لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which directory below contains log files?
A. /opt/CPSmartlog-R80/log
B. /opt/CPshrd-R80/log
C. /opt/CPsuite-R80/fw1/log
D. /opt/CPsuite-R80/log
عرض الإجابة
اجابة صحيحة: B

View The Updated 156-315.80 Exam Questions

SPOTO Provides 100% Real 156-315.80 Exam Questions for You to Pass Your 156-315.80 Exam!

السؤال #2
What is not a component of Check Point SandBlast?
A. Threat Emulation
B. Threat Simulator
C. Threat Extraction
D. Threat Cloud
عرض الإجابة
اجابة صحيحة: D
السؤال #3
Fill in the blank: The IPS policy for pre-R80 gateways is installed during the _______ .
A. Firewall policy install
B. Threat Prevention policy install
C. Anti-bot policy install
D. Access Control policy install
عرض الإجابة
اجابة صحيحة: D
السؤال #4
What is the benefit of “tw monitor” over “tcpdump”?
A. “fw monitor” reveals Layer 2 information, while “tcpdump” acts at Layer 3
B. “fw monitor” is also available for 64-Bit operating systems
C. With “fw monitor”, you can see the inspection points, which cannot be seen in “tcpdump”
D. “fw monitor” can be used from the CLI of the Management Server to collect information from multiple gateways
عرض الإجابة
اجابة صحيحة: D
السؤال #5
Joey wants to upgrade from R75.40 to R80 version of Security management. He will use Advanced Upgrade with Database Migration method to achieve this. What is one of the requirements for his success?
A. Size of the /var/log folder of the source machine must be at least 25% of the size of the /var/log directory on the target machine
B. Size of the /var/log folder of the target machine must be at least 25% of the size of the /var/log directory on the source machine
C. Size of the $FWDIR/log folder of the target machine must be at least 30% of the size of the$FWDIR/log directory on the source machine
D. Size of the /var/log folder of the target machine must be at least 25GB or more
عرض الإجابة
اجابة صحيحة: A
السؤال #6
Which remote Access Solution is clientless?
A. Checkpoint Mobile
B. Endpoint Security Suite
C. SecuRemote
D. Mobile Access Portal
عرض الإجابة
اجابة صحيحة: A
السؤال #7
What are types of Check Point APIs available currently as part of R80.10 code?
A. Security Gateway API Management API, Threat Prevention API and Identity Awareness Web Services API
B. Management API, Threat Prevention API, Identity Awareness Web Services API and OPSEC SDK API
C. OSE API, OPSEC SDK API, Threat Extraction API and Policy Editor API
D. CPMI API, Management API, Threat Prevention API and Identity Awareness Web Services API
عرض الإجابة
اجابة صحيحة: C
السؤال #8
What are the steps to configure the HTTPS Inspection Policy?
A. Go to Manage&Settings > Blades > HTTPS Inspection > Configure in SmartDashboard
B. Go to Application&url filtering blade > Advanced > Https Inspection > Policy
C. Go to Manage&Settings > Blades > HTTPS Inspection > Policy
D. Go to Application&url filtering blade > Https Inspection > Policy
عرض الإجابة
اجابة صحيحة: B
السؤال #9
What is the most recommended way to install patches and hotfixes?
A. CPUSE Check Point Update Service Engine
B. rpm -Uv
C. Software Update Service
D. UnixinstallScript
عرض الإجابة
اجابة صحيحة: B
السؤال #10
VPN Link Selection will perform the following when the primary VPN link goes down?
A. The Firewall will drop the packets
B. The Firewall can update the Link Selection entries to start using a different link for the same tunnel
C. The Firewall will send out the packet on all interfaces
D. The Firewall will inform the client that the tunnel is down
عرض الإجابة
اجابة صحيحة: A
السؤال #11
The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?
A. add host name ip-address
B. add hostname ip-address
C. set host name ip-address
D. set hostname ip-address
عرض الإجابة
اجابة صحيحة: B
السؤال #12
What is true about the IPS-Blade?
A. In R80, IPS is managed by the Threat Prevention Policy
B. In R80, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict
C. In R80, IPS Exceptions cannot be attached to “all rules”
D. In R80, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same
عرض الإجابة
اجابة صحيحة: A
السؤال #13
SmartEvent has several components that function together to track security threats. What is the function of the Correlation Unit as a component of this architecture?
A. Analyzes each log entry as it arrives at the log server according to the Event Polic
B. When a threat pattern is identified, an event is forwarded to the SmartEvent Server
C. Correlates all the identified threats with the consolidation policy
D. Collects syslog data from third party devices and saves them to the database
E. Connects with the SmartEvent Client when generating threat reports
عرض الإجابة
اجابة صحيحة: D
السؤال #14
Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?
A. Synchronized
B. Never been synchronized
C. Lagging
D. Collision
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Which tool is used to enable ClusterXL?
A. SmartUpdate
B. cpconfig
C. SmartConsole
D. sysconfig
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: