Leads4pass > CheckPoint > Checkpoint Certifications > 156-315.80 > 156-315.80 Online Practice Questions and Answers

156-315.80 Online Practice Questions and Answers

Questions 4

How is communication between different Check Point components secured in R80? As with all questions, select the BEST answer.

A. By using IPSEC

B. By using SIC

C. By using ICA

D. By using 3DES

Buy Now
Questions 5

What is the default size of NAT table fwx_alloc?

A. 20000

B. 35000

C. 25000

D. 10000

Buy Now
Questions 6

Which one of the following is true about Threat Extraction?

A. Always delivers a file to user

B. Works on all MS Office, Executables, and PDF files

C. Can take up to 3 minutes to complete

D. Delivers file only if no threats found

Buy Now
Questions 7

Which tool is used to enable ClusterXL?

A. SmartUpdate

B. cpconfig

C. SmartConsole

D. sysconfig

Buy Now
Questions 8

When Configuring Endpoint Compliance Settings for Applications and Gateways within Mobile Access, which of the three approaches will allow you to contuju'1* individual policies for each application?

A. Basic Approach

B. Strong Approach

C. Very Advanced Approach

D. Medium Approach

Buy Now
Questions 9

The "fw monitor" tool can be best used to troubleshoot _______________.

A. Logging issues

B. FWD issues

C. Network traffic issues

D. Authentication issues

Buy Now
Questions 10

Matt wants to upgrade his old Security Management Server to R80.x using the Advanced Upgrade with Database Migration. What is one of the requirements for a successful upgrade?

A. Size of the /var/log folder of the source machine must be at least 25% of the size of the /var/log directory on the target machine

B. Size of the /var/log folder of the target machine must be at least 25% of the size of the /var/log directory on the source machine

C. Size of the $FWDIR/log folder of the target machine must be at least 25% of the size of the $FWDIR/ log directory on the source machine

D. Size of the /var/log folder of the target machine must be at least 25GB or more

Buy Now
Questions 11

In SmartConsole, where do you manage your Mobile Access Policy?

A. Access Control Policy

B. Through the Mobile Console

C. Shared Gateways Policy

D. From the Dedicated Mobility Tab

Buy Now
Questions 12

John is using Management HA. Which Security Management Server should he use for making changes?

A. secondary Smartcenter

B. active SmartConsole

C. connect virtual IP of Smartcenter HA

D. primary Log Server

Buy Now
Questions 13

In Threat Prevention, you can create new or clone profiles but you CANNOT change the out-of-the-box profiles of:

A. Basic, Optimized, Strict

B. Basic, Optimized, Severe

C. General, Escalation, Severe

D. General, purposed, Strict

Buy Now
Exam Code: 156-315.80
Exam Name: Check Point Certified Security Expert - R80 (CCSE)
Last Update: Jan 10, 2025
Questions: 483
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99