Check Point 156-315.80 Check Point Certified Security Expert – R80 Online Training
Check Point 156-315.80 Online Training
The questions for 156-315.80 were last updated at Nov 26,2024.
- Exam Code: 156-315.80
- Exam Name: Check Point Certified Security Expert - R80
- Certification Provider: Check Point
- Latest update: Nov 26,2024
In Advanced Permanent Tunnel Configuration, to set the amount of time the tunnel test runs without a
response before the peer host is declared ‘down’, you would set the_________?
- A . life sign polling interval
- B . life sign timeout
- C . life_sign_polling_interval
- D . life_sign_timeout
How many images are included with Check Point TE appliance in Recommended Mode?
- A . 2(OS) images
- B . images are chosen by administrator during installation
- C . as many as licensed for
- D . the most new image
The Firewall kernel is replicated multiple times, therefore:
- A . The Firewall kernel only touches the packet if the connection is accelerated
- B . The Firewall can run different policies per core
- C . The Firewall kernel is replicated only with new connections and deletes itself once the connection times out
- D . The Firewall can run the same policy on all cores.
In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log .
Which of the following options can you add to each Log, Detailed Log and Extended Log?
- A . Accounting
- B . Suppression
- C . Accounting/Suppression
- D . Accounting/Extended
Which blades and or features are not supported in R80?
- A . SmartEvent Maps
- B . SmartEvent
- C . Identity Awareness
- D . SmartConsole Toolbars
View the rule below .
What does the lock-symbol in the left column mean? (Choose the BEST answer.)
- A . The current administrator has read-only permissions to Threat Prevention Policy.
- B . Another user has locked the rule for editing.
- C . Configuration lock is present. Click the lock symbol to gain read-write access.
- D . The current administrator is logged in as read-only because someone else is editing the policy.
UserCheck objects in the Application Control and URL Filtering rules allow the gateway to communicate with the users .
Which action is not supported in UserCheck objects?
- A . Ask
- B . Drop
- C . Inform
- D . Reject
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
- A . Detects and blocks malware by correlating multiple detection engines before users are affected.
- B . Configure rules to limit the available network bandwidth for specified users or groups.
- C . Use UserCheck to help users understand that certain websites are against the company’s security policy.
- D . Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.
In R80 spoofing is defined as a method of:
- A . Disguising an illegal IP address behind an authorized IP address through Port Address Translation.
- B . Hiding your firewall from unauthorized users.
- C . Detecting people using false or wrong authentication logins
- D . Making packets appear as if they come from an authorized IP address.
Answer: fw accel stat = wrong.
fw ctl multik set_mode 9 does not work in R80.10 any more, correct answer is fw ctl multik dynamic_dispatching on for R80 and up.
cphaprob set_ccp multicast = wrong
Which is the *least ideal* Synchronization Status for Security Management Server High Availability deployment? => never been synchronized is the only correct answer. Other statuses are ofcourse not good, too. But Never been Synched is the worst: if something happens to the active SMS, the configuration is lost and you need to go back to backups. (https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk54160#1.5)
fw tab Ct = wrong. fw tab -t doesn’t work either. Did you mean fw tab?
fw-tab Cs = wrong. fw-tab is not a known command
fw ctl affinity Cl a Cr Cv = fw ctl affinity -l -a -r -v (instead of C there should be – signs. And the – in front of a was missing).