156-315.80 Exam Questions - Online Test


156-315.80 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

we provide Certified Check-Point 156-315.80 actual exam which are the best for clearing 156-315.80 test, and to get certified by Check-Point Check Point Certified Security Expert - R80. The 156-315.80 Questions & Answers covers all the knowledge points of the real 156-315.80 exam. Crack your Check-Point 156-315.80 Exam with latest dumps, guaranteed!

Online 156-315.80 free questions and answers of New Version:

NEW QUESTION 1
Which of the following links will take you to the SmartView web application?

  • A. https://<Security Management Server host name>/smartviewweb/
  • B. https://<Security Management Server IP Address>/smartview/
  • C. https://<Security Management Server host name>smartviewweb
  • D. https://<Security Management Server IP Address>/smartview

Answer: B

NEW QUESTION 2
Which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?

  • A. Auditor
  • B. Read Only All
  • C. Super User
  • D. Full Access

Answer: B

NEW QUESTION 3
What is the difference between an event and a log?

  • A. Events are generated at gateway according to Event Policy
  • B. A log entry becomes an event when it matches any rule defined in Event Policy
  • C. Events are collected with SmartWorkflow form Trouble Ticket systems
  • D. Log and Events are synonyms

Answer: B

NEW QUESTION 4
Can multiple administrators connect to a Security Management Server at the same time?

  • A. No, only one can be connected
  • B. Yes, all administrators can modify a network object at the same time
  • C. Yes, every administrator has their own username, and works in a session that is independent of other administrators.
  • D. Yes, but only one has the right to write.

Answer: C

NEW QUESTION 5
The Security Gateway is installed on GAIA R80. The default port for the Web User Interface is ______.

  • A. TCP 18211
  • B. TCP 257
  • C. TCP 4433
  • D. TCP 443

Answer: D

NEW QUESTION 6
Which TCP-port does CPM process listen to?

  • A. 18191
  • B. 18190
  • C. 8983
  • D. 19009

Answer: D

NEW QUESTION 7
SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?

  • A. Management Dashboard
  • B. Gateway
  • C. Personal User Storage
  • D. Behavior Risk Engine

Answer: C

NEW QUESTION 8
Fill in the blank: The command _______ provides the most complete restoration of a R80 configuration.

  • A. upgrade_import
  • B. cpconfig
  • C. fwm dbimport -p <export file>
  • D. cpinfo –recover

Answer: A

NEW QUESTION 9
You have existing dbedit scripts from R77. Can you use them with R80.10?

  • A. dbedit is not supported in R80.10
  • B. dbedit is fully supported in R80.10
  • C. You can use dbedit to modify threat prevention or access policies, but not create or modify layers
  • D. dbedit scripts are being replaced by mgmt_cli in R80.10

Answer: D

NEW QUESTION 10
Which command can you use to enable or disable multi-queue per interface?

  • A. cpmq set
  • B. Cpmqueue set
  • C. Cpmq config
  • D. St cpmq enable

Answer: A

NEW QUESTION 11
Fill in the blank: Authentication rules are defined for ________.

  • A. User groups
  • B. Users using UserCheck
  • C. Individual users
  • D. All users in the database

Answer: A

NEW QUESTION 12
During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?

  • A. Host having a Critical event found by Threat Emulation
  • B. Host having a Critical event found by IPS
  • C. Host having a Critical event found by Antivirus
  • D. Host having a Critical event found by Anti-Bot

Answer: D

NEW QUESTION 13
Which command is used to display status information for various components?

  • A. show all systems
  • B. show system messages
  • C. sysmess all
  • D. show sysenv all

Answer: D

NEW QUESTION 14
Fill in the blank: The R80 utility fw monitor is used to troubleshoot _______ .

  • A. User data base corruption
  • B. LDAP conflicts
  • C. Traffic issues
  • D. Phase two key negotiations

Answer: C

Explanation:
Check Point’s FW Monitor is a powerful built-in tool for capturing network traffic at the packet level. The FW Monitor utility captures network packets at multiple capture points along the FireWall inspection chains. These captured packets can be inspected later using the WireShark.

NEW QUESTION 15
Advanced Security Checkups can be easily conducted within:

  • A. Reports
  • B. Advanced
  • C. Checkups
  • D. Views
  • E. Summary

Answer: A

NEW QUESTION 16
Which of the following is a task of the CPD process?

  • A. Invoke and monitor critical processes and attempts to restart them if they fail
  • B. Transfers messages between Firewall processes
  • C. Log forwarding
  • D. Responsible for processing most traffic on a security gateway

Answer: A

Explanation:
https://sc1.checkpoint.com/documents/R76/CP_R76_CLI_WebAdmin/12496.htm

NEW QUESTION 17
On R80.10 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:

  • A. 18210
  • B. 18184
  • C. 257
  • D. 18191

Answer: B

NEW QUESTION 18
......

Thanks for reading the newest 156-315.80 exam dumps! We recommend you to try the PREMIUM Dumps-files.com 156-315.80 dumps in VCE and PDF here: https://www.dumps-files.com/files/156-315.80/ (428 Q&As Dumps)