Checkpoint 156-315.80 Exam Practice Questions (P. 3)
- Full Access (479 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
Which command is used to set the CCP protocol to Multicast?
- Acphaprob set_ccp multicast
- Bcphaconf set_ccp multicastMost Voted
- Ccphaconf set_ccp no_broadcast
- Dcphaprob set_ccp no_broadcast
Correct Answer:
B
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk20576
B
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk20576
send
light_mode
delete
Question #22
Which packet info is ignored with Session Rate Acceleration?
- Asource port ranges
- Bsource ip
- Csource portMost Voted
- Dsame info from Packet Acceleration is used
Correct Answer:
C
Reference:
http://trlj.blogspot.com/2015/10/check-point-acceleration.html
C
Reference:
http://trlj.blogspot.com/2015/10/check-point-acceleration.html
send
light_mode
delete
Question #23
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?
- ASynchronizedMost Voted
- BNever been synchronized
- CLagging
- DCollision
Correct Answer:
D
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/CP_R80_SecMGMT/120712
D
Reference:
https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/CP_R80_SecMGMT/120712
send
light_mode
delete
Question #24
During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?
- AHost having a Critical event found by Threat Emulation
- BHost having a Critical event found by IPS
- CHost having a Critical event found by Antivirus
- DHost having a Critical event found by Anti-BotMost Voted
Correct Answer:
D
D
send
light_mode
delete
Question #25
In R80 spoofing is defined as a method of:
- ADisguising an illegal IP address behind an authorized IP address through Port Address Translation.
- BHiding your firewall from unauthorized users.
- CDetecting people using false or wrong authentication logins
- DMaking packets appear as if they come from an authorized IP address.
Correct Answer:
D
IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack connections to your network. Attackers use IP spoofing to send malware and bots to your protected network, to execute DoS attacks, or to gain unauthorized access.
Reference:
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/Preventing-IP-
Spoofing.htm
D
IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack connections to your network. Attackers use IP spoofing to send malware and bots to your protected network, to execute DoS attacks, or to gain unauthorized access.
Reference:
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/Preventing-IP-
Spoofing.htm
send
light_mode
delete
Question #26
Connections to the Check Point R80 Web API use what protocol?
send
light_mode
delete
Question #27
Which command lists all tables in Gaia?
send
light_mode
delete
Question #28
What is true about the IPS-Blade?
- AIn R80, IPS is managed by the Threat Prevention Policy
- BIn R80, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict
- CIn R80, IPS Exceptions cannot be attached to ג€all rulesג€
- DIn R80, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same
Correct Answer:
A
A
send
light_mode
delete
Question #29
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
- ADetects and blocks malware by correlating multiple detection engines before users are affected.
- BConfigure rules to limit the available network bandwidth for specified users or groups.
- CUse UserCheck to help users understand that certain websites are against the company's security policy.
- DMake rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.
Correct Answer:
A
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_AppControl_WebAdmin/60902.htm
A
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_AppControl_WebAdmin/60902.htm
send
light_mode
delete
Question #30
What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?
- AStateful Mode
- BVPN Routing Mode
- CWire Mode
- DStateless Mode
Correct Answer:
C
Wire Mode is a VPN-1 NGX feature that enables VPN connections to successfully fail over, bypassing Security Gateway enforcement. This improves performance and reduces downtime. Based on a trusted source and destination, Wire Mode uses internal interfaces and VPN Communities to maintain a private and secure
VPN session, without employing Stateful Inspection. Since Stateful Inspection no longer takes place, dynamic-routing protocols that do not survive state verification in non-Wire Mode configurations can now be deployed. The VPN connection is no different from any other connections along a dedicated wire, thus the meaning of "Wire Mode".
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk30974
C
Wire Mode is a VPN-1 NGX feature that enables VPN connections to successfully fail over, bypassing Security Gateway enforcement. This improves performance and reduces downtime. Based on a trusted source and destination, Wire Mode uses internal interfaces and VPN Communities to maintain a private and secure
VPN session, without employing Stateful Inspection. Since Stateful Inspection no longer takes place, dynamic-routing protocols that do not survive state verification in non-Wire Mode configurations can now be deployed. The VPN connection is no different from any other connections along a dedicated wire, thus the meaning of "Wire Mode".
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk30974
send
light_mode
delete
All Pages