Black Friday Special - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

Hot Vendors
Note! The 156-315.80 Exam is no longer available.

156-315.80 Check Point Certified Security Expert - R80 Questions and Answers

Questions 4

Can Check Point and Third-party Gateways establish a certificate-based Site-to-Site VPN tunnel?

Options:

A.

Yes, but they need to have a mutually trusted certificate authority

B.

Yes, but they have to have a pre-shared secret key

C.

No, they cannot share certificate authorities

D.

No, Certificate based VPNs are only possible between Check Point devices

Buy Now
Questions 5

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?

Options:

A.

Detects and blocks malware by correlating multiple detection engines before users are affected.

B.

Configure rules to limit the available network bandwidth for specified users or groups.

C.

Use UserCheck to help users understand that certain websites are against the company’s security policy.

D.

Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.

Buy Now
Questions 6

What are the available options for downloading Check Point hotfixes in Gala WebUI (CPUSE)?

Options:

A.

Manually, Scheduled, Automatic

B.

Manually, Automatic, Disabled

C.

Manually, Scheduled, Disabled

D.

Manually, Scheduled, Enabled

Buy Now
Questions 7

Which of the following is a task of the CPD process?

Options:

A.

Invoke and monitor critical processes and attempts to restart them if they fail

B.

Transfers messages between Firewall processes

C.

Log forwarding

D.

Responsible for processing most traffic on a security gateway

Buy Now
Questions 8

Which command would disable a Cluster Member permanently?

Options:

A.

clusterXL_admin down

B.

cphaprob_admin down

C.

clusterXL_admin down-p

D.

set clusterXL down-p

Buy Now
Questions 9

What will SmartEvent automatically define as events?

Options:

A.

Firewall

B.

VPN

C.

IPS

D.

HTTPS

Buy Now
Questions 10

What has to be taken into consideration when configuring Management HA?

Options:

A.

The Database revisions will not be synchronized between the management servers

B.

SmartConsole must be closed prior to synchronized changes in the objects database

C.

If you wanted to use Full Connectivity Upgrade, you must change the Implied Rules to allow FW1_cpredundant to pass before the Firewall Control Connections.

D.

For Management Server synchronization, only External Virtual Switches are supported. So, if you wanted to employ Virtual Routers instead, you have to reconsider your design.

Buy Now
Questions 11

Using ClusterXL, what statement is true about the Sticky Decision Function?

Options:

A.

Can only be changed for Load Sharing implementations

B.

All connections are processed and synchronized by the pivot

C.

Is configured using cpconfig

D.

Is only relevant when using SecureXL

Buy Now
Questions 12

UserCheck objects in the Application Control and URL Filtering rules allow the gateway to communicate with the users. Which action is not supported in UserCheck objects?

Options:

A.

Ask

B.

Drop

C.

Inform

D.

Reject

Buy Now
Questions 13

SmartConsole R80 x requires the following ports to be open for SmartEvent.

Options:

A.

19009, 19090 & 443

B.

19009, 19004 & 18190

C.

18190 & 443

D.

19009, 18190 & 443

Buy Now
Questions 14

When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.

Options:

A.

SecureID

B.

SecurID

C.

Complexity

D.

TacAcs

Buy Now
Questions 15

In the Check Point Security Management Architecture, which component(s) can store logs?

Options:

A.

SmartConsole

B.

Security Management Server and Security Gateway

C.

Security Management Server

D.

SmartConsole and Security Management Server

Buy Now
Questions 16

Check Point security components are divided into the following components:

Options:

A.

GUI Client, Security Gateway, WebUI Interface

B.

GUI Client, Security Management, Security Gateway

C.

Security Gateway, WebUI Interface, Consolidated Security Logs

D.

Security Management, Security Gateway, Consolidate Security Logs

Buy Now
Questions 17

Which command can you use to enable or disable multi-queue per interface?

Options:

A.

cpmq set

B.

Cpmqueue set

C.

Cpmq config

D.

St cpmq enable

Buy Now
Questions 18

You need to change the MAC-address on eth2 interface of the gateway. What is the correct way to change MAC-address in Check Point Gaia?

Options:

A.

In CLISH run: set interface eth2 mac-addr 11:11:11:11:11:11

B.

In expert-mode run ifconfig eth1 hw 11:11:11:11 11 11

C.

In CLISH run set interface eth2 hw-addr 11 11 11:11:11 11

D.

In expert-mode run: ethtool -4 eth2 mac 11 11:11:11:11:11

Buy Now
Questions 19

Which TCP-port does CPM process listen to?

Options:

A.

18191

B.

18190

C.

8983

D.

19009

Buy Now
Questions 20

According to out of the box SmartEvent policy, which blade will automatically be correlated into events?

Options:

A.

Firewall

B.

VPN

C.

IPS

D.

HTTPS

Buy Now
Questions 21

In the Firewall chain mode FFF refers to:

Options:

A.

Stateful Packets

B.

No Match

C.

All Packets

D.

Stateless Packets

Buy Now
Questions 22

What is the Implicit Clean-up Rule?

Options:

A.

A setting is defined in the Global Properties for all policies.

B.

A setting that is configured per Policy Layer.

C.

Another name for the Clean-up Rule.

D.

Automatically created when the Clean-up Rule is defined.

Buy Now
Questions 23

Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidated management console. It empowers the migration from legacy Client-side logic to Server-side logic. The cpm process:

Options:

A.

Allow GUI Client and management server to communicate via TCP Port 19001

B.

Allow GUI Client and management server to communicate via TCP Port 18191

C.

Performs database tasks such as creating, deleting, and modifying objects and compiling policy.

D.

Performs database tasks such as creating, deleting, and modifying objects and compiling as well as policy code generation.

Buy Now
Questions 24

Which of the following blades is NOT subscription-based and therefore does not have to be renewed on a regular basis?

Options:

A.

Application Control

B.

Threat Emulation

C.

Anti-Virus

D.

Advanced Networking Blade

Buy Now
Questions 25

The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?

Options:

A.

add host name ip-address

B.

add hostname ip-address

C.

set host name ip-address

D.

set hostname ip-address

Buy Now
Questions 26

Using Threat Emulation technologies, what is the best way to block .exe and .bat file types?

Options:

A.

enable DLP and select.exe and .bat file type

B.

enable .exe & .bat protection in IPS Policy

C.

create FW rule for particular protocol

D.

tecli advanced attributes set prohibited_file_types exe.bat

Buy Now
Questions 27

Customer’s R80 management server needs to be upgraded to R80.10. What is the best upgrade method when the management server is not connected to the Internet?

Options:

A.

Export R80 configuration, clean install R80.10 and import the configuration

B.

CPUSE offline upgrade

C.

CPUSE online upgrade

D.

SmartUpdate upgrade

Buy Now
Questions 28

To ensure that VMAC mode is enabled, which CLI command should you run on all cluster members?

Options:

A.

fw ctl set int fwha vmac global param enabled

B.

fw ctl get int vmac global param enabled; result of command should return value 1

C.

cphaprob-a if

D.

fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1

Buy Now
Questions 29

What key is used to save the current CPView page in a filename format cpview_”cpview process ID”.cap”number of captures”?

Options:

A.

S

B.

W

C.

C

D.

Space bar

Buy Now
Questions 30

Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is ____ all traffic. However, in the Application Control policy layer, the default action is ______ all traffic.

Options:

A.

Accept; redirect

B.

Accept; drop

C.

Redirect; drop

D.

Drop; accept

Buy Now
Questions 31

To optimize Rule Base efficiency, the most hit rules should be where?

Options:

A.

Removed from the Rule Base.

B.

Towards the middle of the Rule Base.

C.

Towards the top of the Rule Base.

D.

Towards the bottom of the Rule Base.

Buy Now
Questions 32

What is the default size of NAT table fwx_alloc?

Options:

A.

20000

B.

35000

C.

25000

D.

10000

Buy Now
Questions 33

Which application should you use to install a contract file?

Options:

A.

SmartView Monitor

B.

WebUI

C.

SmartUpdate

D.

SmartProvisioning

Buy Now
Questions 34

Fill in the blank: The command ___________________ provides the most complete restoration of a R80 configuration.

Options:

A.

upgrade_import

B.

cpconfig

C.

fwm dbimport -p

D.

cpinfo –recover

Buy Now
Questions 35

Which of the following is NOT a type of Endpoint Identity Agent?

Options:

A.

Terminal

B.

Light

C.

Full

D.

Custom

Buy Now
Questions 36

The Check Point history feature in R80 provides the following:

Options:

A.

View install changes and install specific version

B.

View install changes

C.

Policy Installation Date, view install changes and install specific version

D.

Policy Installation Date only

Buy Now
Questions 37

Which process handles connection from SmartConsole R80?

Options:

A.

fwm

B.

cpmd

C.

cpm

D.

cpd

Buy Now
Questions 38

You have existing dbedit scripts from R77. Can you use them with R80.10?

Options:

A.

dbedit is not supported in R80.10

B.

dbedit is fully supported in R80.10

C.

You can use dbedit to modify threat prevention or access policies, but not create or modify layers

D.

dbedit scripts are being replaced by mgmt_cli in R80.10

Buy Now
Questions 39

Installations and upgrades with CPUSE require that the CPUSE agent is up-to-date. Usually the latest build is downloaded automatically. How can you verify the CPUSE agent build?

Options:

A.

In WebUI Status and Actions page or by running the following command in CLISH: show installer status build

B.

In WebUI Status and Actions page or by running the following command in CLISH: show installer status version

C.

In the Management Server or Gateway object in SmartConsole or by running the following command in CLISH: show installer status build

D.

In the Management Server or Gateway object in SmartConsole or by running the following command in CLISH: show installer agent

Buy Now
Questions 40

How does the Anti-Virus feature of the Threat Prevention policy block traffic from infected websites?

Options:

A.

By dropping traffic from websites identified through ThreatCloud Verification and URL Caching

B.

By dropping traffic that is not proven to be from clean websites in the URL Filtering blade

C.

By allowing traffic from websites that are known to run Antivirus Software on servers regularly

D.

By matching logs against ThreatCloud information about the reputation of the website

Buy Now
Questions 41

Which of the following is NOT a component of Check Point Capsule?

Options:

A.

Capsule Docs

B.

Capsule Cloud

C.

Capsule Enterprise

D.

Capsule Workspace

Buy Now
Questions 42

What is the protocol and port used for Health Check and State Synchronization in ClusterXL?

Options:

A.

CCP and 18190

B.

CCP and 257

C.

CCP and 8116

D.

CPC and 8116

Buy Now
Questions 43

Which option, when applied to a rule, allows traffic to VPN gateways in specific VPN communities?

Options:

A.

All Connections (Clear or Encrypted)

B.

Accept all encrypted traffic

C.

Specific VPN Communities

D.

All Site-to-Site VPN Communities

Buy Now
Questions 44

Which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?

Options:

A.

Auditor

B.

Read Only All

C.

Super User

D.

Full Access

Buy Now
Questions 45

In which formats can Threat Emulation forensics reports be viewed in?

Options:

A.

TXT, XML and CSV

B.

PDF and TXT

C.

PDF, HTML, and XML

D.

PDF and HTML

Buy Now
Questions 46

Check Pont Central Deployment Tool (CDT) communicates with the Security Gateway / Cluster Members over Check Point SIC _______ .

Options:

A.

TCP Port 18190

B.

TCP Port 18209

C.

TCP Port 19009

D.

TCP Port 18191

Buy Now
Questions 47

Fill in the blank: A ________ VPN deployment is used to provide remote users with secure access to internal corporate resources by authenticating the user through an internet browser.

Options:

A.

Clientless remote access

B.

Clientless direct access

C.

Client-based remote access

D.

Direct access

Buy Now
Questions 48

Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?

Options:

A.

Synchronized

B.

Never been synchronized

C.

Lagging

D.

Collision

Buy Now
Questions 49

What is the best method to upgrade a Security Management Server to R80.x when it is not connected to the Internet?

Options:

A.

CPUSE offline upgrade only

B.

Advanced upgrade or CPUSE offline upgrade

C.

Advanced Upgrade only

D.

SmartUpdate offline upgrade

Buy Now
Questions 50

With SecureXL enabled, accelerated packets will pass through the following:

Options:

A.

Network Interface Card, OSI Network Layer, OS IP Stack, and the Acceleration Device

B.

Network Interface Card, Check Point Firewall Kernal, and the Acceleration Device

C.

Network Interface Card and the Acceleration Device

D.

Network Interface Card, OSI Network Layer, and the Acceleration Device

Buy Now
Questions 51

John is using Management HA. Which Security Management Server should he use for making changes?

Options:

A.

secondary Smartcenter

B.

active SmartConsole

C.

connect virtual IP of Smartcenter HA

D.

primary Log Server

Buy Now
Questions 52

Which statement is true about ClusterXL?

Options:

A.

Supports Dynamic Routing (Unicast and Multicast)

B.

Supports Dynamic Routing (Unicast Only)

C.

Supports Dynamic Routing (Multicast Only)

D.

Does not support Dynamic Routing

Buy Now
Questions 53

Fill in the blank: Browser-based Authentication sends users to a web page to acquire identities using ________ .

Options:

A.

User Directory

B.

Captive Portal and Transparent Kerberos Authentication

C.

Captive Portal

D.

UserCheck

Buy Now
Questions 54

Which one of the following is true about Threat Emulation?

Options:

A.

Takes less than a second to complete

B.

Works on MS Office and PDF files only

C.

Always delivers a file

D.

Takes minutes to complete (less than 3 minutes)

Buy Now
Questions 55

Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?

Options:

A.

Check Point Remote User

B.

Check Point Capsule Workspace

C.

Check Point Mobile Web Portal

D.

Check Point Capsule Remote

Buy Now
Questions 56

Which of the following is NOT supported by CPUSE?

Options:

A.

Automatic download of full installation and upgrade packages

B.

Automatic download of hotfixes

C.

Installation of private hotfixes

D.

Offline installations

Buy Now
Questions 57

CoreXL is NOT supported when one of the following features is enabled: (Choose three)

Options:

A.

Route-based VPN

B.

IPS

C.

IPv6

D.

Overlapping NAT

Buy Now
Questions 58

In SmartConsole, objects are used to represent physical and virtual network components and also some logical components. These objects are divided into several categories. Which of the following is NOT an objects category?

Options:

A.

Limit

B.

Resource

C.

Custom Application / Site

D.

Network Object

Buy Now
Questions 59

Where you can see and search records of action done by R80 SmartConsole administrators?

Options:

A.

In SmartView Tracker, open active log

B.

In the Logs & Monitor view, select “Open Audit Log View”

C.

In SmartAuditLog View

D.

In Smartlog, all logs

Buy Now
Questions 60

Which view is NOT a valid CPVIEW view?

Options:

A.

IDA

B.

RAD

C.

PDP

D.

VPN

Buy Now
Questions 61

Which of the SecureXL templates are enabled by default on Security Gateway?

Options:

A.

Accept

B.

Drop

C.

NAT

D.

None

Buy Now
Questions 62

With Mobile Access enabled, administrators select the web-based and native applications that can be accessed by remote users and define the actions that users can perform the applications. Mobile Access encrypts all traffic using:

Options:

A.

HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, they need to install the SSL Network Extender.

B.

HTTPS for web-based applications and AES or RSA algorithm for native applications. For end users to access the native application, they need to install the SSL Network Extender.

C.

HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, no additional software is required.

D.

HTTPS for web-based applications and AES or RSA algorithm for native applications. For end users to access the native application, no additional software is required.

Buy Now
Questions 63

The back end database for Check Point R80 Management uses:

Options:

A.

DBMS

B.

MongoDB

C.

PostgreSQL

D.

MySQL

Buy Now
Questions 64

What is the purpose of the CPCA process?

Options:

A.

Monitoring the status of processes.

B.

Sending and receiving logs.

C.

Communication between GUI clients and the SmartCenter server.

D.

Generating and modifying certificates.

Buy Now
Questions 65

While using the Gaia CLI. what is the correct command to publish changes to the management server?

Options:

A.

json publish

B.

mgmt publish

C.

mgmt_cli commit

D.

commit

Buy Now
Questions 66

Which of the following describes how Threat Extraction functions?

Options:

A.

Detect threats and provides a detailed report of discovered threats.

B.

Proactively detects threats.

C.

Delivers file with original content.

D.

Delivers PDF versions of original files with active content removed.

Buy Now
Questions 67

How many layers make up the TCP/IP model?

Options:

A.

2

B.

7

C.

6

D.

4

Buy Now
Questions 68

Identify the API that is not supported by Check Point currently.

Options:

A.

R80 Management API-

B.

Identity Awareness Web Services API

C.

Open REST API

D.

OPSEC SDK

Buy Now
Questions 69

Which of the following Windows Security Events will not map a username to an IP address in Identity Awareness?

Options:

A.

Kerberos Ticket Renewed

B.

Kerberos Ticket Requested

C.

Account Logon

D.

Kerberos Ticket Timed Out

Buy Now
Exam Code: 156-315.80
Exam Name: Check Point Certified Security Expert - R80
Last Update: Nov 28, 2023
Questions: 462
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 23 Nov 2024