P.S. Free 156-915.80 training materials are available on Google Drive, GET MORE: https://drive.google.com/open?id=1UHtXnNXw0Sz3rmLlziAf9CI0FDZ1fvFf
Question No: 1
Which two processes are responsible on handling Identity Awareness?
A. pdp and lad
B. pdp and pdp-11
C. pep and lad
D. pdp and pep
Answer: D
Question No: 2
SmartEvent does NOT use which of the following procedures to identify events?
A. Matching a log against each event definition
B. Create an event candidate
C. Matching a log against local exclusions
D. Matching a log against global exclusions
Answer: C
Explanation:
Events are detected by the SmartEvent Correlation Unit. The Correlation Unit task is to scan logs for criteria that match an Event Definition. SmartEvent uses these procedures to identify events:
Matching a Log Against Global Exclusions
Matching a Log Against Each Event Definition
Creating an Event Candidate
When a Candidate Becomes an Event
Question No: 3
The command useful for debugging by capturing packet information, including verifying LDAP authentication on all Check Point platforms is
Answer:
fw monitor
Question No: 4
In the following cluster configuration; if you reboot sglondon_1 which device will be active when sglondon_1 is back up and running? Why?
A. sglondon_1 because it the first configured object with the lowest IP.
B. sglondon_2 because sglondon_1 has highest IP.
C. sglondon_1, because it is up again, sglondon_2 took over during reboot.
D. sglondon_2 because it has highest priority.
Answer: D
Question No: 5
When do modifications to the Event Policy take effect?
A. As soon as the Policy Tab window is closed.
B. When saved on the SmartEvent Server and installed to the Correlation Units.
C. When saved on the Correlation Units, and pushed as a policy.
D. When saved on the SmartEvent Client, and installed on the SmartEvent Server.
Answer: B
Question No: 6
Where do you verify that UserDirectory is enabled?
A. Verify that Security Gateway > General Properties > Authentication > Use UserDirectory (LDAP) for Security Gateways is checked
B. Verify that Global Properties > Authentication > Use UserDirectory (LDAP) for Security Gateways is checked
C. Verify that Security Gateway > General Properties > UserDirectory (LDAP) > Use UserDirectory (LDAP) for Security Gateways is checked
D. Verify that Global Properties > UserDirectory (LDAP) > Use UserDirectory (LDAP) for Security Gateways is checked
Answer: D
Question No: 7
Looking at the SYN packets in the Wireshark output, select the statement that is true about NAT.
A. This is an example of Hide NAT.
B. There is not enough information provided in the Wireshark capture to determine the NAT settings.
C. This is an example of Static NAT and Translate destination on client side unchecked in Global Properties.
D. This is an example of Static NAT and Translate destination on client side checked in Global Properties.
Answer: D
Question No: 8
ALL of the following options are provided by the GAiA sysconfig utility, EXCEPT:
A. Export setup
B. DHCP Server configuration
C. Time & Date
D. GUI Clients
Answer: D
Question No: 9
John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the gateway
policy permits access only from John's desktop which is assigned a static IP address 10.0.0.19.
John received a laptop and wants to access the HR Web Server from anywhere in the organization. The IT department gave the laptop a static IP address, but that limits him to operating it only from his desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his laptop with a static IP (10.0.0.19). He wants to move around the organization and continue to have access to the HR Web Server.
To make this scenario work, the IT administrator:
1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs the policy.
2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web Server from any machine and from any location.
What should John do when he cannot access the web server from a different personal computer?
A. John should lock and unlock his computer
B. Investigate this as a network connectivity issue
C. The access should be changed to authenticate the user instead of the PC
D. John should install the Identity Awareness Agent
Answer: C
Question No: 10
When defining QoS global properties, which option below is not valid?
A. Weight
B. Authenticated timeout
C. Schedule
D. Rate
Answer: C
P.S. Easily pass 156-915.80 Exam with Examcollection Free Dumps & pdf vce, Try Free: http://www.examcollectionuk.com/156-915.80-vce-download.html ( New Questions)