Summer Sale - Special Discounts Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 63r59951

Note! The 156-915.80 Exam is no longer available.

156-915.80 Check Point Certified Security Expert Update - R80.10 Questions and Answers

Questions 4

Your organization’s disaster recovery plan needs an update to the backup and restore section to reap the new distributed R80 installation benefits. Your plan must meet the following required and desired objectives:

Required Objective: The Security Policy repository must be backed up no less frequently than every 24 hours.

Desired Objective: The R80 components that enforce the Security Policies should be backed up at least once a week.

Desired Objective: Back up R80 logs at least once a week.

Your disasterrecovery plan is as follows:

- Use the cron utility to run the command upgrade_export each night on the Security Management Servers.

- Configure the organization's routine back up software to back up the files created by the command upgrade_export.

- Configure the GAiA back up utility to back up the Security Gateways every Saturday night.

- Use the cron utility to run the command upgrade_export each Saturday night on the log servers.

- Configure an automatic, nightly logswitch.

- Configure theorganization's routine back up software to back up the switched logs every night.

Upon evaluation, your plan:

Options:

A.

Meets the required objective and only one desired objective.

B.

Meets the required objective but does not meet either desired objective.

C.

Does not meet the required objective.

D.

Meets the required objective and both desired objectives.

Buy Now
Questions 5

Because of pre-existing design constraints, you set up manual NAT rules for your HTTP server. However, your FTP server and SMTP server are both using automatic NAT rules. All traffic from your FTP and SMTP servers are passing through the Security Gateway without a problem, but traffic from the Web server is dropped on rule 0 because of anti-spoofing settings. What is causing this?

Options:

A.

Manual NAT rules are notconfigured correctly.

B.

Allow bi-directional NAT is not checked in Global Properties.

C.

Routing is not configured correctly.

D.

Translate destination on client side is not checked in Global Properties under Manual NAT Rules.

Buy Now
Questions 6

In SmartDashboard, Translate destination on client side is checked in Global Properties. When Network Address Translation is used:

Options:

A.

It is not necessary to add a static route to the Gateway’s routing table.

B.

It is necessary to add a static route to the Gateway’s routing table.

C.

TheSecurity Gateway’s ARP file must be modified.

D.

VLAN tagging cannot be defined for any hosts protected by the Gateway.

Buy Now
Questions 7

Which command line interface utility allows the administrator to verify the Security Policy name and timestamp currentlyinstalled on a firewall module?

Options:

A.

cpstat fwd

B.

fw ver

C.

fw stat

D.

fw ctl pstat

Buy Now
Questions 8

Where can you find the Check Point’s SNMP MIB file?

Options:

A.

$CPDIR/lib/snmp/chkpt.mib

B.

$FWDIR/conf/snmp.mib

C.

It is obtained only by request from the TAC.

D.

There is no specific MIB file for Check Point products.

Buy Now
Questions 9

Match the followingcommands to their correct function.

156-915.80 Question 9

Each command has one function only listed.

Options:

A.

C1>F6; C2>F4; C3>F2; C4>F5

B.

C1>F2; C2>F1; C3>F6; C4>F4

C.

C1>F2; C2>F4; C3>F1; C4>F5

D.

C1>F4; C2>F6; C3>F3; C4>F2

Buy Now
Questions 10

Which operating systems are supported by a Check Point Security Gateway on an open server? Select MOST complete list.

Options:

A.

Sun Solaris, Red Hat Enterprise Linux, Check Point SecurePlatform, IPSO, Microsoft Windows

B.

Check Point GAiA and SecurePlatform, and Microsoft Windows

C.

Check Point GAiA, Microsoft Windows, Red Hat Enterprise Linux, Sun Solaris, IPSO

D.

Check Point GAiA and SecurePlatform, IPSO, Sun Solaris, Microsoft Windows

Buy Now
Questions 11

Which Security Gateway R80 configuration setting forces the Client Authentication authorization time-out to refresh, each time a new user is authenticated? The:

Options:

A.

Time properties, adjusted on the user objects for each user, in the Client Authentication rule Source.

B.

IPS > Application Intelligence > Client Authentication > Refresh User Timeout option enabled.

C.

Refreshable Timeout setting, in Client AuthenticationAction Properties > Limits.

D.

Global Properties > Authentication parameters, adjusted to allow for Regular Client Refreshment.

Buy Now
Questions 12

Your customer, Mr. Smith needs access to other networks and should be able to use all services. Session authentication is not suitable. You select Client Authentication with HTTP. The standard authentication port for clientHTTP authentication (Port 900) is already in use. You want to use Port 9001 but are having connectivity problems. Why are you having problems?

156-915.80 Question 12

156-915.80 Question 12

Options:

A.

The configuration file $FWDIR/conf/fwauthd.conf is incorrect.

B.

The Security Policy is notcorrect.

C.

You can't use any port other than the standard port 900 for Client Authentication via HTTP.

D.

The service FW_clntauth_http configuration is incorrect.

Buy Now
Questions 13

Aaron is a Cyber Security Engineer working for Global Law Firm with large scale deployment of Check PointEnterprise Appliances using GAiA/R80.10. Company’s Network Security Developer Team is having issue testing new API with newly deployed R80.10 Security Management Server and blames Check Point Security Management Server as root cause. The ticket has been created and issue is at Aaron’s desk for an investigation. What do you recommend as the best suggestion for Aaron to make sure API testing works as expected?

Options:

A.

Aaron should check API Server status from expert CLI by “fwm api status” and if it’s stopped heshould start using command “fwm api start” on Security Management Server.

B.

Aaron should check API Server5 status from expert CLI by “cpapi status” and if it’s stopped he should start using command “cpapi start” on Security Management Server.

C.

Aaron should check API Server status from expert CLI by “api status” and if it’s stopped he should start using command “api start” on Security Management Server.

D.

Aaron should check API Server status from expert CLI by “cpm api status” and if it’s stopped he should start using command “cpm api start” on Security Management Server.

Buy Now
Questions 14

What Shell is required in Gaia to use WinSCP?

Options:

A.

UNIX

B.

CPShell

C.

CLISH

D.

Bash

Buy Now
Questions 15

When deploying multiple clustered firewalls on the same subnet, what does the firewall administrator need to configure to prevent CCP broadcasts being sent to the wrong cluster?

Options:

A.

Set the fwha_mac_magic_forward parameter in the $CPDIR/boot/modules/ha_boot. conf

B.

Set the fwha_mac_magic parameter in the $FWDIR/boot/fwkern.conf file

C.

Set the cluster global ID using thecommand “cphaconf cluster_id set

D.

Set the cluster global ID using the command “fw ctt set cluster_id

Buy Now
Questions 16

What is considered Hybrid Emulation Mode?

Options:

A.

Manual configuration of file types on emulation location

B.

Load sharing of emulation between an on premise appliance and the cloud

C.

Load sharing between OS behavior and CPU Level emulation

D.

High availability between the local SandBlast appliance and the cloud

Buy Now
Questions 17

Where you can see and search records of action done by R80 SmartConsole administrators?

Options:

A.

In SmartView Tracker, open active log

B.

In the Logs & Monitor view, select “Open Audit Log View”

C.

In SmartAudit Log View

D.

In SmartLog, all logs

Buy Now
Questions 18

GAiA Software update packages can be imported and installed offline in situation where:

Options:

A.

Security Gateway with GAiA does NOT have SFTP access to Internet

B.

Security Gateway with GAiA does NOT have access to Internet.

C.

Security Gateway with GAiA does NOT have SSH access to internet.

D.

The desired CPUSE package is ONLY available in the Check Point CLOUD.

Buy Now
Questions 19

What are the different command sources that allow you to communicate with the API server?

Options:

A.

SmartView Monitor, API_cli Tool, Gaia CLI, Web Services

B.

SmartConsole GUI Console, mgmt_cli Tool, Gaia CLI, Web Services

C.

SmartConsole GUI Console, API_cli Tool, Gaia CLI, WebServices

D.

API_cli Tool, Gaia CLI, Web Services

Buy Now
Questions 20

For best practices, what is the recommended time for automatic unlocking of locked admin accounts?

Options:

A.

20 minutes

B.

15 minutes

C.

Admin account cannot be unlocked automatically

D.

30 minutes at least

Buy Now
Questions 21

How would you deploy TE250X Check Point appliance just for email traffic and in-line mode without a Check Point Security Gateway?

Options:

A.

Install appliance TE250X on SpanPort on LAN switch in MTA mode

B.

Install appliance TE250X in standalone mode and setup MTA

C.

You can utilize only Check Point Cloud Services for this scenario

D.

It is not possible, always Check Point SGW is needed to forward emails to SandBlast appliance

Buy Now
Questions 22

Which of the following process pulls applications monitoring status?

Options:

A.

fwd

B.

fwm

C.

cpwd

D.

cpd

Buy Now
Questions 23

Which TCP-port does CPM process listen to?

Options:

A.

18191

B.

18190

C.

8983

D.

19009

Buy Now
Questions 24

UserCheck objects in the Application Control and URL Filtering rules allow the gateway to communicate with the users. Which action is not supported in UserCheck objects?

Options:

A.

Ask

B.

Drop

C.

Inform

D.

Reject

Buy Now
Questions 25

The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?

Options:

A.

fwd via cpm

B.

fwm via fwd

C.

cpm via cpd

D.

fwd via cpd

Buy Now
Questions 26

WhenConfiguring Endpoint Compliance Settings for Applications and Gateways within Mobile Access, which of the three approaches will allow you to configure individual policies for each application?

Options:

A.

Basic Approach

B.

Strong Approach

C.

Advanced Approach

D.

Medium Approach

Buy Now
Questions 27

Fill in the blank.

156-915.80 Question 27

In Load SharingUnicast mode, the internal cluster IP address is 10.4.8.3. The internal interfaces on two members are 10.4.8.1 and 10.4.8.2. Internal host 10.4.8.108 Pings 10.4.8.3, and receives replies. The following is the ARP table from the internal Windows host 10.4.8.108. Review the exhibit and type the IP address of the member serving as the pivot machine in the space below.

Options:

Buy Now
Questions 28

Type the command and syntax to view critical devices on a cluster member in a ClusterXL environment.

Options:

Buy Now
Questions 29

Your expanding network currently includes ClusterXL runningMulticast mode on two members, as shown in this topology:

Exhibit:

156-915.80 Question 29

You need to add interfaces: 10.10.10.1/24 on Member A, and 10.10.10.2/24 on Member B. The virtual IP address for these interfaces is 10.10.10.3/24. Both cluster gateways have a Quad card with an available eth3 interface. What is the correct procedure to add these interfaces?

Options:

A.

1. Disable "Cluster membership" from one Gateway via cpconfig.2. Configure the new interface via sysconfig from the "non-member" Gateway.3. Re-enable "Cluster membership" on the Gateway.4. Perform the same steps on the other Gateway.5. Update the topology in the cluster object.6. Install the Security Policy.

B.

1. Configure the new interface on both members using WebUI.2. Update the new topology in the cluster object from SmartDashboard.3. Define virtual IP in the Dashboard4. Install the Security Policy.

C.

1. Use WebUI to configure the new interfaces on both member.2. Update the topology in the cluster object.3. Reboot both gateways.4. Install the Security Policy.

D.

1. Use the command ifconfig to configure and enable the new interface on both members.2. Update the topology in the cluster object for the cluster and both members.3. Install the Security Policy.4. Reboot the gateway.

Buy Now
Questions 30

What is the difference between an event and a log?

Options:

A.

Events are generated as gateway according to Event Policy

B.

A log entry becomes an event when it matches any rule defined in Event Policy

C.

Events are collected with SmartWorkflow from Trouble Ticket systems

D.

Logs and Events are synonyms

Buy Now
Questions 31

To qualify as an Identity Awareness enabled rule, which column MAY include an Access Role?

Options:

A.

Source

B.

Track

C.

User

D.

Action

Buy Now
Questions 32

Which configuration file contains the structure of the Security Servers showing the port numbers, corresponding protocol name, and status?

Options:

A.

$FWDIR/database/fwauthd.conf

B.

$FWDIR/conf/fwauth.conf

C.

$FWDIR/conf/fwauthd.conf

D.

$FWDIR/state/fwauthd.conf

Buy Now
Questions 33

Which is the lowest Gateway version manageable by SmartCenter R80?

Options:

A.

R65

B.

S71

C.

R55

D.

R60A

Buy Now
Questions 34

When migrating the SmartEvent data base from one server to another, the first step is to back up the files on the original server. Which of the following commands should you run to back up the SmartEvent data base?

Options:

A.

migrate export

B.

eva_db_backup

C.

snapshot

D.

backup

Buy Now
Questions 35

After verifying that API Server is not running, how can you start the API Server?

Options:

A.

Run command “set api start” in CLISH mode

B.

Run command “mgmt._cli set api start” in Expert mode

C.

Run command “mgmt. api start” in CLISH mode

D.

Run command “api start” in Expert mode

Buy Now
Questions 36

Fill in the blank. To save your OSPF configuration in GAiA, enter the command ___________ .

Options:

Buy Now
Questions 37

How could you compare the Fingerprint shown to the Fingerprint on the server? Run cpconfig and select:

Exhibit:

156-915.80 Question 37

Options:

A.

the Certificate Authority option and view the fingerprint.

B.

the GUI Clients option and view the fingerprint.

C.

the Certificate's Fingerprint option and view the fingerprint.

D.

the Server Fingerprint option and view the fingerprint.

Buy Now
Questions 38

Can you implement a complete IPv6 deployment without IPv4 addresses?

Options:

A.

No. SmartCenter cannot be accessed from everywhere on the Internet.

B.

Yes. Only one TCP stack (IPv6 or IPv4) can be used at the same time.

C.

Yes, There is no requirement for managing IPv4 addresses.

D.

No. IPv4 addresses are required for management.

Buy Now
Questions 39

You want VPN traffic to match packets from internal interfaces. You also want the traffic to exit theSecurity Gateway bound for all site-to-site VPN Communities, including Remote Access Communities. How should you configure the VPN match rule?

Options:

A.

internal_clear > All_communities

B.

Internal_clear > External_Clear

C.

Communities > Communities

D.

internal_clear > All_GwToGw

Buy Now
Questions 40

Fill in the blanks. To view thenumber of concurrent connections going through core 0 on the firewall, you would use the command and syntax __ __ _ ___ __ ___________ __ .

Options:

Buy Now
Questions 41

The system administrator of a company is trying to find out why acceleration is not working for the traffic. The traffic is allowed according to the rule base and checked for viruses. But it is not accelerated. What is the most likely reason that the traffic is not accelerated?

Options:

A.

There is a virus found. Traffic is still allowed but not accelerated.

B.

The connection required a Security server.

C.

Acceleration is not enabled.

D.

The traffic is originating from the gateway itself.

Buy Now
Questions 42

Select the command set best used to verify proper failover function of a new ClusterXL configuration.

Options:

A.

reboot

B.

cphaprob -d failDevice -s problem -t 0 register / cphaprob -d failDeviceunregister

C.

clusterXL_admin down / clusterXL_admin up

D.

cpstop/cpstart

Buy Now
Questions 43

You find that Gateway fw2 can NOT be added to the cluster object. What are possible reasons for that?

Exhibit:

156-915.80 Question 43

1) fw2 is a member in a VPN community.

2) ClusterXL software blade is not enabled on fw2.

3) fw2 is a DAIP Gateway.

Options:

A.

2 or 3

B.

1 or 2

C.

1 or 3

D.

All

Buy Now
Questions 44

What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?

Options:

A.

Anti-Bot is the only countermeasure against unknown malware

B.

Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control Centers

C.

Anti-Bot is the only signature-based method of malware protection

D.

Anti-Bot is a post-infection malware protection to prevent a host from establishing a connection to a Command & Control Center

Buy Now
Questions 45

Fill in the blank. What is the correct command and syntax used to view a connection table summary on a Check Point Firewall?

Options:

Buy Now
Questions 46

Which of the following items should be configured for the Security Management Server to authenticate using LDAP?

Options:

A.

Login Distinguished Name and password

B.

Windows logonpassword

C.

Check Point Password

D.

WMI object

Buy Now
Questions 47

Your organization maintains several IKE VPN’s. Executives in your organization want to know which mechanism Security Gateway R80 uses to guarantee the authenticity and integrity of messages. Which technology should you explain to the executives?

Options:

A.

Certificate Revocation Lists

B.

Application Intelligence

C.

Key-exchange protocols

D.

Digital signatures

Buy Now
Questions 48

In what way in Secure Network Distributor (SND) a relevant feature of the Security Gateway?

Options:

A.

SND is a feature to accelerate multiple SSL VPN connections

B.

SND is an alternative to IPSec Main Mode, using only 3 packets

C.

SND is used to distribute packets among Firewall instances

D.

SNDis a feature of fw monitor to capture accelerated packets

Buy Now
Questions 49

Complete this statement. To save interface information before upgrading a Windows Gateway, use command

Options:

Buy Now
Questions 50

MegaCorps' disaster recovery plan is past due for an update to the backup and restore section to enjoy the benefits of the new distributed R80 installation. You must propose a plan that meets the following required and desired objectives:

Required: Security Policy repository must be backed up no less frequently than every 24 hours.

Desired: Back up R80 components enforcing the Security Policies at least once a week.

Desired: Back up R80 logs at least once a week.

You develop a disaster recovery plan proposing the following:

* Use the utility cron to run the command upgrade_export each night on the Security Management Servers.

* Configure the organization's routine backup software to back up files created by the command upgrade_export.

* Configure GAiA back up utility to back up Security Gateways every Saturday night.

* Use the utility cron to run the command upgrade_export each Saturday night on the log servers.

* Configure an automatic, nightly logswitch.

* Configure the organization's routine back up software to back up the switched logs every night.

The corporate IT change review committee decides your plan:

Options:

A.

meets the required objective and only one desired objective.

B.

meets the required objective and both desired objectives.

C.

meets the rquired objective but does not meet either deisred objective.

D.

does notmeet the required objective.

Buy Now
Questions 51

Check Point recommends configuring Disk Space Management parameters to delete old log entities when available disk space is less than or equal to?

Options:

A.

50%

B.

75%

C.

80%

D.

15%

Buy Now
Questions 52

When migrating the SmartEvent data base from one server to another, the last step is to save the files on the new server. Which of thefollowing commands should you run to save the SmartEvent data base files on the new server?

Options:

A.

cp

B.

restore

C.

migrate import

D.

eva_db_restore

Buy Now
Questions 53

Using mgmt_cli, what is the correct syntax to import a host object called Server_1 from the CLI?

Options:

A.

mgmt_cli add-host “Server_1” ip_ address “10.15.123.10” – format txt

B.

mgmt_ cli add host name “Server_ 1” ip-address “10.15.123.10” – format json

C.

mgmt_ cli add object-host “Server_ 1” ip-address “10.15.123.10” – format json

D.

mgmt_cli add object “Server_ 1”ip-address “10.15.123.10” – format json

Buy Now
Questions 54

In a zero downtime scenario, which command do you run manually after all cluster members are upgraded?

Options:

Buy Now
Questions 55

What is the command to see cluster status in cli expert mode?

Options:

A.

fw ctl stat

B.

clusterXL stat

C.

clusterXL status

D.

cphaprob stat

Buy Now
Questions 56

Which command collects diagnostic data for analyzing customer setup remotely?

Options:

A.

cpinfo

B.

migrate export

C.

sysinfo

D.

cpview

Buy Now
Questions 57

On R80.10 the IPS Blade is managed by:

Options:

A.

Threat Protection policy

B.

Anti-Bot Blade

C.

Threat Prevention policy

D.

Layers on Firewall policy

Buy Now
Questions 58

If Jack was concerned about the number of log entries he would receive in the SmartReporter system, which policy would he need to modify?

Options:

A.

Log Sequence Policy

B.

Report Policy

C.

Log Consolidator Policy

D.

Consolidation Policy

Buy Now
Questions 59

MultiCorp is running Smartcenter R71 on an IPSO platform and wants to upgrade to a new Appliance with R80. Which migration tool is recommended?

Options:

A.

Download Migration Tool R80 for IPSO and Splat/Linux from Check Point website.

B.

Use already installed Migration Tool.

C.

Use Migration Tool from CD/ISO

D.

Fetch Migration Tool R71 for IPSO and Migration Tool R80 forSplat/Linux from CheckPoint website

Buy Now
Questions 60

Type the command and syntax you would use to verify that your Check Point cluster is functioning correctly.

Options:

Buy Now
Questions 61

Your company has the requirement that SmartEvent reports should show a detailed and accurate view of network activity but also performance should beguaranteed. Which actions should be taken to achieve that?

1) Use same hard drive for database directory, log files, and temporary directory.

2) Use Consolidation Rules.

3) Limit logging to blocked traffic only.

4) Use Multiple Database Tables.

Options:

A.

2, 4

B.

1, 3, 4

C.

1, 2, 4

D.

1, 2

Buy Now
Questions 62

The command useful for debugging by capturing packet information, including verifying LDAP authentication on all Check Point platforms is

Options:

Buy Now
Questions 63

How do you recover communications between your Security Management Server and Security Gateway if you lock yourself out through a rule or policy mis-configuration?

Options:

A.

fw unload policy

B.

fw unloadlocal

C.

fw delete all.all@localhost

D.

fwm unloadlocal

Buy Now
Questions 64

Several Security Policies can be used for different installation targets. The Firewall protecting Human Resources’ servers should have its own Policy Package. These rules must be installed on this machine and not onthe Internet Firewall. How can this be accomplished?

Options:

A.

A Rule Base is always installed on all possible targets. The rules to be installed on a Firewall are defined by the selection in the Rule Base row Install On.

B.

When selecting the correct Firewall in each line of the Rule Base row Install On, only this Firewall is shown in the list of possible installation targets after selecting Policy > Install on Target.

C.

In the menu of SmartDashboard, go to Policy > Policy Installation Targets and select the correct firewall via Specific Targets.

D.

A Rule Base can always be installed on any Check Point Firewall object. It is necessary to select the appropriate target directly after selecting Policy > Install on Target.

Buy Now
Questions 65

You are about to integrate RSA SecurID users into the Check Point infrastructure. What kind of users are to be defined via SmartDashboard?

Options:

A.

A group with generic user

B.

All users

C.

LDAP Account Unit Group

D.

Internal user Group

Buy Now
Questions 66

Afterfiltering a fw monitor trace by port and IP, a packet is displayed three times; in the i, I, and o inspection points, but not in the O inspection point. Which is the likely source of the issue?

Options:

A.

The packet has been sent out through a VPN tunnel unencrypted.

B.

An IPSO ACL has blocked the packet’s outbound passage.

C.

A SmartDefense module has blocked the packet.

D.

It is due to NAT.

Buy Now
Questions 67

You find that Users are not prompted for authentication when they access their Web servers, even though you havecreated an HTTP rule via User Authentication. Choose the BEST reason why.

Options:

A.

You checked the cache password on desktop option in Global Properties.

B.

Another rule that accepts HTTP without authentication exists in the Rule Base.

C.

You have forgotten to place the User Authentication Rule before the Stealth Rule.

D.

Users must use the SecuRemote Client, to use the User Authentication Rule.

Buy Now
Questions 68

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimizemalware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned a static IP address 10.0.0.19.

John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop with a static IP (10.0.0.19). He wants tomove around the organization and continue to have access to the HR Web Server.

To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the policy.

2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.

What should John do when he cannot access the web server from a different personal computer?

Options:

A.

John should lock and unlock his computer

B.

Investigate this as a network connectivity issue

C.

The access should be changed to authenticate the user instead of the PC

D.

John should install the Identity Awareness Agent

Buy Now
Questions 69

You intend to upgrade a Check Point Gateway from R71 to R80. Prior to upgrading, you want to back up the Gateway should there be any problems with the upgrade. Which of the following allows for the Gateway configuration to be completely backed up into a manageable size in the least amount of time?

Options:

A.

database revision

B.

snapshot

C.

upgrade_export

D.

backup

Buy Now
Questions 70

Complete this statement from the options provided. Using Captive Portal, unidentified users may be either; blocked, allowed to enter required credentials, or required to download the _____________.

Options:

A.

Identity Awareness Agent

B.

Full Endpoint Client

C.

ICA Certificate

D.

SecureClient

Buy Now
Questions 71

As a Security Administrator, you must refresh the Client Authentication authorization time-out every time a new user connection is authorized. How do you do this? Enable the Refreshable Timeout setting:

Options:

A.

in the user object's Authentication screen.

B.

in the Gateway object's Authentication screen.

C.

in the Limit tab of the Client AuthenticationAction Properties screen.

D.

in the Global Properties Authentication screen.

Buy Now
Questions 72

Your internal network is configured to be 10.1.1.0/24. This network is behind your perimeter R80 Gateway, which connects to your ISP provider. How do you configure the Gateway to allow this network to go out to the Internet?

Options:

A.

Use Hide NAT for network 10.1.1.0/24 behind the external IP address of your perimeter Gateway.

B.

Use Hide NAT for network10.1.1.0/24 behind the internal interface of your perimeter Gateway.

C.

Use automatic Static NAT for network 10.1.1.0/24.

D.

Do nothing, as long as 10.1.1.0 network has the correct default Gateway.

Buy Now
Questions 73

You cannot use SmartDashboard’s User Directory features to connect to the LDAP server. What should you investigate?

1) Verify you have read-only permissions as administrator for the operating system.

2) Verify there are no restrictions blocking SmartDashboard's User Manager from connecting to the LDAP server.

3) Check that the login Distinguished Name configured has root permission (or at least write permission Administrative access) in the LDAP Server's access control configuration.

Options:

A.

1,2, and 3

B.

2 and 3

C.

1 and 2

D.

1 and 3

Buy Now
Questions 74

Captive Portal is a __________ that allows the gateway to request login information from the user.

Options:

A.

Pre-configured and customizable web-based tool

B.

Transparent network inspection tool

C.

LDAP serveradd-on

D.

Separately licensed feature

Buy Now
Questions 75

You are the Security Administrator for ABC-Corp. A Check Point Firewall is installed and in use on GAiA. You are concerned that the system might not be retaining your entries for the interfaces and routing configuration. You would like to verify your entries in the corresponding file(s) on GAiA. Where can you view them? Give the BEST answer.

Options:

A.

/etc/sysconfig/netconf.C

B.

/etc/conf/route.C

C.

/etc/sysconfig/network-scripts/ifcfg-ethx

D.

/etc/sysconfig/network

Buy Now
Exam Code: 156-915.80
Exam Name: Check Point Certified Security Expert Update - R80.10
Last Update: Apr 14, 2023
Questions: 502