Check Point 156-915.80 Exam Questions and Answers 2021

Cause all that matters here is passing exam with 156-915.80 Exam Dumps. Cause all that you need is a high score of 156-915.80 Exam Questions and Answers. The only one thing you need to do is downloading 156-915.80 Dumps free now. We will not let you down with our money-back guarantee.

Also have 156-915.80 free dumps questions for you:

NEW QUESTION 1
Type the command and syntax to configure the Cluster Control Protocol (CCP) to use Broadcast.

    Answer:

    Explanation: cphaconf set_ccp broadcast

    NEW QUESTION 2
    Type the command and syntax you would use to verify that your Check Point cluster is functioning correctly. Answer:
    cphaprob state

      Answer:

      NEW QUESTION 3
      You are MegaCorp’s Security Administrator. There are various network objects which must be NATed. Some of them use the Automatic Hide NAT method, while others use the Automatic Static NAT method. What is the rule order if both methods are used together? Give the BEST answer.

      • A. The Administrator decides the rule order by shifting the corresponding rules up and down.
      • B. The Static NAT rules have priority over the Hide NAT rules and the NAT on a node has priority over the NAT on a network or an address range.
      • C. The Hide NAT rules have priority over the Static NAT rules and the NAT on a node has priority over the NAT on a network or an address range.
      • D. The rule position depends on the time of their creatio
      • E. The rules created first are placed at the top; rules created later are placed successively below the others.

      Answer: B

      NEW QUESTION 4
      Fill in the blank. The command that typically generates the firewall application, operating system, and hardware specific drivers is .

        Answer:

        Explanation: snapshot

        NEW QUESTION 5
        Before upgrading SecurePlatform to GAiA, you should create a backup. To save time, many administrators use the command backup. This creates a backup of the Check Point configuration as well as the system configuration.
        An administrator has installed the latest HFA on the system for fixing traffic problem after creating a backup file. There is a mistake in the very complex static routing configuration. The Check Point configuration has not been changed. Can the administrator use a restore to fix the errors in static routing?

        • A. The restore is not possible because the backup file does not have the same build number (version).
        • B. The restore is done by selecting Snapshot Management from the boot menu of GAiA.
        • C. The restore can be done easily by the command restore and copying netconf.C from the production environment.
        • D. A backup cannot be restored, because the binary files are missing.

        Answer: C

        NEW QUESTION 6
        Select the command set best used to verify proper failover function of a new ClusterXL configuration.

        • A. reboot
        • B. cphaprob -d failDevice -s problem -t 0 register / cphaprob -d failDevice unregister
        • C. clusterXL_admin down / clusterXL_admin up
        • D. cpstop/cpstart

        Answer: C

        NEW QUESTION 7
        Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use her iPad to access the internal Finance Web server. Because the iPad is not a member of the Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter her AD credentials in the Captive Portal and then get the same access as on her office computer. Her access to resources is based on rules in the R80 Firewall Rule Base.
        To make this scenario work, the IT administrator must:
        1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity Sources.
        2) In the Portal Settings window in the User Access section, make sure that Name and password login is selected.
        3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network destinations. Select accept as the Action.
        Ms. McHanry tries to access the resource but is unable. What should she do?

        • A. Have the security administrator select the Action field of the Firewall Rule “Redirect HTTP connections to an authentication (captive) portal”
        • B. Have the security administrator reboot the firewall
        • C. Have the security administrator select Any for the Machines tab in the appropriate Access Role
        • D. Install the Identity Awareness agent on her iPad

        Answer: A

        NEW QUESTION 8
        What type of traffic can be re-directed to the Captive Portal?

        • A. SMTP
        • B. HTTP
        • C. All of the above
        • D. FTP

        Answer: B

        NEW QUESTION 9
        You want to generate a cpinfo file via CLI on a system running GAiA. This will take about 40 minutes since the log files are also needed. What action do you need to take regarding timeout?

        • A. No action is needed because cpshell has a timeout of one hour by default.
        • B. Log in as the default user expert and start cpinfo.
        • C. Log in as admin, switch to expert mode, set the timeout to one hour with the command, idle 60, then start cpinfo.
        • D. Log in as Administrator, set the timeout to one hour with the command idle 60 and start cpinfo.

        Answer: D

        NEW QUESTION 10
        Fill in the blank. What is the correct command and syntax used to view a connection table summary on a Check Point Firewall?

          Answer:

          Explanation: fw tab -t connections -s

          NEW QUESTION 11
          Which command shows the current connections distributed by CoreXL FW instances?

          • A. fw ctl multik stat
          • B. fw ctl affinity –l
          • C. fw ctl instances –v
          • D. fw ctl iflist

          Answer: A

          Explanation: The fw ctl multik stat and fw6ctl multik stat (multi-kernel statistics) commands show information for eac kernel instance. The state and processing core number of each instance is displayed, along with:

          NEW QUESTION 12
          What mechanism does a gateway configured with Identity Awareness and LDAP initially use to communicate with a Windows 2003 or 2008 server?

          • A. WMI
          • B. CIFS
          • C. RCP
          • D. LDAP

          Answer: A

          NEW QUESTION 13
          You have three Gateways in a mesh community. Each gateway’s VPN Domain is their internal network as defined on the Topology tab setting All IP Addresses behind Gateway based on Topology information.
          You want to test the route-based VPN, so you created VTIs among the Gateways and created static route entries for the VTIs. However, when you test the VPN, you find out the VPN still go through the regular domain IPsec tunnels instead of the routed VTI tunnels.
          What is the problem and how do you make the VPN use the VTI tunnels?

          • A. Domain VPN takes precedence over the route-based VT
          • B. To make the VPN go through VTI, remove the Gateways out of the mesh community and replace with a star community
          • C. Domain VPN takes precedence over the route-based VT
          • D. To make the VPN go through VTI, use an empty group object as each Gateway’s VPN Domain
          • E. Route-based VTI takes precedence over the Domain VP
          • F. To make the VPN go through VTI, use dynamic-routing protocol like OSPF or BGP to route the VTI address to the peer instead of static routes
          • G. Route-based VTI takes precedence over the Domain VP
          • H. Troubleshoot the static route entries to insure that they are correctly pointing to the VTI gateway IP.

          Answer: B

          NEW QUESTION 14
          Which is a suitable command to check whether Drop Templates are activated or not?

          • A. fw ctl get int activate _drop_ templates
          • B. fwaccel stat
          • C. fwaccel stats
          • D. fw ctl templates –d

          Answer: B

          NEW QUESTION 15
          What is the responsibility of SOLR process on R80.10 management server?

          • A. Validating all data before it’s written into the database
          • B. It generates indexes of data written to the database
          • C. Communication between SmartConsole applications and the Security Management Server
          • D. Writing all information into the database

          Answer: B

          NEW QUESTION 16
          What is the command to show SecureXL status?

          • A. fwaccel status
          • B. fwaccel stats –m
          • C. fwaccel –s
          • D. fwaccel stat

          Answer: D

          Explanation: To check overall SecureXL status: [Expert@HostName]# fwaccel stat

          P.S. Easily pass 156-915.80 Exam with 303 Q&As Certshared Dumps & pdf Version, Welcome to Download the Newest Certshared 156-915.80 Dumps: https://www.certshared.com/exam/156-915.80/ (303 New Questions)