Check Point 156-915.80 Free Practice Questions 2021

Our pass rate is high to 98.9% and the similarity percentage between our 156-915.80 Exam Questions and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Check Point 156-915.80 exam in just one try? I am currently studying for the 156-915.80 Exam Questions and Answers. Latest 156-915.80 Exam Dumps, Try Check Point 156-915.80 Brain Dumps First.

Online 156-915.80 free questions and answers of New Version:

NEW QUESTION 1
What type of traffic can be re-directed to the Captive Portal?

  • A. SMTP
  • B. HTTP
  • C. All of the above
  • D. FTP

Answer: B

NEW QUESTION 2
Type the command and syntax to view critical devices on a cluster member in a ClusterXL environment. Answer:
cphaprob -ia list

    Answer:

    NEW QUESTION 3
    Which one of the following is true about Threat Emulation?

    • A. Takes less than a second to complete
    • B. Works on MS Office and PDF files only
    • C. Always delivers a file
    • D. Takes minutes to complete (less than 3 minutes)

    Answer: D

    NEW QUESTION 4
    You find that Gateway fw2 can NOT be added to the cluster object. What are possible reasons for that? Exhibit:
    156-915.80 dumps exhibit
    1) fw2 is a member in a VPN community.
    2) ClusterXL software blade is not enabled on fw2.
    3) fw2 is a DAIP Gateway.

    • A. 2 or 3
    • B. 1 or 2
    • C. 1 or 3
    • D. All

    Answer: C

    NEW QUESTION 5
    What is Check Point's CoreXL?

    • A. A way to synchronize connections across cluster members
    • B. TCP-18190
    • C. Multiple core interfaces on the device to accelerate traffic
    • D. Multi Core support for Firewall Inspection

    Answer: D

    NEW QUESTION 6
    What happens if the identity of a user is known?

    • A. If the user credentials do not match an Access Role, the system displays the Captive Portal.
    • B. If the user credentials do not match an Access Role, the system displays a sandbox.
    • C. If the user credentials do not match an Access Role, the traffic is automatically dropped.
    • D. If the user credentials match an Access Role, the rule is applied and traffic is accepted or dropped basedon the defined action.

    Answer: D

    NEW QUESTION 7
    An internal host initiates a session to the Google.com website and is set for Hide NAT behind the Security Gateway. The initiating traffic is an example of .

    • A. client side NAT
    • B. source NAT
    • C. destination NAT
    • D. None of these

    Answer: B

    NEW QUESTION 8
    Your expanding network currently includes ClusterXL running Multicast mode on two members, as shown in this topology:
    Exhibit:
    156-915.80 dumps exhibit
    You need to add interfaces: 10.10.10.1/24 on Member A, and 10.10.10.2/24 on Member B. The virtual IP address for these interfaces is 10.10.10.3/24. Both cluster gateways have a Quad card with an available eth3 interface. What is the correct procedure to add these interfaces?

    • A. 1. Disable "Cluster membership" from one Gateway via cpconfig.2. Configure the new interface via sysconfig from the "non-member" Gateway.3. Re-enable "Cluster membership" on the Gateway.4. Perform the same steps on the other Gateway.5. Update the topology in the cluster object.6. Install the Security Policy.
    • B. 1. Configure the new interface on both members using WebUI.2. Update the new topology in the clusterobject from SmartDashboard.3. Define virtual IP in the Dashboard4. Install the Security Policy.
    • C. 1. Use WebUI to configure the new interfaces on both member.2. Update the topology in the cluster object.3. Reboot both gateways.4. Install the Security Policy.
    • D. 1. Use the command ifconfig to configure and enable the new interface on both members.2. Update the topology in the cluster object for the cluster and both members.3. Install the Security Policy.4. Reboot the gateway.

    Answer: B

    NEW QUESTION 9
    Which of the following authentication methods can be configured in the Identity Awareness setup wizard?

    • A. Check Point Password
    • B. TACACS
    • C. LDAP
    • D. Windows password

    Answer: C

    NEW QUESTION 10
    John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned a static IP address 10.0.0.19.
    John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop with a static IP (10.0.0.19). He wants to move around the organization and continue to have access to the HR Web Server.
    To make this scenario work, the IT administrator:
    1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the policy.
    2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.
    What should John do when he cannot access the web server from a different personal computer?

    • A. John should lock and unlock his computer
    • B. Investigate this as a network connectivity issue
    • C. The access should be changed to authenticate the user instead of the PC
    • D. John should install the Identity Awareness Agent

    Answer: C

    NEW QUESTION 11
    Your perimeter Security Gateway’s external IP is 200.200.200.3. Your network diagram shows:
    156-915.80 dumps exhibit
    Required: Allow only network 192.168.10.0 and 192.168.20.0 to go out to the Internet, using 200.200.200.5. The local network 192.168.1.0/24 needs to use 200.200.200.3 to go out to the Internet.
    Assuming you enable all the settings in the NAT page of Global Properties, how could you achieve these requirements?

    • A. Create network objects for 192.168.10.0/24 and 192.168.20.0/24. Enable Hide NAT on both network objects, using 200.200.200.5 as hiding IP addres
    • B. Add an ARP entry for 200.200.200.3 for the MAC address of 200.200.200.5.
    • C. Create an Address Range object, starting from 192.168.10.1 to 192.168.20.254. Enable Hide NAT onthe NAT page of the address range objec
    • D. Enter Hiding IP address 200.200.200.5. Add an ARP entry for 200.200.200.5 for the MAC address of 200.200.200.3.
    • E. Create a network object 192.168.0.0/16. Enable Hide NAT on the NAT pag
    • F. Enter 200.200.200.5 as the hiding IP addres
    • G. Add an ARP entry for 200.200.200.5 for the MAC address of 200.200.200.3.
    • H. Create two network objects: 192.168.10.0/24 and 192.168.20.0/24. Add the two network objects to a group objec
    • I. Create a manual NAT rule like the following: Original source - group object; Destination - any; Service - any; Translated source - 200.200.200.5; Destination - original; Service - original.

    Answer: B

    NEW QUESTION 12
    You are MegaCorp’s Security Administrator. There are various network objects which must be NATed. Some of them use the Automatic Hide NAT method, while others use the Automatic Static NAT method. What is the rule order if both methods are used together? Give the BEST answer.

    • A. The Administrator decides the rule order by shifting the corresponding rules up and down.
    • B. The Static NAT rules have priority over the Hide NAT rules and the NAT on a node has priority over the NAT on a network or an address range.
    • C. The Hide NAT rules have priority over the Static NAT rules and the NAT on a node has priority over the NAT on a network or an address range.
    • D. The rule position depends on the time of their creatio
    • E. The rules created first are placed at the top; rules created later are placed successively below the others.

    Answer: B

    NEW QUESTION 13
    SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day Protection?

    • A. Smart Cloud Services
    • B. Load Sharing Mode Services
    • C. Threat Agent Solution
    • D. Public Cloud Services

    Answer: C

    NEW QUESTION 14
    Which command collects diagnostic data for analyzing customer setup remotely?

    • A. cpinfo
    • B. migrate export
    • C. sysinfo
    • D. cpview

    Answer: A

    Explanation: CPInfo is an auto-updatable utility that collects diagnostics data on a customer's machine at the time of execution and uploads it to Check Point servers (it replaces the standalone cp_uploader utility for uploading files to Check Point servers).
    The CPInfo output file allows analyzing customer setups from a remote location. Check Point support engineers can open the CPInfo file in a demo mode, while viewing actual customer Security Policies and Objects. This allows the in-depth analysis of customer's configuration and environment settings.
    References:

    NEW QUESTION 15
    Which directory below contains log files?

    • A. /opt/CPSmartlog-R80/log
    • B. /opt/CPshrd-R80/log
    • C. /opt/CPsuite-R80/fw1/log
    • D. /opt/CPsuite-R80/log

    Answer: C

    NEW QUESTION 16
    VPN Tunnel Sharing can be configured with any of the options below, EXCEPT One:

    • A. Gateway-based
    • B. Subnet-based
    • C. IP range based
    • D. Host-based

    Answer: C

    Explanation: VPN Tunnel Sharing provides interoperability and scalability by controlling the number of VPN tunnels created between peer Security Gateways. There are three available settings:

    NEW QUESTION 17
    Fill in the blank. What is the correct command and syntax used to view a connection table summary on a Check Point Firewall?

      Answer:

      Explanation: fw tab -t connections -s

      NEW QUESTION 18
      A snapshot delivers a complete GAiA backup. The resulting file can be stored on servers or as a local file in
      /var/CPsnapshot/snapshots. How do you restore a local snapshot named MySnapshot.tgz?

      • A. Reboot the system and call the start men
      • B. Select the option Snapshot Management, provide the Expert password and select [L] for a restore from a local fil
      • C. Then, provide the correct file name.
      • D. As expert user, type the command snapshot -r MySnapshot.tgz.
      • E. As expert user, type the command revert --file MySnapshot.tgz.
      • F. As expert user, type the command snapshot - R to restore from a local fil
      • G. Then, provide the correct file name.

      Answer: C

      NEW QUESTION 19
      Because of pre-existing design constraints, you set up manual NAT rules for your HTTP server. However, your FTP server and SMTP server are both using automatic NAT rules. All traffic from your FTP and SMTP servers are passing through the Security Gateway without a problem, but traffic from the Web server is dropped on rule 0 because of anti-spoofing settings. What is causing this?

      • A. Manual NAT rules are not configured correctly.
      • B. Allow bi-directional NAT is not checked in Global Properties.
      • C. Routing is not configured correctly.
      • D. Translate destination on client side is not checked in Global Properties under Manual NAT Rules.

      Answer: D

      Recommend!! Get the Full 156-915.80 dumps in VCE and PDF From Certshared, Welcome to Download: https://www.certshared.com/exam/156-915.80/ (New 303 Q&As Version)