Pass4itsure > CheckPoint > CCSE Update > 156-915.80 > 156-915.80 Online Practice Questions and Answers

156-915.80 Online Practice Questions and Answers

Questions 4

Charles requests a Website while using a computer not in the net_singapore network. What is TRUE about his location restriction?

A. Source setting in Source column always takes precedence.

B. Source setting in User Properties always takes precedence.

C. As location restrictions add up, he would be allowed from net_singapore and net_sydney.

D. It depends on how the User Auth object is configured; whether User Properties or Source Restriction takes precedence.

Buy Now
Questions 5

Study the Rule base and Client Authentication Action properties screen After being authenticated by the Security Gateway, when a user starts an HTTP connection to a Web site, the user tries to FTP to another site using the command line. What happens to the user? The:

A. user is prompted for authentication by the Security Gateway again.

B. FTP data connection is dropped after the user is authenticated successfully.

C. user is prompted to authenticate from that FTP site only, and does not need to enter his username and password for Client Authentication.

D. FTP connection is dropped by Rule 2.

Buy Now
Questions 6

What mechanism does a gateway configured with Identity Awareness and LDAP initially use to communicate with a Windows 2003 or 2008 server?

A. WMI

B. CIFS

C. RCP

D. LDAP

Buy Now
Questions 7

When migrating the SmartEvent data base from one server to another, the last step is to save the files on the new server. Which of the following commands should you run to save the SmartEvent data base files on the new server?

A. cp

B. restore

C. migrate import

D. eva_db_restore

Buy Now
Questions 8

Return oriented programming (ROP) exploits are detected by which security blade?

A. Check Point Anti-Virus / Threat Emulation

B. Intrusion Prevention Software

C. Application control

D. Data Loss Prevention

Buy Now
Questions 9

Using mgmt_cli, what is the correct syntax to import a host object called Server_1 from the CLI?

A. mgmt_cli add-host "Server_1" ip_ address "10.15.123.10" ?format txt

B. mgmt_ cli add host name "Server_ 1" ip-address "10.15.123.10" ?format json

C. mgmt_ cli add object-host "Server_ 1" ip-address "10.15.123.10" ?format json

D. mgmt_cli add object "Server_ 1" ip-address "10.15.123.10" ?format json

Buy Now
Questions 10

GAiA greatly increases operational efficiency by offering an advanced and intuitive software update agent, commonly referred to as the:

A. Check Point Upgrade Service Engine.

B. Check Point Software Update Agent

C. Check Point Remote Installation Daemon (CPRID)

D. Check Point Software Update Daemon

Buy Now
Questions 11

What can you do to see the current number of kernel instances in a system with CoreXL enabled?

A. Browse to Secure Platform Web GUI

B. Only Check Point support personnel can access that information

C. Execute SmarDashboard client

D. Execute command cpconfig

Buy Now
Questions 12

What Factors preclude Secure XL Templating?

A. Source Port Ranges/Encrypted Connections

B. IPS

C. ClusterXL in load sharing Mode

D. CoreXL

Buy Now
Questions 13

With MTA (Mail Transfer Agent) enabled the gateways manages SMTP traffic and holds external email with potentially malicious attachments. What is required in order to enable MTA (Mail Transfer Agent) functionality in the Security Gateway?

A. Threat Cloud Intelligence

B. Threat Prevention Software Blade Package

C. Endpoint Total Protection

D. Traffic on port 25

Buy Now
Exam Code: 156-915.80
Exam Name: Check Point Certified Security Expert Update - R80.10
Last Update: Dec 16, 2024
Questions: 536
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99