Check Point 156-915.80 Check Point Certified Security Expert Update – R80.10 Online Training
Check Point 156-915.80 Online Training
The questions for 156-915.80 were last updated at Dec 23,2024.
- Exam Code: 156-915.80
- Exam Name: Check Point Certified Security Expert Update - R80.10
- Certification Provider: Check Point
- Latest update: Dec 23,2024
What is the port used for SmartConsole to connect to the Security Management Server:
- A . CPMI port 18191/TCP
- B . CPM port / TCP port 19009
- C . SIC port 18191/TCP
- D . https port 4434/TCP
Which is the correct order of a log flow processed by SmartEvents components:
- A . Firewall > Correlation Unit > Log Server > SmartEvent Server Database > SmartEvent Client
- B . Firewall > SmartEvent Server Database > Correlation unit > Log Server > SmartEvent Client
- C . Firewall > Log Server > SmartEvent Server Database > Correlation Unit > SmartEvent Client
- D . Firewall > Log Server > Correlation Unit > SmartEvent Server Database > SmartEvent Client
In SmartEvent, what are the different types of automatic reactions that the administrator can configure?
- A . Mail, Block Source, Block Event Activity, External Script, SNMP Trap
- B . Mail, Block Source, Block Destination, Block Services, SNMP Trap
- C . Mail, Block Source, Block Destination, External Script, SNMP Trap
- D . Mail, Block Source, Block Event Activity, Packet Capture, SNMP Trap
Which components allow you to reset a VPN tunnel?
- A . vpn tucommand or SmartView monitor
- B . delete vpn ike saor vpn she11 command
- C . vpn tunnelutilor delete vpn ike sa command
- D . SmartView monitor only
When synchronizing clusters, which of the following statements is FALSE?
- A . The state of connections using resources is maintained in a Security Server, so their connections cannot be synchronized.
- B . Only cluster members running on the same OS platform can be synchronized.
- C . In the case of a failover, accounting information on the failed member may be lost despite a properly working synchronization.
- D . Client Authentication or Session Authentication connections through a cluster member will be lost if the cluster member fails.
Which of the following is a new R80.10 Gateway feature that had not been available in R77.X and older?
- A . The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.
- B . Limits the upload and download throughout for streaming media in the company to 1 Gbps.
- C . Time object to a rule to make the rule active only during specified times.
- D . Sub Policies are sets of rules that can be created and attached to specific rules. If the rule is matched, inspection will continue in the sub policy attached to it rather than in the next rule
In R80.10, how do you manage your Mobile Access Policy?
- A . Through the Unified Policy
- B . Through the Mobile Console
- C . From SmartDashboard
- D . From the Dedicated Mobility Tab
You find one of your cluster gateways showing “Down” when you run the “cphaprob stat” command. You then run the “clusterXL_admin up” on the down member but unfortunately the member continues to show down.
What command do you run to determine the case?
- A . cphaprob Cf register
- B . cphaprob CdCs report
- C . cpstatCf-all
- D . cphaprob Ca list
SandBlast offers flexibility in implementation based on their individual business needs.
What is an option for deployment of Check Point SandBlast Zero-Day Protection?
- A . Smart Cloud Services
- B . Load Sharing Mode Services
- C . Threat Agent Solution
- D . Public Cloud Services
Which of the following is NOT a valid way to view interface’s IP address settings in Gaia?
- A . Using the command sthtoolin Expert Mode
- B . Viewing the file / config/ active
- C . Via the Gaia WebUl
- D . Via the command show configurationin CLISH