This page was exported from PassLeader VCE Dumps and PDF Dumps for Free
[
https://www.testkingvce.com
]
Export date: Thu Mar 28 21:20:29 2024 / +0000 GMT
New Updated 156-215.80 Exam Questions from PassLeader 156-215.80 PDF dumps! Welcome to download the newest PassLeader 156-215.80 VCE dumps: https://www.passleader.com/156-215-80.html (417 Q&As) Keywords: 156-215.80 exam dumps, 156-215.80 exam questions, 156-215.80 VCE dumps, 156-215.80 PDF dumps, 156-215.80 practice tests, 156-215.80 study guide, 156-215.80 braindumps, Check Point Certified Security Administrator (CCSA) R80 Exam P.S. New 156-215.80 dumps PDF: https://drive.google.com/open?id=0B-ob6L_QjGLpdm81T0hOX1ZpWGs NEW QUESTION 351 A. Export R80 configuration, clean install R80.10 and import the configuration. Answer: C NEW QUESTION 352 A. Matching a log against each event definition. Answer: C NEW QUESTION 353 A. secondary Smartcenter Answer: B NEW QUESTION 354 A. Slow path Answer: C NEW QUESTION 355 A. Detect threats and provides a detailed report of discovered threats. Answer: B NEW QUESTION 356 A. SmartView Monitor Answer: B NEW QUESTION 357 A. Smart Cloud Services Answer: A NEW QUESTION 358 A. Consolidation Policy Answer: B NEW QUESTION 359 A. Basic: Provides reliable protection on a range of non-HTTP protocols for servers, with minimal impact on network performance. Answer: D NEW QUESTION 360 A. When an interface fails the priority changes to the priority delta. Answer: C NEW QUESTION 361 A. Incoming Answer: D NEW QUESTION 362 A. Security policy Answer: A NEW QUESTION 363 A. Capsule Docs Answer: C NEW QUESTION 364 A. restore_backup Answer: A NEW QUESTION 365 A. Use 1 cluster + 1st sync Answer: B NEW QUESTION 366 A. No, only one can be connected. Answer: C NEW QUESTION 367 A. Endpoint Security Client Answer: B NEW QUESTION 368 A. Accounting Answer: C NEW QUESTION 369 A. fw ctl multik dynamic_dispatching on Answer: C NEW QUESTION 370 A. ELA and CPD Answer: B NEW QUESTION 371 A. fw ctl set int fwha vmac global param enabled Answer: B NEW QUESTION 372 A. Used for full text search and enables powerful matching capabilities. Answer: A NEW QUESTION 373 A. cphaprob state Answer: A NEW QUESTION 374 A. Security Gateway Answer: A NEW QUESTION 375 A. Server Units Answer: C NEW QUESTION 376 A. AES-128 Answer: A NEW QUESTION 377 A. Clustered Protocol Answer: D NEW QUESTION 378 A. Partial log Answer: ACD NEW QUESTION 379 A. cplic print Answer: A NEW QUESTION 380 A. SmartManager Answer: C NEW QUESTION 381 A. all options stop Check Point processes Answer: D NEW QUESTION 382 A. It transports packets as datagrams along different routes to reach their destination. Answer: B NEW QUESTION 383 A. A host route to route to the destination IP. Answer: C NEW QUESTION 384 A. SmartConsole Answer: B NEW QUESTION 385 A. User Center Answer: B NEW QUESTION 386 A. Security Management Server's /home/.fgpt file and is available for future SmartConsole authentications. Answer: D NEW QUESTION 387 A. SHA-256 Answer: A NEW QUESTION 388 A. Quick Mode Complete Answer: A NEW QUESTION 389 A. DNS Rule is using one of the new feature of R80 where an administrator can mark a rule with the padlock icon to let other administrators know it is important. Answer: B NEW QUESTION 390 A. Down Answer: A NEW QUESTION 391 A. Password Answer: B NEW QUESTION 392 A. ifconfig -a Answer: D NEW QUESTION 393 A. user groups Answer: A NEW QUESTION 394 A. ThreatWiki Answer: A NEW QUESTION 395 A. SSL Answer: B NEW QUESTION 396 A. There is connection between the gateway and Security Management Server but it is not trusted. Answer: C NEW QUESTION 397 A. In R80 all Network Address Translation is done automatically and there is no need for manually defined NAT-rules. Answer: D NEW QUESTION 398 A. Cplic verify license Answer: B NEW QUESTION 399 A. a routing table Answer: B NEW QUESTION 400 A. The firewall topologies Answer: C NEW QUESTION 401 Download the newest PassLeader 156-215.80 dumps from passleader.com now! 100% Pass Guarantee! 156-215.80 PDF dumps & 156-215.80 VCE dumps: https://www.passleader.com/156-215-80.html (417 Q&As) (New Questions Are 100% Available and Wrong Answers Have Been Corrected! Free VCE simulator!) P.S. New 156-215.80 dumps PDF: https://drive.google.com/open?id=0B-ob6L_QjGLpdm81T0hOX1ZpWGs
Customer's R80 management server needs to be upgraded to R80.10. What is the best upgrade method when the management server is not connected to the Internet?
B. CPUSE online upgrade.
C. CPUSE offline upgrade.
D. SmartUpdate upgrade.
SmartEvent does NOT use which of the following procedures to identity events?
B. Create an event candidate.
C. Matching a log against local exclusions.
D. Matching a log against global exclusions.
John is using Management HA. Which Smartcenter should be connected to for making changes?
B. active Smartcenter
C. connect virtual IP of Smartcenter HA
D. primary Smartcenter
Which path below is available only when CoreXL is enabled?
B. Firewall path
C. Medium path
D. Accelerated path
Which of the following describes how Threat Extraction functions?
B. Proactively detects threats.
C. Delivers file with original content.
D. Delivers PDF versions of original files with active content removed.
The SmartEvent R80 Web application for real-time event monitoring is called what?
B. SmartEventWeb
C. There is no Web application for SmartEvent
D. SmartView
SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day Protection?
B. Load Sharing Mode Services
C. Threat Agent Solution
D. Public Cloud Services
What SmartEvent component creates events?
B. Correlation Unit
C. SmartEvent Policy
D. SmartEvent GUI
Which Threat Prevention Profile is not included by default in R80 Management?
B. Optimized: Provides excellent protection for common network products and protocols against recent or popular attacks.
C. Strict: Provides a wide coverage for all products and protocols, with impact on network performance.
D. Recommended: Provides all protection for all common network products and servers, with impact on network performance.
When using Monitored circuit VRRP, what is a priority delta?
B. When an interface fails the delta claims the priority.
C. When an interface fails the priority delta is subtracted from the priority.
D. When an interface fails the priority delta decides if the other interfaces takes over.
Which of the following is NOT an option to calculate the traffic direction?
B. Internal
C. External
D. Outgoing
When an encrypted packet is decrypted, where does this happen?
B. Inbound chain
C. Outbound chain
D. Decryption is not supported
Which of the following is NOT a component of Check Point Capsule?
B. Capsule Cloud
C. Capsule Enterprise
D. Capsule Workspace
You have successfully backed up your Check Point configurations without the OS information. What command would you use to restore this backup?
B. import backup
C. cp_merge
D. migrate import
What is the best sync method in the ClusterXL deployment?
B. Use 1 dedicated sync interface
C. Use 3 clusters + 1st sync + 2nd sync + 3rd sync
D. Use 2 clusters + 1st sync + 2nd sync
Can multiple administrators connect to a Security Management Server at the same time?
B. Yes, all administrators can modify a network object at the same time.
C. Yes, every administrator has their own username, and works in a session that is independent of other administrators.
D. Yes, but only one has the right to write.
What Identity Agent allows packet tagging and computer authentication?
B. Full Agent
C. Light Agent
D. System Agent
In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?
B. Suppression
C. Accounting/Suppression
D. Accounting/Extended
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don't have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?
B. fw ctl multik dynamic_dispatching set_mode 9
C. fw ctl multik set_mode 9
D. fw ctl miltik pq enable
Which two of these Check Point Protocols are used by?
B. FWD and LEA
C. FWD and CPLOG
D. ELA and CPLOG
To ensure that VMAC mode is enabled, which CLI command you should run on all cluster members?
B. fw ctl get int fwha vmac global param enabled; result of command should return value 1
C. cphaprob -a if
D. fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1
What is the SOLR database for?
B. Writes data to the database and full text search.
C. Serves GUI responsible to transfer request to the DLE server.
D. Enables powerful matching capabilities and writes data to the database.
Which of the following commands is used to monitor cluster members?
B. cphaprob status
C. cphaprob
D. cluster state
Service blades must be attached to a ____.
B. Management container
C. Management server
D. Security Gateway container
An LDAP server holds one or more ____.
B. Administrator Units
C. Account Units
D. Account Server
In Security Gateways R75 and above, SIC uses ____ for encryption.
B. AES-256
C. DES
D. 3DES
What protocol is specifically used for clustered environments?
B. Synchronized Cluster Protocol
C. Control Cluster Protocol
D. Cluster Control Protocol
Which of the following is NOT a tracking option? (Select three.)
B. Log
C. Network log
D. Full log
Which command shows the installed licenses?
B. print cplic
C. fwlic print
D. show licenses
Of all the Check Point components in your network, which one changes most often and should be backed up most frequently?
B. SmartConsole
C. Security Gateway
D. Security Management Server
Which option would allow you to make a backup copy of the OS and Check Point configuration, without stopping Check Point processes?
B. backup
C. migrate export
D. snapshot
What is the Transport layer of the TCP/IP model responsible for?
B. It manages the flow of data between two hosts to ensure that the packets are correctly assembled and delivered to the target application.
C. It defines the protocols that are used to exchange data between networks and how host programs interact with the Application layer.
D. It deals with all aspects of the physical components of network connectivity and connects with different network types.
What needs to be configured if the NAT property `Translate destination on client side' is not enabled in Global properties?
B. Use the file local.arp to add the ARP entries for NAT to work.
C. Nothing, the Gateway takes care of all details necessary.
D. Enabling `Allow bi-directional NAT' for NAT to work correctly.
In the Check Point Security Management Architecture, which component(s) can store logs?
B. Security Management Server and Security Gateway
C. Security Management Server
D. SmartConsole and Security Management Server
In order to install a license, it must first be added to the ____.
B. Package repository
C. Download Center Web site
D. License and Contract repository
When logging in for the first time to a Security management Server through SmartConsole, a fingerprint is saved to the ...?
B. Windows registry is available for future Security Management Server authentications.
C. There is no memory used for saving a fingerprint anyway.
D. SmartConsole cache is available for future Security Management Server authentications.
By default, the SIC certificates issued by R80 Management Server are based on the ____ algorithm.
B. SHA-200
C. MD5
D. SHA-128
Which message indicates IKE Phase 2 has completed successfully?
B. Aggressive Mode Complete
C. Main Mode Complete
D. IKE Mode Complete
Administrator Dave logs into R80 Management Server to review and makes some rule changes. He notices that there is a padlock sign next to the DNS rule in the Rule Base:
What is the possible explanation for this?
B. Another administrator is logged into the Management and currently editing the DNS Rule.
C. DNS Rule is a placeholder rule for a rule that existed in the past but was deleted.
D. This is normal behavior in R80 when there are duplicate rules in the Rule Base.
When tunnel test packets no longer invoke a response, SmartView Monitor displays ____ for the given VPN tunnel.
B. No Response
C. Inactive
D. Failed
Which of the following is the most secure means of authentication?
B. Certificate
C. Token
D. Pre-shared secret
What is the BEST command to view configuration details of all interfaces in Gaia CLISH?
B. show interfaces
C. show interfaces detail
D. show configuration interface
Authentication rules are defined for ____.
B. users using UserCheck
C. individual users
D. all users in the database
Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?
B. Whitelist Files
C. AppWiki
D. IPS Protections
Which of the following is an authentication method used for Identity Awareness?
B. Captive Portal
C. PKI
D. RSA
The SIC Status "Unknown" means what?
B. The secure communication is established.
C. There is no connection between the gateway and Security Management Server.
D. The Security Management Server can contact the gateway, but cannot establish SIC.
What is a reason for manual creation of a NAT rule?
B. Network Address Translation of RFC1918-compliant networks is needed to access the Internet.
C. Network Address Translation is desired for some services, but not for others.
D. The public IP-address is different from the gateway's external IP.
Which of the following commands is used to verify license installation?
B. Cplic print
C. Cplic show
D. Cplic license
To enforce the Security Policy correctly, a Security Gateway requires ____.
B. awareness of the network topology
C. a Demilitarized Zone
D. a Security Policy install
Which configuration element determines which traffic should be encrypted into a VPN tunnel vs. sent in the clear?
B. NAT Rules
C. The Rule Base
D. The VPN Domains
......
Post date: 2018-07-04 08:51:15
Post date GMT: 2018-07-04 08:51:15
Post modified date: 2018-07-04 08:51:15
Post modified date GMT: 2018-07-04 08:51:15
Powered by [ Universal Post Manager ] plugin. MS Word saving format developed by gVectors Team www.gVectors.com