A Review Of Breathing 156-915.80 item pool

Examcollection 156-915.80 Questions are updated and all 156-915.80 answers are verified by experts. Once you have completely prepared with our 156-915.80 exam prep kits you will be ready for the real 156-915.80 exam without a problem. We have Up to the minute Check Point 156-915.80 dumps study guide. PASSED 156-915.80 First attempt! Here What I Did.

P.S. Exact 156-915.80 questions pool are available on Google Drive, GET MORE: https://drive.google.com/open?id=10nZGq46vgX7-YMephRQOtbIjmfJ8w6LL


New Check Point 156-915.80 Exam Dumps Collection (Question 4 - Question 13)

Question No: 4

You have selected the event Port Scan from Internal Network in SmartEvent, to detect an event when 30 port scans have occurred within 60 seconds. You also want to detect two port scans from a host within 10 seconds of each other. How would you accomplish this?

A. Define the two port-scan detections as an exception.

B. You cannot set SmartEvent to detect two port scans from a host within 10 seconds of each other.

C. Select the two port-scan detections as a sub-event.

D. Select the two port-scan detections as a new event.

Answer: A


Question No: 5

What is the purpose of the pre-defined exclusions included with SmartEvent R80?

A. To allow SmartEvent R80 to function properly with all other R71 devices.

B. To avoid incorrect event generation by the default IPS event definition; a scenario that may occur in deployments that include Security Gateways of versions prior to R71.

C. As a base for starting and building exclusions.

D. To give samples of how to write your own exclusion.

Answer: B


Question No: 6

The third-shift Administrator was updating Security Management Server access settings in Global Properties. He managed to lock all administrators out of their accounts. How should you unlock these accounts?

A. Delete the file admin.lock in the Security Management Server directory $FWDIR/tmp/.

B. Reinstall the Security Management Server and restore using upgrade_import.

C. Type fwm lock_admin -ua from the Security Management Server command line.

D. Login to SmartDashboard as the special cpconfig_admin user account; right-click on each administrator object and select unlock.

Answer: C


Question No: 7

Type the command and syntax that you would use to view the virtual cluster interfaces of a ClusterXL environment.

Answer:

cphaprob -a if


Question No: 8

MultiCorp is running Smartcenter R71 on an IPSO platform and wants to upgrade to a new Appliance with R80. Which migration tool is recommended?

A. Download Migration Tool R80 for IPSO and Splat/Linux from Check Point website.

B. Use already installed Migration Tool.

C. Use Migration Tool from CD/ISO

D. Fetch Migration Tool R71 for IPSO and Migration Tool R80 for Splat/Linux from CheckPoint website

Answer: A


Question No: 9

A Web server behind the Security Gateway is set to Automatic Static NAT. Client side NAT is not checked in the Global Properties. A client on the Internet initiates a session to the Web Server. Assuming there is a rule allowing this traffic, what other configuration must be done to allow the traffic to reach the Web server?

A. Automatic ARP must be unchecked in the Global Properties.

B. Nothing else must be configured.

C. A static route must be added on the Security Gateway to the internal host.

D. A static route for the NAT IP must be added to the Gatewayu2019s upstream router.

Answer: C


Question No: 10

Which of the following allows administrators to allow or deny traffic to or from a specific network based on the useru2019s credentials?

A. Access Policy

B. Access Role

C. Access Rule

D. Access Certificate

Answer: B


Question No: 11

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned an IP address 10.0.0.19 via DHCP.

John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop. He wants to move around the organization and continue to have access to the HR Web Server.

To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the policy.

2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.

John plugged in his laptop to the network on a different network segment and he is not able to connect. How does he solve this problem?

A. John should install the Identity Awareness Agent

B. The firewall admin should install the Security Policy

C. John should lock and unlock the computer

D. Investigate this as a network connectivity issue

Answer: B


Question No: 12

Your organizationu2019s disaster recovery plan needs an update to the backup and restore section to reap the new distributed R80 installation benefits. Your plan must meet the following required and desired objectives:

Required Objective: The Security Policy repository must be backed up no less frequently than every 24 hours. Desired Objective: The R80 components that enforce the Security Policies should be backed up at least once a week.

Desired Objective: Back up R80 logs at least once a week. Your disaster recovery plan is as follows:

- Use the cron utility to run the command upgrade_export each night on the Security Management Servers.

- Configure the organization's routine back up software to back up the files created by the command upgrade_export.

- Configure the GAiA back up utility to back up the Security Gateways every Saturday night.

- Use the cron utility to run the command upgrade_export each Saturday night on the log servers.

- Configure an automatic, nightly logswitch.

- Configure the organization's routine back up software to back up the switched logs every night. Upon evaluation, your plan:

A. Meets the required objective and only one desired objective.

B. Meets the required objective but does not meet either desired objective.

C. Does not meet the required objective.

D. Meets the required objective and both desired objectives.

Answer: D


Question No: 13

What mechanism does a gateway configured with Identity Awareness and LDAP initially use to communicate with a Windows 2003 or 2008 server?

A. WMI

B. CIFS

C. RCP

D. LDAP

Answer: A


Recommend!! Get the Exact 156-915.80 dumps in VCE and PDF From Examcollectionplus, Welcome to download: https://www.examcollectionplus.net/vce-156-915.80/ (New Q&As Version)