Check Point 156-915.80 Dumps 2021
Exam Code: 156-915.80 (156-915.80 Exam Questions and Answers), Exam Name: Check Point Certified Security Expert Update - R80, Certification Provider: Check Point Certifitcation, Free Today! Guaranteed Training- Pass 156-915.80 Exam.
Free 156-915.80 Demo Online For Microsoft Certifitcation:
NEW QUESTION 1
Several Security Policies can be used for different installation targets. The Firewall protecting Human Resources’ servers should have its own Policy Package. These rules must be installed on this machine and not on the Internet Firewall. How can this be accomplished?
- A. A Rule Base is always installed on all possible target
- B. The rules to be installed on a Firewall are defined by the selection in the Rule Base row Install On.
- C. When selecting the correct Firewall in each line of the Rule Base row Install On, only this Firewall is shown in the list of possible installation targets after selecting Policy > Install on Target.
- D. In the menu of SmartDashboard, go to Policy > Policy Installation Targets and select the correct firewall via Specific Targets.
- E. A Rule Base can always be installed on any Check Point Firewall objec
- F. It is necessary to select the appropriate target directly after selecting Policy > Install on Target.
Answer: C
NEW QUESTION 2
Peter is your new Security Administrator. On his first working day, he is very nervous and enters the wrong password three times. His account is locked. What can be done to unlock Peter’s account? Give the BEST answer.
- A. You can unlock Peter’s account by using the command fwm lock_admin -u Peter on the Security Management Server.
- B. You can unlock Peter’s account by using the command fwm unlock_admin -u Peter on the Security Management Server
- C. It is not possible to unlock Peter’s accoun
- D. You have to install the firewall once again or abstain from Peter’s help.
- E. You can unlock Peter’s account by using the command fwm unlock_admin -u Peter on the Security Gateway.
Answer: A
NEW QUESTION 3
You are the Security Administrator for ABC-Corp. A Check Point Firewall is installed and in use on GAiA. You are concerned that the system might not be retaining your entries for the interfaces and routing configuration. You would like to verify your entries in the corresponding file(s) on GAiA. Where can you view them? Give the BEST answer.
- A. /etc/sysconfig/netconf.C
- B. /etc/conf/route.C
- C. /etc/sysconfig/network-scripts/ifcfg-ethx
- D. /etc/sysconfig/network
Answer: A
NEW QUESTION 4
Select the command set best used to verify proper failover function of a new ClusterXL configuration.
- A. reboot
- B. cphaprob -d failDevice -s problem -t 0 register / cphaprob -d failDevice unregister
- C. clusterXL_admin down / clusterXL_admin up
- D. cpstop/cpstart
Answer: C
NEW QUESTION 5
Fill in the blank. To verify that a VPN Tunnel is properly established, use the command _____
Answer:
Explanation: vpn tunnelutil
NEW QUESTION 6
In R80 spoofing is defined as a method of:
- A. Disguising an illegal IP address behind an authorized IP address through Port Address Translation.
- B. Hiding your firewall from unauthorized users.
- C. Detecting people using false or wrong authentication logins
- D. Making packets appear as if they come from an authorized IP address.
Answer: D
Explanation: IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack connections to your network. Attackers use IP spoofing to send malware and bots to your protected network, to execute DoS attacks, or to gain unauthorized access.
NEW QUESTION 7
Which process should you debug if SmartDashboard login fails?
- A. sdm
- B. cpd
- C. fwd
- D. fwm
Answer: D
NEW QUESTION 8
As a valid Mobile Access Method, what feature provides Capsule Connect/VPN?
- A. that is used to deploy the mobile device as a generator of one-time passwords for authenticating to an RSA Authentication Manager
- B. Full Layer4 VPN –SSL VPN that gives users network access to all mobile applications
- C. Full layer3 VPN –IPSec VPN that gives users network access to all mobile applications
- D. You can make sure that documents are sent to the intended recipients only
Answer: C
NEW QUESTION 9
Which web services protocol is used to communicate to the Check Point R80 identity Awareness Web APi?
- A. SOAP
- B. REST
- C. XLANG
- D. XML-RPC
Answer: B
Explanation: The Identity Web API uses the REST protocol over SSL. The requests and responses are HTTP and in JSON format.
NEW QUESTION 10
Your company’s Security Policy forces users to authenticate to the Gateway explicitly, before they can use any services. The Gateway does not allow the Telnet service to itself from any location. How would you configure authentication on the Gateway? With a:
- A. Client Authentication rule using the manual sign-on method, using HTTP on port 900
- B. Client Authentication rule, using partially automatic sign on
- C. Client Authentication for fully automatic sign on
- D. Session Authentication rule
Answer: A
NEW QUESTION 11
SmartReporter reports can be used to analyze data from a penetration-testing regimen in all of the following examples, EXCEPT:
- A. Analyzing traffic patterns against public resources.
- B. Possible worm/malware activity.
- C. Analyzing access attempts via social-engineering.
- D. Tracking attempted port scans.
Answer: C
NEW QUESTION 12
You are the Security Administrator for MegaCorp. A Check Point firewall is installed and in use on a platform using GAiA. You have trouble configuring the speed and duplex settings of your Ethernet interfaces. Which of the following commands can be used in CLISH to configure the speed and duplex settings of an Ethernet interface and will survive a reboot? Give the BEST answer.
- A. ethtool
- B. set interface <options>
- C. mii_tool
- D. ifconfig -a
Answer: B
NEW QUESTION 13
Which one of these is NOT a firewall chain?
- A. RTM packet in (rtm)
- B. VPN node add (vpnad)
- C. IP Options restore (in) (ipopt_res)
- D. Fw SCV inbound (scv)
Answer: B
NEW QUESTION 14
Which is the lowest Gateway version manageable by SmartCenter R80?
- A. R65
- B. S71
- C. R55
- D. R60A
Answer: A
NEW QUESTION 15
What are you required to do before running the command upgrade_export?
- A. Run a cpstop on the Security Gateway.
- B. Run a cpstop on the Security Management Server.
- C. Close all GUI clients.
- D. Run cpconfig and set yourself up as a GUI client.
Answer: C
NEW QUESTION 16
A Web server behind the Security Gateway is set to Automatic Static NAT. Client side NAT is not checked in the Global Properties. A client on the Internet initiates a session to the Web Server. Assuming there is a rule allowing this traffic, what other configuration must be done to allow the traffic to reach the Web server?
- A. Automatic ARP must be unchecked in the Global Properties.
- B. Nothing else must be configured.
- C. A static route must be added on the Security Gateway to the internal host.
- D. A static route for the NAT IP must be added to the Gateway’s upstream router.
Answer: C
NEW QUESTION 17
When Dynamic Dispatcher is enabled, connections are assigned dynamically with the exception of
- A. Threat Emulation
- B. HTTPS
- C. QOS
- D. VolP
Answer: D
Explanation: The following types of traffic are not load-balanced by the CoreXL Dynamic Dispatcher (this traffic will always be handled by the same CoreXL FW instance):
NEW QUESTION 18
You have selected the event Port Scan from Internal Network in SmartEvent, to detect an event when 30 port scans have occurred within 60 seconds. You also want to detect two port scans from a host within 10 seconds of each other. How would you accomplish this?
- A. Define the two port-scan detections as an exception.
- B. You cannot set SmartEvent to detect two port scans from a host within 10 seconds of each other.
- C. Select the two port-scan detections as a sub-event.
- D. Select the two port-scan detections as a new event.
Answer: A
NEW QUESTION 19
What happen when IPS profile is set in Detect-Only Mode for troubleshooting?
- A. It will generate Geo-Protection traffic
- B. Automatically uploads debugging logs to Check Point Support Center
- C. It will not block malicious traffic
- D. Bypass licenses requirement for Geo-Protection control
Answer: C
Explanation: It is recommended to enable Detect-Only for Troubleshooting on the profile during the initial installation of IPS. This option overrides any protections that are set to Prevent so that they will not block any traffic. During this time you can analyze the alerts that IPS generates to see how IPS will handle network traffic, while avoiding any impact on the flow of traffic.
P.S. Easily pass 156-915.80 Exam with 303 Q&As 2passeasy Dumps & pdf Version, Welcome to Download the Newest 2passeasy 156-915.80 Dumps: https://www.2passeasy.com/dumps/156-915.80/ (303 New Questions)