156-315.80 Dumps

156-315.80 Free Practice Test

Check-Point 156-315.80: Check Point Certified Security Expert - R80

QUESTION 151

What has to be taken into consideration when configuring Management HA?

Correct Answer: A

QUESTION 152

What is the correct command to observe the Sync traffic in a VRRP environment?

Correct Answer: D

QUESTION 153

Which statements below are CORRECT regarding Threat Prevention profiles in SmartDashboard?

Correct Answer: C

QUESTION 154

Fill in the blank: The R80 feature _______ permits blocking specific IP addresses for a specified time period.

Correct Answer: C
Suspicious Activity Rules Solution
Suspicious Activity Rules is a utility integrated into SmartView Monitor that is used to modify access privileges upon detection of any suspicious network activity (for example, several attempts to gain unauthorized access).
The detection of suspicious activity is based on the creation of Suspicious Activity rules. Suspicious Activity rules are Firewall rules that enable the system administrator to instantly block suspicious connections that are not restricted by the currently enforced security policy. These rules, once set (usually with an expiration date), can be applied immediately without the need to perform an Install Policy operation.
References:

QUESTION 155

You have a Gateway is running with 2 cores. You plan to add a second gateway to build a cluster and used a device with 4 cores.
How many cores can be used in a Cluster for Firewall-kernel on the new device?

Correct Answer: D