Professional Documents
Culture Documents
59q
Number: 156-915.80
Passing Score: 800
Time Limit: 120 min
https://www.gratisexam.com/
156-915. 80
https://www.gratisexam.com/
Exam A
QUESTION 1
You find one of your cluster gateways showing “Down” when you run the “cphaprob stat” command. You then run the “clusterXL_admin up” on the down member
but unfortunately the member continues to show down. What command do you run to determine the case?
A. cphaprob –f register
B. cphaprob –d–s report
C. cpstat–f-all
D. cphaprob –a list
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: http://dl3.checkpoint.com/paid/63/6357d81e3b75b5a09a422d715c3b3d79/CP_R80.10_ClusterXL_AdminGuide.pdf?
HashKey=1522170580_c51bd784a86600b5f6141c0f1a6322fd&xtn=.pdf
QUESTION 2
SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day
Protection?
https://www.gratisexam.com/
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
https://www.gratisexam.com/
Reference: https://www.checkpoint.com/products/threat-emulation-sandboxing/
QUESTION 3
Which of the following is NOT a valid way to view interface’s IP address settings in Gaia?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
Check Point recommends configuring Disk Space Management parameters to delete old log entities when available disk space is less than or equal to?
A. 50%
B. 75%
C. 80%
D. 15%
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk110557
QUESTION 5
Which of the following is NOT an internal/native Check Point command?
A. fwaccel on
B. fw ct1 debug
C. tcpdump
https://www.gratisexam.com/
D. cphaprob
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
What is the SandBlast Agent designed to do?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.checkpoint.com/downloads/product-related/datasheets/ds-sandblast-agent.pdf
QUESTION 7
The SmartEvent R80 Web application for real-time event monitoring is called:
A. SmartView Monitor
B. SmartEventWeb
C. There is no Web application for SmartEvent
D. SmartView
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_LoggingAndMonitoring/html_frameset.htm?topic=documents/R80/
CP_R80_LoggingAndMonitoring/120829
https://www.gratisexam.com/
QUESTION 8
What Shell is required in Gaia to use WinSCP?
https://www.gratisexam.com/
A. UNIX
B. CPShell
C. CLISH
D. Bash
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: https://winscp.net/eng/docs/ui_login_scp
QUESTION 9
Which one of the following is true about Threat Emulation?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 10
What are the minimum open server hardware requirements for a Security Management Server/Standalone in R80.10?
https://www.gratisexam.com/
A. 2 CPU cores, 4GB of RAM and 15GB of disk space
B. 8 CPU cores, 16GB of RAM and 500 GB of disk space
C. 4 CPU cores, 8GB of RAM and 500GB of disk space
D. 8 CPU cores, 32GB of RAM and 1 TB of disk space
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Reference: http://dl3.checkpoint.com/paid/db/dbf0aa7672f1dd6031e6096b40510674/CP_R80.10_ReleaseNotes.pdf?
HashKey=1522175073_c4e7fc63c894ad28b3fbe49f9430c023&xtn=.pdf page 16
QUESTION 11
The “MAC magic” value must be modified under the following condition:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk25977
QUESTION 12
The Correlation Unit performs all but which of the following actions:
A. Marks logs that individually are not events, but may be part of a larger pattern to be identified later
B. Generates an event based on the Event policy
C. Assigns a severity level to the event
D. Takes a new log entry that is part of a group of items that together make up an event, and adds it to an ongoing event
Correct Answer: C
https://www.gratisexam.com/
Section: (none)
Explanation
Explanation/Reference:
QUESTION 13
The following command is used to verify the CPUSE version:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: http://dkcheckpoint.blogspot.com/2017/11/how-to-fix-deployment-agent-issues.html
QUESTION 14
Which of these options is an implicit MEP option?
A. Primary-backup
B. Source address based
C. Round robin
D. Load Sharing
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
There are three methods to implement implicit MEP:
First to Respond, in which the first Security Gateway to reply to the peer Security Gateway is chosen. An organization would choose this option if, for example,
the organization has two Security Gateways in a MEP configuration - one in London, the other in New York. It makes sense for VPN-1 peers located in England
to try the London Security Gateway first and the NY Security Gateway second. Being geographically closer to VPN peers in England, the London Security
Gateway is the first to respond, and becomes the entry point to the internal network. See: First to Respond.
https://www.gratisexam.com/
Primary-Backup, in which one or multiple backup Security Gateways provide "high availability" for a primary Security Gateway. The remote peer is configured to
work with the primary Security Gateway, but switches to the backup Security Gateway if the primary goes down. An organization might decide to use this
configuration if it has two machines in a MEP environment, one of which is stronger than the other. It makes sense to configure the stronger machine as the
primary. Or perhaps both machines are the same in terms of strength of performance, but one has a cheaper or faster connection to the Internet. In this case,
the machine with the better Internet connection should be configured as the primary. See: Primary-Backup Security Gateways.
Load Distribution, in which the remote VPN peer randomly selects a Security Gateway with which to open a connection. For each IP source/destination address
pair, a new Security Gateway is randomly selected. An organization might have a number of machines with equal performance abilities. In this case, it makes
sense to enable load distribution. The machines are used in a random and equal way. See: Random Selection.
Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/13812.htm
QUESTION 15
John detected high load on sync interface. Which is most recommended solution?
A. For short connections like http service – delay sync for 2 seconds
B. Add a second interface to handle sync traffic
C. For short connections like http service – do not sync
D. For short connections like icmp service – delay sync for 2 seconds
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 16
What is the SOLR database for?
A. Used for full text search and enables powerful matching capabilities
B. Writes data to the database and full text search
C. Serves GUI responsible to transfer request to the DLEserver
D. Enables powerful matching capabilities and writes data to the database
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
https://www.gratisexam.com/
QUESTION 17
What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?
A. Stateful Mode
B. VPN Routing Mode
C. Wire Mode
D. Stateless Mode
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Wire Mode is a VPN-1 NGX feature that enables VPN connections to successfully fail over, bypassing Security Gateway enforcement. This improves performance
and reduces downtime. Based on a trusted source and destination, Wire Mode uses internal interfaces and VPN Communities to maintain a private and secure
VPN session, without employing Stateful Inspection. Since Stateful Inspection no longer takes place, dynamic-routing protocols that do not survive state verification
in non-Wire Mode configurations can now be deployed. The VPN connection is no different from any other connections along a dedicated wire, thus the meaning of
"Wire Mode".
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk30974
QUESTION 18
On R80.10 the IPS Blade is managed by:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.checkpoint.com/downloads/product-related/r80.10-mgmt-architecture-overview.pdf very top of last page.
QUESTION 19
Which packet info is ignored with Session Rate Acceleration?
https://www.gratisexam.com/
A. source port ranges
B. source ip
C. source port
D. same info from Packet Acceleration is used
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Reference: http://trlj.blogspot.com/2015/10/check-point-acceleration.html
QUESTION 20
What is the purpose of Priority Delta in VRRP?
https://www.gratisexam.com/
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Each instance of VRRP running on a supported interface may monitor the link state of other interfaces. The monitored interfaces do not have to be running VRRP.
If a monitored interface loses its link state, then VRRP will decrement its priority over a VRID by the specified delta value and then will send out a new VRRP
HELLO packet. If the new effective priority is less than the priority a backup platform has, then the backup platform will beging to send out its own HELLO packet.
Once the master sees this packet with a priority greater than its own, then it releases the VIP.
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk38524
QUESTION 21
https://www.gratisexam.com/
What is the purpose of a SmartEvent Correlation Unit?
A. The SmartEvent Correlation Unit is designed to check the connection reliability from SmartConsole to the SmartEvent Server
B. The SmartEvent Correlation Unit’s task it to assign severity levels to the identified events.
C. The Correlation unit role is to evaluate logs from the log server component to identify patterns/threats and convert them to events.
D. The SmartEvent Correlation Unit is designed to check the availability of the SmartReporter Server
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 22
The CDT utility supports which of the following?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The Central Deployment Tool (CDT) is a utility that runs on an R77 / R77.X / R80 / R80.10 Security Management Server / Multi-Domain Security Management
Server (running Gaia OS).
It allows the administrator to automatically install CPUSE Offline packages (Hotfixes, Jumbo Hotfix Accumulators (Bundles), Upgrade to a Minor Version, Upgrade
to a Major Version) on multiple managed Security Gateways and Cluster Members at the same time.
Reference: https://community.checkpoint.com/thread/5319-my-top-3-check-point-cli-commands
QUESTION 23
The Firewall kernel is replicated multiple times, therefore:
A. The Firewall kernel only touches the packet if the connection is accelerated
B. The Firewall can run different policies per core
https://www.gratisexam.com/
C. The Firewall kernel is replicated only with new connections and deletes itself once the connection times out
D. The Firewall can run the same policy on all cores
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
On a Security Gateway with CoreXL enabled, the Firewall kernel is replicated multiple times. Each replicated copy, or instance, runs on one processing core. These
instances handle traffic concurrently, and each instance is a complete and independent inspection kernel. When CoreXL is enabled, all the kernel instances in the
Security Gateway process traffic through the same interfaces and apply the same security policy.
Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_PerformanceTuning_WebAdmin/6731.htm
QUESTION 24
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
A. Symmetric routing
B. Failovers
C. Asymmetric routing
D. Anti-Spoofing
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 25
Which is not a blade option when configuring SmartEvent?
A. Correlation Unit
B. SmartEvent Unit
C. SmartEvent Server
D. Log Server
Correct Answer: B
Section: (none)
https://www.gratisexam.com/
Explanation
Explanation/Reference:
Explanation:
On the Management tab, enable these Software Blades:
Logging & Status
SmartEvent Server
SmartEvent Correlation Unit
Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_LoggingAndMonitoring/html_frameset.htm?topic=documents/R80/
CP_R80_LoggingAndMonitoring/120829
QUESTION 26
What command would show the API server status?
A. cpm status
B. api restart
C. api status
D. show api status
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.hurricanelabs.com/blog/check-point-api-merging-management-servers-with-r80-10
QUESTION 27
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware
upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?
Correct Answer: C
Section: (none)
Explanation
https://www.gratisexam.com/
Explanation/Reference:
Explanation:
To fully enable the CoreXL Dynamic Dispatcher on Security Gateway:
1. Run in Expert mode:
[Expert@HostName]# fw ctl multik set_mode 9
Example output:
[Expert@R77.30:0]# fw ctl multik set_mode 9
Please reboot the system
[Expert@R77.30:0]#
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk105261
QUESTION 28
You have existing dbedit scripts from R77. Can you use them with R80.10?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
dbedit (or GuiDbEdit) uses the cpmi protocol which is gradually being replaced by the new R80.10 automation architecture. cpmi clients are still supported in
R80.10, but there are some functionalities that cannot be managed by cpmi anymore. For example, the Access and Threat policies do not have a cpmi
representation. They can be managed only by the new mgmt_cli and not by cpmi clients. There are still many tables that have an inner cpmi representation (for
example, network objects, services, servers, and global properties) and can still be managed using cpmi.
Reference: https://www.checkpoint.com/downloads/product-related/r80.10-mgmt-architecture-overview.pdf
QUESTION 29
SecureXL improves non-encrypted firewall traffic throughput and encrypted VPN traffic throughput.
Correct Answer: C
https://www.gratisexam.com/
Section: (none)
Explanation
Explanation/Reference:
Explanation:
SecureXL improved non-encrypted firewall traffic throughput, and encrypted VPN traffic throughput, by nearly an order-of-magnitude- particularly for small packets
flowing in long duration connections.
Reference: https://downloads.checkpoint.com/fileserver/SOURCE/direct/ID/10001/FILE/SecureXL_and_Nokia_IPSO_White_Paper_20080401.pdf
QUESTION 30
What are the three components for Check Point Capsule?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.checkpoint.com/solutions/mobile-security/check-point-capsule/
QUESTION 31
Using mgmt_cli, what is the correct syntax to import a host object called Server_1 from the CLI?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Example:
mgmt_cli add host name "New Host 1" ip-address "192.0.2.1" --format json
• "--format json" is optional. By default the output is presented in plain text.
https://www.gratisexam.com/
Reference: https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/add-host~v1.1%20
QUESTION 32
What GUI client would you use to view an IPS packet capture?
A. SmartView Monitor
B. SmartView Tracker
C. Smart Update
D. Smart Reporter
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_IPS_AdminGuide/12766.htm
QUESTION 33
What is the valid range for VRID value in VRRP configuration?
A. 1 – 254
B. 1 – 255
C. 0 – 254
D. 0 – 255
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Virtual Router ID - Enter a unique ID number for this virtual router. The range of valid values is 1 to 255.
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_Gaia_WebAdmin/87911.htm
QUESTION 34
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
A. Detects and blocks malware by correlating multiple detection engines before users are affected.
B. Configure rules to limit the available network bandwidth for specified users or groups.
https://www.gratisexam.com/
C. Use UserCheck to help users understand that certain websites are against the company’s security policy.
D. Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Use the URL Filtering and Application Control Software Blades to:
Create a Granular Policy - Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels. You can also
create an HTTPS policy that enables Security Gateways to inspect HTTPS traffic and prevent security risks related to the SSL protocol.
Manage Bandwidth Consumption - Configure rules to limit the available network bandwidth for specified users or groups. You can define separate limits for
uploading and downloading.
Keep Your Policies Updated - The Application Database is updated regularly, which helps you makes sure that your Internet security policy has the newest
applications and website categories. Security Gateways connect to the Check Point Online Web Service to identify new social networking widgets and website
categories.
Communicate with Users - UserCheck objects add flexibility to URL Filtering and Application Control and let the Security Gateways communicate with users.
UserCheck helps users understand that certain websites are against the company's security policy. It also tells users about the changes in Internet policy related
to websites and applications.
Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/R80/CP_R80_SecMGMT/126197
QUESTION 35
Which command will reset the kernel debug options to default settings?
https://www.gratisexam.com/
A. fw ctl dbg –a 0
B. fw ctl dbg resetall
C. fw ctl debug 0
D. fw ctl debug set 0
Correct Answer: C
Section: (none)
https://www.gratisexam.com/
Explanation
Explanation/Reference:
Explanation:
Reset the debugs to the default.
In case someone changed the setting in the past and since then the firewall was not rebooted we should set all back to the defaults.
Reference: https://itsecworks.com/2011/08/09/checkpoint-firewall-debugging-basics/
QUESTION 36
You need to change the number of firewall instances used by CoreXL. How can you achieve this goal?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_PerformanceTuning_WebAdmin/6731.htm#o94530
QUESTION 37
As a valid Mobile Access Method, what feature provides Capsule Connect/VPN?
A. that is used to deploy the mobile device as a generator of one-time passwords for authenticating to an RSA Authentication Manager
B. Full Layer4 VPN –SSL VPN that gives users network access to all mobile applications
C. Full layer3 VPN –IPSec VPN that gives users network access to all mobile applications
D. You can make sure that documents are sent to the intended recipients only
https://www.gratisexam.com/
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_Mobile_Access_WebAdmin/82201.htm
QUESTION 38
What does the command vpn crl__zap do?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: https://indeni.com/check-point-firewalls-certification-revocation-list-crl-check-mechanism-on-a-check-point-gateway/
QUESTION 39
Firewall policies must be configured to accept VRRP packets on the GAiA platform if it runs Firewall software. The Multicast destination assigned by the Internet
Assigned Numbers Authority (IANA) for VRRP is:
A. 224.0.0.18
B. 224.0.0.5
C. 224.0.0.102
D. 224.0.0.22
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.iana.org/assignments/multicast-addresses/multicast-addresses.xhtml
QUESTION 40
https://www.gratisexam.com/
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Synchronization works in two modes:
Full Sync transfers all Security Gateway kernel table information from one cluster member to another. It is handled by the fwd daemon using an encrypted TCP
connection on port 256.
Delta Sync transfers changes in the kernel tables between cluster members. Delta sync is handled by the Security Gateway kernel using UDP connections on
port 8116.
Reference: https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_ClusterXL_AdminGuide/html_frameset.htm?topic=documents/
R80.10/WebAdminGuides/EN/CP_R80.10_ClusterXL_AdminGuide/7288
QUESTION 41
GAiA greatly increases operational efficiency by offering an advanced and intuitive software update agent, commonly referred to as the:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 42
What is the responsibility of SOLR process on R80.10 management server?
https://www.gratisexam.com/
A. Validating all data before it’s written into the database
B. It generates indexes of data written to the database
C. Communication between SmartConsole applications and the Security Management Server
D. Writing all information into the database
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 43
VPN Tunnel Sharing can be configured with any of the options below, EXCEPT One:
A. Gateway-based
B. Subnet-based
C. IP range based
D. Host-based
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
VPN Tunnel Sharing provides interoperability and scalability by controlling the number of VPN tunnels created between peer Security Gateways. There are three
available settings:
One VPN tunnel per each pair of hosts
One VPN tunnel per subnet pair
One VPN tunnel per Security Gateway pair
Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/14018.htm
QUESTION 44
You want to store the GAiA configuration in a file for later reference. What command should you use?
https://www.gratisexam.com/
C. save config –o <filename>
D. save configuration <filename>
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102234
QUESTION 45
In Gaia, if one is unsure about a possible command, what command lists all possible commands.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_Gaia_WebAdmin/75697.htm
QUESTION 46
In which case is a Sticky Decision Function relevant?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
https://www.gratisexam.com/
QUESTION 47
The Security Gateway is installed on GAiA R80. The default port for the Web User Interface is _______.
A. TCP 18211
B. TCP 257
C. TCP 4433
D. TCP 443
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 48
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 49
Fill in the blank: The tool ___________ generates a R80 Security Gateway configuration report.
A. infoCP
B. infoview
C. cpinfo
D. fw cpinfo
https://www.gratisexam.com/
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 50
You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?
A. Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.
B. Create a separate Security Policy package for each remote Security Gateway.
C. Create network objects that restrict all applicable rules to only certain networks.
D. Run separate SmartConsole instances to login and configure each security Gateway directly.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 51
Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, how many machines will be need if he does
NOT include a SmartConsole machine in his calculations?
A. One machine, but it needs to be installed using SecurePlatform for compatibility purposes.
B. One machine
C. Two machines
D. Three machines
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 52
https://www.gratisexam.com/
Fill in the blank: The command _______________ provides the most complete restoration of a R80 configuration.
A. upgrade_import
B. cpconfig
C. fwn dbimport –p <export file>
D. cpinfo –recover
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 53
Which of the following statements is TRUE about R80 management plug-ins?
https://www.gratisexam.com/
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 54
Fill in the blank: The R80 feature ________ permits blocking specific IP addresses for a specified time period.
https://www.gratisexam.com/
B. Local Interface Spoofing
C. Suspicious Activity Monitoring
D. Adaptive Threat Prevention
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 55
Which features are only supported with R80.10 Gateways but not R77.x?
A. Access Control policy unifies the Firewall, Application Control & URL Filtering, Data Awareness, and Mobile Access Software Blade policies.
B. Limits the upload and download throughput for streaming media in the company to 1 Gbps.
C. The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over
the rule base flow and which security functionalities take precedence.
D. Time object to a rule to make the rule active only during specified times.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Reference: http://slideplayer.com/slide/12183998/
QUESTION 56
For best practices, what is the recommended time for automatic unlocking of locked admin accounts?
A. 20 minutes
B. 15 minutes
C. Admin account cannot be unlocked automatically
D. 30 minutes at least
Correct Answer: D
Section: (none)
Explanation
https://www.gratisexam.com/
Explanation/Reference:
QUESTION 57
What scenario indicates that SecureXL is enabled?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 58
What is the command to show SecureXL status?
A. fwaccel status
B. fwaccel stats –m
C. fwaccel –s
D. fwaccel stat
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
To check overall SecureXL status:
[Expert@HostName]# fwaccel stat
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk41397
QUESTION 59
Which file gives you a list of all security servers in use, including port number?
https://www.gratisexam.com/
A. $FWDIR/conf/conf.conf
B. $FWDIR/conf/servers.conf
C. $FWDIR/conf/fwauthd.conf
D. $FWDIR/conf/serversd.conf
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
https://www.gratisexam.com/
https://www.gratisexam.com/