Examcollection offers free demo for 156-315.80 exam. "Check Point Certified Security Expert - R80", also known as 156-315.80 exam, is a Check-Point Certification. This set of posts, Passing the Check-Point 156-315.80 exam, will help you answer those questions. The 156-315.80 Questions & Answers covers all the knowledge points of the real exam. 100% real Check-Point 156-315.80 exams and revised by experts!
Online Check-Point 156-315.80 free dumps demo Below:
NEW QUESTION 1
How do you enable virtual mac (VMAC) on-the-fly on a cluster member?
- A. cphaprob set int fwha_vmac_global_param_enabled 1
- B. clusterXL set int fwha_vmac_global_param_enabled 1
- C. fw ctl set int fwha_vmac_global_param_enabled 1
- D. cphaconf set int fwha_vmac_global_param_enabled 1
Answer: C
NEW QUESTION 2
Which statement is most correct regarding about “CoreXL Dynamic Dispatcher”?
- A. The CoreXL FW instances assignment mechanism is based on Source MAC addresses, Destination MAC addresses
- B. The CoreXL FW instances assignment mechanism is based on the utilization of CPU cores
- C. The CoreXL FW instances assignment mechanism is based on IP Protocol type
- D. The CoreXl FW instances assignment mechanism is based on Source IP addresses, Destination IP addresses, and the IP ‘Protocol’ type
Answer: B
NEW QUESTION 3
Please choose the path to monitor the compliance status of the Check Point R80.10 based management.
- A. Gateways & Servers --> Compliance View
- B. Compliance blade not available under R80.10
- C. Logs & Monitor --> New Tab --> Open compliance View
- D. Security & Policies --> New Tab --> Compliance View
Answer: C
NEW QUESTION 4
Which application should you use to install a contract file?
- A. SmartView Monitor
- B. WebUI
- C. SmartUpdate
- D. SmartProvisioning
Answer: C
NEW QUESTION 5
What API command below creates a new host with the name “New Host” and IP address of “192.168.0.10”?
- A. new host name “New Host” ip-address “192.168.0.10”
- B. set host name “New Host” ip-address “192.168.0.10”
- C. create host name “New Host” ip-address “192.168.0.10”
- D. add host name “New Host” ip-address “192.168.0.10”
Answer: D
NEW QUESTION 6
SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?
- A. Management Dashboard
- B. Gateway
- C. Personal User Storage
- D. Behavior Risk Engine
Answer: C
NEW QUESTION 7
Check Point security components are divided into the following components:
- A. GUI Client, Security Gateway, WebUI Interface
- B. GUI Client, Security Management, Security Gateway
- C. Security Gateway, WebUI Interface, Consolidated Security Logs
- D. Security Management, Security Gateway, Consolidate Security Logs
Answer: B
NEW QUESTION 8
The Event List within the Event tab contains:
- A. a list of options available for running a query.
- B. the top events, destinations, sources, and users of the query results, either as a chart or in a tallied list.
- C. events generated by a query.
- D. the details of a selected event.
Answer: C
NEW QUESTION 9
Which directory below contains log files?
- A. /opt/CPSmartlog-R80/log
- B. /opt/CPshrd-R80/log
- C. /opt/CPsuite-R80/fw1/log
- D. /opt/CPsuite-R80/log
Answer: C
NEW QUESTION 10
You need to see which hotfixes are installed on your gateway, which command would you use?
- A. cpinfo –h all
- B. cpinfo –o hotfix
- C. cpinfo –l hotfix
- D. cpinfo –y all
Answer: D
NEW QUESTION 11
Which command is used to obtain the configuration lock in Gaia?
- A. Lock database override
- B. Unlock database override
- C. Unlock database lock
- D. Lock database user
Answer: A
Explanation:
Obtaining a Configuration Lock
NEW QUESTION 12
What are the blades of Threat Prevention?
- A. IPS, DLP, AntiVirus, AntiBot, Sandblast Threat Emulation/Extraction
- B. DLP, AntiVirus, QoS, AntiBot, Sandblast Threat Emulation/Extraction
- C. IPS, AntiVirus, AntiBot
- D. IPS, AntiVirus, AntiBot, Sandblast Threat Emulation/Extraction
Answer: D
NEW QUESTION 13
Which one of the following is true about Threat Emulation?
- A. Takes less than a second to complete
- B. Works on MS Office and PDF files only
- C. Always delivers a file
- D. Takes minutes to complete (less than 3 minutes)
Answer: D
NEW QUESTION 14
What is the recommended configuration when the customer requires SmartLog indexing for 14 days and SmartEvent to keep events for 180 days?
- A. Use Multi-Domain Management Server.
- B. Choose different setting for log storage and SmartEvent db
- C. Install Management and SmartEvent on different machines.
- D. it is not possible.
Answer: B
NEW QUESTION 15
You need to change the MAC-address on eth2 interface of the gateway. What command and what mode will you use to achieve this goal?
- A. set interface eth2 mac-addr 11:11:11:11:11:11; CLISH
- B. ifconfig eth1 hw 11:11:11:11:11:11; expert
- C. set interface eth2 hw-addr 11:11:11:11:11:11; CLISH
- D. ethtool -i eth2 mac 11:11:11:11:11:11; expert
Answer: A
NEW QUESTION 16
When users connect to the Mobile Access portal they are unable to open File Shares. Which log file would you want to examine?
- A. cvpnd.elg
- B. httpd.elg
- C. vpnd.elg
- D. fw.elg
Answer: A
NEW QUESTION 17
Which Check Point software blades could be enforced under Threat Prevention profile using Check Point R80.10 SmartConsole application?
- A. IPS, Anti-Bot, URL Filtering, Application Control, Threat Emulation.
- B. Firewall, IPS, Threat Emulation, Application Control.
- C. IPS, Anti-Bot, Anti-Virus, Threat Emulation, Threat Extraction.
- D. Firewall, IPS, Anti-Bot, Anti-Virus, Threat Emulation.
Answer: C
NEW QUESTION 18
On R80.10 the IPS Blade is managed by:
- A. Threat Protection policy
- B. Anti-Bot Blade
- C. Threat Prevention policy
- D. Layers on Firewall policy
Answer: C
NEW QUESTION 19
What is the command to check the status of Check Point processes?
- A. top
- B. cptop
- C. cphaprob list
- D. cpwd_admin list
Answer: D
NEW QUESTION 20
In ClusterXL Load Sharing Multicast Mode:
- A. only the primary member received packets sent to the cluster IP address
- B. only the secondary member receives packets sent to the cluster IP address
- C. packets sent to the cluster IP address are distributed equally between all members of the cluster
- D. every member of the cluster received all of the packets sent to the cluster IP address
Answer: D
NEW QUESTION 21
......
P.S. Dumps-files.com now are offering 100% pass ensure 156-315.80 dumps! All 156-315.80 exam questions have been updated with correct answers: https://www.dumps-files.com/files/156-315.80/ (428 New Questions)
