aiotestking uk

156-215.80 Exam Questions - Online Test


156-215.80 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

are updated and are verified by experts. Once you have completely prepared with our you will be ready for the real 156-215.80 exam without a problem. We have . PASSED First attempt! Here What I Did.

Online 156-215.80 free questions and answers of New Version:

NEW QUESTION 1
When a packet arrives at the gateway, the gateway checks it against the rules in the top Policy Layer, sequentially from top to bottom, and enforces the first rule that matches a packet. Which of the following statements about the order of rule enforcement is true?

  • A. If the Action is Accept, the gateway allows the packet to pass through the gateway.
  • B. If the Action is Drop, the gateway continues to check rules in the next Policy Layer down.
  • C. If the Action is Accept, the gateway continues to check rules in the next Policy Layer down.
  • D. If the Action is Drop, the gateway applies the Implicit Clean-up Rule for that Policy Layer.

Answer: C

NEW QUESTION 2
Fill in the blank: The ____ is used to obtain identification and security information about network users.

  • A. User Directory
  • B. User server
  • C. UserCheck
  • D. User index

Answer: A

NEW QUESTION 3
Look at the following screenshot and select the BEST answer.
156-215.80 dumps exhibit

  • A. Clients external to the Security Gateway can download archive files from FTP_Ext server using FTP.
  • B. Internal clients can upload and download any-files to FTP_Ext-server using FTP.
  • C. Internal clients can upload and download archive-files to FTP_Ext server using FTP.
  • D. Clients external to the Security Gateway can upload any files to the FTP_Ext-server using FTP.

Answer: A

NEW QUESTION 4
Where do you verify that UserDirectory is enabled?

  • A. Verify that Security Gateway > General Properties > Authentication > Use UserDirectory (LDAP) for Security Gateways is checked
  • B. Verify that Global Properties > Authentication > Use UserDirectory (LDAP) for Security Gateways is checked.
  • C. Verify that Security Gateway > General Properties > UserDirectory (LDAP) > Use UserDirectory (LDAP) for Security Gateways is checked.
  • D. Verify that Global Properties > UserDirectory (LDAP) > Use UserDirectory (LDAP) for Security Gateways is checked.

Answer: D

NEW QUESTION 5
Fill in the blank: By default, the SIC certificates issued by R80 Management Server are based on the _____ algorithm.

  • A. SHA-256
  • B. SHA-200
  • C. MD5
  • D. SHA-128

Answer: A

NEW QUESTION 6
Fill in the blank: A ____ is used by a VPN gateway to send traffic as if it were a physical interface.

  • A. VPN Tunnel Interface
  • B. VPN community
  • C. VPN router
  • D. VPN interface

Answer: A

Explanation: Route Based VPN
VPN traffic is routed according to the routing settings (static or dynamic) of the Security Gateway operating system. The Security Gateway uses a VTI (VPN Tunnel Interface) to send the VPN traffic as if it were a physical interface. The VTIs of Security Gateways in a VPN community connect and can support dynamic routing protocols.

NEW QUESTION 7
During the Check Point Stateful Inspection Process, for packets that do not pass Firewall Kernel Inspection and are rejected by the rule definition, packets are:

  • A. Dropped without sending a negative acknowledgment
  • B. Dropped without logs and without sending a negative acknowledgment
  • C. Dropped with negative acknowledgment
  • D. Dropped with logs and without sending a negative acknowledgment

Answer: D

NEW QUESTION 8
Which of the following are available SmartConsole clients which can be installed from the R77 Windows CD? Read all answers and select the most complete and valid list.

  • A. SmartView Tracker, SmartDashboard, CPINFO, SmartUpdate, SmartView Status
  • B. SmartView Tracker, SmartDashboard, SmartLSM, SmartView Monitor
  • C. SmartView Tracker, CPINFO, SmartUpdate
  • D. Security Policy Editor, Log Viewer, Real Time Monitor GUI

Answer: C

NEW QUESTION 9
Which tool CANNOT be launched from SmartUpdate R77?

  • A. IP Appliance Voyager
  • B. snapshot
  • C. GAiA WebUI
  • D. cpinfo

Answer: B

NEW QUESTION 10
Kofi, the administrator of the ABC Corp network wishes to change the default Gaia WebUI Portal port number currently set on the default HTTPS port. Which CLISH commands are required to be able to change this TCP port?
156-215.80 dumps exhibit

  • A. set web ssl-port <new port number>
  • B. set Gaia-portal <new port number>
  • C. set Gaia-portal https-port <new port number>
  • D. set web https-port <new port number>

Answer: A

Explanation: In Clish
Connect to command line on Security Gateway / each
Log in to Clish.
Set the desired port (e.g., port 4434):
Cluster member.
HostName> set web ssl-port <Port_Number>
Save the changes:
HostName> save config
Verify that the configuration was saved:
[Expert@HostName]# grep 'httpd:ssl_port' /config/db/initial References:

NEW QUESTION 11
What happens if the identity of a user is known?

  • A. If the user credentials do not match an Access Role, the system displays the Captive Portal.
  • B. If the user credentials do not match an Access Role, the system displays a sandbox.
  • C. If the user credentials do not match an Access Role, the traffic is automatically dropped.
  • D. If the user credentials match an Access Role, the rule is applied and traffic is accepted or dropped based on the defined action.

Answer: D

NEW QUESTION 12
Which Check Point feature enables application scanning and the detection?

  • A. Application Dictionary
  • B. AppWiki
  • C. Application Library
  • D. CPApp

Answer: B

Explanation: AppWiki Application Classification Library
AppWiki enables application scanning and detection of more than 5,000 distinct applications and over 300,000 Web 2.0 widgets including instant messaging, social networking, video streaming, VoIP, games and more.

NEW QUESTION 13
John is using Management HA. Which Smartcenter should be connected to for making changes?

  • A. secondary Smartcenter
  • B. active Smartcenter
  • C. connect virtual IP of Smartcenter HA
  • D. primary Smartcenter

Answer: B

NEW QUESTION 14
Which of these statements describes the Check Point ThreatCloud?

  • A. Blocks or limits usage of web applications
  • B. Prevents or controls access to web sites based on category
  • C. Prevents Cloud vulnerability exploits
  • D. A worldwide collaborative security network

Answer: D

NEW QUESTION 15
Fill in the blanks: A High Availability deployment is referred to as a ____ cluster and a Load Sharing deployment is referred to as a _____ cluster.

  • A. Standby/standby; active/active
  • B. Active/active; standby/standby
  • C. Active/active; active/standby;
  • D. Active/standby; active/active

Answer: D

Explanation: In a High Availability cluster, only one member is active (Active/Standby operation).
ClusterXL Load Sharing distributes traffic within a cluster so that the total throughput of multiple members is increased. In Load Sharing configurations, all functioning members in the cluster are active, and handle network traffic (Active/Active operation).

NEW QUESTION 16
The organization's security manager wishes to back up just the Gaia operating system parameters. Which command can be used to back up only Gaia operating system parameters like interface details, Static routes and Proxy ARP entries?

  • A. show configuration
  • B. backup
  • C. migrate export
  • D. upgrade export

Answer: B

Explanation: 3. System Backup (and System Restore)
System Backup can be used to backup current system configuration. A backup creates a compressed file that contains the Check Point configuration including the networking and operating system parameters, such as routing and interface configuration etc., but unlike a snapshot, it does not include the operating system, product binaries, and hotfixes.

Topic 3, Exam Pool C

NEW QUESTION 17
Which of the following uses the same key to decrypt as it does to encrypt?

  • A. Asymmetric encryption
  • B. Dynamic encryption
  • C. Certificate-based encryption
  • D. Symmetric encryption

Answer: D

NEW QUESTION 18
Fill in the blank: The tool ____ generates a R80 Security Gateway configuration report.

  • A. infoCP
  • B. infoview
  • C. cpinfo
  • D. fw cpinfo

Answer: C

Explanation: CPInfo is an auto-updatable utility that collects diagnostics data on a customer's machine at the time of execution and uploads it to Check Point servers (it replaces the standalone cp_uploader utility for uploading files to Check Point servers).
The CPinfo output file allows analyzing customer setups from a remote location. Check Point support engineers can open the CPinfo file in a demo mode, while viewing actual customer Security Policies and Objects. This allows the in-depth analysis of customer's configuration and environment settings.
When contacting Check Point Support, collect the cpinfo files from the Security Management server and Security Gateways involved in your case.

P.S. Easily pass 156-215.80 Exam with 440 Q&As prep-labs.com Dumps & pdf Version, Welcome to Download the Newest prep-labs.com 156-215.80 Dumps: https://www.prep-labs.com/dumps/156-215.80/ (440 New Questions)