Check Point 156-315.80 Check Point Certified Security Expert – R80 Online Training
Check Point 156-315.80 Online Training
The questions for 156-315.80 were last updated at Nov 27,2024.
- Exam Code: 156-315.80
- Exam Name: Check Point Certified Security Expert - R80
- Certification Provider: Check Point
- Latest update: Nov 27,2024
You have existing dbedit scripts from R77. Can you use them with R80.10?
- A . dbedit is not supported in R80.10
- B . dbedit is fully supported in R80.10
- C . You can use dbedit to modify threat prevention or access policies, but not create or modify layers
- D . dbedit scripts are being replaced by mgmt_cli in R80.10
To optimize Rule Base efficiency, the most hit rules should be where?
- A . Removed from the Rule Base.
- B . Towards the middle of the Rule Base.
- C . Towards the top of the Rule Base.
- D . Towards the bottom of the Rule Base.
In which formats can Threat Emulation forensics reports be viewed in?
- A . TXT, XML and CSV
- B . PDF and TXT
- C . PDF, HTML, and XML
- D . PDF and HTML
What is the minimum amount of RAM needed for a Threat Prevention Appliance?
- A . 6 GB
- B . 8GB with Gaia in 64-bit mode
- C . 4 GB
- D . It depends on the number of software blades enabled
Which software blade does NOT accompany the Threat Prevention policy?
- A . Anti-virus
- B . IPS
- C . Threat Emulation
- D . Application Control and URL Filtering
Which of the following is NOT a type of Endpoint Identity Agent?
- A . Terminal
- B . Light
- C . Full
- D . Custom
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.
- A . Inspect/Bypass
- B . Inspect/Prevent
- C . Prevent/Bypass
- D . Detect/Bypass
Within the Check Point Firewall Kernel resides Chain Modules, which are individually responsible for the inspection of a specific blade or feature that has been enabled in the configuration of the gateway. For Wire mode configuration, chain modules marked with _______ will not apply.
- A . ffffffff
- B . 00000001
- C . 00000002
- D . 00000003
What command can you use to have cpinfo display all installed hotfixes?
- A . cpinfo -hf
- B . cpinfo Cy all
- C . cpinfo Cget hf
- D . cpinfo installed_jumbo
Which NAT rules are prioritized first?
- A . Post-Automatic/Manual NAT rules
- B . Manual/Pre-Automatic NAT
- C . Automatic Hide NAT
- D . Automatic Static NAT
Answer: fw accel stat = wrong.
fw ctl multik set_mode 9 does not work in R80.10 any more, correct answer is fw ctl multik dynamic_dispatching on for R80 and up.
cphaprob set_ccp multicast = wrong
Which is the *least ideal* Synchronization Status for Security Management Server High Availability deployment? => never been synchronized is the only correct answer. Other statuses are ofcourse not good, too. But Never been Synched is the worst: if something happens to the active SMS, the configuration is lost and you need to go back to backups. (https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk54160#1.5)
fw tab Ct = wrong. fw tab -t doesn’t work either. Did you mean fw tab?
fw-tab Cs = wrong. fw-tab is not a known command
fw ctl affinity Cl a Cr Cv = fw ctl affinity -l -a -r -v (instead of C there should be – signs. And the – in front of a was missing).