156-915.80 Exam - Check Point Certified Security Expert Update - R80

certleader.com

P.S. Virtual 156-915.80 training tools are available on Google Drive, GET MORE: https://drive.google.com/open?id=10nZGq46vgX7-YMephRQOtbIjmfJ8w6LL


New Check Point 156-915.80 Exam Dumps Collection (Question 3 - Question 12)

Q1. Fill in the blank. You can set Acceleration to ON or OFF using command syntax .

Answer:

fwaccel off/on


Q2. Which command line interface utility allows the administrator to verify the Security Policy name and timestamp currently installed on a firewall module?

A. cpstat fwd

B. fw ver

C. fw stat

D. fw ctl pstat

Answer: C


Q3. Type the command and syntax that you would use to view the virtual cluster interfaces of a ClusterXL environment.

Answer:

cphaprob -a if


Q4. VPN Tunnel Sharing can be configured with any of the options below, EXCEPT One:

A. Gateway-based

B. Subnet-based

C. IP range based

D. Host-based

Answer: C

Explanation:

VPN Tunnel Sharing provides interoperability and scalability by controlling the number of VPN tunnels created between peer Security Gateways. There are three available settings:

One VPN tunnel per each pair of hosts One VPN tunnel per subnet pair

One VPN tunnel per Security Gateway pair


Q5. What is the command to show SecureXL status?

A. fwaccel status

B. fwaccel stats u2013m

C. fwaccel u2013s

D. fwaccel stat

Answer: D

Explanation:

To check overall SecureXL status: [Expert@HostName]# fwaccel stat


Q6. In the Rule Base displayed, user authentication in Rule 4 is configured as fully automatic. Eric is a member of the LDAP group, MSD_Group.

What happens when Eric tries to connect to a server on the Internet?

A. None of these things will happen.

B. Eric will be authenticated and get access to the requested server.

C. Eric will be blocked because LDAP is not allowed in the Rule Base.

D. Eric will be dropped by the Stealth Rule.

Answer: D


Q7. You are the Security Administrator for MegaCorp. A Check Point firewall is installed and in use on a platform using GAiA. You have trouble configuring the speed and duplex settings of your Ethernet interfaces. Which of the following commands can be used in CLISH to configure the speed and duplex settings of an Ethernet interface and will survive a reboot? Give the BEST answer.

A. ethtool

B. set interface <options>

C. mii_tool

D. ifconfig -a

Answer: B


Q8. What happen when IPS profile is set in Detect-Only Mode for troubleshooting?

A. It will generate Geo-Protection traffic

B. Automatically uploads debugging logs to Check Point Support Center

C. It will not block malicious traffic

D. Bypass licenses requirement for Geo-Protection control

Answer: C

Explanation:

It is recommended to enable Detect-Only for Troubleshooting on the profile during the initial installation of IPS. This option overrides any protections that are set to Prevent so that they will not block any traffic. During this time you can analyze the alerts that IPS generates to see how IPS will handle network traffic, while avoiding any impact on the flow of traffic.


Q9. Type the command and syntax to view critical devices on a cluster member in a ClusterXL environment.

Answer:

cphaprob -ia list


Q10. What gives administrators more flexibility when configuring Captive Portal instead of LDAP query for Identity Awareness authentication?

A. Captive Portal is more secure than standard LDAP

B. Nothing, LDAP query is required when configuring Captive Portal

C. Captive Portal works with both configured users and guests

D. Captive Portal is more transparent to the user

Answer: C


Recommend!! Get the Virtual 156-915.80 dumps in VCE and PDF From Examcollection, Welcome to download: http://www.examcollectionuk.com/156-915.80-vce-download.html (New Q&As Version)