Check Point 156-915.80 Check Point Certified Security Expert Update – R80.10 Online Training
Check Point 156-915.80 Online Training
The questions for 156-915.80 were last updated at Feb 13,2025.
- Exam Code: 156-915.80
- Exam Name: Check Point Certified Security Expert Update - R80.10
- Certification Provider: Check Point
- Latest update: Feb 13,2025
Check Point recommends configuring Disk Space Management parameters to delete old log entities when available disk space is less than or equal to?
- A . 50%
- B . 75%
- C . 80%
- D . 15%
What API command below creates a new host with the name “New Host” and IP address of “192.168.0.10”?
- A . new host name “New Host” ip-address “192.168.0.10”
- B . set host name “New Host” ip-address “192.168.0.10”
- C . create host name “New Host” ip-address “192.168.0.10”
- D . add host name “New Host” ip-address “192.168.0.10”
What are types of Check Point APIs available currently as part of R80.10 code?
- A . Security Gateway API, Management API, Threat Prevention API and Identity Awareness Web Services API
- B . Management API, Threat Prevention API, Identity Awareness Web Services API and OPSEC SDK API
- C . OSE API, OPSEC SDK API, Threat Extraction API and Policy Editor API
- D . CPMI API, Management API, Threat Prevention API and Identity Awareness Web Services API
Which of the following is NOT an internal/native Check Point command?
- A . fwaccel on
- B . fw ct1 debug
- C . tcpdump
- D . cphaprob
What is the SandBlast Agent designed to do?
- A . Performs OS-level sandboxing for SandBlast Cloud architecture
- B . Ensure the Check Point SandBlast services is running on the end user’s system
- C . If malware enters an end user’s system, the SandBlast Agent prevents the malware form spreading with the network
- D . Clean up email sent with malicious attachments.
The SmartEvent R80 Web application for real-time event monitoring is called:
- A . SmartView Monitor
- B . SmartEventWeb
- C . There is no Web application for SmartEvent
- D . SmartView
What Shell is required in Gaia to use WinSCP?
- A . UNIX
- B . CPShell
- C . CLISH
- D . Bash
Which one of the following is true about Threat Emulation?
- A . Takes less than a second to complete
- B . Works on MS Office and PDF files only
- C . Always delivers a file
- D . Takes minutes to complete (less than 3 minutes)
What are the minimum open server hardware requirements for a Security Management Server/Standalone in R80.10?
- A . 2 CPU cores, 4GB of RAM and 15GB of disk space
- B . 8 CPU cores, 16GB of RAM and 500 GB of disk space
- C . 4 CPU cores, 8GB of RAM and 500GB of disk space
- D . 8 CPU cores, 32GB of RAM and 1 TB of disk space
The “MAC magic” value must be modified under the following condition:
- A . There is more than one cluster connected to the same VLAN
- B . A firewall cluster is configured to use Multicast for CCP traffic
- C . There are more than two members in a firewall cluster
- D . A firewall cluster is configured to use Broadcast for CCP traffic