Download CCSE Update R80.156-915.80.Train4Sure.2019-04-08.103q.vcex

Vendor: Checkpoint
Exam Code: 156-915.80
Exam Name: CCSE Update R80
Date: Apr 08, 2019
File Size: 81 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Which is the correct order of a log flow processed by SmartEvents components:
  1. Firewall > Correlation Unit > Log Server > SmartEvent Server Database > SmartEvent Client
  2. Firewall > SmartEvent Server Database > Correlation unit > Log Server > SmartEvent Client
  3. Firewall > Log Server > SmartEvent Server Database > Correlation Unit > SmartEvent Client
  4. Firewall > Log Server > Correlation Unit > SmartEvent Server Database > SmartEvent Client
Correct answer: D
Question 2
In SmartEvent, what are the different types of automatic reactions that the administrator can configure?
  1. Mail, Block Source, Block Event Activity, External Script, SNMP Trap
  2. Mail, Block Source, Block Destination, Block Services, SNMP Trap
  3. Mail, Block Source, Block Destination, External Script, SNMP Trap
  4. Mail, Block Source, Block Event Activity, Packet Capture, SNMP Trap
Correct answer: A
Explanation:
These are the types of Automatic Reactions:Mail - tell an administrator by email that the event occurred. See Create a Mail Reaction. Block Source - instruct the Security Gateway to block the source IP address from which this event was detected for a configurable period of time . Select a period of time from one minute to more than three weeks. See Create a Block Source Reaction Block Event activity - instruct the Security Gateway to block a distributed attack that emanates from multiple sources, or attacks multiple destinations for a configurable period of time. Select a period of time from one minute to more than three weeks). See Create a Block Event Activity Reaction. External Script - run a script that you provide. See Creating an External Script Automatic Reaction to write a script that can exploit SmartEvent data. SNMP Trap - generate an SNMP Trap. See Create an SNMP Trap Reaction. Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_LoggingAndMonitoring/html_frameset.htm?topic=documents/R80/CP_R80_LoggingAndMonitoring/131915
These are the types of Automatic Reactions:
  • Mail - tell an administrator by email that the event occurred. See Create a Mail Reaction. 
  • Block Source - instruct the Security Gateway to block the source IP address from which this event was detected for a configurable period of time . Select a period of time from one minute to more than three weeks. See Create a Block Source Reaction 
  • Block Event activity - instruct the Security Gateway to block a distributed attack that emanates from multiple sources, or attacks multiple destinations for a configurable period of time. Select a period of time from one minute to more than three weeks). See Create a Block Event Activity Reaction. 
  • External Script - run a script that you provide. See Creating an External Script Automatic Reaction to write a script that can exploit SmartEvent data. 
  • SNMP Trap - generate an SNMP Trap. See Create an SNMP Trap Reaction. 
Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_LoggingAndMonitoring/html_frameset.htm?topic=documents/R80/CP_R80_LoggingAndMonitoring/131915
Question 3
Which components allow you to reset a VPN tunnel?
  1. vpn  tu command or SmartView monitor
  2. delete   vpn   ike   sa or vpn she11 command
  3. vpn   tunnelutil or delete   vpn   ike   sa command
  4. SmartView monitor only
Correct answer: D
Question 4
You find one of your cluster gateways showing “Down” when you run the “cphaprob stat” command. You then run the “clusterXL_admin up” on the down member but unfortunately the member continues to show down. What command do you run to determine the case?
  1. cphaprob –f register
  2. cphaprob –d–s report
  3. cpstat–f-all
  4. cphaprob –a list
Correct answer: D
Explanation:
Reference: http://dl3.checkpoint.com/paid/63/6357d81e3b75b5a09a422d715c3b3d79/CP_R80.10_ClusterXL_AdminGuide.pdf?HashKey=1522170580_c51bd784a86600b5f6141c0f1a6322fd&xtn=.pdf
Reference: http://dl3.checkpoint.com/paid/63/6357d81e3b75b5a09a422d715c3b3d79/CP_R80.10_ClusterXL_AdminGuide.pdf?HashKey=1522170580_c51bd784a86600b5f6141c0f1a6322fd&xtn=.pdf
Question 5
SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day Protection?
  1. Smart Cloud Services
  2. Load Sharing Mode Services
  3. Threat Agent Solution
  4. Public Cloud Services
Correct answer: C
Explanation:
Reference: https://www.checkpoint.com/products/threat-emulation-sandboxing/
Reference: https://www.checkpoint.com/products/threat-emulation-sandboxing/
Question 6
Which of the following is NOT a valid way to view interface’s IP address settings in Gaia?
  1. Using the command sthtool in Expert Mode
  2. Viewing the file / config/ active
  3. Via the Gaia WebUl
  4. Via the command show  configuration in CLISH
Correct answer: A
Question 7
Check Point recommends configuring Disk Space Management parameters to delete old log entities when available disk space is less than or equal to?
  1. 50%
  2. 75%
  3. 80%
  4. 15%
Correct answer: D
Question 8
What are types of Check Point APIs available currently as part of R80.10 code?
  1. Security Gateway API, Management API, Threat Prevention API and Identity Awareness Web Services API
  2. Management API, Threat Prevention API, Identity Awareness Web Services API and OPSEC SDK API
  3. OSE API, OPSEC SDK API, Threat Extraction API and Policy Editor API
  4. CPMI API, Management API, Threat Prevention API and Identity Awareness Web Services API
Correct answer: B
Explanation:
Reference: http://dl3.checkpoint.com/paid/29/29532b9eec50d0a947719ae631f640d0/CP_R80_CheckPoint_API_ReferenceGuide.pdf?HashKey=1522171994_d7bae71a861bbc54c18c61420e586d77&xtn=.pdf
Reference: http://dl3.checkpoint.com/paid/29/29532b9eec50d0a947719ae631f640d0/CP_R80_CheckPoint_API_ReferenceGuide.pdf?HashKey=1522171994_d7bae71a861bbc54c18c61420e586d77&xtn=.pdf
Question 9
Which of the following is NOT an internal/native Check Point command? 
  1. fwaccel  on
  2. fw  ct1  debug
  3. tcpdump
  4. cphaprob
Correct answer: C
Question 10
What is the SandBlast Agent designed to do?
  1. Performs OS-level sandboxing for SandBlast Cloud architecture
  2. Ensure the Check Point SandBlast services is running on the end user’s system
  3. If malware enters an end user’s system, the SandBlast Agent prevents the malware form spreading with the network
  4. Clean up email sent with malicious attachments.
Correct answer: C
Explanation:
Reference: https://www.checkpoint.com/downloads/product-related/datasheets/ds-sandblast-agent.pdf
Reference: https://www.checkpoint.com/downloads/product-related/datasheets/ds-sandblast-agent.pdf
Question 11
Which is the correct order of a log flow processed by SmartEvents components:
  1. Firewall > Correlation Unit > Log Server > SmartEvent Server Database > SmartEvent Client
  2. Firewall > SmartEvent Server Database > Correlation unit > Log Server > SmartEvent Client
  3. Firewall > Log Server > SmartEvent Server Database > Correlation Unit > SmartEvent Client
  4. Firewall > Log Server > Correlation Unit > SmartEvent Server Database > SmartEvent Client
Correct answer: D
Question 12
In SmartEvent, what are the different types of automatic reactions that the administrator can configure?
  1. Mail, Block Source, Block Event Activity, External Script, SNMP Trap
  2. Mail, Block Source, Block Destination, Block Services, SNMP Trap
  3. Mail, Block Source, Block Destination, External Script, SNMP Trap
  4. Mail, Block Source, Block Event Activity, Packet Capture, SNMP Trap
Correct answer: A
Explanation:
These are the types of Automatic Reactions:Mail - tell an administrator by email that the event occurred. See Create a Mail Reaction. Block Source - instruct the Security Gateway to block the source IP address from which this event was detected for a configurable period of time . Select a period of time from one minute to more than three weeks. See Create a Block Source Reaction Block Event activity - instruct the Security Gateway to block a distributed attack that emanates from multiple sources, or attacks multiple destinations for a configurable period of time. Select a period of time from one minute to more than three weeks). See Create a Block Event Activity Reaction. External Script - run a script that you provide. See Creating an External Script Automatic Reaction to write a script that can exploit SmartEvent data. SNMP Trap - generate an SNMP Trap. See Create an SNMP Trap Reaction. Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_LoggingAndMonitoring/html_frameset.htm?topic=documents/R80/CP_R80_LoggingAndMonitoring/131915
These are the types of Automatic Reactions:
  • Mail - tell an administrator by email that the event occurred. See Create a Mail Reaction. 
  • Block Source - instruct the Security Gateway to block the source IP address from which this event was detected for a configurable period of time . Select a period of time from one minute to more than three weeks. See Create a Block Source Reaction 
  • Block Event activity - instruct the Security Gateway to block a distributed attack that emanates from multiple sources, or attacks multiple destinations for a configurable period of time. Select a period of time from one minute to more than three weeks). See Create a Block Event Activity Reaction. 
  • External Script - run a script that you provide. See Creating an External Script Automatic Reaction to write a script that can exploit SmartEvent data. 
  • SNMP Trap - generate an SNMP Trap. See Create an SNMP Trap Reaction. 
Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_LoggingAndMonitoring/html_frameset.htm?topic=documents/R80/CP_R80_LoggingAndMonitoring/131915
Question 13
Which components allow you to reset a VPN tunnel?
  1. vpn  tu command or SmartView monitor
  2. delete   vpn   ike   sa or vpn she11 command
  3. vpn   tunnelutil or delete   vpn   ike   sa command
  4. SmartView monitor only
Correct answer: D
Question 14
You find one of your cluster gateways showing “Down” when you run the “cphaprob stat” command. You then run the “clusterXL_admin up” on the down member but unfortunately the member continues to show down. What command do you run to determine the case?
  1. cphaprob –f register
  2. cphaprob –d–s report
  3. cpstat–f-all
  4. cphaprob –a list
Correct answer: D
Explanation:
Reference: http://dl3.checkpoint.com/paid/63/6357d81e3b75b5a09a422d715c3b3d79/CP_R80.10_ClusterXL_AdminGuide.pdf?HashKey=1522170580_c51bd784a86600b5f6141c0f1a6322fd&xtn=.pdf
Reference: http://dl3.checkpoint.com/paid/63/6357d81e3b75b5a09a422d715c3b3d79/CP_R80.10_ClusterXL_AdminGuide.pdf?HashKey=1522170580_c51bd784a86600b5f6141c0f1a6322fd&xtn=.pdf
Question 15
SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day Protection?
  1. Smart Cloud Services
  2. Load Sharing Mode Services
  3. Threat Agent Solution
  4. Public Cloud Services
Correct answer: C
Explanation:
Reference: https://www.checkpoint.com/products/threat-emulation-sandboxing/
Reference: https://www.checkpoint.com/products/threat-emulation-sandboxing/
Question 16
Which of the following is NOT a valid way to view interface’s IP address settings in Gaia?
  1. Using the command sthtool in Expert Mode
  2. Viewing the file / config/ active
  3. Via the Gaia WebUl
  4. Via the command show  configuration in CLISH
Correct answer: A
Question 17
Check Point recommends configuring Disk Space Management parameters to delete old log entities when available disk space is less than or equal to?
  1. 50%
  2. 75%
  3. 80%
  4. 15%
Correct answer: D
Question 18
What are types of Check Point APIs available currently as part of R80.10 code?
  1. Security Gateway API, Management API, Threat Prevention API and Identity Awareness Web Services API
  2. Management API, Threat Prevention API, Identity Awareness Web Services API and OPSEC SDK API
  3. OSE API, OPSEC SDK API, Threat Extraction API and Policy Editor API
  4. CPMI API, Management API, Threat Prevention API and Identity Awareness Web Services API
Correct answer: B
Explanation:
Reference: http://dl3.checkpoint.com/paid/29/29532b9eec50d0a947719ae631f640d0/CP_R80_CheckPoint_API_ReferenceGuide.pdf?HashKey=1522171994_d7bae71a861bbc54c18c61420e586d77&xtn=.pdf
Reference: http://dl3.checkpoint.com/paid/29/29532b9eec50d0a947719ae631f640d0/CP_R80_CheckPoint_API_ReferenceGuide.pdf?HashKey=1522171994_d7bae71a861bbc54c18c61420e586d77&xtn=.pdf
Question 19
Which of the following is NOT an internal/native Check Point command? 
  1. fwaccel  on
  2. fw  ct1  debug
  3. tcpdump
  4. cphaprob
Correct answer: C
Question 20
What is the SandBlast Agent designed to do?
  1. Performs OS-level sandboxing for SandBlast Cloud architecture
  2. Ensure the Check Point SandBlast services is running on the end user’s system
  3. If malware enters an end user’s system, the SandBlast Agent prevents the malware form spreading with the network
  4. Clean up email sent with malicious attachments.
Correct answer: C
Explanation:
Reference: https://www.checkpoint.com/downloads/product-related/datasheets/ds-sandblast-agent.pdf
Reference: https://www.checkpoint.com/downloads/product-related/datasheets/ds-sandblast-agent.pdf
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!