image


156-315-80 Dumps

156-315-80 Braindumps

156-315-80 Real Questions

156-315-80 Practice Test

156-315-80 Actual Questions


Checkpoint


156-315-80


Check Point Certified Security Expert - R80 (156-315.80)


https://killexams.com/pass4sure/exam-detail/156-315-80


Question: 368


Fill in the blank: The tool generates a R80 Security Gateway configuration report.

  1. infoCP

  2. infoview

  3. cpinfo

  4. fw cpinfo


Answer: C


Question: 369


Which of these statements describes the Check Point ThreatCloud?

  1. Blocks or limits usage of web applications

  2. Prevents or controls access to web sites based on category

  3. Prevents Cloud vulnerability exploits

  4. A worldwide collaborative security network


Answer: D


Question: 370


Automatic affinity means that if SecureXL is running, the affinity for each interface is automatically reset every

  1. 15 sec

  2. 60 sec

  3. 5 sec

  4. 30 sec


Answer: B


Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_PerformanceTuning_WebAdmin/6731.htm

Question: 371


SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?

  1. Application and Client Service

  2. Network and Application

  3. Network and Layers

  4. Virtual Adapter and Mobile App


Answer: B


Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk67820

Question: 372


Which command would disable a Cluster Member permanently?

  1. clusterXL_admin down

  2. cphaprob_admin down

  3. clusterXL_admin down-p

  4. set clusterXL down-p


Answer: C


Question: 373


Which two of these Check Point Protocols are used by SmartEvent Processes?

  1. ELA and CPD

  2. FWD and LEA

  3. FWD and CPLOG

  4. ELA and CPLOG


Answer: D


Question: 374


What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?

  1. Anti-Bot is the only countermeasure against unknown malware

  2. Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control Centers

  3. Anti-Bot is the only signature-based method of malware protection.

  4. Anti-Bot is a post-infection malware protection to prevent a host from establishing a connection to a Command & Control Center.


Answer: D


Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_AntiBotAntiVirus_AdminGuide/index.html

Question: 375


Which TCP-port does CPM process listen to?

A. 18191

B. 18190

C. 8983

D. 19009


Answer: D


Reference: https://www.checkpoint.com/downloads/products/r80.10-security-management-architecture-overview.pdf

Question: 376


Which method below is NOT one of the ways to communicate using the Management API’s?

  1. Typing API commands using the "mgmt_cli" command

  2. Typing API commands from a dialog box inside the SmartConsole GUI application

  3. Typing API commands using Gaia’s secure shell(clish)19+

  4. Sending API commands over an http connection using web-services

Answer: D


Reference: https://sc1.checkpoint.com/documents/R80/APIs/#introduction%20

Question: 377


Your manager asked you to check the status of SecureXL, and its enable templates and features, what command will you use to provide such information to manager?

  1. fw accel stat

  2. fwaccel stat

  3. fw acces stats

  4. fwaccel stats


Answer: B


Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk41397

Question: 378


Identify the API that is not supported by Check Point currently.

  1. R80 Management API

  2. Identity Awareness Web Services API

  3. Open REST API

  4. OPSEC SDK


Answer: C


Question: 379


SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?

  1. Management Dashboard

  2. Gateway

  3. Personal User Storage

  4. Behavior Risk Engine


Answer: C


Reference: https://community.checkpoint.com/docs/DOC-3072-sandblast-mobile-architecture-overview

Question: 380


What are the different command sources that allow you to communicate with the API server?

  1. SmartView Monitor, API_cli Tool, Gaia CLI, Web Services

  2. SmartConsole GUI Console, mgmt._cli Tool, Gaia CLI, Web Services

  3. SmartConsole GUI Console, API_cli Tool, Gaia CLI, Web Services

  4. API_cli Tool, Gaia CLI, Web Services


Answer: B


Reference: https://sc1.checkpoint.com/documents/R80/APIs/#introduction%20


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG