Certbus > CheckPoint > CCSE Update > 156-915.80 > 156-915.80 Online Practice Questions and Answers

156-915.80 Online Practice Questions and Answers

Questions 4

Fill in the blank with a numeric value. The default port number for Secure Sockets Layer (SSL) connections with the LDAP Server is ________

Browse 536 Q&As
Questions 5

The technical-support department has a requirement to access an intranet server. When configuring a User Authentication rule to achieve this, which of the following should you remember?

A. You can only use the rule for Telnet, FTP, SMTP, and rlogin services.

B. The Security Gateway first checks if there is any rule that does not require authentication for this type of connection before invoking the Authentication Security Server.

C. Once a user is first authenticated, the user will not be prompted for authentication again until logging out.

D. You can limit the authentication attempts in the User Properties' Authentication tab.

Browse 536 Q&As
Questions 6

Your users are defined in a Windows 2008 R2 Active Directory server. You must add LDAP users to a Client Authentication rule. Which kind of user group do you need in the Client Authentication rule in R80?

A. External-user group

B. LDAP group

C. A group with a generic user

D. All Users

Browse 536 Q&As
Questions 7

How many pre-defined exclusions are included by default in SmartEvent R80 as part of the product installation?

A. 5

B. 0

C. 10

D. 3

Browse 536 Q&As
Questions 8

What is the primary benefit of using the command upgrade_export over either backup or snapshot?

A. upgrade_export is operating system independent and can be used when backup or snapshot is not available.

B. upgrade_export will back up routing tables, hosts files, and manual ARP configurations, where backup and snapshot will not.

C. The commands backup and snapshot can take a long time to run whereas upgrade_export will take a much shorter amount of time.

D. upgrade_export has an option to back up the system and SmartView Tracker logs while backup and snapshot will not.

Browse 536 Q&As
Questions 9

Which operating systems are supported by a Check Point Security Gateway on an open server? Select MOST complete list.

A. Sun Solaris, Red Hat Enterprise Linux, Check Point SecurePlatform, IPSO, Microsoft Windows

B. Check Point GAiA and SecurePlatform, and Microsoft Windows

C. Check Point GAiA, Microsoft Windows, Red Hat Enterprise Linux, Sun Solaris, IPSO

D. Check Point GAiA and SecurePlatform, IPSO, Sun Solaris, Microsoft Windows

Browse 536 Q&As
Questions 10

In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies the type of traffic applicable to the chain module. For Stateful Mode configuration, chain modules marked with ___________ will not apply.

A. ffff

B. 1

C. 3

D. 2

Browse 536 Q&As
Questions 11

Fred is troubleshooting a NAT issue and wants to check to see if the inbound connection from his internal network is being translated across the interface in the firewall correctly. He decides to use the fw monitor to capture the traffic from the source 192.168.3.5 or the destination of 10.1.1.25 on his Security Gateway, Green that has an IP of 192.168.4.5. What command captures this traffic in a file that he can download and review with WireShark?

A. Expert@Green# fwmonitor -e “accept src=192.168.3.5 and dst=10.1.1.25;” -o monitor.out

B. Expert@Green# fw monitor -e “accept src=192.168.3.5 or dst=10.1.1.25;” -o monitor.out

C. Expert@Green# fwmonitor -e “accept src=192.168.3.5 or dst=10.1.1.25;” -o monitor.out

D. Expert@Green# fw monitor -e “accept src=192.168.4.5 or dst=10.1.1.25;” -o monitor.out

Browse 536 Q&As
Questions 12

Which command will reset the kernel debug options to default settings?

A. fw ctl dbg -a 0

B. fw ctl dbg resetall

C. fw ctl debug 0

D. fw ctl debug set 0

Browse 536 Q&As
Questions 13

Which web services protocol is used to communicate to the Check Point R80 identity Awareness Web APi?

A. SOAP

B. REST

C. XLANG

D. XML-RPC

Browse 536 Q&As
Questions 14

What is the limitation of employing Sticky Decision Function?

A. With SDF enabled, the involved VPN Gateways only supports IKEv1

B. Acceleration technologies, such as SecureXL and CoreXL are disabled when activating SDF

C. With SDF enabled, only ClusterXL in legacy mode is supported

D. With SDF enabled, you can only have three Sync interfaces at most

Browse 536 Q&As
Questions 15

Which of the SecureXL templates are enabled by default on Security Gateway?

A. Accept

B. Drop

C. NAT

D. None

Browse 536 Q&As
Questions 16

Which configuration file contains the structure of the Security Servers showing the port numbers, corresponding protocol name, and status?

A. $FWDIR/database/fwauthd.conf

B. $FWDIR/conf/fwauth.conf

C. $FWDIR/conf/fwauthd.conf

D. $FWDIR/state/fwauthd.conf

Browse 536 Q&As
Questions 17

The WebUI offers several methods for downloading hotfixes via CPUSE except:

A. Automatic

B. Force override

C. Manually

D. Scheduled

Browse 536 Q&As
Questions 18

Which TCP-port does CPM process listen to?

A. 18191

B. 18190

C. 8983

D. 19009

Browse 536 Q&As
Exam Code: 156-915.80
Exam Name: Check Point Certified Security Expert Update - R80.10
Last Update: Apr 20, 2024
Questions: 536 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99