aiotestking uk

156-915.80 Exam Questions - Online Test


156-915.80 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

P.S. High value 156-915.80 free demo are available on Google Drive, GET MORE: https://drive.google.com/open?id=1PCXbUMDUo5Er1-inFIcDg5bU0AdcWvrC


New Check Point 156-915.80 Exam Dumps Collection (Question 1 - Question 10)

Question No: 1

To qualify as an Identity Awareness enabled rule, which column MAY include an Access Role?

A. Action

B. Source

C. User

D. Track

Answer: B


Question No: 2

When do modifications to the Event Policy take effect?

A. As soon as the Policy Tab window is closed.

B. When saved on the SmartEvent Server and installed to the Correlation Units.

C. When saved on the Correlation Units, and pushed as a policy.

D. When saved on the SmartEvent Client, and installed on the SmartEvent Server.

Answer: B


Question No: 3

John is configuring a new R80 Gateway cluster but he can not configure the cluster as Third Party IP Clustering because this option is not available in Gateway Cluster Properties.

Whatu2021s happening?

A. ClusterXL needs to be unselected to permit third party clustering configuration.

B. Third Party Clustering is not available for R80 Security Gateways.

C. John has an invalid ClusterXL license.

D. John is not using third party hardware as IP Clustering is part of Check Pointu2021s IP Appliance.

Answer: A


Question No: 4

Match the ClusterXL modes with their configurations. Exhibit:

A. A-2, B-3, C-4, D-1

B. A-2, B-3, C-1, D-5

C. A-3, B-5, C-1, D-4

D. A-5, B-2, C-4, D-1

Answer: C


Question No: 5

What command with appropriate switches would you use to test Identity Awareness connectivity?

A. test_ldap

B. test_ad_connectivity

C. test_ldap_connectivity

D. test_ad

Answer: B


Question No: 6

How can you check whether IP forwarding is enabled on an IP Security Appliance?

A. clish -c show routing active enable

B. cat /proc/sys/net/ipv4/ip_forward

C. echo 1 > /proc/sys/net/ipv4/ip_forward

D. ipsofwd list

Answer: D


Question No: 7

The Firewall kernel is replicated multiple times, therefore:

A. The Firewall kernel only touches the packet if the connection is accelerated

B. The Firewall can run different policies per core

C. The Firewall kernel is replicated only with new connections and deletes itself once the connection times out

D. The Firewall can run the same policy on all cores

Answer: D

Explanation:

On a Security Gateway with CoreXL enabled, the Firewall kernel is replicated multiple times. Each replicated copy, or instance, runs on one processing core. These instances handle traffic concurrently, and each instance is a complete and independent inspection kernel. When CoreXL is enabled, all the kernel instances in the Security Gateway process traffic through the same interfaces and apply the same security policy.


Question No: 8

You want to establish a VPN, using certificates. Your VPN will exchange certificates with an external partner. Which of the following activities should you do first?

A. Exchange exported CA keys and use them to create a new server object to represent your partneru2021s Certificate Authority (CA).

B. Create a new logical-server object to represent your partneru2021s CA.

C. Manually import your partneru2021s Access Control List.

D. Manually import your partneru2021s Certificate Revocation List.

Answer: A


Question No: 9

What is the primary benefit of using the command upgrade_export over either backup or snapshot?

A. upgrade_export is operating system independent and can be used when backup or snapshot is not available.

B. upgrade_export will back up routing tables, hosts files, and manual ARP configurations, where backup and snapshot will not.

C. The commands backup and snapshot can take a long time to run whereas upgrade_export will take a much shorter amount of time.

D. upgrade_export has an option to back up the system and SmartView Tracker logs while backup and snapshot will not.

Answer: A


Question No: 10

Which of the following items should be configured for the Security Management Server to authenticate via LDAP?

A. Check Point Password

B. Active Directory Server object

C. Windows logon password

D. WMI object

Answer: B


P.S. Easily pass 156-915.80 Exam with 2passeasy High value Dumps & pdf vce, Try Free: https://www.2passeasy.com/dumps/156-915.80/ ( New Questions)