D.

Anti-Spoofing

Question # 9

How would you determine the software version from the CLI?

A.

fw ver

B.

fw stat

C.

fw monitor

D.

cpinfo

Question # 10

Which of the following cannot be configured in an Access Role Object?

A.

Networks

B.

Users

C.

Time

D.

Machines

Page: 1 / 13
Total 123 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 16 Oct 2025