Certbus > CheckPoint > CCSE > 156-315.80 > 156-315.80 Online Practice Questions and Answers

156-315.80 Online Practice Questions and Answers

Questions 4

Fill in the blank: A new license should be generated and installed in all of the following situations EXCEPT when ________ .

A. The license is attached to the wrong Security Gateway.

B. The existing license expires.

C. The license is upgraded.

D. The IP address of the Security Management or Security Gateway has changed.

Browse 483 Q&As
Questions 5

Which Check Point software blade provides protection from zero-day and undiscovered threats?

A. Firewall

B. Threat Emulation

C. Application Control

D. Threat Extraction

Browse 483 Q&As
Questions 6

You work as a security administrator for a large company. CSO of your company has attended a security conference where he has learnt how hackers constantly modify their strategies and techniques to evade detection and reach corporate resources. He wants to make sure that his company has the tight protections in place. Check Point has been selected for the security vendor.

Which Check Point product protects BEST against malware and zero-day attacks while ensuring quick delivery of safe content to your users?

A. IPS AND Application Control

B. IPS, anti-virus and anti-bot

C. IPS, anti-virus and e-mail security

D. SandBlast

Browse 483 Q&As
Questions 7

CoreXL is NOT supported when one of the following features is enabled: (Choose three) A. Route-based VPN

B. IPS

C. IPv6

D. Overlapping NAT

Browse 483 Q&As
Questions 8

After verifying that API Server is not running, how can you start the API Server?

A. Run command "set api start" in CLISH mode

B. Run command "mgmt_cli set api start" in Expert mode

C. Run command "mgmt api start" in CLISH mode

D. Run command "api start" in Expert mode

Browse 483 Q&As
Questions 9

When configuring SmartEvent Initial settings, you must specify a basic topology to SmartEvent to help it calculate traffic direction for events. What is this setting called, and what are you defining?

A. Network; and defining your Class A space

B. Topology; and you are defining the Internal network

C. Internal addresses; you are defining the gateways

D. Internal network(s); you are defining your networks

Browse 483 Q&As
Questions 10

To add a file to the Threat Prevention Whitelist, what two items are needed?

A. File name and Gateway

B. Object Name and MD5 signature

C. MD5 signature and Gateway

D. IP address of Management Server and Gateway

Browse 483 Q&As
Questions 11

After making modifications to the $CVPNDIR/conf/cvpnd.C file, how would you restart the daemon?

A. cvpnd_restart

B. cvpnd_restart

C. cvpnd restart

D. cvpnrestart

Browse 483 Q&As
Questions 12

What CLI command compiles and installs a Security Policy on the target's Security Gateways?

A. fwm compile

B. fwm load

C. fwm fetch

D. fwm install

Browse 483 Q&As
Questions 13

What is the SandBlast Agent designed to do?

A. Performs OS-level sandboxing for SandBlast Cloud architecture

B. Ensure the Check Point SandBlast services is running on the end user's system

C. If malware enters an end user's system, the SandBlast Agent prevents the malware from spreading with the network

D. Clean up email sent with malicious attachments

Browse 483 Q&As
Questions 14

Please choose the path to monitor the compliance status of the Check Point R80.10 based management.

A. Gateways and Servers --> Compliance View

B. Compliance blade not available under R80.10

C. Logs and Monitor --> New Tab --> Open compliance View

D. Security and Policies --> New Tab --> Compliance View

Browse 483 Q&As
Questions 15

Which command would disable a Cluster Member permanently?

A. clusterXL_admin down

B. cphaprob_admin down

C. clusterXL_admin down-p

D. set clusterXL down-p

Browse 483 Q&As
Questions 16

The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?

A. fwd via cpm

B. fwm via fwd

C. cpm via cpd

D. fwd via cpd

Browse 483 Q&As
Questions 17

UserCheck objects in the Application Control and URL Filtering rules allow the gateway to communicate with the users. Which action is not supported in UserCheck objects?

A. Ask

B. Drop

C. Inform

D. Reject

Browse 483 Q&As
Questions 18

What is the best method to upgrade a Security Management Server to R80.x when it is not connected to the Internet?

A. CPUSE offline upgrade only B. Advanced upgrade or CPUSE offline upgrade

C. Advanced Upgrade only

D. SmartUpdate offline upgrade

Browse 483 Q&As
Exam Code: 156-315.80
Exam Name: Check Point Certified Security Expert (CCSE) R80
Last Update: Apr 21, 2024
Questions: 483 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99