Check Point 156-915.80 Exam Questions and Answers 2021
156-915.80 Free Practice Questions are updated and 156-915.80 Exam Questions and Answers are verified by experts. Once you have completely prepared with our 156-915.80 Study Guides you will be ready for the real 156-915.80 exam without a problem. We have 156-915.80 Dumps. PASSED 156-915.80 Dumps Questions First attempt! Here What I Did.
Free 156-915.80 Demo Online For Microsoft Certifitcation:
NEW QUESTION 1
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?
- A. Anti-Bot is the only countermeasure against unknown malware
- B. Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control Centers
- C. Anti-Bot is the only signature-based method of malware protection
- D. Anti-Bot is a post-infection malware protection to prevent a host from establishing a connection to a Command & Control Center
Answer: D
NEW QUESTION 2
When configuring numbered VPN Tunnel Interfaces (VTIs) in a clustered environment, what issues need to be considered?
1) Each member must have a unique source IP address.
2) Every interface on each member requires a unique IP address.
3) All VTI's going to the same remote peer must have the same name.
4) Cluster IP addresses are required.
- A. 1, 2, and 4
- B. 2 and 3
- C. 1, 2, 3 and 4
- D. 1, 3, and 4
Answer: C
NEW QUESTION 3
You find one of your cluster gateways showing “Down” when you run the “cphaprob stat” command. You then run the “clusterXL_admin up” on the down member but unfortunately the member continues to show down. What command do you run to determine the case?
- A. cphaprob –f register
- B. cphaprob –d–s report
- C. cpstat–f-all
- D. cphaprob –a list
Answer: D
NEW QUESTION 4
When defining QoS global properties, which option below is not valid?
- A. Weight
- B. Authenticated timeout
- C. Schedule
- D. Rate
Answer: C
NEW QUESTION 5
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
- A. Detects and blocks malware by correlating multiple detection engines before users are affected.
- B. Configure rules to limit the available network bandwidth for specified users or groups.
- C. Use UserCheck to help users understand that certain websites are against the company’s security policy.
- D. Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.
Answer: A
Explanation: Use the URL Filtering and Application Control Software Blades to:
NEW QUESTION 6
MegaCorp is running Smartcenter R70, some Gateways at R65 and some other Gateways with R60. Management wants to upgrade to the most comprehensive IPv6 support. What should the administrator do first?
- A. Upgrade Smartcenter to R80 first.
- B. Upgrade R60-Gateways to R65.
- C. Upgrade every unit directly to R80.
- D. Check the ReleaseNotes to verify that every step is supported.
Answer: D
NEW QUESTION 7
What mechanism does a gateway configured with Identity Awareness and LDAP initially use to communicate with a Windows 2003 or 2008 server?
- A. WMI
- B. CIFS
- C. RCP
- D. LDAP
Answer: A
NEW QUESTION 8
What can you do to see the current number of kernel instances in a system with CoreXL enabled?
- A. Browse to Secure Platform Web GUI
- B. Only Check Point support personnel can access that information
- C. Execute SmarDashboard client
- D. Execute command cpconfig
Answer: D
NEW QUESTION 9
Complete this statement from the options provided. Using Captive Portal, unidentified users may be either; blocked, allowed to enter required credentials, or required to download the .
- A. Identity Awareness Agent
- B. Full Endpoint Client
- C. ICA Certificate
- D. SecureClient
Answer: A
NEW QUESTION 10
What is mandatory for ClusterXL to work properly?
- A. The number of cores must be the same on every participating cluster node
- B. The Magic MAC number must be unique per cluster node.
- C. The Sync Interface must not have an IP address configured
- D. If you have “Non-monitored Private” interfaces, the number of those interfaces must be the same on all cluster members
Answer: B
NEW QUESTION 11
When do modifications to the Event Policy take effect?
- A. As soon as the Policy Tab window is closed.
- B. When saved on the SmartEvent Server and installed to the Correlation Units.
- C. When saved on the Correlation Units, and pushed as a policy.
- D. When saved on the SmartEvent Client, and installed on the SmartEvent Server.
Answer: B
NEW QUESTION 12
The “MAC magic” value must be modified under the following condition:
- A. There is more than one cluster connected to the same VLAN
- B. A firewall cluster is configured to use Multicast for CCP traffic
- C. There are more than two members in a firewall cluster
- D. A firewall cluster is configured to use Broadcast for CCP traffic
Answer: D
NEW QUESTION 13
ALL of the following options are provided by the GAiA sysconfig utility, EXCEPT:
- A. Export setup
- B. DHCP Server configuration
- C. Time & Date
- D. GUI Clients
Answer: D
NEW QUESTION 14
You find that Users are not prompted for authentication when they access their Web servers, even though you have created an HTTP rule via User Authentication. Choose the BEST reason why.
- A. You checked the cache password on desktop option in Global Properties.
- B. Another rule that accepts HTTP without authentication exists in the Rule Base.
- C. You have forgotten to place the User Authentication Rule before the Stealth Rule.
- D. Users must use the SecuRemote Client, to use the User Authentication Rule.
Answer: B
NEW QUESTION 15
Type the full cphaprob command and syntax that will show full synchronization status.
Answer:
Explanation: cphaprob -i list
NEW QUESTION 16
Your customer, Mr. Smith needs access to other networks and should be able to use all services. Session authentication is not suitable. You select Client Authentication with HTTP. The standard authentication port for client HTTP authentication (Port 900) is already in use. You want to use Port 9001 but are having connectivity problems. Why are you having problems?

- A. The configuration file $FWDIR/conf/fwauthd.conf is incorrect.
- B. The Security Policy is not correct.
- C. You can't use any port other than the standard port 900 for Client Authentication via HTTP.
- D. The service FW_clntauth_http configuration is incorrect.
Answer: A
NEW QUESTION 17
Fill in the blank. To remove site-to-site IKE and IPSEC keys you would enter command and select the option to delete all IKE and IPSec SA’s.
Answer:
Explanation: vpn tu
NEW QUESTION 18
John is configuring a new R80 Gateway cluster but he can not configure the cluster as Third Party IP Clustering because this option is not available in Gateway Cluster Properties.
What’s happening?
- A. ClusterXL needs to be unselected to permit third party clustering configuration.
- B. Third Party Clustering is not available for R80 Security Gateways.
- C. John has an invalid ClusterXL license.
- D. John is not using third party hardware as IP Clustering is part of Check Point’s IP Appliance.
Answer: A
NEW QUESTION 19
What is the primary benefit of using the command upgrade_export over either backup or snapshot?
- A. upgrade_export is operating system independent and can be used when backup or snapshot is not available.
- B. upgrade_export will back up routing tables, hosts files, and manual ARP configurations, where backup and snapshot will not.
- C. The commands backup and snapshot can take a long time to run whereas upgrade_export will take a much shorter amount of time.
- D. upgrade_export has an option to back up the system and SmartView Tracker logs while backup andsnapshot will not.
Answer: A
P.S. Easily pass 156-915.80 Exam with 303 Q&As prep-labs.com Dumps & pdf Version, Welcome to Download the Newest prep-labs.com 156-915.80 Dumps: https://www.prep-labs.com/dumps/156-915.80/ (303 New Questions)