Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following 156-315.80 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-315.80 Exam Dumps - Check Point Certified Security Expert (CCSE) R80

Question # 4

To add a file to the Threat Prevention Whitelist, what two items are needed?

A.

File name and Gateway

B.

Object Name and MD5 signature

C.

MD5 signature and Gateway

D.

IP address of Management Server and Gateway

Full Access
Question # 5

According to out of the box SmartEvent policy, which blade will automatically be correlated into events?

A.

Firewall

B.

VPN

C.

IPS

D.

HTTPS

Full Access
Question # 6

Which of the following blades is NOT subscription-based and therefore does not have to be renewed on a regular basis?

A.

Application Control

B.

Threat Emulation

C.

Anti-Virus

D.

Advanced Networking Blade

Full Access
Question # 7

Which component is NOT required to communicate with the Web Services API?

A.

API key

B.

session ID token

C.

content-type

D.

Request payload

Full Access
Question # 8

Fill in the blanks: A _______ license requires an administrator to designate a gateway for attachment whereas a ________ license is automatically attached to a Security Gateway.

A.

Formal; corporate

B.

Local; formal

C.

Local; central

D.

Central; local

Full Access
Question # 9

What CLI command compiles and installs a Security Policy on the target’s Security Gateways?

A.

fwm compile

B.

fwm load

C.

fwm fetch

D.

fwm install

Full Access
Question # 10

Which Check Point daemon monitors the other daemons?

A.

fwm

B.

cpd

C.

cpwd

D.

fwssd

Full Access
Question # 11

Which command will allow you to see the interface status?

A.

cphaprob interface

B.

cphaprob –I interface

C.

cphaprob –a if

D.

cphaprob stat

Full Access
Question # 12

What are the blades of Threat Prevention?

A.

IPS, DLP, AntiVirus, AntiBot, Sandblast Threat Emulation/Extraction

B.

DLP, AntiVirus, QoS, AntiBot, Sandblast Threat Emulation/Extraction

C.

IPS, AntiVirus, AntiBot

D.

IPS, AntiVirus, AntiBot, Sandblast Threat Emulation/Extraction

Full Access
Question # 13

Which of the following is NOT supported by CPUSE?

A.

Automatic download of full installation and upgrade packages

B.

Automatic download of hotfixes

C.

Installation of private hotfixes

D.

Offline installations

Full Access
Question # 14

Which option, when applied to a rule, allows traffic to VPN gateways in specific VPN communities?

A.

All Connections (Clear or Encrypted)

B.

Accept all encrypted traffic

C.

Specific VPN Communities

D.

All Site-to-Site VPN Communities

Full Access
Question # 15

Which of the following is NOT a type of Endpoint Identity Agent?

A.

Terminal

B.

Light

C.

Full

D.

Custom

Full Access
Question # 16

The Firewall kernel is replicated multiple times, therefore:

A.

The Firewall kernel only touches the packet if the connection is accelerated

B.

The Firewall can run different policies per core

C.

The Firewall kernel is replicated only with new connections and deletes itself once the connection times out

D.

The Firewall can run the same policy on all cores.

Full Access
Question # 17

UserCheck objects in the Application Control and URL Filtering rules allow the gateway to communicate with the users. Which action is not supported in UserCheck objects?

A.

Ask

B.

Drop

C.

Inform

D.

Reject

Full Access
Question # 18

Which tool provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?

A.

ThreatWiki

B.

Whitelist Files

C.

AppWiki

D.

IPS Protections

Full Access
Question # 19

Ken wants to obtain a configuration lock from other administrator on R80 Security Management Server. He can do this via WebUI or via CLI.

Which command should he use in CLI? (Choose the correct answer.)

A.

remove database lock

B.

The database feature has one command lock database override.

C.

override database lock

D.

The database feature has two commands lock database override and unlock database. Both will work.

Full Access
Question # 20

Which one of the following is NOT a configurable Compliance Regulation?

A.

glba

B.

cjis

C.

soci

D.

ncipa

Full Access
Question # 21

What can we infer about the recent changes made to the Rule Base?

A.

Rule 7 was created by the ‘admin’ administrator in the current session

B.

8 changes have been made by administrators since the last policy installation

C.

The rules 1, 5 and 6 cannot be edited by the ‘admin’ administrator

D.

Rule 1 and object webserver are locked by another administrator

Full Access
Question # 22

What solution is Multi-queue intended to provide?

A.

Improve the efficiency of traffic handling by SecureXL SNDs

B.

Reduce the confusion for traffic capturing in FW Monitor

C.

Improve the efficiency of CoreXL Kernel Instances

D.

Reduce the performance of network interfaces

Full Access
Question # 23

Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.

A.

Symmetric routing

B.

Failovers

C.

Asymmetric routing

D.

Anti-Spoofing

Full Access
Question # 24

Which TCP-port does CPM process listen to?

A.

18191

B.

18190

C.

8983

D.

19009

Full Access
Question # 25

What is a best practice before starting to troubleshoot using the “fw monitor” tool?

A.

Run the command: fw monitor debug on

B.

Clear the connections table

C.

Disable CoreXL

D.

Disable SecureXL

Full Access
Question # 26

Which Check Point feature enables application scanning and the detection?

A.

Application Dictionary

B.

AppWiki

C.

Application Library

D.

CPApp

Full Access
Question # 27

SandBlast agent extends 0 day prevention to what part of the network?

A.

Web Browsers and user devices

B.

DMZ server

C.

Cloud

D.

Email servers

Full Access
Question # 28

From SecureXL perspective, what are the tree paths of traffic flow:

A.

Initial Path; Medium Path; Accelerated Path

B.

Layer Path; Blade Path; Rule Path

C.

Firewall Path; Accept Path; Drop Path

D.

Firewall Path; Accelerated Path; Medium Path

Full Access
Question # 29

After finishing installation admin John likes to use top command in expert mode. John has to set the expert-password and was able to use top command. A week later John has to use the top command again, He detected that the expert password is no longer valid. What is the most probable reason for this behavior?

A.

“write memory” was not issued on clish

B.

changes are only possible via SmartConsole

C.

“save config” was not issued in expert mode

D.

“save config” was not issued on clish

Full Access
Question # 30

Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?

A.

UserCheck

B.

Active Directory Query

C.

Account Unit Query

D.

User Directory Query

Full Access
Question # 31

Which of the following is NOT an option to calculate the traffic direction?

A.

Incoming

B.

Internal

C.

External

D.

Outgoing

Full Access
Question # 32

STION NO: 179

Security Checkup Summary can be easily conducted within:

A.

Summary

B.

Views

C.

Reports

D.

Checkups

Full Access
Question # 33

Which GUI client is supported in R80?

A.

SmartProvisioning

B.

SmartView Tracker

C.

SmartView Monitor

D.

SmartLog

Full Access
Question # 34

Which tool is used to enable ClusterXL?

A.

SmartUpdate

B.

cpconfig

C.

SmartConsole

D.

sysconfig

Full Access
Question # 35

Which of the following is NOT a component of Check Point Capsule?

A.

Capsule Docs

B.

Capsule Cloud

C.

Capsule Enterprise

D.

Capsule Workspace

Full Access
Question # 36

What ports are used for SmartConsole to connect to the Security Management Server?

A.

CPMl (18190)

B.

CPM (19009), CPMl (18190) https (443)

C.

CPM (19009). CPMl (18190) CPD (18191)

D.

ICA_Pull (18210), CPMl (18190) https (443)

Full Access
Question # 37

What are the different command sources that allow you to communicate with the API server?

A.

SmartView Monitor, API_cli Tool, Gaia CLI, Web Services

B.

SmartConsole GUI Console, mgmt_cli Tool, Gaia CLI, Web Services

C.

SmartConsole GUI Console, API_cli Tool, Gaia CLI, Web Services

D.

API_cli Tool, Gaia CLI, Web Services

Full Access
Question # 38

Which process handles connection from SmartConsole R80?

A.

fwm

B.

cpmd

C.

cpm

D.

cpd

Full Access
Question # 39

How many images are included with Check Point TE appliance in Recommended Mode?

A.

2(OS) images

B.

images are chosen by administrator during installation

C.

as many as licensed for

D.

the most new image

Full Access
Question # 40

Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?

A.

Dynamic ID

B.

RADIUS

C.

Username and Password

D.

Certificate

Full Access
Question # 41

Which utility allows you to configure the DHCP service on Gaia from the command line?

A.

ifconfig

B.

dhcp_ofg

C.

sysconfig

D.

cpconfig

Full Access
Question # 42

Which of these statements describes the Check Point ThreatCloud?

A.

Blocks or limits usage of web applications

B.

Prevents or controls access to web sites based on category

C.

Prevents Cloud vulnerability exploits

D.

A worldwide collaborative security network

Full Access
Question # 43

What state is the Management HA in when both members have different policies/databases?

A.

Synchronized

B.

Never been synchronized

C.

Lagging

D.

Collision

Full Access
Question # 44

When an encrypted packet is decrypted, where does this happen?

A.

Security policy

B.

Inbound chain

C.

Outbound chain

D.

Decryption is not supported

Full Access
Question # 45

When deploying SandBlast, how would a Threat Emulation appliance benefit from the integration of ThreatCloud?

A.

ThreatCloud is a database-related application which is located on-premise to preserve privacy of company-related data

B.

ThreatCloud is a collaboration platform for all the CheckPoint customers to form a virtual cloud consisting of a combination of all on-premise private cloud environments

C.

ThreatCloud is a collaboration platform for Check Point customers to benefit from VMWare ESXi infrastructure which supports the Threat Emulation Appliances as virtual machines in the EMC Cloud

D.

ThreatCloud is a collaboration platform for all the Check Point customers to share information about malicious and benign files that all of the customers can benefit from as it makes emulation of known files unnecessary

Full Access
Question # 46

Which statements below are CORRECT regarding Threat Prevention profiles in SmartDashboard?

A.

You can assign only one profile per gateway and a profile can be assigned to one rule Only.

B.

You can assign multiple profiles per gateway and a profile can be assigned to one rule only.

C.

You can assign multiple profiles per gateway and a profile can be assigned to one or more rules.

D.

You can assign only one profile per gateway and a profile can be assigned to one or more rules.

Full Access
Question # 47

You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?

A.

restore_backup

B.

import backup

C.

cp_merge

D.

migrate import

Full Access
Question # 48

Fill in the blank: The tool _____ generates a R80 Security Gateway configuration report.

A.

infoCP

B.

infoview

C.

cpinfo

D.

fw cpinfo

Full Access
Question # 49

What is the most ideal Synchronization Status for Security Management Server High Availability deployment?

A.

Lagging

B.

Synchronized

C.

Never been synchronized

D.

Collision

Full Access
Question # 50

Fill in the blanks: Gaia can be configured using the ______ or _____ .

A.

GaiaUI; command line interface

B.

WebUI; Gaia Interface

C.

Command line interface; WebUI

D.

Gaia Interface; GaiaUI

Full Access
Question # 51

: 131

Which command is used to display status information for various components?

A.

show all systems

B.

show system messages

C.

sysmess all

D.

show sysenv all

Full Access
Question # 52

Which of the following process pulls application monitoring status?

A.

fwd

B.

fwm

C.

cpwd

D.

cpd

Full Access
Question # 53

When simulating a problem on ClusterXL cluster with cphaprob –d STOP -s problem -t 0 register, to initiate a failover on an active cluster member, what command allows you remove the problematic state?

A.

cphaprob –d STOP unregister

B.

cphaprob STOP unregister

C.

cphaprob unregister STOP

D.

cphaprob –d unregister STOP

Full Access
Question # 54

What is the protocol and port used for Health Check and State Synchronization in ClusterXL?

A.

CCP and 18190

B.

CCP and 257

C.

CCP and 8116

D.

CPC and 8116

Full Access
Question # 55

Which is the correct order of a log flow processed by SmartEvent components?

A.

Firewall > Correlation Unit > Log Server > SmartEvent Server Database > SmartEvent Client

B.

Firewall > SmartEvent Server Database > Correlation Unit > Log Server > SmartEvent Client

C.

Firewall > Log Server > SmartEvent Server Database > Correlation Unit > SmartEvent Client

D.

Firewall > Log Server > Correlation Unit > SmartEvent Server Database > SmartEvent Client

Full Access
Question # 56

What API command below creates a new host with the name “New Host” and IP address of “192.168.0.10”?

A.

new host name “New Host” ip-address “192.168.0.10”

B.

set host name “New Host” ip-address “192.168.0.10”

C.

create host name “New Host” ip-address “192.168.0.10”

D.

add host name “New Host” ip-address “192.168.0.10”

Full Access
Question # 57

You can access the ThreatCloud Repository from:

A.

R80.10 SmartConsole and Application Wiki

B.

Threat Prevention and Threat Tools

C.

Threat Wiki and Check Point Website

D.

R80.10 SmartConsole and Threat Prevention

Full Access
Question # 58

NO: 240

You notice that your firewall is under a DDoS attack and would like to enable the Penalty Box feature, which command you use?

A.

sim erdos –e 1

B.

sim erdos – m 1

C.

sim erdos –v 1

D.

sim erdos –x 1

Full Access
Question # 59

Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?

A.

Run cprestart from clish

B.

After upgrading the hardware, increase the number of kernel instances using cpconfig

C.

Administrator does not need to perform any task. Check Point will make use of the newly installed CPU and Cores

D.

Hyperthreading must be enabled in the bios to use CoreXL

Full Access
Question # 60

When running a query on your logs, to find records for user Toni with machine IP of 10.0.4.210 but exclude her tablet IP of 10.0.4.76, which of the following query syntax would you use?

A.

Toni? AND 10.0.4.210 NOT 10.0.4.76

B.

To** AND 10.0.4.210 NOT 10.0.4.76

C.

Ton* AND 10.0.4.210 NOT 10.0.4.75

D.

"Toni" AND 10.0.4.210 NOT 10.0.4.76

Full Access
Question # 61

What is the minimum amount of RAM needed for a Threat Prevention Appliance?

A.

6 GB

B.

8GB with Gaia in 64-bit mode

C.

4 GB

D.

It depends on the number of software blades enabled

Full Access
Question # 62

Which of the following is NOT an alert option?

A.

SNMP

B.

High alert

C.

Mail

D.

User defined alert

Full Access
Question # 63

When users connect to the Mobile Access portal they are unable to open File Shares.

Which log file would you want to examine?

A.

cvpnd.elg

B.

httpd.elg

C.

vpnd.elg

D.

fw.elg

Full Access
Question # 64

SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day Protection?

A.

Smart Cloud Services

B.

Load Sharing Mode Services

C.

Threat Agent Solution

D.

Public Cloud Services

Full Access
Question # 65

What is not a purpose of the deployment of Check Point API?

A.

Execute an automated script to perform common tasks

B.

Create a customized GUI Client for manipulating the objects database

C.

Create products that use and enhance the Check Point solution

D.

Integrate Check Point products with 3rd party solution

Full Access
Question # 66

Which command lists firewall chain?

A.

fw chain module

B.

fw tab -t chainmod

C.

fwctl chain

D.

fw list chain

Full Access
Question # 67

Which of the SecureXL templates are enabled by default on Security Gateway?

A.

Accept

B.

Drop

C.

NAT

D.

None

Full Access
Question # 68

Which statement is true regarding redundancy?

A.

System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob –f if command.

B.

ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.

C.

Machines in a ClusterXL High Availability configuration must be synchronized.

D.

Both ClusterXL and VRRP are fully supported by Gaia and available to all Check Point appliances, open servers, and virtualized environments.

Full Access
Question # 69

Pamela is Cyber Security Engineer working for Global Instance Firm with large scale deployment of Check Point Enterprise Appliances using GAiA/R80.10. Company’s Developer Team is having random access issue to newly deployed Application Server in DMZ’s Application Server Farm Tier and blames DMZ Security Gateway as root cause. The ticket has been created and issue is at Pamela’s desk for an investigation. Pamela decides to use Check Point’s Packet Analyzer Tool-fw monitor to iron out the issue during approved Maintenance window.

What do you recommend as the best suggestion for Pamela to make sure she successfully captures entire traffic in context of Firewall and problematic traffic?

A.

Pamela should check SecureXL status on DMZ Security gateway and if it’s turned ON. She should turn OFF SecureXL before using fw monitor to avoid misleading traffic captures.

B.

Pamela should check SecureXL status on DMZ Security Gateway and if it’s turned OFF. She should turn ON SecureXL before using fw monitor to avoid misleading traffic captures.

C.

Pamela should use tcpdump over fw monitor tool as tcpdump works at OS-level and captures entire traffic.

D.

Pamela should use snoop over fw monitor tool as snoop works at NIC driver level and captures entire traffic.

Full Access