Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > CheckPoint > Checkpoint Certifications > 156-915.80 > 156-915.80 Online Practice Questions and Answers

156-915.80 Online Practice Questions and Answers

Questions 4

Which of the following allows administrators to allow or deny traffic to or from a specific network based on the user's credentials?

A. Access Policy

B. Access Role

C. Access Rule

D. Access Certificate

Buy Now

Correct Answer: B

Questions 5

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway policy permits access only

from John's desktop which is assigned a static IP address 10.0.0.19.

John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a

rule that lets John Adams access the HR Web Server from his laptop with a static IP (10.0.0.19). He wants to move around the organization and continue to have access to the HR Web Server.

To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the policy.

2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.

What should John do when he cannot access the web server from a different personal computer?

A. John should lock and unlock his computer

B. Investigate this as a network connectivity issue

C. The access should be changed to authenticate the user instead of the PC

D. John should install the Identity Awareness Agent

Buy Now

Correct Answer: C

Questions 6

Select the command set best used to verify proper failover function of a new ClusterXL configuration.

A. reboot

B. cphaprob -d failDevice -s problem -t 0 register / cphaprob -d failDevice unregister

C. clusterXL_admin down / clusterXL_admin up

D. cpstop/cpstart

Buy Now

Correct Answer: C

Questions 7

Match the VPN-related terms with their definitions. Each correct term is only used once. Exhibit:

A. A-3, B-4, C-1, D-5

B. A-4, B-3, C-5, D-2

C. A-2, B-5, C-4, D-1

D. A-3, B-2, C-1, D-4

Buy Now

Correct Answer: B

Questions 8

What is the purpose of a SmartEvent Correlation Unit?

A. The SmartEvent Correlation Unit is designed to check the connection reliability from SmartConsole to the SmartEvent Server

B. The SmartEvent Correlation Unit's task it to assign severity levels to the identified events.

C. The Correlation unit role is to evaluate logs from the log server component to identify patterns/threats and convert them to events.

D. The SmartEvent Correlation Unit is designed to check the availability of the SmartReporter Server

Buy Now

Correct Answer: C

Questions 9

Which one of these is NOT a firewall chain?

A. RTM packet in (rtm)

B. VPN node add (vpnad)

C. IP Options restore (in) (ipopt_res)

D. Fw SCV inbound (scv)

Buy Now

Correct Answer: B

Reference: http://dkcheckpoint.blogspot.com/2016/07/chapter-2-chain-module.html

Questions 10

Which web services protocol is used to communicate to the Check Point R80 identity Awareness Web APi?

A. SOAP

B. REST

C. XLANG

D. XML-RPC

Buy Now

Correct Answer: B

The Identity Web API uses the REST protocol over SSL. The requests and responses are HTTP and in JSON format.

Reference: https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_IdentityAwareness_AdminGuide/html_frameset.htm?topic=documents/R80.10/WebAdminGuides/EN/

CP_R80.10_IdentityAwareness_AdminGuide/148699

Questions 11

What is the least ideal Synchronization Status for Security Management Server High Availability deployment?

A. Lagging

B. Synchronized

C. Never been synchronized

D. Collision

Buy Now

Correct Answer: A

The possible synchronization statuses are:

Never been synchronized - immediately after the Secondary Security Management server has been installed, it has not yet undergone the first manual synchronization that brings it up to date with the Primary Security Management server.

Synchronized - the peer is properly synchronized and has the same database information and installed Security Policy.

Lagging - the peer SMS has not been synchronized properly.

For instance, on account of the fact that the Active SMS has undergone changes since the previous synchronization (objects have been edited, or the Security Policy has been newly installed), the information on the Standby SMS is lagging.

Advanced - the peer SMS is more up-to-date.

For instance, in the above figure, if a system administrators logs into Security Management server B before it has been synchronized with the Security Management server A, the status of the Security Management server A is Advanced, since

it contains more up-to-date information which the former does not have.

In this case, manual synchronization must be initiated by the system administrator by changing the Active SMS to a Standby SMS. Perform a synch me operation from the more advanced server to the Standby SMS. Change the Standby SMS

to the Active SMS.

Collision - the Active SMS and its peer have different installed policies and databases. The administrator must perform manual synchronization and decide which of the SMSs to overwrite.

Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_SecMan_WebAdmin/html_frameset.htm?topic=documents/R76/CP_R76_SecMan_WebAdmin/13132

Questions 12

What is true about the IPS-Blade?

A. in R80, IPS is managed by the Threat Prevention Policy

B. in R80, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict

C. in R80, IPS Exceptions cannot be attached to "all rules"

D. in R80, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same

Buy Now

Correct Answer: A

Questions 13

The Check Point installation history feature in R80 provides the following:

A. View install changes and install specific version.

B. View install changes

C. Policy Installation Date, view install changes and install specific version

D. Policy Installation Date only

Buy Now

Correct Answer: C

Reference: https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_SecurityManagement_AdminGuide/html_frameset.htm?topic=documents/R80.10/WebAdminGuides/EN/ CP_R80.10_SecurityManagement_AdminGuide/159917

Exam Code: 156-915.80
Exam Name: Check Point Certified Security Expert Update - R80.10
Last Update: Jun 28, 2025
Questions: 536

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.