Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following 156-915.80 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-915.80 Exam Dumps - Check Point Certified Security Expert Update - R80.10

Go to page:
Question # 41

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned an IP address 10.0.0.19 via DHCP.

John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop. He wants to move around the organization and continue to have access to the HR Web Server.

To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the policy.

2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.

Johnplugged in his laptop to the network on a different network segment and he is not able to connect. How does he solve this problem?

A.

John should install the Identity Awareness Agent

B.

The firewall admin should install the Security Policy

C.

John shouldlock and unlock the computer

D.

Investigate this as a network connectivity issue

Full Access
Question # 42

When simulating a problem on CLusterXL cluster with cphaprob –d STOP –s problem –t 0 register, to initiate a failover on an active cluster member, what command allows you remove the problematic state?

A.

cphaprob –d STOP unregister

B.

cphaprob STOP unregister

C.

cphaprob unregister STOP

D.

cphaprob –d unregister STOP

Full Access
Question # 43

To findrecords in the logs that shows log records from the Application & URL Filtering Software Blade where traffic was blocked, what would be the query syntax?

A.

blade: application control AND action:block

B.

blade; “application control” AND action;block

C.

(blade: application control AND action;block)

D.

blade: “application control” AND action:block

Full Access
Question # 44

Fill in the blank: The tool___________ generates a R80 Security Gateway configuration report.

A.

infoCP

B.

infoview

C.

cpinfo

D.

fw cpinfo

Full Access
Question # 45

Which command will allow you to see the interface status?

A.

cphaprob interface

B.

cphaprob –l interface

C.

cphaprob –a if

D.

cphaprob stat

Full Access
Question # 46

Identify the API that is not supported by Check Point currently.

A.

R80 Management API-

B.

Identify Awareness Web Services API

C.

Open REST API

D.

OPSEC SDK

Full Access
Question # 47

How many images are included with Check Point TE appliance in Recommended Mode?

A.

2 (OS) images

B.

Images are chosen by administrator during installation

C.

as many as licensed for

D.

the most new image

Full Access
Question # 48

John is using Management HA. Which Smartcenter should be connected to for marking changes?

A.

secondary Smartcenter

B.

active SmartConsole

C.

connect virtual IP of Smartcenter HA

D.

Primary Log Server

Full Access
Go to page: