Download Checkpoint.156-915.80.PracticeTest.2019-04-01.105q.vcex

Download Exam

File Info

Exam CCSE Update R80
Number 156-915.80
File Name Checkpoint.156-915.80.PracticeTest.2019-04-01.105q.vcex
Size 100 KB
Posted Apr 01, 2019
Download Checkpoint.156-915.80.PracticeTest.2019-04-01.105q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

What is the port used for SmartConsole to connect to the Security Management Server:


  1. CPMI port 18191/TCP
  2. CPM port / TCP port 19009
  3. SIC port 18191/TCP
  4. https port 4434/TCP
Correct answer: A



Question 2

Which is the correct order of a log flow processed by SmartEvents components:


  1. Firewall > Correlation Unit > Log Server > SmartEvent Server Database > SmartEvent Client
  2. Firewall > SmartEvent Server Database > Correlation unit > Log Server > SmartEvent Client
  3. Firewall > Log Server > SmartEvent Server Database > Correlation Unit > SmartEvent Client
  4. Firewall > Log Server > Correlation Unit > SmartEvent Server Database > SmartEvent Client
Correct answer: D
Explanation:



Question 3

In SmartEvent, what are the different types of automatic reactions that the administrator can configure?


  1. Mail, Block Source, Block Event Activity, External Script, SNMP Trap
  2. Mail, Block Source, Block Destination, Block Services, SNMP Trap
  3. Mail, Block Source, Block Destination, External Script, SNMP Trap
  4. Mail, Block Source, Block Event Activity, Packet Capture, SNMP Trap
Correct answer: A
Explanation:
These are the types of Automatic Reactions:Mail - tell an administrator by email that the event occurred. See Create a Mail Reaction. Block Source - instruct the Security Gateway to block the source IP address from which this event was detected for a configurable period of time . Select a period of time from one minute to more than three weeks. See Create a Block Source Reaction Block Event activity - instruct the Security Gateway to block a distributed attack that emanates from multiple sources, or attacks multiple destinations for a configurable period of time. Select a period of time from one minute to more than three weeks). See Create a Block Event Activity Reaction. External Script - run a script that you provide. See Creating an External Script Automatic Reaction to write a script that can exploit SmartEvent data. SNMP Trap - generate an SNMP Trap. See Create an SNMP Trap Reaction. Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_LoggingAndMonitoring/html_frameset.htm?topic=documents/R80/CP_R80_LoggingAndMonitoring/131915
These are the types of Automatic Reactions:
  • Mail - tell an administrator by email that the event occurred. See Create a Mail Reaction. 
  • Block Source - instruct the Security Gateway to block the source IP address from which this event was detected for a configurable period of time . Select a 
    period of time from one minute to more than three weeks. See Create a Block Source Reaction 
  • Block Event activity - instruct the Security Gateway to block a distributed attack that emanates from multiple sources, or attacks multiple destinations for a 
    configurable period of time. Select a period of time from one minute to more than three weeks). See Create a Block Event Activity Reaction. 
  • External Script - run a script that you provide. See Creating an External Script Automatic Reaction to write a script that can exploit SmartEvent data. 
  • SNMP Trap - generate an SNMP Trap. See Create an SNMP Trap Reaction. 
Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_LoggingAndMonitoring/html_frameset.htm?topic=documents/R80/
CP_R80_LoggingAndMonitoring/131915



Question 4

In R80.10, how do you manage your Mobile Access Policy?


  1. Through the Unified Policy
  2. Through the Mobile Console
  3. From SmartDashboard
  4. From the Dedicated Mobility Tab
Correct answer: C
Explanation:
Reference: http://dl3.checkpoint.com/paid/f7/f78b067c6838c747e1568f139b6e6e8d/CP_R80.10_MobileAccess_AdminGuide.pdf?HashKey=1522170407_805ae0a295fd6664fa23700cc1482686&xtn=.pdf
Reference: http://dl3.checkpoint.com/paid/f7/f78b067c6838c747e1568f139b6e6e8d/CP_R80.10_MobileAccess_AdminGuide.pdf?
HashKey=1522170407_805ae0a295fd6664fa23700cc1482686&xtn=.pdf



Question 5

Which one of the following is true about Threat Emulation?


  1. Takes less than a second to complete
  2. Works on MS Office and PDF files only
  3. Always delivers a file
  4. Takes minutes to complete (less than 3 minutes)
Correct answer: D



Question 6

The “MAC magic” value must be modified under the following condition:


  1. There is more than one cluster connected to the same VLAN
  2. A firewall cluster is configured to use Multicast for CCP traffic
  3. There are more than two members in a firewall cluster
  4. A firewall cluster is configured to use Broadcast for CCP traffic
Correct answer: D
Explanation:
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk25977
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk25977



Question 7

Which statement is true regarding redundancy?


  1. System Administrator know when their cluster has failed over and can also see why it failed over by using the cphaprob f it command.
  2. ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.
  3. Machines in a Cluster XL High Availability configuration must be synchronized. 
  4. Both Cluster XL and VRRP are fully supported by Gaia and available to all Check Point appliances, open servers, and virtualized environments.
Correct answer: D
Explanation:
Reference: https://www.checkpoint.com/download/public-files/gaia-technical-brief.pdf page 5
Reference: https://www.checkpoint.com/download/public-files/gaia-technical-brief.pdf page 5



Question 8

Vanessa is expecting a very important Security Report. The Document should be sent as an attachment via e-mail. An e-mail with Security_ report.pdf file was delivered to her e-mail inbox. When she opened the PDF file, she noticed that the file is basically empty and only few lines of text are in it. The report is missing some graphs, tables and links. Which component of SandBlast protection is her company using on a Gateway?


  1. SandBlast Threat Emulation
  2. SandBlast Agent
  3. Check Point Protect
  4. SandBlast Threat Extraction
Correct answer: D



Question 9

What is the SOLR database for?


  1. Used for full text search and enables powerful matching capabilities
  2. Writes data to the database and full text search
  3. Serves GUI responsible to transfer request to the DLEserver
  4. Enables powerful matching capabilities and writes data to the database
Correct answer: A
Explanation:



Question 10

What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?


  1. Stateful Mode
  2. VPN Routing Mode
  3. Wire Mode
  4. Stateless Mode
Correct answer: C
Explanation:
Wire Mode is a VPN-1 NGX feature that enables VPN connections to successfully fail over, bypassing Security Gateway enforcement. This improves performance and reduces downtime. Based on a trusted source and destination, Wire Mode uses internal interfaces and VPN Communities to maintain a private and secure VPN session, without employing Stateful Inspection. Since Stateful Inspection no longer takes place, dynamic-routing protocols that do not survive state verification in non-Wire Mode configurations can now be deployed. The VPN connection is no different from any other connections along a dedicated wire, thus the meaning of "Wire Mode". Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk30974
Wire Mode is a VPN-1 NGX feature that enables VPN connections to successfully fail over, bypassing Security Gateway enforcement. This improves performance and reduces downtime. Based on a trusted source and destination, Wire Mode uses internal interfaces and VPN Communities to maintain a private and secure VPN session, without employing Stateful Inspection. Since Stateful Inspection no longer takes place, dynamic-routing protocols that do not survive state verification in non-Wire Mode configurations can now be deployed. The VPN connection is no different from any other connections along a dedicated wire, thus the meaning of "Wire Mode". 
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk30974









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files