CheckPoint Check Point Certified Security Expert - R80 - 156-315.80 Exam Practice Test

SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?

Correct Answer: B
Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?

Correct Answer: D
If there are two administration logged in at the same time to the SmartConsole, and there are objects locked for editing, what must be done to make them available or other administrators? (Choose the BEST answer.)

Correct Answer: D
Which utility allows you to configure the DHCP service on Gaia from the command line?

Correct Answer: D
What are the two high availability modes?

Correct Answer: D
Which of the following is NOT an option to calculate the traffic direction?

Correct Answer: B
GAiA Software update packages can be imported and installed offline in situation where:

Correct Answer: C
What are types of Check Point APIs available currently as part of R80.10 code?

Correct Answer: D
Which statement is correct about the Sticky Decision Function?

Correct Answer: D
If SecureXL is disabled which path is used to process traffic?

Correct Answer: A
What is the main difference between Threat Extraction and Threat Emulation?

Correct Answer: D
Joey wants to upgrade from R75.40 to R80 version of Security management. He will use Advanced Upgrade with Database Migration method to achieve this.
What is one of the requirements for his success?

Correct Answer: C
By default how often updates are checked when the CPUSE Software Updates Policy is set to Automatic?

Correct Answer: A
Explanation: (Only visible to Fast2test members)
You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?

Correct Answer: D
Please choose correct command to add an "emailserver1" host with IP address 10.50.23.90 using GAiA management CLI?

Correct Answer: A
Which one of the following is true about Threat Emulation?

Correct Answer: D
SandBlast agent extends 0 day prevention to what part of the network?

Correct Answer: B
At what point is the Internal Certificate Authority (ICA) created?

Correct Answer: B
Which command is used to obtain the configuration lock in Gaia?

Correct Answer: D
In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?

Correct Answer: A
For Management High Availability, which of the following is NOT a valid synchronization status?

Correct Answer: C
What are the methods of SandBlast Threat Emulation deployment?

Correct Answer: A
VPN Link Selection will perform the following when the primary VPN link goes down?

Correct Answer: C
What is the mechanism behind Threat Extraction?

Correct Answer: D
To optimize Rule Base efficiency, the most hit rules should be where?

Correct Answer: A
Check Point APIs allow system engineers and developers to make changes to their organization's security policy with CLI tools and Web Services for all the following except:

Correct Answer: A
SecureXL improves non-encrypted firewall traffic throughput and encrypted VPN traffic throughput.

Correct Answer: A
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?

Correct Answer: C
What command verifies that the API server is responding?

Correct Answer: A
Your manager asked you to check the status of SecureXL, and its enabled templates and features. What command will you use to provide such information to manager?

Correct Answer: A
If an administrator wants to add manual NAT for addresses now owned by the Check Point firewall, what else is necessary to be completed for it to function properly?

Correct Answer: B
You want to store the GAIA configuration in a file for later reference. What command should you use?

Correct Answer: B

Contact Us

If you have any question please leave me your email address, we will reply and send email to you in 12 hours.

Our Working Time: ( GMT 0:00-15:00 ) From Monday to Saturday

Support: Contact now 

日本語 Deutsch 繁体中文 한국어