156-315.80 Dumps

156-315.80 Free Practice Test

Check-Point 156-315.80: Check Point Certified Security Expert - R80

QUESTION 181

What is the mechanism behind Threat Extraction?

Correct Answer: D

QUESTION 182

When gathering information about a gateway using CPINFO, what information is included or excluded when using the “-x” parameter?

Correct Answer: B

QUESTION 183

Check Point ClusterXL Active/Active deployment is used when:

Correct Answer: D

QUESTION 184

When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?

Correct Answer: D
Identity Awareness gets identities from these acquisition sources:

QUESTION 185

In SmartEvent, what are the different types of automatic reactions that the administrator can configure?

Correct Answer: A