New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following 156-315.80 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-315.80 Exam Dumps - Check Point Certified Security Expert (CCSE) R80

Go to page:
Question # 41

Which utility allows you to configure the DHCP service on Gaia from the command line?

A.

ifconfig

B.

dhcp_ofg

C.

sysconfig

D.

cpconfig

Full Access
Question # 42

Which of these statements describes the Check Point ThreatCloud?

A.

Blocks or limits usage of web applications

B.

Prevents or controls access to web sites based on category

C.

Prevents Cloud vulnerability exploits

D.

A worldwide collaborative security network

Full Access
Question # 43

What state is the Management HA in when both members have different policies/databases?

A.

Synchronized

B.

Never been synchronized

C.

Lagging

D.

Collision

Full Access
Question # 44

When an encrypted packet is decrypted, where does this happen?

A.

Security policy

B.

Inbound chain

C.

Outbound chain

D.

Decryption is not supported

Full Access
Question # 45

When deploying SandBlast, how would a Threat Emulation appliance benefit from the integration of ThreatCloud?

A.

ThreatCloud is a database-related application which is located on-premise to preserve privacy of company-related data

B.

ThreatCloud is a collaboration platform for all the CheckPoint customers to form a virtual cloud consisting of a combination of all on-premise private cloud environments

C.

ThreatCloud is a collaboration platform for Check Point customers to benefit from VMWare ESXi infrastructure which supports the Threat Emulation Appliances as virtual machines in the EMC Cloud

D.

ThreatCloud is a collaboration platform for all the Check Point customers to share information about malicious and benign files that all of the customers can benefit from as it makes emulation of known files unnecessary

Full Access
Question # 46

Which statements below are CORRECT regarding Threat Prevention profiles in SmartDashboard?

A.

You can assign only one profile per gateway and a profile can be assigned to one rule Only.

B.

You can assign multiple profiles per gateway and a profile can be assigned to one rule only.

C.

You can assign multiple profiles per gateway and a profile can be assigned to one or more rules.

D.

You can assign only one profile per gateway and a profile can be assigned to one or more rules.

Full Access
Question # 47

You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?

A.

restore_backup

B.

import backup

C.

cp_merge

D.

migrate import

Full Access
Question # 48

Fill in the blank: The tool _____ generates a R80 Security Gateway configuration report.

A.

infoCP

B.

infoview

C.

cpinfo

D.

fw cpinfo

Full Access
Go to page: