Using 156-315.80 Exam Dumps (Updated) Prepare For The Best Exams

Our passitdump.com has updated the 156-315.80 exam dumps in line with the latest Check Point Certified Security Expert (CCSE) R80 exam changes, which is the best learning material for preparing for the 156-315.80 exam, and with it, the 156-315.80 exam is no longer difficult.

100% authentic 156-315.80 certification exam questions and answers to help you prepare for the exam.

Check 156-315.80 free questions to get a better understanding of 156-315.80 exams.

Question 1:

On the following picture an administrator configures Identity Awareness:

After clicking “Next” the above configuration is supported by:

A. Kerberos SSO which will be working for Active Directory integration

B. Based on Active Directory integration which allows the Security Gateway to correlate Active Directory users and machines to IP addresses in a method that is completely transparent to the user.

C. Obligatory usage of Captive Portal.

D. The ports 443 or 80 what will be used by Browser-Based and configured Authentication.

Correct Answer: B

Reference: https://sc1.checkpoint.com/documents/R80/CP_R80BC_IdentityAwareness/ html_frameset.htm?topic=documents/R80/CP_R80BC_IdentityAwareness/62050


Question 2:

Which of the completed statements is NOT true? The WebUI can be used to manage user accounts and:

A. assign privileges to users.

B. edit the home directory of the user.

C. add users to your Gaia system.

D. assign user rights to their home directory in the Security Management Server.

Correct Answer: D

Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_Gaia_WebAdmin/73101.htm


Question 3:

In the Check Point Security Management Architecture, which component(s) can store logs?

A. SmartConsole

B. Security Management Server and Security Gateway

C. Security Management Server

D. SmartConsole and Security Management Server

Correct Answer: B


Question 4:

View the rule below. What does the lock-symbol in the left column mean? (Choose the BEST answer.)

A. The current administrator has read-only permissions to Threat Prevention Policy.

B. Another user has locked the rule for editing.

C. Configuration lock is present. Click the lock symbol to gain read-write access.

D. The current administrator is logged in as read-only because someone else is editing the policy.

Correct Answer: B

https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm?topic=documents/ R80/CP_R80_SecMGMT/124265


Question 5:

By default, which port does the WebUI listen on?

A. 80

B. 4434

C. 443

D. 8080

Correct Answer: C

Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_Gaia_IUG/html_frameset.htm? topic=documents/R80/CP_R80_Gaia_IUG/132120


Question 6:

Which VPN routing option uses VPN routing for every connection a satellite gateway handles?

A. To satellites through center only

B. To center only

C. To center and to other satellites through center

D. To center, or through the center to other satellites, to Internet and other VPN targets

Correct Answer: D

Reference: https://supportcenter.checkpoint.com/supportcenter/portal? eventSubmit_doGoviewsolutiondetails=andsolutionid=sk31021


Question 7:

Kofi, the administrator of the ALPHA Corp network wishes to change the default Gaia WebUI Portal port number currently set on the default HTTPS port. Which CLISH commands are required to be able to change this TCP port?

A. set web ssl-port

B. set Gaia-portal port

C. set Gaia-portal https-port

D. set web https-port

Correct Answer: A

Reference: https://supportcenter.checkpoint.com/supportcenter/portal? eventSubmit_doGoviewsolutiondetails=andsolutionid=sk83482


Question 8:

Joey want to configure NTP on R80 Security Management Server. He decided to do this via WebUI. What is the correct address to access the Web UI for Gaia platform via browser?

A. https://

B. http://:443

C. https://:10000

D. https://:4434

Correct Answer: A

Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_Gaia_AdminWebAdminGuide/ html_frameset.htm?topic=documents/R77/CP_R77_Gaia_AdminWebAdminGuide/75930


Question 9:

The “Hit count” feature allows tracking the number of connections that each rule matches. Will the Hit

count feature work independently from logging and Track the hits if the Track option is set to “None”?

A. No, it will work independently. Hit Count will be shown only for rules Track option set as Log or alert.

B. Yes it will work independently as long as “analyze all rules” tick box is enabled on the Security Gateway.

C. No, it will not work independently because hit count requires all rules to be logged.

D. Yes it will work independently because when you enable Hit Count, the SMS collects the data from supported Security Gateways.

Correct Answer: D

Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_SecMGMT/html_frameset.htm? topic=documents/R80/CP_R80_SecMGMT/126197


Question 10:

Fill in the blank: Permanent VPN tunnels can be set on all tunnels in the community, on all tunnels for specific gateways, or ______ .

A. On all satellite gateway to satellite gateway tunnels

B. On specific tunnels for specific gateways

C. On specific tunnels in the community

D. On specific satellite gateway to central gateway tunnels

Correct Answer: C

Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/html_frameset.htm? topic=documents/R77/CP_R77_VPN_AdminGuide/14018


Question 11:

True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway.

A. True, CLI is the prefer method for Licensing

B. False, Central License are handled via Security Management Server

C. False, Central Licenses are installed via Gaia on Security Gateways

D. True, Central License can be installed with CPLIC command on a Security Gateway

Correct Answer: D


Question 12:

In which VPN community is a satellite VPN gateway not allowed to create a VPN tunnel with another satellite VPN gateway?

A. Pentagon

B. Combined

C. Meshed

D. Star

Correct Answer: D

Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_Firewall_WebAdmin/92709.htm


Question 13:

When a packet arrives at the gateway, the gateway checks it against the rules in the hop Policy Layer, sequentially from top to bottom, and enforces the first rule that matches a packet. Which of the following statements about the order of rule enforcement is true?

A. If the Action is Accept, the gateway allows the packet to pass through the gateway.

B. If the Action is Drop, the gateway continues to check rules in the next Policy Layer down.

C. If the Action is Accept, the gateway continues to check rules in the next Policy Layer down.

D. If the Action is Drop, the gateway applies the Implicit Clean-up Rule for that Policy Layer.

Correct Answer: C


Question 14:

Which of the following is an identity acquisition method that allows a Security Gateway to identify Active Directory users and computers?

A. UserCheck

B. Active Directory Query

C. Account Unit Query

D. User Directory Query

Correct Answer: B

Reference : https://sc1.checkpoint.com/documents/R76/ CP_R76_IdentityAwareness_AdminGuide/62402.htm


Question 15:

Why would an administrator see the message below?

A. A new Policy Package created on both the Management and Gateway will be deleted and must be backed up first before proceeding.

B. A new Policy Package created on the Management is going to be installed to the existing Gateway.

C. A new Policy Package created on the Gateway is going to be installed on the existing Management.

D. A new Policy Package created on the Gateway and transferred to the Management will be overwritten by the Policy Package currently on the Gateway but can be restored from a periodic backup on the Gateway.

Correct Answer: B