Summer Sale - Special Discounts Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 63r59951

Note! The 156-315.80 Exam is no longer available.

156-315.80 Check Point Certified Security Expert - R80 Questions and Answers

Questions 4

What is the SOLR database for?

Options:

A.

Used for full text search and enables powerful matching capabilities

B.

Writes data to the database and full text search

C.

Serves GUI responsible to transfer request to the DLE server

D.

Enables powerful matching capabilities and writes data to the database

Buy Now
Questions 5

What solution is Multi-queue intended to provide?

Options:

A.

Improve the efficiency of traffic handling by SecureXL SNDs

B.

Reduce the confusion for traffic capturing in FW Monitor

C.

Improve the efficiency of CoreXL Kernel Instances

D.

Reduce the performance of network interfaces

Buy Now
Questions 6

After making modifications to the $CVPNDIR/conf/cvpnd.C file, how would you restart the daemon?

Options:

A.

cvpnd_restart

B.

cvpnd_restart

C.

cvpnd restart

D.

cvpnrestart

Buy Now
Questions 7

The ____ software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware.

Options:

A.

Next Generation Threat Prevention

B.

Next Generation Threat Emulation

C.

Next Generation Threat Extraction

D.

Next Generation Firewall

Buy Now
Questions 8

After verifying that API Server is not running, how can you start the API Server?

Options:

A.

Run command "set api start" in CLISH mode

B.

Run command "mgmt__cli set api start" in Expert mode

C.

Run command "mgmt api start" in CLISH mode

D.

Run command "api start" in Expert mode

Buy Now
Questions 9

To fully enable Dynamic Dispatcher on a Security Gateway:

Options:

A.

run fw ctl multik set_mode 9 in Expert mode and then Reboot.

B.

Using cpconfig, update the Dynamic Dispatcher value to “full” under the CoreXL menu.

C.

Edit/proc/interrupts to include multik set_mode 1 at the bottom of the file, save, and reboot.

D.

run fw multik set_mode 1 in Expert mode and then reboot.

Buy Now
Questions 10

What is the valid range for Virtual Router Identifier (VRID) value in a Virtual Routing Redundancy Protocol (VRRP) configuration?

Options:

A.

1-254

B.

1-255

C.

0-254

D.

0 – 255

Buy Now
Questions 11

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?

Options:

A.

Detects and blocks malware by correlating multiple detection engines before users are affected.

B.

Configure rules to limit the available network bandwidth for specified users or groups.

C.

Use UserCheck to help users understand that certain websites are against the company’s security policy.

D.

Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.

Buy Now
Questions 12

How does the Anti-Virus feature of the Threat Prevention policy block traffic from infected websites?

Options:

A.

By dropping traffic from websites identified through ThreatCloud Verification and URL Caching

B.

By dropping traffic that is not proven to be from clean websites in the URL Filtering blade

C.

By allowing traffic from websites that are known to run Antivirus Software on servers regularly

D.

By matching logs against ThreatCloud information about the reputation of the website

Buy Now
Questions 13

Besides fw monitor, what is another command that can be used to capture packets?

a. ping

B. arp

C. tcpdump

D. traceroute

Options:

Buy Now
Questions 14

You have created a rule at the top of your Rule Base to permit Guest Wireless access to the Internet. However, when guest users attempt to reach the Internet, they are not seeing the splash page to accept your Terms of Service, and cannot access the Internet. How can you fix this?

156-315.80 Question 14

Options:

A.

Right click Accept in the rule, select “More”, and then check ‘Enable Identity Captive Portal’.

B.

On the firewall object, Legacy Authentication screen, check ‘Enable Identity Captive Portal’.

C.

In the Captive Portal screen of Global Properties, check ‘Enable Identity Captive Portal’.

D.

On the Security Management Server object, check the box ‘Identity Logging’.

Buy Now
Questions 15

What kind of information would you expect to see using the sim affinity command?

Options:

A.

The VMACs used in a Security Gateway cluster

B.

The involved firewall kernel modules in inbound and outbound packet chain

C.

Overview over SecureXL templated connections

D.

Network interfaces and core distribution used for CoreXL

Buy Now
Questions 16

Hit Count is a feature to track the number of connections that each rule matches, which one is not benefit of Hit Count.

Options:

A.

Better understand the behavior of the Access Control Policy

B.

Improve Firewall performance - You can move a rule that has hot count to a higher position in the Rule Base

C.

Automatically rearrange Access Control Policy based on Hit Count Analysis

D.

Analyze a Rule Base - You can delete rules that have no matching connections

Buy Now
Questions 17

How would you enable VMAC Mode in ClusterXL?

Options:

A.

Cluster Object -> Edit -> ClusterXL and VRRP -> Use Virtual MAC

B.

fw ctl set int vmac_mode 1

C.

cphaconf vmac_mode set 1

D.

Cluster Object -> Edit -> Cluster Members -> Edit -> Use Virtual MAC

Buy Now
Questions 18

For best practices, what is the recommended time for automatic unlocking of locked admin accounts?

Options:

A.

20 minutes

B.

15 minutes

C.

Admin account cannot be unlocked automatically

D.

30 minutes at least

Buy Now
Questions 19

When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.

Options:

A.

SecureID

B.

SecurID

C.

Complexity

D.

TacAcs

Buy Now
Questions 20

Which statement is true regarding redundancy?

Options:

A.

System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob –f if command.

B.

ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.

C.

Machines in a ClusterXL High Availability configuration must be synchronized.

D.

Both ClusterXL and VRRP are fully supported by Gaia and available to all Check Point appliances, open servers, and virtualized environments.

Buy Now
Questions 21

With SecureXL enabled, accelerated packets will pass through the following:

Options:

A.

Network Interface Card, OSI Network Layer, OS IP Stack, and the Acceleration Device

B.

Network Interface Card, Check Point Firewall Kernal, and the Acceleration Device

C.

Network Interface Card and the Acceleration Device

D.

Network Interface Card, OSI Network Layer, and the Acceleration Device

Buy Now
Questions 22

Which of the following is NOT supported by CPUSE?

Options:

A.

Automatic download of full installation and upgrade packages

B.

Automatic download of hotfixes

C.

Installation of private hotfixes

D.

Offline installations

Buy Now
Questions 23

What are the attributes that SecureXL will check after the connection is allowed by Security Policy?

Options:

A.

Source address, Destination address, Source port, Destination port, Protocol

B.

Source MAC address, Destination MAC address, Source port, Destination port, Protocol

C.

Source address, Destination address, Source port, Destination port

D.

Source address, Destination address, Destination port, Protocol

Buy Now
Questions 24

NO: 219

What cloud-based SandBlast Mobile application is used to register new devices and users?

Options:

A.

Check Point Protect Application

B.

Management Dashboard

C.

Behavior Risk Engine

D.

Check Point Gateway

Buy Now
Questions 25

CoreXL is supported when one of the following features is enabled:

Options:

A.

Route-based VPN

B.

IPS

C.

IPv6

D.

Overlapping NAT

Buy Now
Questions 26

Which packet info is ignored with Session Rate Acceleration?

Options:

A.

source port ranges

B.

source ip

C.

source port

D.

same info from Packet Acceleration is used

Buy Now
Questions 27

The log server sends what to the Correlation Unit?

Options:

A.

Authentication requests

B.

CPMI dbsync

C.

Logs

D.

Event Policy

Buy Now
Questions 28

What is the valid range for VRID value in VRRP configuration?

Options:

A.

1 - 254

B.

1 - 255

C.

0 - 254

D.

0 - 255

Buy Now
Questions 29

Matt wants to upgrade his old Security Management server to R80.x using the Advanced Upgrade with Database Migration. What is one of the requirements for a successful upgrade?

Options:

A.

Size of the /var/log folder of the source machine must be at least 25% of the size of the /var/log directory on the target machine

B.

Size of the /var/log folder of the target machine must be at least 25% of the size of the /var/log directory on the source machine

C.

Size of the $FWDIR/log folder of the target machine must be at least 30% of the size of the $FWDIR/log directory on the source machine

D.

Size of the /var/log folder of the target machine must be at least 25GB or more

Buy Now
Questions 30

You need to change the MAC-address on eth2 interface of the gateway. What is the correct way to change MAC-address in Check Point Gaia?

Options:

A.

In CLISH run: set interface eth2 mac-addr 11:11:11:11:11:11

B.

In expert-mode run ifconfig eth1 hw 11:11:11:11 11 11

C.

In CLISH run set interface eth2 hw-addr 11 11 11:11:11 11

D.

In expert-mode run: ethtool -4 eth2 mac 11 11:11:11:11:11

Buy Now
Questions 31

Where do you create and modify the Mobile Access policy in R80?

Options:

A.

SmartConsole

B.

SmartMonitor

C.

SmartEndpoint

D.

SmartDashboard

Buy Now
Questions 32

Which of the following is NOT a component of Check Point Capsule?

Options:

A.

Capsule Docs

B.

Capsule Cloud

C.

Capsule Enterprise

D.

Capsule Workspace

Buy Now
Questions 33

Please choose the path to monitor the compliance status of the Check Point R80.10 based management.

Options:

A.

Gateways & Servers --> Compliance View

B.

Compliance blade not available under R80.10

C.

Logs & Monitor --> New Tab --> Open compliance View

D.

Security & Policies --> New Tab --> Compliance View

Buy Now
Questions 34

How many policy layers do Access Control policy support?

Options:

A.

2

B.

4

C.

1

D.

3

Buy Now
Questions 35

fwssd is a child process of which of the following Check Point daemons?

Options:

A.

fwd

B.

cpwd

C.

fwm

D.

cpd

Buy Now
Questions 36

What is the command to show SecureXL status?

Options:

A.

fwaccel status

B.

fwaccel stats -m

C.

fwaccel -s

D.

fwaccel stat

Buy Now
Questions 37

Which VPN routing option uses VPN routing for every connection a satellite gateway handles?

Options:

A.

To satellites through center only

B.

To center only

C.

To center and to other satellites through center

D.

To center, or through the center to other satellites, to Internet and other VPN targets

Buy Now
Questions 38

Which GUI client is supported in R80?

Options:

A.

SmartProvisioning

B.

SmartView Tracker

C.

SmartView Monitor

D.

SmartLog

Buy Now
Questions 39

When users connect to the Mobile Access portal they are unable to open File Shares.

Which log file would you want to examine?

Options:

A.

cvpnd.elg

B.

httpd.elg

C.

vpnd.elg

D.

fw.elg

Buy Now
Questions 40

What are the blades of Threat Prevention?

Options:

A.

IPS, DLP, AntiVirus, AntiBot, Sandblast Threat Emulation/Extraction

B.

DLP, AntiVirus, QoS, AntiBot, Sandblast Threat Emulation/Extraction

C.

IPS, AntiVirus, AntiBot

D.

IPS, AntiVirus, AntiBot, Sandblast Threat Emulation/Extraction

Buy Now
Questions 41

SmartConsole R80 x requires the following ports to be open for SmartEvent.

Options:

A.

19009, 19090 & 443

B.

19009, 19004 & 18190

C.

18190 & 443

D.

19009, 18190 & 443

Buy Now
Questions 42

Why would an administrator see the message below?

156-315.80 Question 42

Options:

A.

A new Policy Package created on both the Management and Gateway will be deleted and must be backed up first before proceeding.

B.

A new Policy Package created on the Management is going to be installed to the existing Gateway.

C.

A new Policy Package created on the Gateway is going to be installed on the existing Management.

D.

A new Policy Package created on the Gateway and transferred to the Management will be overwritten by the Policy Package currently on the Gateway but can be restored from a periodic backup on the Gateway.

Buy Now
Questions 43

NO: 66

You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?

Options:

A.

Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.

B.

Create a separate Security Policy package for each remote Security Gateway.

C.

Create network objects that restricts all applicable rules to only certain networks.

D.

Run separate SmartConsole instances to login and configure each Security Gateway directly.

Buy Now
Questions 44

The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?

Options:

A.

add host name ip-address

B.

add hostname ip-address

C.

set host name ip-address

D.

set hostname ip-address

Buy Now
Questions 45

There are two R77.30 Security Gateways in the Firewall Cluster. They are named FW_A and FW_B. The cluster is configured to work as HA (High availability) with default cluster configuration. FW_A is configured to have higher priority than FW_B. FW_A was active and processing the traffic in the morning. FW_B was standby. Around 1100 am, its interfaces went down and this caused a failover. FW_B became active. After an hour, FW_A’s interface issues were resolved and it became operational.

When it re-joins the cluster, will it become active automatically?

Options:

A.

No, since ‘maintain’ current active cluster member’ option on the cluster object properties is enabled by default.

B.

No, since ‘maintain’ current active cluster member’ option is enabled by default on the Global Properties.

C.

Yes, since ‘Switch to higher priority cluster member’ option on the cluster object properties is enabled by default.

D.

Yes, since ‘Switch to higher priority cluster member’ option is enabled by default on the Global Properties.

Buy Now
Questions 46

To find records in the logs that shows log records from the Application & URL Filtering Software Blade where traffic was dropped, what would be the query syntax?

Options:

A.

blada: application control AND action:drop

B.

blade."application control AND action;drop

C.

(blade: application control AND action;drop)

D.

blade;"application control AND action:drop

Buy Now
Questions 47

You have enabled “Full Log” as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?

Options:

A.

Logging has disk space issues. Change logging storage options on the logging server or Security Management Server properties and install database.

B.

Data Awareness is not enabled.

C.

Identity Awareness is not enabled.

D.

Logs are arriving from Pre-R80 gateways.

Buy Now
Questions 48

What CLI command compiles and installs a Security Policy on the target’s Security Gateways?

Options:

A.

fwm compile

B.

fwm load

C.

fwm fetch

D.

fwm install

Buy Now
Questions 49

Which 3 types of tracking are available for Threat Prevention Policy?

Options:

A.

SMS Alert, Log, SNMP alert

B.

Syslog, None, User-defined scripts

C.

None, Log, Syslog

D.

Alert, SNMP trap, Mail

Buy Now
Questions 50

By default, the R80 web API uses which content-type in its response?

Options:

A.

Java Script

B.

XML

C.

Text

D.

JSON

Buy Now
Questions 51

Ken wants to obtain a configuration lock from other administrator on R80 Security Management Server. He can do this via WebUI or via CLI.

Which command should he use in CLI? (Choose the correct answer.)

Options:

A.

remove database lock

B.

The database feature has one command lock database override.

C.

override database lock

D.

The database feature has two commands lock database override and unlock database. Both will work.

Buy Now
Questions 52

In the Firewall chain mode FFF refers to:

Options:

A.

Stateful Packets

B.

No Match

C.

All Packets

D.

Stateless Packets

Buy Now
Questions 53

SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day Protection?

Options:

A.

Smart Cloud Services

B.

Load Sharing Mode Services

C.

Threat Agent Solution

D.

Public Cloud Services

Buy Now
Questions 54

Within the Check Point Firewall Kernel resides Chain Modules, which are individually responsible for the

inspection of a specific blade or feature that has been enabled in the configuration of the gateway. For Wire

mode configuration, chain modules marked with _______ will not apply.

Options:

A.

ffffffff

B.

00000001

C.

00000002

D.

00000003

Buy Now
Questions 55

Fill in the blank: The R80 SmartConsole, SmartEvent GUI client, and _______ consolidate billions of logs and shows then as prioritized security events.

Options:

A.

SmartMonitor

B.

SmartView Web Application

C.

SmartReporter

D.

SmartTracker

Buy Now
Questions 56

When simulating a problem on ClusterXL cluster with cphaprob –d STOP -s problem -t 0 register, to initiate a failover on an active cluster member, what command allows you remove the problematic state?

Options:

A.

cphaprob –d STOP unregister

B.

cphaprob STOP unregister

C.

cphaprob unregister STOP

D.

cphaprob –d unregister STOP

Buy Now
Questions 57

What is the recommended number of physical network interfaces in a Mobile Access cluster deployment?

Options:

A.

4 Interfaces – an interface leading to the organization, a second interface leading to the internet, a third interface for synchronization, a fourth interface leading to the Security Management Server.

B.

3 Interfaces – an interface leading to the organization, a second interface leading to the Internet, a third interface for synchronization.

C.

1 Interface – an interface leading to the organization and the Internet, and configure for synchronization.

D.

2 Interfaces – a data interface leading to the organization and the Internet, a second interface for synchronization.

Buy Now
Questions 58

Which of the following will NOT affect acceleration?

Options:

A.

Connections destined to or originated from the Security gateway

B.

A 5-tuple match

C.

Multicast packets

D.

Connections that have a Handler (ICMP, FTP, H.323, etc.)

Buy Now
Questions 59

Which one of the following is true about Threat Emulation?

Options:

A.

Takes less than a second to complete

B.

Works on MS Office and PDF files only

C.

Always delivers a file

D.

Takes minutes to complete (less than 3 minutes)

Buy Now
Questions 60

Which encryption algorithm is the least secured?

Options:

A.

AES-128

B.

AES-256

C.

DES

D.

3DES

Buy Now
Questions 61

Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?

Options:

A.

Dynamic ID

B.

RADIUS

C.

Username and Password

D.

Certificate

Buy Now
Questions 62

You have pushed policy to GW-3 and now cannot pass traffic through the gateway. As a last resort, to restore traffic flow, what command would you run to remove the latest policy from GW-3?

Options:

A.

fw unloadlocal

B.

fw unloadpolicy

C.

fwm unload local

D.

fwm unload policy

Buy Now
Questions 63

After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?

Options:

A.

Security Gateway IP-address cannot be changed without re-establishing the trust.

B.

The Security Gateway name cannot be changed in command line without re-establishing trust.

C.

The Security Management Server name cannot be changed in SmartConsole without re-establishing trust.

D.

The Security Management Server IP-address cannot be changed without re-establishing the trust.

Buy Now
Questions 64

Fill in the blank: Permanent VPN tunnels can be set on all tunnels in the community, on all tunnels for specific gateways, or ______ .

Options:

A.

On all satellite gateway to satellite gateway tunnels

B.

On specific tunnels for specific gateways

C.

On specific tunnels in the community

D.

On specific satellite gateway to central gateway tunnels

Buy Now
Questions 65

What is the difference between an event and a log?

Options:

A.

Events are generated at gateway according to Event Policy

B.

A log entry becomes an event when it matches any rule defined in Event Policy

C.

Events are collected with SmartWorkflow form Trouble Ticket systems

D.

Log and Events are synonyms

Buy Now
Questions 66

The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?

Options:

A.

Secure Internal Communication (SIC)

B.

Restart Daemons if they fail

C.

Transfers messages between Firewall processes

D.

Pulls application monitoring status

Buy Now
Questions 67

Which command can you use to enable or disable multi-queue per interface?

Options:

A.

cpmq set

B.

Cpmqueue set

C.

Cpmq config

D.

St cpmq enable

Buy Now
Questions 68

Which configuration file contains the structure of the Security Server showing the port numbers, corresponding protocol name, and status?

Options:

A.

$FWDIR/database/fwauthd.conf

B.

$FWDIR/conf/fwauth.conf

C.

$FWDIR/conf/fwauthd.conf

D.

$FWDIR/state/fwauthd.conf

Buy Now
Questions 69

When performing a minimal effort upgrade, what will happen to the network traffic?

Options:

A.

All connections that were initiated before the upgrade will be dropped, causing network downtime

B.

All connections that were initiated before the upgrade will be handled normally

C.

All connections that were initiated before the upgrade will be handled by the standby gateway

D.

All connections that were initiated before the upgrade will be handled by the active gateway

Buy Now
Exam Code: 156-315.80
Exam Name: Check Point Certified Security Expert - R80
Last Update: Apr 14, 2023
Questions: 462