Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following 156-915.80 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-915.80 Exam Dumps - Check Point Certified Security Expert Update - R80.10

Go to page:
Question # 57

What is the proper CLISH syntax to configure a default route via 192.168.255.1 in Gaia?

A.

setstatic-route default nexthop gateway address 192.168.255.1 priority 1 on

B.

set static-route 192.168.255.0/24 nexthop gateway logical eth1 on

C.

set static-route 192.168.255.0/24 nexthop gateway address 192.168.255.1 priority 1 on

D.

set static-route nexthop default gateway logical 192.168.255.1 priority 1 on

Full Access
Question # 58

SmartEvent provides a convenient way to run common command line executables that can assist ininvestigating events. Right-clicking the IP address, source or destination, in a event provides a list of default and customized commands. They appear only on cells that refer to IP addresses because the IP address of the active cell is used as the destination of the command when run. The default commands are:

A.

ping, traceroute, netstat, and route

B.

ping, nslookup, Telnet, and route

C.

ping, whois, nslookup, and Telnet

D.

ping, traceroute, netstat, and nslookup

Full Access
Question # 59

What are types of Check Point APIs available currently as part of R80.10 code?

A.

Security Gateway API, Management API, Threat Prevention API and Identity Awareness Web Services API

B.

Management API, Threat Prevention API, Identity Awareness Web Services API and OPSEC SDK API

C.

OSE API, OPSEC SDK API, Threat Extraction API and Policy Editor API

D.

CPMI API, Management API, Threat Prevention API and Identity Awareness Web Services API

Full Access
Question # 60

Return oriented programming (ROP) exploits are detected by which security blade?

A.

Check Point Anti-Virus / Threat Emulation

B.

Intrusion PreventionSoftware

C.

Application control

D.

Data Loss Prevention

Full Access
Question # 61

Fill in the blank: The R80 utility fw monitor is used to troubleshoot __________.

A.

User data basecorruption

B.

LDAP conflicts

C.

Traffic issues

D.

Phase two key negotiation

Full Access
Question # 62

Check Point recommends configuring Disk Space Management parameters to delete old log entities when available disk space is less than or equal to?

A.

50%

B.

75%

C.

80%

D.

15%

Full Access
Question # 63

What happens if the identity of a user is known?

A.

If the user credentials do not match an Access Role, the system displays the Captive Portal.

B.

If the user credentials do not match an Access Role, the system displays a sandbox.

C.

If the user credentials do not match an Access Role, the traffic is automatically dropped.

D.

If the user credentials match an Access Role, the rule is applied and traffic is accepted or dropped based on the defined action.

Full Access
Question # 64

Which command allows you to view the contents of an R80 table?

A.

fw tab -a

B.

fw tab-t

C.

fw tab -s

D.

fw tab -x

Full Access
Go to page: