Check Point 156-915.80 Exam Questions 2021

156-915.80 Dumps for Check Point certification, Real Success Guaranteed with Updated 156-915.80 Exam Dumps. 100% PASS 156-915.80 Check Point Certified Security Expert Update - R80 exam Today!

Also have 156-915.80 free dumps questions for you:

NEW QUESTION 1
You are investigating issues with two gateway cluster members that are not able to establish the first initial cluster synchronization. What service is used by the FWD daemon to do a Full Synchronization?

  • A. TCP port 443
  • B. TCP port 257
  • C. TCP port 256
  • D. UDP port 8116

Answer: C

Explanation: Synchronization works in two modes:
Full sync is used for initial transfers of state information, for many thousands of connections. If a cluster member is brought up after being down, it will perform full sync. After all members are synchronized, only updates are transferred via delta sync. Delta sync is quicker than full sync.
References:

NEW QUESTION 2
Fill in the blank.
156-915.80 dumps exhibit
In New Mode HA, the internal cluster IP VIP address is 10.4.8.3. An internal host 10.4.8.108 successfully pings its Cluster and receives replies. Review the ARP table from the internal Windows host 10.4.8.108. Based on this information, what is the active cluster member’s IP address?

    Answer:

    Explanation: 10.4.8.2

    NEW QUESTION 3
    To bind a NIC to a single processor when using CoreXL on GAiA, you would use the command

      Answer:

      Explanation: sim affinity

      NEW QUESTION 4
      What is the SOLR database for?

      • A. Used for full text search and enables powerful matching capabilities
      • B. Writes data to the database and full text search
      • C. Serves GUI responsible to transfer request to the DLEserver
      • D. Enables powerful matching capabilities and writes data to the database

      Answer: A

      NEW QUESTION 5
      What is mandatory for ClusterXL to work properly?

      • A. The number of cores must be the same on every participating cluster node
      • B. The Magic MAC number must be unique per cluster node.
      • C. The Sync Interface must not have an IP address configured
      • D. If you have “Non-monitored Private” interfaces, the number of those interfaces must be the same on all cluster members

      Answer: B

      NEW QUESTION 6
      When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?

      • A. None, Security Management Server would be installed by itself
      • B. SmartConsole
      • C. SecureClient
      • D. SmartEvent

      Answer: D

      NEW QUESTION 7
      Which command allows you to view the contents of an R80 table?

      • A. fw tab -a <tablename>
      • B. fw tab -t <tablename>
      • C. fw tab -s <tablename>
      • D. fw tab -x <tablename>

      Answer: B

      NEW QUESTION 8
      What command syntax would you use to turn on PDP logging in a distributed environment?

      • A. pdp track=1
      • B. pdp tracker on
      • C. pdp logging on
      • D. pdp log=1

      Answer: B

      NEW QUESTION 9
      What GUI client would you use to view an IPS packet capture?

      • A. SmartView Monitor
      • B. SmartView Tracker
      • C. Smart Update
      • D. Smart Reporter

      Answer: B

      NEW QUESTION 10
      Review the rules.
      156-915.80 dumps exhibit
      Assume domain UDP is enabled in the impled rules.
      What happens when a user from the internal network tries to browse to the internet using HTTP? The user:

      • A. can connect to the Internet successfully after being authenticated.
      • B. is prompted three times before connecting to the Internet successfully.
      • C. can go to the Internet after Telnetting to the client authentication daemon port 259.
      • D. can go to the Internet, without being prompted for authentication.

      Answer: D

      NEW QUESTION 11
      Your organization’s disaster recovery plan needs an update to the backup and restore section to reap the new distributed R80 installation benefits. Your plan must meet the following required and desired objectives:
      Required Objective: The Security Policy repository must be backed up no less frequently than every 24 hours. Desired Objective: The R80 components that enforce the Security Policies should be backed up at least once a week.
      Desired Objective: Back up R80 logs at least once a week. Your disaster recovery plan is as follows:
      - Use the cron utility to run the command upgrade_export each night on the Security Management Servers.
      - Configure the organization's routine back up software to back up the files created by the command upgrade_export.
      - Configure the GAiA back up utility to back up the Security Gateways every Saturday night.
      - Use the cron utility to run the command upgrade_export each Saturday night on the log servers.
      - Configure an automatic, nightly logswitch.
      - Configure the organization's routine back up software to back up the switched logs every night. Upon evaluation, your plan:

      • A. Meets the required objective and only one desired objective.
      • B. Meets the required objective but does not meet either desired objective.
      • C. Does not meet the required objective.
      • D. Meets the required objective and both desired objectives.

      Answer: D

      NEW QUESTION 12
      Type the full fw command and syntax that will show full synchronization status.

        Answer:

        Explanation: fw ctl pstat

        NEW QUESTION 13
        When configuring numbered VPN Tunnel Interfaces (VTIs) in a clustered environment, what issues need to be considered?
        1) Each member must have a unique source IP address.
        2) Every interface on each member requires a unique IP address.
        3) All VTI's going to the same remote peer must have the same name.
        4) Cluster IP addresses are required.

        • A. 1, 2, and 4
        • B. 2 and 3
        • C. 1, 2, 3 and 4
        • D. 1, 3, and 4

        Answer: C

        NEW QUESTION 14
        Match the VPN-related terms with their definitions. Each correct term is only used once. Exhibit:
        156-915.80 dumps exhibit

        • A. A-3, B-4, C-1, D-5
        • B. A-4, B-3, C-5, D-2
        • C. A-2, B-5, C-4, D-1
        • D. A-3, B-2, C-1, D-4

        Answer: B

        NEW QUESTION 15
        Where do you verify that UserDirectory is enabled?

        • A. Verify that Security Gateway > General Properties > Authentication > Use UserDirectory (LDAP) for Security Gateways is checked
        • B. Verify that Global Properties > Authentication > Use UserDirectory (LDAP) for Security Gateways is checked
        • C. Verify that Security Gateway > General Properties > UserDirectory (LDAP) > Use UserDirectory (LDAP) for Security Gateways is checked
        • D. Verify that Global Properties > UserDirectory (LDAP) > Use UserDirectory (LDAP) for Security Gateways is checked

        Answer: D

        NEW QUESTION 16
        Fill in the blanks. To view the number of concurrent connections going through core 0 on the firewall, you would use the command and syntax ______

          Answer:

          Explanation: fw –i 0 tab –t connections –s

          P.S. Easily pass 156-915.80 Exam with 303 Q&As Certshared Dumps & pdf Version, Welcome to Download the Newest Certshared 156-915.80 Dumps: https://www.certshared.com/exam/156-915.80/ (303 New Questions)