Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

156-915.80 Questions and Answers

Note! Following 156-915.80 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

156-915.80 Questions and Answers

Question # 6

You want to implement Static Destination NAT in order to provide external, Internet users access to an internal Web Serverthat has a reserved (RFC 1918) IP address. You have an unused valid IP address on the network between your Security Gateway and ISP router. You control the router that sits between the firewall external interface and the Internet.

What is an alternative configuration if proxy ARP cannot be used on your Security Gateway?

A.

Publish a proxy ARP entry on the ISP router instead of the firewall for the valid IP address.

B.

Place a static ARP entry on the ISP router for the valid IP address to the firewall's external address.

C.

Publish a proxy ARP entry on the internal Web server instead of the firewall for the valid IP address.

D.

Place a static host route on the firewall for the valid IP address to the internal Web server.

Full Access
Question # 7

What is Check Point's CoreXL?

A.

A way to synchronize connections across cluster members

B.

TCP-18190

C.

Multiple core interfaces on the device to accelerate traffic

D.

Multi Core support for Firewall Inspection

Full Access
Question # 8

You run cphaprob -a if. When you review the output, you find the word DOWN. What does DOWN mean?

A.

The cluster link is down.

B.

The physical interface is administratively set to DOWN.

C.

Thephysical interface is down.

D.

CCP pakets couldn't be sent to or didn't arrive from neighbor member.

Full Access
Question # 9

Fill in the blanks. To view the number of concurrent connections going through your firewall, you would use the command and syntax __ ___ __ __________ __ .

Full Access
Question # 10

How do you recover communications between your Security Management Server and Security Gateway if you lock yourself out through a rule or policy mis-configuration?

A.

fw unload policy

B.

fw unloadlocal

C.

fw delete all.all@localhost

D.

fwm unloadlocal

Full Access
Question # 11

You find that Users are not prompted for authentication when they access their Web servers, even though you havecreated an HTTP rule via User Authentication. Choose the BEST reason why.

A.

You checked the cache password on desktop option in Global Properties.

B.

Another rule that accepts HTTP without authentication exists in the Rule Base.

C.

You have forgotten to place the User Authentication Rule before the Stealth Rule.

D.

Users must use the SecuRemote Client, to use the User Authentication Rule.

Full Access
Question # 12

Which of the following tools is used to generate a Security Gateway R80 configuration report?

A.

fw cpinfo

B.

infoCP

C.

cpinfo

D.

infoview

Full Access
Question # 13

You have selected the event Port Scanfrom Internal Network in SmartEvent, to detect an event when 30 port scans have occurred within 60 seconds. You also want to detect two port scans from a host within 10 seconds of each other. How would you accomplish this?

A.

Define the two port-scan detections as an exception.

B.

You cannot set SmartEvent to detect two port scans from a host within 10 seconds of each other.

C.

Select the two port-scan detections as a sub-event.

D.

Select the two port-scan detections as a new event.

Full Access
Question # 14

Fill in the blank. You can set Acceleration to ON or OFF using command syntax ___________ .

Full Access
Question # 15

Looking at the SYN packets in the Wireshark output, select the statement that is true about NAT.

A.

This is an example of Hide NAT.

B.

There is not enough information provided in the Wireshark capture to determine the NAT settings.

C.

This is an exampleof Static NAT and Translate destination on client side unchecked in Global Properties.

D.

This is an example of Static NAT and Translate destination on client side checked in Global Properties.

Full Access
Question # 16

Which Security Gateway R80 configuration setting forces the Client Authentication authorization time-out to refresh, each time a new user is authenticated? The:

A.

Time properties, adjusted on the user objects for each user, in the Client Authentication rule Source.

B.

IPS > Application Intelligence > Client Authentication > Refresh User Timeout option enabled.

C.

Refreshable Timeout setting, in Client AuthenticationAction Properties > Limits.

D.

Global Properties > Authentication parameters, adjusted to allow for Regular Client Refreshment.

Full Access
Question # 17

Which command displays the installed Security Gateway version?

A.

fw printver

B.

fw ver

C.

fw stat

D.

cpstat -gw

Full Access
Question # 18

When using AD Query to authenticate users for IdentityAwareness, identity data is received seamlessly from the Microsoft Active Directory (AD). What is NOT a recommended usage of this method?

A.

Leveraging identity in the application control blade

B.

Basic identity enforcement in the internal network

C.

Identity-based auditing and logging

D.

Identity-based enforcement for non-AD users (non-Windows and guest users)

Full Access
Question # 19

Which of the following is the preferred method for adding static routes in GAiA?

A.

In the CLI with the command “route add”

B.

In Web Portal, under Network Management > IPv4 Static Routes

C.

In the CLI via sysconfig

D.

In SmartDashboard under Gateway Properties > Topology

Full Access
Question # 20

Which statements about Management HA are correct?

1) Primary SmartCenter describes first installed SmartCenter

2) Active SmartCenter is always used to administrate with SmartConsole

3) Active SmartCenter describes first installed SmartCenter

4) Primary SmartCenter is always used to administrate with SmartConsole

A.

1 and 4

B.

2 and 3

C.

1 and 2

D.

3 and 4

Full Access
Question # 21

Fill in the blank. What is the correct command and syntax used to view a connection table summary on a Check Point Firewall?

Full Access
Question # 22

What happens if the identity of a user is known?

A.

If the user credentials do not match an Access Role, the system displays the Captive Portal.

B.

If the user credentials do not match an Access Role, the system displays a sandbox.

C.

If the user credentials do not match an Access Role, the traffic is automatically dropped.

D.

If the user credentials match an Access Role, the rule is applied and traffic is accepted or dropped based on the defined action.

Full Access
Question # 23

You are running a R80 Security Gateway on GAiA. In case of a hardware failure, you have a server with the exact same hardware and firewall version installed. What back up method could be used to quickly put the secondary firewall into production?

A.

manual backup

B.

upgrade_export

C.

backup

D.

snapshot

Full Access
Question # 24

Match the VPN-related terms with their definitions. Each correct term is only used once.

Exhibit:

A.

A-3, B-4, C-1, D-5

B.

A-4, B-3, C-5, D-2

C.

A-2, B-5, C-4, D-1

D.

A-3, B-2, C-1, D-4

Full Access
Question # 25

Which of the following items should be configured for the Security Management Server to authenticate using LDAP?

A.

Login Distinguished Name and password

B.

Windows logonpassword

C.

Check Point Password

D.

WMI object

Full Access
Question # 26

SandBlast offers businesses flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day Protection?

A.

Smart Cloud Services

B.

Any Cloud Service

C.

Threat Agent Solution

D.

Public Cloud Services

Full Access
Question # 27

What are you required to do beforerunning the command upgrade_export?

A.

Run a cpstop on the Security Gateway.

B.

Run a cpstop on the Security Management Server.

C.

Close all GUI clients.

D.

Run cpconfig and set yourself up as a GUI client.

Full Access
Question # 28

Which command would provide the most comprehensive diagnostic information to Check Point Technical Support?

A.

fw cpinfo

B.

cpinfo -o date.cpinfo.txt

C.

diag

D.

cpstat - date.cpstat.txt

Full Access
Question # 29

Your customer, Mr. Smith needs access to other networks and should be able to use all services. Session authentication is not suitable. You select Client Authentication with HTTP. The standard authentication port for clientHTTP authentication (Port 900) is already in use. You want to use Port 9001 but are having connectivity problems. Why are you having problems?

A.

The configuration file $FWDIR/conf/fwauthd.conf is incorrect.

B.

The Security Policy is notcorrect.

C.

You can't use any port other than the standard port 900 for Client Authentication via HTTP.

D.

The service FW_clntauth_http configuration is incorrect.

Full Access
Question # 30

Jennifer McHanry is CEO of ACME. Sherecently bought her own personal iPad. She wants use her iPad to access the internal Finance Web server. Because the iPad is not a member of the Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter her AD credentials in the Captive Portal and then get the same access as on her office computer. Her access to resources is based on rules in the R80 Firewall Rule Base.

To make this scenario work, the IT administrator must:

1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity Sources.

2) In the Portal Settings window in the User Access section, make sure that Name and password login is selected.

3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry accessnetwork destinations. Select accept as the Action.

Ms. McHanry tries to access the resource but is unable. What should she do?

A.

Have the security administrator select the Action field of the Firewall Rule “Redirect HTTP connections to an authentication (captive) portal”

B.

Have the security administrator reboot the firewall

C.

Have the security administrator select Any for the Machines tab in the appropriate Access Role

D.

Install the Identity Awareness agent on her iPad

Full Access
Question # 31

Which command allows you to view the contents of an R80 table?

A.

fw tab -a <tablename>

B.

fw tab-t <tablename>

C.

fw tab -s <tablename>

D.

fw tab -x <tablename>

Full Access
Question # 32

Which of the following is NOTdefined by an Access Role object?

A.

Source Network

B.

Source Machine

C.

Source User

D.

Source Server

Full Access
Question # 33

You cannot use SmartDashboard’s User Directory features to connect to the LDAP server. What should you investigate?

1) Verify you have read-only permissions as administrator for the operating system.

2) Verify there are no restrictions blocking SmartDashboard's User Manager from connecting to the LDAP server.

3) Check that the login Distinguished Name configured has root permission (or at least write permission Administrative access) in the LDAP Server's access control configuration.

A.

1,2, and 3

B.

2 and 3

C.

1 and 2

D.

1 and 3

Full Access
Question # 34

Which operating systems are supported by a Check Point Security Gateway on an open server? Select MOST complete list.

A.

Sun Solaris, Red Hat Enterprise Linux, Check Point SecurePlatform, IPSO, Microsoft Windows

B.

Check Point GAiA and SecurePlatform, and Microsoft Windows

C.

Check Point GAiA, Microsoft Windows, Red Hat Enterprise Linux, Sun Solaris, IPSO

D.

Check Point GAiA and SecurePlatform, IPSO, Sun Solaris, Microsoft Windows

Full Access
Question # 35

You are the Security Administrator for ABC-Corp. A Check Point Firewall is installed and in use on GAiA. You are concerned that the system might not be retaining your entries for the interfaces and routing configuration. You would like to verify your entries in the corresponding file(s) on GAiA. Where can you view them? Give the BEST answer.

A.

/etc/sysconfig/netconf.C

B.

/etc/conf/route.C

C.

/etc/sysconfig/network-scripts/ifcfg-ethx

D.

/etc/sysconfig/network

Full Access
Question # 36

Where is it necessary to configure historical records in SmartView Monitor to generate Express reports in SmartReporter?

A.

InSmartDashboard, the SmartView Monitor page in the R80 Security Gateway object

B.

In SmartReporter, under Express > Network Activity

C.

In SmartReporter, under Standard > Custom

D.

In SmartView Monitor, under Global Properties > Log and Masters

Full Access
Question # 37

How could you compare the Fingerprint shown to the Fingerprint on the server?

Exhibit:

A.

Run cpconfig, select the Certificate's Fingerprint option and view the fingerprint

B.

Runcpconfig, select the GUI Clients option and view the fingerprint

C.

Run cpconfig, select the Certificate Authority option and view the fingerprint

D.

Run sysconfig, select the Server Fingerprint option and view the fingerprint

Full Access
Question # 38

Write the full fw command and syntax that you would use to troubleshoot ClusterXL sync issues.

Full Access
Question # 39

Which three of the following are ClusterXL member requirements?

1) same operating systems

2) same Check Point version

3) same appliance model

4) same policy

A.

1, 3, and 4

B.

1, 2, and 4

C.

2, 3, and 4

D.

1, 2, and 3

Full Access
Question # 40

What command withappropriate switches would you use to test Identity Awareness connectivity?

A.

test_ldap

B.

test_ad_connectivity

C.

test_ldap_connectivity

D.

test_ad

Full Access
Question # 41

Which of the following CLISH commands would you use to set the admin user's shell to bash?

A.

set user admin shell bash

B.

set user admin shell /bin/bash

C.

set user admin shell = /bin/bash

D.

set user admin /bin/bash

Full Access
Question # 42

Fill in the blank.

InNew Mode HA, the internal cluster IP VIP address is 10.4.8.3. The internal interfaces on two members are 10.4.8.1 and 10.4.8.2 Internal host 10.4.8.108 pings 10.4.8.3, and receives replies. Review the ARP table from the internal Windows host 10.4.8.108. According to the output, which member is the standby machine?

Full Access
Question # 43

Your organization maintains several IKE VPN’s. Executives in your organization want to know which mechanism Security Gateway R80 uses to guarantee the authenticity and integrity of messages. Which technology should you explain to the executives?

A.

Certificate Revocation Lists

B.

Application Intelligence

C.

Key-exchange protocols

D.

Digital signatures

Full Access
Question # 44

You have three Gateways in a mesh community. Each gateway’s VPN Domain is their internal network as defined on the Topologytab setting All IP Addresses behind Gateway based on Topology information.

You want to test the route-based VPN, so you created VTIs among the Gateways and created static route entries for the VTIs. However, when you test the VPN, you find out the VPNstill go through the regular domain IPsec tunnels instead of the routed VTI tunnels.

What is the problem and how do you make the VPN use the VTI tunnels?

A.

Domain VPN takes precedence over the route-based VTI. To make the VPN go through VTI, remove the Gateways out of the mesh community and replace with a star community

B.

Domain VPN takes precedence over the route-based VTI. To make the VPN go through VTI, use an empty group object as each Gateway’s VPN Domain

C.

Route-based VTI takes precedence over theDomain VPN. To make the VPN go through VTI, use dynamic-routing protocol like OSPF or BGP to route the VTI address to the peer instead of static routes

D.

Route-based VTI takes precedence over the Domain VPN. Troubleshoot the static route entries to insurethat they are correctly pointing to the VTI gateway IP.

Full Access
Question # 45

Complete this statement. To save interface information before upgrading a Windows Gateway, use command

Full Access
Question # 46

When do modifications to the Event Policy take effect?

A.

As soon as the Policy Tab window is closed.

B.

When saved on the SmartEvent Server and installed to the Correlation Units.

C.

When saved on the Correlation Units, and pushed as a policy.

D.

When saved on the SmartEvent Client, and installed on the SmartEvent Server.

Full Access
Question # 47

If your firewall is performing a lot of IPS inspection and the CPUs assigned tofw_worker_thread are at or near 100%, which of the following could you do to improve performance?

A.

Add more RAM to the system.

B.

Add more Disk Drives.

C.

Assign more CPU cores to CoreXL

D.

Assign more CPU cores to SecureXL.

Full Access
Question # 48

Type the command and syntax to view critical devices on a cluster member in a ClusterXL environment.

Full Access
Question # 49

To qualify as an Identity Awareness enabled rule, which column MAY include an Access Role?

A.

Source

B.

Track

C.

User

D.

Action

Full Access
Question # 50

What is the command to see cluster status in cli expert mode?

A.

fw ctl stat

B.

clusterXL stat

C.

clusterXL status

D.

cphaprob stat

Full Access
Question # 51

Which of the following is NOT an attribute of packet acceleration?

A.

Source address

B.

Protocol

C.

Destination port

D.

Application Awareness

Full Access
Question # 52

Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, howmany machines will be need if he does NOT include a SmartConsole machine in his calculations?

A.

One machine, but it needs to be installed using SecurePlatform for compatibility purposes.

B.

One machine

C.

Two machines

D.

Three machines

Full Access
Question # 53

You find one of your cluster gateways showing “Down” when you run the “cphaprob stat” command. You then run the “clusterXL_admin up” on the down member but unfortunately the member continues to show down. What command do you run to determine the case?

A.

cphaprob –f register

B.

cphaprob –d–s report

C.

cpstat–f-all

D.

cphaprob –a list

Full Access
Question # 54

SandBlast has several functional components that work together to ensure that attacks are prevented in real-time. Which the following is NOT part of the SandBlastcomponent?

A.

Threat Emulation

B.

Mobile Access

C.

Mail Transfer Agent

D.

Threat Cloud

Full Access
Question # 55

To fully enable Dynamic Dispatcher with Firewall Priority Queues on a Security Gateway, run the following command in Expert mode then reboot:

A.

fw ctl multik set_mode 1

B.

fw ctlDynamic_Priority_Queue on

C.

fw ctl Dynamic_Priority_Queue enable

D.

fw ctl multik set_mode 9

Full Access
Question # 56

You want to gather data and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?

A.

SmartEvent Client Info

B.

SecuRemote

C.

Check Point Protect

D.

Check Point Capsule Cloud

Full Access
Question # 57

What are the blades of Threat Prevention?

A.

IPS, QoS, AntiVirus, AntiBot, Threat Emulation/Extraction

B.

DLP, AntiVirus, QoS, AntiBot, Threat Emulation/Extraction

C.

IPS, AntiVirus, AntiBot

D.

IPS, AntiVirus, AntiBot, Threat Emulation/Extraction

Full Access
Question # 58

On R80.10 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:

A.

18210

B.

18184

C.

257

D.

18191

Full Access
Question # 59

Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single coreCPU. After installation, is the administrator required to perform any additional tasks?

A.

Go to clash-Run cpstop|Run cpstart

B.

Go to clash-Run cpconfig|Configure CoreXL to make use of the additional Cores|Exit cpconfig|Reboot Security Gateway

C.

Administrator does not need to perform any task. Check Point will make use of the newly installed CPU and Cores

D.

Go to clash-Run cpconfig|Configure CoreXL to make use of the additional Cores|Exit cpconfig|Reboot Security Gateway|Install Security Policy

Full Access
Question # 60

You want to store the GAiA configuration in a file for later reference. What command should you use?

A.

write mem <filename>

B.

show config –f <filename>

C.

save config –o <filename>

D.

save configuration <filename>

Full Access
Question # 61

What is the SandBlast Agent designed to do?

A.

Performs OS-level sandboxing for SandBlast Cloud architecture

B.

Ensure the Check Point SandBlast services is running on the end user’s system

C.

If malware enters an end user’s system, the SandBlast Agent prevents the malware form spreading with the network

D.

Clean up email sent with malicious attachments.

Full Access
Question # 62

Customer’s R80 management server needs to be upgraded to R80.10. What is the best upgrade method when the management server is not connected to the Internet?

A.

Export R80 configuration, clean install R80.10 and import the configuration

B.

CPUSE online upgrade

C.

CPUSE offline upgrade

D.

SmartUpdate upgrade

Full Access
Question # 63

In terms of Order Rule Enforcement, when a packet arrives at the gateway, the gateway checks it against the

rules in the top Policy Layer, sequentially from top to bottom. Which of the following statements is correct?

A.

If the Action of the matching rule is Accept, the gateway will drop the packet.

B.

If the Action of the matching rule is Drop, the gateway continues to check rules in the next Policy Layer down. 57D5D1DDCBD40AB3BF70D5D

C.

If the Action of the matching rule is Drop, the gateway stops matching against later rules in the Policy Rule

Base and drops the packet.

D.

If the rule does not matched in the Network policy it will continue to other enabled policies

Full Access
Question # 64

Using Threat Emulation technologies, what is the best way to block .exe and .bat file types?

A.

Enable DLP and select .exe and .bat file type

B.

enable .exe & .batprotection in IPS Policy

C.

create FW rule for particular protocol

D.

tecli advanced attributes set prohibited_file_types exe,bat

Full Access
Question # 65

Daisy need to review how the Security Gateway Cluster, Jonas, behaves when a cluster member comes back on line. Where would she review the behavior of cluster member recovery in the Dashboard?

A.

Open SmartDashboard, select and open the Cluster Object Jonas, Select ClusterXL and review the High Availability recovery options.

B.

Open SmartDashboard, select and open the Cluster Object Jonas, Select Cluster Members and review the High Availability recovery options.

C.

OpenSmartDashboard, select and open the Cluster Object Jonas, Select Topology – Advanced Options and review the High Availability recovery options.

D.

Open SmartDashboard, select and open the Cluster Object Jonas, Select ClusterXL – Advanced Options and reviewthe High Availability recovery options.

Full Access
Question # 66

What is the mechanism behind Threat Extraction?

A.

This is a new mechanism which extracts malicious files from a document to use it as acounter-attack against its sender

B.

This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy it prior to sending it to the intended recipient

C.

This is a new mechanism to identify the IP address of the sender of malicious codes and to put it into the SAM database (Suspicious Activity Monitoring).

D.

Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makesthis solution very fast.

Full Access
Question # 67

The “MAC magic” value must be modified under the following condition:

A.

There is more than one cluster connected to the same VLAN

B.

A firewall cluster is configured to use Multicast for CCP traffic

C.

There are morethan two members in a firewall cluster

D.

A firewall cluster is configured to use Broadcast for CCP traffic

Full Access
Question # 68

Which file gives you a list of all security servers in use, including port number?

A.

$FWDIR/conf/conf.conf

B.

$FWDIR/conf/servers.conf

C.

$FWDIR/conf/fwauthd.conf

D.

$FWDIR/conf/serversd.conf

Full Access
Question # 69

You need to see which hotfixes are installed on your gateway, which command would you use?

A.

cpinfo –h all

B.

cpinfo –o hotfix

C.

cpinfo –l hotfix

D.

cpinfo –y all

Full Access
Question # 70

Which of these options is an implicit MEP option?

A.

Primary-backup

B.

Source addressbased

C.

Round robin

D.

Load Sharing

Full Access
Question # 71

John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to a set of designated IP addresses to minimize malwareinfection and unauthorized access risks. Thus, the gateway policy permits access only from John's desktop which is assigned a static IP address 10.0.0.19.

He has received a new laptop and wants to access the HR Web Server from anywhere in the organization.The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop with a static IP (10.0.0.19).

He wants to move around the organization and continue to have access to the HR Web Server. To make this scenario work, the IT administrator:

1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources, and installs the policy.

2) Adds anaccess role object to the Firewall Rule Base that lets John Adams access the HR Web Server from any machine and from any location and installs policy.

John plugged in his laptop to the network on a different network segment and was not able to connect to the HR Web server. What is the next BEST troubleshooting step?

A.

Investigate this as a network connectivity issue

B.

Install the Identity Awareness Agent

C.

Set static IP to DHCP

D.

After enabling Identity Awareness, reboot the gateway

Full Access
Question # 72

Type the full fw command and syntax that will show full synchronization status.

Full Access
Question # 73

What are the methods of SandBlast Threat Emulation deployment?

A.

Cloud, Appliance and Private

B.

Cloud,Appliance and Hybrid

C.

Cloud, Smart-1 and Hybrid

D.

Cloud, OpenServer and VMware

Full Access
Question # 74

Check Point APIs allow system engineers and developers to make changes to their organization’s security policy with CLI tools and Web Services for all of the following except?

A.

Create new dashboards to manage 3rd party task

B.

Create products that use and enhance 3rd party solutions.

C.

Execute automated scripts to perform common tasks.

D.

Create products that use and enhance the Check Point Solution.

Full Access
Question # 75

Vanessa is expecting a very important Security Report. The Document should be sent as an attachment via e-mail. An e-mail with Security_ report.pdf file was delivered to her e-mail inbox. When she opened the PDF file, she noticed that the file is basically empty and only few lines of text are in it. The report is missing some graphs, tables and links. Which component of SandBlast protection isher company using on a Gateway?

A.

SandBlast Threat Emulation

B.

SandBlast Agent

C.

Check Point Protect

D.

SandBlast Threat Extraction

Full Access