156-915.80 | What Downloadable 156-915.80 dumps Is?


P.S. Simulation 156-915.80 keys are available on Google Drive, GET MORE: https://drive.google.com/open?id=1YYqgCO6ctCwcBVUFbQYMfHPbrQOvemUT


New Check Point 156-915.80 Exam Dumps Collection (Question 1 - Question 10)

New Questions 1

Which file defines the fields for each object used in the file objects.C (color, num/string, default valueu2026)?

A. $FWDIR/conf/classes.C

B. $FWDIR/conf/scheam.C

C. $FWDIR/conf/fields.C

D. $FWDIR/conf/table.C

Answer: A

New Questions 2

Security Gateway R80 supports User Authentication for which of the following services? Select the response below that contains the MOST correct list of supported services.

A. SMTP, FTP, TELNET

B. SMTP, FTP, HTTP, TELNET

C. FTP, HTTP, TELNET

D. FTP, TELNET

Answer: C

New Questions 3

Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use her iPad to access the internal Finance Web server. Because the iPad is not a member of the Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter her AD credentials in the Captive Portal and then get the same access as on her office computer. Her access to resources is based on rules in the R80 Firewall Rule Base.

To make this scenario work, the IT administrator must:

1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity Sources.

2) In the Portal Settings window in the User Access section, make sure that Name and password login is selected.

3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network destinations. Select accept as the Action.

Ms. McHanry tries to access the resource but is unable. What should she do?

A. Have the security administrator select the Action field of the Firewall Rule u201cRedirect HTTP connections to an authentication (captive) portalu201d

B. Have the security administrator reboot the firewall

C. Have the security administrator select Any for the Machines tab in the appropriate Access Role

D. Install the Identity Awareness agent on her iPad

Answer: A

New Questions 4

You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You donu2021t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to

use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?

A. fw cti multik dynamic_dispatching on

B. fw cti multik dynamic_dispatching set_mode 9

C. fw cti multik set_mode 9

D. fw cti multik pq enable

Answer: C

Explanation:

To fully enable the CoreXL Dynamic Dispatcher on Security Gateway:

1. Run in Expert mode:

[Expert@HostName]# fw ctl multik set_mode 9 Example output:

[Expert@R77.30:0]# fw ctl multik set_mode 9

Please reboot the system [Expert@R77.30:0]#

New Questions 5

Peter is your new Security Administrator. On his first working day, he is very nervous and enters the wrong password three times. His account is locked. What can be done to unlock Peteru2021s account? Give the BEST answer.

A. You can unlock Peteru2021s account by using the command fwm lock_admin -u Peter on the Security Management Server.

B. You can unlock Peteru2021s account by using the command fwm unlock_admin -u Peter on the Security Management Server

C. It is not possible to unlock Peteru2021s account. You have to install the firewall once again or abstain from Peteru2021s help.

D. You can unlock Peteru2021s account by using the command fwm unlock_admin -u Peter on the Security Gateway.

Answer: A

New Questions 6

When using GAiA, it might be necessary to temporarily change the MAC address of the interface eth 0 to 00:0C:29:12:34:56. After restarting the network the old MAC address should be active. How do you configure this change?

A. Option A

B. Option B

C. Option C

D. Option D

Answer: A

New Questions 7

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned an IP address 10.0.0.19 via DHCP.

John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop. He wants to move around the organization and continue to have access to the HR Web Server.

To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the policy.

2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.

John plugged in his laptop to the network on a different network segment and he is not able to connect. How does he solve this problem?

A. John should install the Identity Awareness Agent

B. The firewall admin should install the Security Policy

C. John should lock and unlock the computer

D. Investigate this as a network connectivity issue

Answer: B

New Questions 8

What can you do to see the current number of kernel instances in a system with CoreXL enabled?

A. Browse to Secure Platform Web GUI

B. Only Check Point support personnel can access that information

C. Execute SmarDashboard client

D. Execute command cpconfig

Answer: D

New Questions 9

What command would show the API server status?

A. cpm status

B. api restart

C. api status

D. show api status

Answer: C

New Questions 10

MegaCorps' disaster recovery plan is past due for an update to the backup and restore section to enjoy the benefits of the new distributed R80 installation. You must propose a plan that meets the following required and desired objectives:

Required: Security Policy repository must be backed up no less frequently than every 24 hours. Desired: Back up R80 components enforcing the Security Policies at least once a week. Desired: Back up R80 logs at least once a week.

You develop a disaster recovery plan proposing the following:

* Use the utility cron to run the command upgrade_export each night on the Security Management Servers.

* Configure the organization's routine backup software to back up files created by the command upgrade_export.

* Configure GAiA back up utility to back up Security Gateways every Saturday night.

* Use the utility cron to run the command upgrade_export each Saturday night on the log servers.

* Configure an automatic, nightly logswitch.

* Configure the organization's routine back up software to back up the switched logs every night. The corporate IT change review committee decides your plan:

A. meets the required objective and only one desired objective.

B. meets the required objective and both desired objectives.

C. meets the rquired objective but does not meet either deisred objective.

D. does not meet the required objective.

Answer: B

100% Up to the minute Check Point 156-915.80 Questions & Answers shared by 2passeasy, Get HERE: https://www.2passeasy.com/dumps/156-915.80/ (New Q&As)