P.S. Highest Quality 156-915.80 discount pack are available on Google Drive, GET MORE: https://drive.google.com/open?id=1kHtvfzv89_QPh4A3_cAnuAFq9mDuP3yP
Question No: 2
A snapshot delivers a complete GAiA backup. The resulting file can be stored on servers or as a local file in /var/CPsnapshot/snapshots. How do you restore a local snapshot named MySnapshot.tgz?
A. Reboot the system and call the start menu. Select the option Snapshot Management, provide the Expert password and select [L] for a restore from a local file. Then, provide the correct file name.
B. As expert user, type the command snapshot -r MySnapshot.tgz.
C. As expert user, type the command revert --file MySnapshot.tgz.
D. As expert user, type the command snapshot - R to restore from a local file. Then, provide the correct file name.
Answer: C
Question No: 3
Use the table to match the BEST Management High Availability synchronication-status descriptions for your Security Management Server (SMS).
Exhibit:
A. A-5, B-3, C-1, D-2
B. A-3, B-1, C-4, D-2
C. A-3, B-5, C-2, D-4
D. A-3, B-1, C-5, D-4
Answer: D
Question No: 4
Type the command and syntax you would use to verify that your Check Point cluster is functioning correctly.
Answer:
cphaprob state
Question No: 5
You are troubleshooting a HTTP connection problem. You've started fw monitor -o http.pcap. When you open http.pcap with Wireshark there is only one line. What is the most likely reason?
A. fw monitor was restricted to the wrong interface.
B. Like SmartView Tracker only the first packet of a connection will be captured by fw monitor.
C. By default only SYN pakets are captured.
D. Acceleration was turned on and therefore fw monitor sees only SYN.
Answer: D
Question No: 6
You want to establish a VPN, using certificates. Your VPN will exchange certificates with an external partner. Which of the following activities should you do first?
A. Exchange exported CA keys and use them to create a new server object to represent your partneru2021s Certificate Authority (CA).
B. Create a new logical-server object to represent your partneru2021s CA.
C. Manually import your partneru2021s Access Control List.
D. Manually import your partneru2021s Certificate Revocation List.
Answer: A
Question No: 7
Which of the following tools is used to generate a Security Gateway R80 configuration report?
A. fw cpinfo
B. infoCP
C. cpinfo
D. infoview
Answer: C
Question No: 8
You have three servers located in a DMZ, using private IP addresses. You want internal users from 10.10.10.x to access the DMZ servers by public IP addresses. Internal_net 10.10.10.x is configured for Hide NAT behind the Security Gatewayu2021s external interface.
What is the best configuration for 10.10.10.x users to access the DMZ servers, using the DMZ serversu2021 public IP addresses?
A. When connecting to internal network 10.10.10.x, configure Hide NAT for the DMZ network behind the Security Gateway DMZ interface.
B. When the source is the internal network 10.10.10.x, configure manual static NAT rules to translate the DMZ servers.
C. When connecting to the Internet, configure manual Static NAT rules to translate the DMZ servers.
D. When trying to access DMZ servers, configure Hide NAT for 10.10.10.x behind the DMZu2021s interface.
Answer: B
Question No: 9
Match the ClusterXL modes with their configurations. Exhibit:
A. A-2, B-3, C-4, D-1
B. A-2, B-3, C-1, D-5
C. A-3, B-5, C-1, D-4
D. A-5, B-2, C-4, D-1
Answer: C
Question No: 10
Because of pre-existing design constraints, you set up manual NAT rules for your HTTP server. However, your FTP server and SMTP server are both using automatic NAT rules. All traffic from your FTP and SMTP servers are passing through the Security Gateway without a problem, but traffic from the Web server is dropped on rule 0 because of anti-spoofing settings. What is causing this?
A. Manual NAT rules are not configured correctly.
B. Allow bi-directional NAT is not checked in Global Properties.
C. Routing is not configured correctly.
D. Translate destination on client side is not checked in Global Properties under Manual NAT Rules.
Answer: D
Question No: 11
Complete this statement from the options provided. Using Captive Portal, unidentified users may be either; blocked, allowed to enter required credentials, or required to download the .
A. Identity Awareness Agent
B. Full Endpoint Client
C. ICA Certificate
D. SecureClient
Answer: A
Recommend!! Get the Highest Quality 156-915.80 dumps in VCE and PDF From Thedumpscentre, Welcome to download: http://www.thedumpscentre.com/156-915.80-dumps/ (New Q&As Version)