Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
sale

Want to Unlock All Questions for this Exam?

Full Exam Access, Discussions, No Robots Checks

Checkpoint 156-315.80 Exam Actual Questions

The questions for 156-315.80 were last updated on April 15, 2024.
  • Viewing page 1 out of 48 pages.
  • Viewing questions 1-10 out of 487 questions

Topic 1 - Single Topic

Question #1 Topic 1

Identify the API that is not supported by Check Point currently.

  • A. R80 Management API-
  • B. Identity Awareness Web Services API
  • C. Open REST API
  • D. OPSEC SDK
Reveal Solution Hide Solution   Discussion   3

Correct Answer: C 🗳️

Question #2 Topic 1

SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their data. Which component is NOT part of the SandBlast Mobile solution?

  • A. Management Dashboard
  • B. Gateway
  • C. Personal User Storage
  • D. Behavior Risk Engine
Reveal Solution Hide Solution   Discussion  

Correct Answer: C 🗳️
Reference:
https://community.checkpoint.com/docs/DOC-3072-sandblast-mobile-architecture-overview

Question #3 Topic 1

What are the different command sources that allow you to communicate with the API server?

  • A. SmartView Monitor, API_cli Tool, Gaia CLI, Web Services
  • B. SmartConsole GUI Console, mgmt_cli Tool, Gaia CLI, Web Services
  • C. SmartConsole GUI Console, API_cli Tool, Gaia CLI, Web Services
  • D. API_cli Tool, Gaia CLI, Web Services
Reveal Solution Hide Solution   Discussion   7

Correct Answer: B 🗳️
Reference:
https://sc1.checkpoint.com/documents/R80/APIs/#introduction%20

Question #4 Topic 1

What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?

  • A. Anti-Bot is the only countermeasure against unknown malware
  • B. Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control Centers
  • C. Anti-Bot is the only signature-based method of malware protection.
  • D. Anti-Bot is a post-infection malware protection to prevent a host from establishing a connection to a Command & Control Center.
Reveal Solution Hide Solution   Discussion   3

Correct Answer: D 🗳️
Reference:
https://sc1.checkpoint.com/documents/R76/CP_R76_AntiBotAntiVirus_AdminGuide/index.html

Question #5 Topic 1

Which TCP-port does CPM process listen to?

  • A. 18191
  • B. 18190
  • C. 8983
  • D. 19009
Reveal Solution Hide Solution   Discussion  

Correct Answer: D 🗳️
Reference:
https://www.checkpoint.com/downloads/products/r80.10-security-management-architecture-overview.pdf

Question #6 Topic 1

Which method below is NOT one of the ways to communicate using the Management API's?

  • A. Typing API commands using the ג€mgmt_cliג€ command
  • B. Typing API commands from a dialog box inside the SmartConsole GUI application
  • C. Typing API commands using Gaia's secure shell(clish)19+
  • D. Sending API commands over an http connection using web-services
Reveal Solution Hide Solution   Discussion   7

Correct Answer: D 🗳️
Reference:
https://sc1.checkpoint.com/documents/R80/APIs/#introduction%20

Question #7 Topic 1

Your manager asked you to check the status of SecureXL, and its enabled templates and features. What command will you use to provide such information to manager?

  • A. fw accel stat
  • B. fwaccel stat
  • C. fw acces stats
  • D. fwaccel stats
Reveal Solution Hide Solution   Discussion   9

Correct Answer: B 🗳️
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk41397

Question #8 Topic 1

SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user's machine via the web browser. What are the two modes of
SNX?

  • A. Application and Client Service
  • B. Network and Application
  • C. Network and Layers
  • D. Virtual Adapter and Mobile App
Reveal Solution Hide Solution   Discussion   1

Correct Answer: B 🗳️
Reference:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk67820

Question #9 Topic 1

Which command would disable a Cluster Member permanently?

  • A. clusterXL_admin down
  • B. cphaprob_admin down
  • C. clusterXL_admin down-p
  • D. set clusterXL down-p
Reveal Solution Hide Solution   Discussion   7

Correct Answer: C 🗳️

Question #10 Topic 1

Which two of these Check Point Protocols are used by SmartEvent Processes?

  • A. ELA and CPD
  • B. FWD and LEA
  • C. FWD and CPLOG
  • D. ELA and CPLOG
Reveal Solution Hide Solution   Discussion   11

Correct Answer: D 🗳️

Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...