156-315.80 Exam - Check Point Certified Security Expert - R80

certleader.com

We provide real 156-315.80 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Check-Point 156-315.80 Exam quickly & easily. The 156-315.80 PDF type is available for reading and printing. You can print more and practice many times. With the help of our Check-Point 156-315.80 dumps pdf and vce product and material, you can easily pass the 156-315.80 exam.

Free demo questions for Check-Point 156-315.80 Exam Dumps Below:

NEW QUESTION 1
What is true about VRRP implementations?

  • A. VRRP membership is enabled in cpconfig
  • B. VRRP can be used together with ClusterXL, but with degraded performance
  • C. You cannot have a standalone deployment
  • D. You cannot have different VRIDs in the same physical network

Answer: C

NEW QUESTION 2
To ensure that VMAC mode is enabled, which CLI command should you run on all cluster members?

  • A. fw ctl set int fwha vmac global param enabled
  • B. fw ctl get int vmac global param enabled; result of command should return value 1
  • C. cphaprob-a if
  • D. fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1

Answer: D

NEW QUESTION 3
Which tool is used to enable ClusterXL?

  • A. SmartUpdate
  • B. cpconfig
  • C. SmartConsole
  • D. sysconfig

Answer: B

NEW QUESTION 4
Which configuration file contains the structure of the Security Server showing the port numbers, corresponding protocol name, and status?

  • A. $FWDIR/database/fwauthd.conf
  • B. $FWDIR/conf/fwauth.conf
  • C. $FWDIR/conf/fwauthd.conf
  • D. $FWDIR/state/fwauthd.conf

Answer: C

NEW QUESTION 5
Which Check Point feature enables application scanning and the detection?

  • A. Application Dictionary
  • B. AppWiki
  • C. Application Library
  • D. CPApp

Answer: B

NEW QUESTION 6
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?

  • A. Go to clash-Run cpstop | Run cpstart
  • B. Go to clash-Run cpconfig | Configure CoreXL to make use of the additional Cores | Exit cpconfig | Reboot Security Gateway
  • C. Administrator does not need to perform any tas
  • D. Check Point will make use of the newly installed CPU and Cores
  • E. Go to clash-Run cpconfig | Configure CoreXL to make use of the additional Cores | Exit cpconfig | Reboot Security Gateway | Install Security Policy

Answer: B

NEW QUESTION 7
What is the correct command to observe the Sync traffic in a VRRP environment?

  • A. fw monitor –e “accept[12:4,b]=224.0.0.18;”
  • B. fw monitor –e “accept port(6118;”
  • C. fw monitor –e “accept proto=mcVRRP;”
  • D. fw monitor –e “accept dst=224.0.0.18;”

Answer: D

NEW QUESTION 8
What is the port used for SmartConsole to connect to the Security Management Server?

  • A. CPMI port 18191/TCP
  • B. CPM port/TCP port 19009
  • C. SIC port 18191/TCP
  • D. https port 4434/TCP

Answer: A

NEW QUESTION 9
Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ______ .

  • A. User Directory
  • B. Captive Portal and Transparent Kerberos Authentication
  • C. Captive Portal
  • D. UserCheck

Answer: B

NEW QUESTION 10
What is the recommended configuration when the customer requires SmartLog indexing for 14 days and SmartEvent to keep events for 180 days?

  • A. Use Multi-Domain Management Server.
  • B. Choose different setting for log storage and SmartEvent db
  • C. Install Management and SmartEvent on different machines.
  • D. it is not possible.

Answer: B

NEW QUESTION 11
When an encrypted packet is decrypted, where does this happen?

  • A. Security policy
  • B. Inbound chain
  • C. Outbound chain
  • D. Decryption is not supported

Answer: A

NEW QUESTION 12
Which command would disable a Cluster Member permanently?

  • A. clusterXL_admin down
  • B. cphaprob_admin down
  • C. clusterXL_admin down-p
  • D. set clusterXL down-p

Answer: C

NEW QUESTION 13
In terms of Order Rule Enforcement, when a packet arrives at the gateway, the gateway checks it against the rules in the top Policy Layer, sequentially from top to bottom Which of the following statements is correct?

  • A. If the Action of the matching rule is Accept the gateway will drop the packet
  • B. If the Action of the matching rule is Drop, the gateway continues to check rules in the next Policy Layer down
  • C. If the Action of the matching rule is Drop the gateway stops matching against later rules in the Policy Rule Base and drops the packet
  • D. If the rule does not matched in the Network policy it will continue to other enabled polices

Answer: C

Explanation:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/CP_

NEW QUESTION 14
What is the purpose of extended master key extension/session hash?

  • A. UDP VOIP protocol extension
  • B. In case of TLS1.x it is a prevention of a Man-in-the-Middle attack/disclosure of the client-servercommunication
  • C. Special TCP handshaking extension
  • D. Supplement DLP data watermark

Answer: B

NEW QUESTION 15
When a packet arrives at the gateway, the gateway checks it against the rules in the hop Policy Layer, sequentially from top to bottom, and enforces the first rule that matches a packet. Which of the following statements about the order of rule enforcement is true?

  • A. If the Action is Accept, the gateway allows the packet to pass through the gateway.
  • B. If the Action is Drop, the gateway continues to check rules in the next Policy Layer down.
  • C. If the Action is Accept, the gateway continues to check rules in the next Policy Layer down.
  • D. If the Action is Drop, the gateway applies the Implicit Clean-up Rule for that Policy Layer.

Answer: C

NEW QUESTION 16
Which features are only supported with R80.10 Gateways but not R77.x?

  • A. Access Control policy unifies the Firewall, Application Control & URL Filtering, Data Awareness, and Mobile Access Software Blade policies.
  • B. Limits the upload and download throughput for streaming media in the company to 1 Gbps.
  • C. The rule base can be built of layers, each containing a set of the security rule
  • D. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.
  • E. Time object to a rule to make the rule active only during specified times.

Answer: C

NEW QUESTION 17
From SecureXL perspective, what are the tree paths of traffic flow:

  • A. Initial Path; Medium Path; Accelerated Path
  • B. Layer Path; Blade Path; Rule Path
  • C. Firewall Path; Accept Path; Drop Path
  • D. Firewall Path; Accelerated Path; Medium Path

Answer: D

NEW QUESTION 18
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?

  • A. Synchronized
  • B. Never been synchronized
  • C. Lagging
  • D. Collision

Answer: D

NEW QUESTION 19
......

Thanks for reading the newest 156-315.80 exam dumps! We recommend you to try the PREMIUM Certleader 156-315.80 dumps in VCE and PDF here: https://www.certleader.com/156-315.80-dumps.html (428 Q&As Dumps)