Exam Code: 156-915.80 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Check Point Certified Security Expert Update - R80
Certification Provider: Check Point
Free Today! Guaranteed Training- Pass 156-915.80 Exam.
♥♥ 2018 NEW RECOMMEND ♥♥
Free VCE & PDF File for Check Point 156-915.80 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
P.S. Download 156-915.80 forum are available on Google Drive, GET MORE: https://drive.google.com/open?id=1UHtXnNXw0Sz3rmLlziAf9CI0FDZ1fvFf
New Check Point 156-915.80 Exam Dumps Collection (Question 6 - Question 15)
Q1. When using GAiA, it might be necessary to temporarily change the MAC address of the interface eth 0 to 00:0C:29:12:34:56. After restarting the network the old MAC address should be active. How do you configure this change?
A. Option A
B. Option B
C. Option C
D. Option D
Q2. John detected high load on sync interface. Which is most recommended solution?
A. For short connections like http service u2013 delay sync for 2 seconds
B. Add a second interface to handle sync traffic
C. For short connections like http service u2013 do not sync
D. For short connections like icmp service u2013 delay sync for 2 seconds
Q3. You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You donu2019t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to
use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?
A. fw cti multik dynamic_dispatching on
B. fw cti multik dynamic_dispatching set_mode 9
C. fw cti multik set_mode 9
D. fw cti multik pq enable
To fully enable the CoreXL Dynamic Dispatcher on Security Gateway:
1. Run in Expert mode:
[Expert@HostName]# fw ctl multik set_mode 9 Example output:
[Expert@R77.30:0]# fw ctl multik set_mode 9
Please reboot the system [Expert@R77.30:0]#
Q4. Which of the following authentication methods can be configured in the Identity Awareness setup wizard?
B. Captive Portal
C. Check Point Password
D. Windows password
Q5. You intend to upgrade a Check Point Gateway from R71 to R80. Prior to upgrading, you want to back up the Gateway should there be any problems with the upgrade. Which of the following allows for the Gateway configuration to be completely backed up into a manageable size in the least amount of time?
A. database revision
Q6. Your organizationu2019s disaster recovery plan needs an update to the backup and restore section to reap the new distributed R80 installation benefits. Your plan must meet the following required and desired objectives:
Required Objective: The Security Policy repository must be backed up no less frequently than every 24 hours. Desired Objective: The R80 components that enforce the Security Policies should be backed up at least once a week.
Desired Objective: Back up R80 logs at least once a week. Your disaster recovery plan is as follows:
- Use the cron utility to run the command upgrade_export each night on the Security Management Servers.
- Configure the organization's routine back up software to back up the files created by the command upgrade_export.
- Configure the GAiA back up utility to back up the Security Gateways every Saturday night.
- Use the cron utility to run the command upgrade_export each Saturday night on the log servers.
- Configure an automatic, nightly logswitch.
- Configure the organization's routine back up software to back up the switched logs every night. Upon evaluation, your plan:
A. Meets the required objective and only one desired objective.
B. Meets the required objective but does not meet either desired objective.
C. Does not meet the required objective.
D. Meets the required objective and both desired objectives.
Q7. Fill in the blank. You can set Acceleration to ON or OFF using command syntax .
Q8. Which command collects diagnostic data for analyzing customer setup remotely?
B. migrate export
CPInfo is an auto-updatable utility that collects diagnostics data on a customer's machine at the time of execution and uploads it to Check Point servers (it replaces the standalone cp_uploader utility for uploading
files to Check Point servers).
The CPInfo output file allows analyzing customer setups from a remote location. Check Point support engineers can open the CPInfo file in a demo mode, while viewing actual customer Security Policies and Objects. This allows the in-depth analysis of customer's configuration and environment settings.
Q9. Which of these options is an implicit MEP option?
B. Source address based
C. Round robin
D. Load Sharing
There are three methods to implement implicit MEP:
First to Respond, in which the first Security Gateway to reply to the peer Security Gateway is chosen. An organization would choose this option if, for example, the organization has two Security Gateways in a MEP
configuration - one in London, the other in New York. It makes sense for VPN-1 peers located in England to try the London Security Gateway first and the NY Security Gateway second. Being geographically closer to VPN peers in England, the London Security Gateway is the first to respond, and becomes the entry point to the internal network. See: First to Respond.
Primary-Backup, in which one or multiple backup Security Gateways provide "high availability" for a primary Security Gateway. The remote peer is configured to work with the primary Security Gateway, but switches to the backup Security Gateway if the primary goes down. An organization might decide to use this configuration if it has two machines in a MEP environment, one of which is stronger than the other. It makes sense to configure the stronger machine as the primary. Or perhaps both machines are the same in terms of strength of performance, but one has a cheaper or faster connection to the Internet. In this case, the machine with the better Internet connection should be configured as the primary. See: Primary-Backup Security Gateways.
Load Distribution, in which the remote VPN peer randomly selects a Security Gateway with which to open a connection. For each IP source/destination address pair, a new Security Gateway is randomly selected. An organization might have a number of machines with equal performance abilities. In this case, it makes
sense to enable load distribution. The machines are used in a random and equal way. See: Random Selection.
Q10. Your users are defined in a Windows 2008 R2 Active Directory server. You must add LDAP users to a Client Authentication rule. Which kind of user group do you need in the Client Authentication rule in R80?
A. External-user group
B. LDAP group
C. A group with a generic user
D. All Users
P.S. Easily pass 156-915.80 Exam with 2passeasy Download Dumps & pdf vce, Try Free: https://www.2passeasy.com/dumps/156-915.80/ ( New Questions)