P.S. Real 156-915.80 discount pack are available on Google Drive, GET MORE: https://drive.google.com/open?id=1UHtXnNXw0Sz3rmLlziAf9CI0FDZ1fvFf
New Questions 1
What is the purpose of the pre-defined exclusions included with SmartEvent R80?
A. To allow SmartEvent R80 to function properly with all other R71 devices.
B. To avoid incorrect event generation by the default IPS event definition; a scenario that may occur in deployments that include Security Gateways of versions prior to R71.
C. As a base for starting and building exclusions.
D. To give samples of how to write your own exclusion.
Answer: B
New Questions 2
You intend to upgrade a Check Point Gateway from R71 to R80. Prior to upgrading, you want to back up the Gateway should there be any problems with the upgrade. Which of the following allows for the Gateway configuration to be completely backed up into a manageable size in the least amount of time?
A. database revision
B. snapshot
C. upgrade_export
D. backup
Answer: D
New Questions 3
When restoring R80 using the command upgrade_import, which of the following items are NOT restored?
A. SIC Certificates
B. Licenses
C. Route tables
D. Global properties
Answer: C
New Questions 4
What CLI command will reset the IPS pattern matcher statistics?
A. ips reset pmstat
B. ips pstats reset
C. ips pmstats refresh
D. ips pmstats reset
Answer: D
Explanation:
ips pmstats reset
Description - Resets the data that is collected to calculate the pmstat statistics. Usage - ips pmstats reset
New Questions 5
Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use her iPad to access the internal Finance Web server. Because the iPad is not a member of the Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter her AD credentials in the Captive Portal and then get the same access as on her office computer. Her access to resources is based on rules in the R80 Firewall Rule Base.
To make this scenario work, the IT administrator must:
1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity Sources.
2) In the Portal Settings window in the User Access section, make sure that Name and password login is selected.
3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network destinations. Select accept as the Action.
Ms. McHanry tries to access the resource but is unable. What should she do?
A. Have the security administrator select the Action field of the Firewall Rule u201cRedirect HTTP connections to an authentication (captive) portalu201d
B. Have the security administrator reboot the firewall
C. Have the security administrator select Any for the Machines tab in the appropriate Access Role
D. Install the Identity Awareness agent on her iPad
Answer: A
New Questions 6
Fill in the blank. To save your OSPF configuration in GAiA, enter the command .
Answer:
save config
New Questions 7
Your R80 primary Security Management Server is installed on GAiA. You plan to schedule the Security Management Server to run fw logswitch automatically every 48 hours. How do you create this schedule?
A. On a GAiA Security Management Server, this can only be accomplished by configuring the command fw logswitch via the cron utility.
B. Create a time object, and add 48 hours as the interval. Open the primary Security Management Server objectu2021s Logs and Masters window, enable Schedule log switch, and select the Time object.
C. Create a time object, and add 48 hours as the interval. Open the Security Gateway object's Logs and Masters window, enable Schedule log switch, and select the Time object.
D. Create a time object, and add 48 hours as the interval. Select that time objectu2021s Global Properties > Logs and Masters window, to schedule a logswitch.
Answer: B
New Questions 8
To stop acceleration on a GAiA Security Gateway, enter command:
Answer:
fwaccel off
New Questions 9
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?
A. Anti-Bot is the only countermeasure against unknown malware
B. Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control Centers
C. Anti-Bot is the only signature-based method of malware protection
D. Anti-Bot is a post-infection malware protection to prevent a host from establishing a connection to a Command & Control Center
Answer: D
New Questions 10
Your companyu2021s Security Policy forces users to authenticate to the Gateway explicitly, before they can use any services. The Gateway does not allow the Telnet service to itself from any location. How would you configure authentication on the Gateway? With a:
A. Client Authentication rule using the manual sign-on method, using HTTP on port 900
B. Client Authentication rule, using partially automatic sign on
C. Client Authentication for fully automatic sign on
D. Session Authentication rule
Answer: A
100% Renewal Check Point 156-915.80 Questions & Answers shared by Allfreedumps, Get HERE: https://www.allfreedumps.com/156-915.80-dumps.html (New Q&As)