Checkpoint 156-915.80 Exam Practice Questions (P. 4)
- Full Access (50 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #16
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You dont have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?
- Afw cti multik dynamic_dispatching on
- Bfw cti multik dynamic_dispatching set_mode 9
- Cfw cti multik set_mode 9
- Dfw cti multik pq enable
Correct Answer:
C
To fully enable the CoreXL Dynamic Dispatcher on Security Gateway:
1. Run in Expert mode:
[Expert@HostName]# fw ctl multik set_mode 9
:
[[email protected]:0]# fw ctl multik set_mode 9
Please reboot the system -
[[email protected]:0]#
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk105261
C
To fully enable the CoreXL Dynamic Dispatcher on Security Gateway:
1. Run in Expert mode:
[Expert@HostName]# fw ctl multik set_mode 9
:
[[email protected]:0]# fw ctl multik set_mode 9
Please reboot the system -
[[email protected]:0]#
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk105261
send
light_mode
delete
Question #17
You have existing dbedit scripts from R77. Can you use them with R80.10?
- Adbedit is not supported in R80.10
- Bdbedit is fully supported in R80.10
- CYou can use dbedit to modify threat prevention or access policies, but not create or modify layers
- Ddbedit scripts are being replaced by mgmt._cli in R80.10
Correct Answer:
D
dbedit (or GuiDbEdit) uses the cpmi protocol which is gradually being replaced by the new R80.10 automation architecture. cpmi clients are still supported in
R80.10, but there are some functionalities that cannot be managed by cpmi anymore. For example, the Access and Threat policies do not have a cpmi representation. They can be managed only by the new mgmt_cli and not by cpmi clients. There are still many tables that have an inner cpmi representation (for example, network objects, services, servers, and global properties) and can still be managed using cpmi.
Reference:
https://www.checkpoint.com/downloads/product-related/r80.10-mgmt-architecture-overview.pdf
D
dbedit (or GuiDbEdit) uses the cpmi protocol which is gradually being replaced by the new R80.10 automation architecture. cpmi clients are still supported in
R80.10, but there are some functionalities that cannot be managed by cpmi anymore. For example, the Access and Threat policies do not have a cpmi representation. They can be managed only by the new mgmt_cli and not by cpmi clients. There are still many tables that have an inner cpmi representation (for example, network objects, services, servers, and global properties) and can still be managed using cpmi.
Reference:
https://www.checkpoint.com/downloads/product-related/r80.10-mgmt-architecture-overview.pdf
send
light_mode
delete
Question #18
SecureXL improves non-encrypted firewall traffic throughput and encrypted VPN traffic throughput.
- AThis statement is true because SecureXL does improve all traffic
- BThis statement is false because SecureXL does not improve this traffic but CoreXL does
- CThis statement is true because SecureXL does improve this traffic
- DThis statement is false because encrypted traffic cannot be inspected
Correct Answer:
C
SecureXL improved non-encrypted firewall traffic throughput, and encrypted VPN traffic throughput, by nearly an order-of-magnitude- particularly for small packets flowing in long duration connections.
Reference: https://downloads.checkpoint.com/fileserver/SOURCE/direct/ID/10001/FILE/SecureXL_and_Nokia_IPSO_White_Paper_20080401.pdf
C
SecureXL improved non-encrypted firewall traffic throughput, and encrypted VPN traffic throughput, by nearly an order-of-magnitude- particularly for small packets flowing in long duration connections.
Reference: https://downloads.checkpoint.com/fileserver/SOURCE/direct/ID/10001/FILE/SecureXL_and_Nokia_IPSO_White_Paper_20080401.pdf
send
light_mode
delete
Question #19
What are the three components for Check Point Capsule?
- ACapsule Docs, Capsule Cloud, Capsule Connect
- BCapsule Workspace, Capsule Cloud, Capsule Connect
- CCapsule Workspace, Capsule Docs, Capsule Connect
- DCapsule Workspace, Capsule Docs, Capsule Cloud
Correct Answer:
D
Reference: https://www.checkpoint.com/solutions/mobile-security/check-point-capsule/
D
Reference: https://www.checkpoint.com/solutions/mobile-security/check-point-capsule/
send
light_mode
delete
Question #20
Using mgmt_cli, what is the correct syntax to import a host object called Server_1 from the CLI?
- Amgmt_cli add-host "Server_1" ip_ address "10.15.123.10" – format txt
- Bmgmt_ cli add host name "Server_ 1" ip-address "10.15.123.10" – format json
- Cmgmt_ cli add object-host "Server_ 1" ip-address "10.15.123.10" – format json
- Dmgmt_cli add object "Server_ 1" ip-address "10.15.123.10" – format json
Correct Answer:
B
Example:
mgmt_cli add host name "New Host 1" ip-address "192.0.2.1" --format json
"--format json" is optional. By default the output is presented in plain text.
Reference: https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/add-host~v1.1%20
B
Example:
mgmt_cli add host name "New Host 1" ip-address "192.0.2.1" --format json
"--format json" is optional. By default the output is presented in plain text.
Reference: https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/add-host~v1.1%20
send
light_mode
delete
All Pages