156-915.80 Exam - Check Point Certified Security Expert Update - R80

certleader.com

P.S. Certified 156-915.80 Q&A are available on Google Drive, GET MORE: https://drive.google.com/open?id=10nZGq46vgX7-YMephRQOtbIjmfJ8w6LL


New Check Point 156-915.80 Exam Dumps Collection (Question 4 - Question 13)

New Questions 4

You enable Automatic Static NAT on an internal host node object with a private IP address of 10.10.10.5, which is NATed into 216.216.216.5. (You use the default settings in Global Properties / NAT.)

When you run fw monitor on the R80 Security Gateway and then start a new HTTP connection from host

10.10.10.5 to browse the Internet, at what point in the monitor output will you observe the HTTP SYN-ACK packet translated from 216.216.216.5 back into 10.10.10.5?

A. o=outbound kernel, before the virtual machine

B. I=inbound kernel, after the virtual machine

C. O=outbound kernel, after the virtual machine

D. i=inbound kernel, before the virtual machine

Answer: B


New Questions 5

If you need strong protection for the encryption of user data, what option would be the BEST choice?

A. Use Diffie-Hellman for key construction and pre-shared keys for Quick Mode. Choose SHA in Quick Mode and encrypt with AES. Use AH protocol. Switch to Aggressive Mode.

B. When you need strong encryption, IPsec is not the best choice. SSL VPNu2021s are a better choice.

C. Use certificates for Phase 1, SHA for all hashes, AES for all encryption and PFS, and use ESP protocol.

D. Disable Diffie-Hellman by using stronger certificate based key-derivation. Use AES-256 bit on all encrypted channels and add PFS to QuickMode. Use double encryption by implementing AH and ESP as protocols.

Answer: C


New Questions 6

Select the correct statement about Secure Internal Communications (SIC) Certificates. SIC Certificates:

A. Are used for securing internal network communications between the SmartDashboard and the Security Management Server.

B. For R75 Security Gateways are created during the Security Management Server installation.

C. Decrease network security by securing administrative communication among the Security Management Servers and the Security Gateway.

D. Uniquely identify Check Point enabled machines; they have the same function as VPN Certificates.

Answer: D


New Questions 7

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned an IP address 10.0.0.19 via DHCP.

John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop. He wants to move around the organization and continue to have access to the HR Web Server.

To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the policy.

2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.

John plugged in his laptop to the network on a different network segment and he is not able to connect. How does he solve this problem?

A. John should install the Identity Awareness Agent

B. The firewall admin should install the Security Policy

C. John should lock and unlock the computer

D. Investigate this as a network connectivity issue

Answer: B


New Questions 8

What command syntax would you use to turn on PDP logging in a distributed environment?

A. pdp track=1

B. pdp tracker on

C. pdp logging on

D. pdp log=1

Answer: B


New Questions 9

What is the responsibility of SOLR process on R80.10 management server?

A. Validating all data before itu2021s written into the database

B. It generates indexes of data written to the database

C. Communication between SmartConsole applications and the Security Management Server

D. Writing all information into the database

Answer: B


New Questions 10

What are you required to do before running the command upgrade_export?

A. Run a cpstop on the Security Gateway.

B. Run a cpstop on the Security Management Server.

C. Close all GUI clients.

D. Run cpconfig and set yourself up as a GUI client.

Answer: C


New Questions 11

You have selected the event Port Scan from Internal Network in SmartEvent, to detect an event when 30 port scans have occurred within 60 seconds. You also want to detect two port scans from a host within 10 seconds of each other. How would you accomplish this?

A. Define the two port-scan detections as an exception.

B. You cannot set SmartEvent to detect two port scans from a host within 10 seconds of each other.

C. Select the two port-scan detections as a sub-event.

D. Select the two port-scan detections as a new event.

Answer: A


New Questions 12

You want to generate a cpinfo file via CLI on a system running GAiA. This will take about 40 minutes since the log files are also needed. What action do you need to take regarding timeout?

A. No action is needed because cpshell has a timeout of one hour by default.

B. Log in as the default user expert and start cpinfo.

C. Log in as admin, switch to expert mode, set the timeout to one hour with the command, idle 60, then start cpinfo.

D. Log in as Administrator, set the timeout to one hour with the command idle 60 and start cpinfo.

Answer: D


New Questions 13

Which of the following authentication methods can be configured in the Identity Awareness setup wizard?

A. TACACS

B. Captive Portal

C. Check Point Password

D. Windows password

Answer: B


P.S. Easily pass 156-915.80 Exam with Certleader Certified Dumps & pdf vce, Try Free: https://www.certleader.com/156-915.80-dumps.html ( New Questions)