Vcehome > CheckPoint > CCSE > 156-315.80 > 156-315.80 Online Practice Questions and Answers

156-315.80 Online Practice Questions and Answers

Questions 4

You plan to automate creating new objects using new R80 Management API. You decide to use GAIA CLI for this task.

What is the first step to run management API commands on GAIA's shell?

A. mgmt_admin@teabag > id.txt

B. mgmt_login

C. login user admin password teabag

D. mgmt_cli login user "admin" password "teabag" > id.txt

Browse 483 Q&As
Questions 5

For Management High Availability, which of the following is NOT a valid synchronization status?

A. Collision

B. Down

C. Lagging

D. Never been synchronized

Browse 483 Q&As
Questions 6

To add a file to the Threat Prevention Whitelist, what two items are needed?

A. File name and Gateway

B. Object Name and MD5 signature

C. MD5 signature and Gateway

D. IP address of Management Server and Gateway

Browse 483 Q&As
Questions 7

Which of the following will NOT affect acceleration?

A. Connections destined to or originated from the Security gateway

B. A 5-tuple match

C. Multicast packets

D. Connections that have a Handler (ICMP, FTP, H.323, etc.)

Browse 483 Q&As
Questions 8

You need to change the number of firewall Instances used by CoreXL. How can you achieve this goal?

A. edit fwaffinity.conf; reboot required

B. cpconfig; reboot required

C. edit fwaffinity.conf; reboot not required

D. cpconfig; reboot not required

Browse 483 Q&As
Questions 9

When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?

A. None, Security Management Server would be installed by itself.

B. SmartConsole

C. SecureClient

D. Security Gateway

E. SmartEvent

Browse 483 Q&As
Questions 10

What is the least amount of CPU cores required to enable CoreXL?

A. 2

B. 1

C. 4

D. 6

Browse 483 Q&As
Questions 11

You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?

A. Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.

B. Create a separate Security Policy package for each remote Security Gateway.

C. Create network objects that restricts all applicable rules to only certain networks.

D. Run separate SmartConsole instances to login and configure each Security Gateway directly.

Browse 483 Q&As
Questions 12

Which of the following authentication methods ARE NOT used for Mobile Access?

A. RADIUS server

B. Username and password (internal, LDAP)

C. SecurID

D. TACACS+

Browse 483 Q&As
Questions 13

NAT rules are prioritized in which order?

1.

Automatic Static NAT

2.

Automatic Hide NAT

3.

Manual/Pre-Automatic NAT

4.

Post-Automatic/Manual NAT rules

A. 1, 2, 3, 4

B. 1, 4, 2, 3

C. 3, 1, 2, 4

D. 4, 3, 1, 2

Browse 483 Q&As
Exam Code: 156-315.80
Exam Name: Check Point Certified Security Expert (CCSE) R80
Last Update: May 09, 2024
Questions: 483 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99