156-915.80 Exam - Check Point Certified Security Expert Update - R80

certleader.com

P.S. Certified 156-915.80 questions pool are available on Google Drive, GET MORE: https://drive.google.com/open?id=1AOCvpDSrVRu84FD-BbSByp1q4rNge15Q


New Check Point 156-915.80 Exam Dumps Collection (Question 7 - Question 16)

Question No: 7

What are the three components for Check Point Capsule?

A. Capsule Docs, Capsule Cloud, Capsule Connect

B. Capsule Workspace, Capsule Cloud, Capsule Connect

C. Capsule Workspace, Capsule Docs, Capsule Connect

D. Capsule Workspace, Capsule Docs, Capsule Cloud

Answer: D


Question No: 8

The connection to the ClusterXL member u2021Au2021 breaks. The ClusterXL member u2021Au2021 status is now u2021downu2021. Afterwards the switch admin set a port to ClusterXL member u2021Bu2021 to u2021downu2021. What will happen?

A. ClusterXL member u2021Bu2021 also left the cluster.

B. ClusterXL member u2021Bu2021 stays active as last member.

C. Both ClusterXL members share load equally.

D. ClusterXL member u2021Au2021 is asked to come back to cluster.

Answer: B


Question No: 9

The technical-support department has a requirement to access an intranet server. When configuring a User Authentication rule to achieve this, which of the following should you remember?

A. You can only use the rule for Telnet, FTP, SMTP, and rlogin services.

B. The Security Gateway first checks if there is any rule that does not require authentication for this type of connection before invoking the Authentication Security Server.

C. Once a user is first authenticated, the user will not be prompted for authentication again until logging

out.

D. You can limit the authentication attempts in the User Propertiesu2021 Authentication tab.

Answer: B


Question No: 10

Which Check Point tool allows you to open a debug file and see the VPN packet exchange details.

A. PacketDebug.exe

B. VPNDebugger.exe

C. IkeView.exe

D. IPSECDebug.exe

Answer: C


Question No: 11

The command useful for debugging by capturing packet information, including verifying LDAP authentication on all Check Point platforms is

Answer:

fw monitor


Question No: 12

Which features are only supported with R80.10 Gateways but not R77.x?

A. Access Control policy unifies the Firewall, Application Control & URL Filtering, Data Awareness, and Mobile Access Software Blade policies.

B. Limits the upload and download throughput for streaming media in the company to 1 Gbps.

C. The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.

D. Time object to a rule to make the rule active only during specified times.

Answer: C


Question No: 13

What is the purpose of Priority Delta in VRRP?

A. When a box is up, Effective Priority = Priority + Priority Delta

B. When an Interface is up, Effective Priority = Priority + Priority Delta

C. When an Interface fail, Effective Priority = Priority u2013 Priority Delta

D. When a box fail, Effective Priority = Priority u2013 Priority Delta

Answer: C

Explanation:

Each instance of VRRP running on a supported interface may monitor the link state of other interfaces. The monitored interfaces do not have to be running VRRP. If a monitored interface loses its link state, then VRRP will decrement its priority over a VRID by the specified delta value and then will send out a new VRRP HELLO packet. If the new effective priority is less than the priority a backup platform has, then the backup platform will beging to send out its own HELLO packet. Once the master sees this packet with a priority greater than its own, then it releases the VIP.


Question No: 14

Which of the following is NOT defined by an Access Role object?

A. Source Network

B. Source Machine

C. Source User

D. Source Server

Answer: D


Question No: 15

ALL of the following options are provided by the GAiA sysconfig utility, EXCEPT:

A. Export setup

B. DHCP Server configuration

C. Time & Date

D. GUI Clients

Answer: D


Question No: 16

Which command displays the installed Security Gateway version?

A. fw printver

B. fw ver

C. fw stat

D. cpstat -gw

Answer: B


Recommend!! Get the Certified 156-915.80 dumps in VCE and PDF From Examcollection, Welcome to download: http://www.examcollectionuk.com/156-915.80-vce-download.html (New Q&As Version)