Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following 156-915.80 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-915.80 Exam Dumps - Check Point Certified Security Expert Update - R80.10

Go to page:
Question # 25

Which of the following is the preferred method for adding static routes in GAiA?

A.

In the CLI with the command “route add”

B.

In Web Portal, under Network Management > IPv4 Static Routes

C.

In the CLI via sysconfig

D.

In SmartDashboard under Gateway Properties > Topology

Full Access
Question # 26

MultiCorp is located in Atlanta. It has a branch office in Europe, Asia, and Africa. Each location has its own AD controller for local user login. How many ADqueries have to be configured?

Full Access
Question # 27

Type the full fw command and syntax that allows you to disable only sync on a cluster firewall member.

Full Access
Question # 28

When do modifications to the Event Policy take effect?

A.

As soon as the Policy Tab window is closed.

B.

When saved on the SmartEvent Server and installed to the Correlation Units.

C.

When saved on the Correlation Units, and pushed as a policy.

D.

When saved on the SmartEvent Client, and installed on the SmartEvent Server.

Full Access
Question # 29

Can you implement a complete IPv6 deployment without IPv4 addresses?

A.

No. SmartCenter cannot be accessed from everywhere on the Internet.

B.

Yes. Only one TCP stack (IPv6 or IPv4) can be used at the same time.

C.

Yes, There is no requirement for managing IPv4 addresses.

D.

No. IPv4 addresses are required for management.

Full Access
Question # 30

You find that Users are not prompted for authentication when they access their Web servers, even though you havecreated an HTTP rule via User Authentication. Choose the BEST reason why.

A.

You checked the cache password on desktop option in Global Properties.

B.

Another rule that accepts HTTP without authentication exists in the Rule Base.

C.

You have forgotten to place the User Authentication Rule before the Stealth Rule.

D.

Users must use the SecuRemote Client, to use the User Authentication Rule.

Full Access
Question # 31

You are running a R80 Security Gateway on GAiA. In case of a hardware failure, you have a server with the exact same hardware and firewall version installed. What back up method could be used to quickly put the secondary firewall into production?

A.

manual backup

B.

upgrade_export

C.

backup

D.

snapshot

Full Access
Question # 32

Which of the following tools is used to generate a Security Gateway R80 configuration report?

A.

fw cpinfo

B.

infoCP

C.

cpinfo

D.

infoview

Full Access
Go to page: