- Home
- Check-Point
- 156-315.80 Dumps
We provide real 156-315.80 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Check-Point 156-315.80 Exam quickly & easily. The 156-315.80 PDF type is available for reading and printing. You can print more and practice many times. With the help of our Check-Point 156-315.80 dumps pdf and vce product and material, you can easily pass the 156-315.80 exam.
Free demo questions for Check-Point 156-315.80 Exam Dumps Below:
NEW QUESTION 1
What is true about VRRP implementations?
- A. VRRP membership is enabled in cpconfig
- B. VRRP can be used together with ClusterXL, but with degraded performance
- C. You cannot have a standalone deployment
- D. You cannot have different VRIDs in the same physical network
Answer: C
NEW QUESTION 2
To ensure that VMAC mode is enabled, which CLI command should you run on all cluster members?
- A. fw ctl set int fwha vmac global param enabled
- B. fw ctl get int vmac global param enabled; result of command should return value 1
- C. cphaprob-a if
- D. fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1
Answer: D
NEW QUESTION 3
Which tool is used to enable ClusterXL?
- A. SmartUpdate
- B. cpconfig
- C. SmartConsole
- D. sysconfig
Answer: B
NEW QUESTION 4
Which configuration file contains the structure of the Security Server showing the port numbers, corresponding protocol name, and status?
- A. $FWDIR/database/fwauthd.conf
- B. $FWDIR/conf/fwauth.conf
- C. $FWDIR/conf/fwauthd.conf
- D. $FWDIR/state/fwauthd.conf
Answer: C
NEW QUESTION 5
Which Check Point feature enables application scanning and the detection?
- A. Application Dictionary
- B. AppWiki
- C. Application Library
- D. CPApp
Answer: B
NEW QUESTION 6
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?
- A. Go to clash-Run cpstop | Run cpstart
- B. Go to clash-Run cpconfig | Configure CoreXL to make use of the additional Cores | Exit cpconfig | Reboot Security Gateway
- C. Administrator does not need to perform any tas
- D. Check Point will make use of the newly installed CPU and Cores
- E. Go to clash-Run cpconfig | Configure CoreXL to make use of the additional Cores | Exit cpconfig | Reboot Security Gateway | Install Security Policy
Answer: B
NEW QUESTION 7
What is the correct command to observe the Sync traffic in a VRRP environment?
- A. fw monitor –e “accept[12:4,b]=224.0.0.18;”
- B. fw monitor –e “accept port(6118;”
- C. fw monitor –e “accept proto=mcVRRP;”
- D. fw monitor –e “accept dst=224.0.0.18;”
Answer: D
NEW QUESTION 8
What is the port used for SmartConsole to connect to the Security Management Server?
- A. CPMI port 18191/TCP
- B. CPM port/TCP port 19009
- C. SIC port 18191/TCP
- D. https port 4434/TCP
Answer: A
NEW QUESTION 9
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ______ .
- A. User Directory
- B. Captive Portal and Transparent Kerberos Authentication
- C. Captive Portal
- D. UserCheck
Answer: B
NEW QUESTION 10
What is the recommended configuration when the customer requires SmartLog indexing for 14 days and SmartEvent to keep events for 180 days?
- A. Use Multi-Domain Management Server.
- B. Choose different setting for log storage and SmartEvent db
- C. Install Management and SmartEvent on different machines.
- D. it is not possible.
Answer: B
NEW QUESTION 11
When an encrypted packet is decrypted, where does this happen?
- A. Security policy
- B. Inbound chain
- C. Outbound chain
- D. Decryption is not supported
Answer: A
NEW QUESTION 12
Which command would disable a Cluster Member permanently?
- A. clusterXL_admin down
- B. cphaprob_admin down
- C. clusterXL_admin down-p
- D. set clusterXL down-p
Answer: C
NEW QUESTION 13
In terms of Order Rule Enforcement, when a packet arrives at the gateway, the gateway checks it against the rules in the top Policy Layer, sequentially from top to bottom Which of the following statements is correct?
- A. If the Action of the matching rule is Accept the gateway will drop the packet
- B. If the Action of the matching rule is Drop, the gateway continues to check rules in the next Policy Layer down
- C. If the Action of the matching rule is Drop the gateway stops matching against later rules in the Policy Rule Base and drops the packet
- D. If the rule does not matched in the Network policy it will continue to other enabled polices
Answer: C
Explanation:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/CP_
NEW QUESTION 14
What is the purpose of extended master key extension/session hash?
- A. UDP VOIP protocol extension
- B. In case of TLS1.x it is a prevention of a Man-in-the-Middle attack/disclosure of the client-servercommunication
- C. Special TCP handshaking extension
- D. Supplement DLP data watermark
Answer: B
NEW QUESTION 15
When a packet arrives at the gateway, the gateway checks it against the rules in the hop Policy Layer, sequentially from top to bottom, and enforces the first rule that matches a packet. Which of the following statements about the order of rule enforcement is true?
- A. If the Action is Accept, the gateway allows the packet to pass through the gateway.
- B. If the Action is Drop, the gateway continues to check rules in the next Policy Layer down.
- C. If the Action is Accept, the gateway continues to check rules in the next Policy Layer down.
- D. If the Action is Drop, the gateway applies the Implicit Clean-up Rule for that Policy Layer.
Answer: C
NEW QUESTION 16
Which features are only supported with R80.10 Gateways but not R77.x?
- A. Access Control policy unifies the Firewall, Application Control & URL Filtering, Data Awareness, and Mobile Access Software Blade policies.
- B. Limits the upload and download throughput for streaming media in the company to 1 Gbps.
- C. The rule base can be built of layers, each containing a set of the security rule
- D. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.
- E. Time object to a rule to make the rule active only during specified times.
Answer: C
NEW QUESTION 17
From SecureXL perspective, what are the tree paths of traffic flow:
- A. Initial Path; Medium Path; Accelerated Path
- B. Layer Path; Blade Path; Rule Path
- C. Firewall Path; Accept Path; Drop Path
- D. Firewall Path; Accelerated Path; Medium Path
Answer: D
NEW QUESTION 18
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?
- A. Synchronized
- B. Never been synchronized
- C. Lagging
- D. Collision
Answer: D
Thanks for reading the newest 156-315.80 exam dumps! We recommend you to try the PREMIUM Certleader 156-315.80 dumps in VCE and PDF here: https://www.certleader.com/156-315.80-dumps.html (428 Q&As Dumps)