Download CCSE Update R80.156-915.80.Test4Prep.2018-11-28.56q.vcex

Vendor: Checkpoint
Exam Code: 156-915.80
Exam Name: CCSE Update R80
Date: Nov 28, 2018
File Size: 38 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
The “MAC magic” value must be modified under the following condition:
  1. There is more than one cluster connected to the same VLAN
  2. A firewall cluster is configured to use Multicast for CCP traffic
  3. There are more than two members in a firewall cluster
  4. A firewall cluster is configured to use Broadcast for CCP traffic
Correct answer: D
Explanation:
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk25977
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk25977
Question 2
The Correlation Unit performs all but which of the following actions:
  1. Marks logs that individually are not events, but may be part of a larger pattern to be identified later
  2. Generates an event based on the Event policy
  3. Assigns a severity level to the event
  4. Takes a new log entry that is part of a group of items that together make up an event, and adds it to an ongoing event
Correct answer: C
Question 3
The following command is used to verify the CPUSE version:
  1. HostName:0>show installer status build
  2. [Expert@HostName:0]#show installer status
  3. [Expert@HostName:0]#show installer status build
  4. HostName:0>show installer build
Correct answer: A
Explanation:
Reference: http://dkcheckpoint.blogspot.com/2017/11/how-to-fix-deployment-agent-issues.html
Reference: http://dkcheckpoint.blogspot.com/2017/11/how-to-fix-deployment-agent-issues.html
Question 4
Which statement is true regarding redundancy?
  1. System Administrator know when their cluster has failed over and can also see why it failed over by using the cphaprob f it command.
  2. ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.
  3. Machines in a Cluster XL High Availability configuration must be synchronized.
  4. Both Cluster XL and VRRP are fully supported by Gaia and available to all Check Point appliances, open servers, and virtualized environments.
Correct answer: D
Explanation:
Reference: https://www.checkpoint.com/download/public-files/gaia-technical-brief.pdf page 5
Reference: https://www.checkpoint.com/download/public-files/gaia-technical-brief.pdf page 5
Question 5
Vanessa is expecting a very important Security Report. The Document should be sent as an attachment via e-mail. An e-mail with Security_ report.pdf file was delivered to her e-mail inbox. When she opened the PDF file, she noticed that the file is basically empty and only few lines of text are in it. The report is missing some graphs, tables and links. 
Which component of SandBlast protection is her company using on a Gateway?
  1. SandBlast Threat Emulation
  2. SandBlast Agent
  3. Check Point Protect
  4. SandBlast Threat Extraction
Correct answer: D
Question 6
Which command collects diagnostic data for analyzing customer setup remotely?
  1. cpinfo
  2. migrate export
  3. sysinfo
  4. cpview
Correct answer: A
Explanation:
CPInfo is an auto-updatable utility that collects diagnostics data on a customer's machine at the time of execution and uploads it to Check Point servers (it replaces the standalone cp_uploader utility for uploading files to Check Point servers). The CPInfo output file allows analyzing customer setups from a remote location. Check Point support engineers can open the CPInfo file in a demo mode, while viewing actual customer Security Policies and Objects. This allows the in-depth analysis of customer's configuration and environment settings. Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk92739
CPInfo is an auto-updatable utility that collects diagnostics data on a customer's machine at the time of execution and uploads it to Check Point servers (it replaces the standalone cp_uploader utility for uploading files to Check Point servers). 
The CPInfo output file allows analyzing customer setups from a remote location. Check Point support engineers can open the CPInfo file in a demo mode, while viewing actual customer Security Policies and Objects. This allows the in-depth analysis of customer's configuration and environment settings. 
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk92739
Question 7
When deploying multiple clustered firewalls on the same subnet, what does the firewall administrator need to configure to prevent CCP broadcasts being sent to the wrong cluster?
  1. Set the fwha_mac_magic_forward parameter in the $CPDIR/boot/modules/ha_boot. conf
  2. Set the fwha_mac_magic parameter in the $FWDIR/boot/fwkern.conf file
  3. Set the cluster global ID using the command “cphaconf cluster_id set <value>”
  4. Set the cluster global ID using the command “fw ctt set cluster_id <value>”
Correct answer: C
Explanation:
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk25977
Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk25977
Question 8
Which of these options is an implicit MEP option?
  1. Primary-backup
  2. Source address based
  3. Round robin
  4. Load Sharing
Correct answer: A
Explanation:
There are three methods to implement implicit MEP:First to Respond, in which the first Security Gateway to reply to the peer Security Gateway is chosen. An organization would choose this option if, for example, the organization has two Security Gateways in a MEP configuration - one in London, the other in New York. It makes sense for VPN-1 peers located in England to try the London Security Gateway first and the NY Security Gateway second. Being geographically closer to VPN peers in England, the London Security Gateway is the first to respond, and becomes the entry point to the internal network. See: First to Respond.Primary-Backup, in which one or multiple backup Security Gateways provide "high availability" for a primary Security Gateway. The remote peer is configured to work with the primary Security Gateway, but switches to the backup Security Gateway if the primary goes down. An organization might decide to use this configuration if it has two machines in a MEP environment, one of which is stronger than the other. It makes sense to configure the stronger machine as the primary. Or perhaps both machines are the same in terms of strength of performance, but one has a cheaper or faster connection to the Internet. In this case, the machine with the better Internet connection should be configured as the primary. See: Primary-Backup Security Gateways.Load Distribution, in which the remote VPN peer randomly selects a Security Gateway with which to open a connection. For each IP source/destination address pair, a new Security Gateway is randomly selected. An organization might have a number of machines with equal performance abilities. In this case, it makes sense to enable load distribution. The machines are used in a random and equal way. See: Random Selection.Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/13812.htm
There are three methods to implement implicit MEP:
  • First to Respond, in which the first Security Gateway to reply to the peer Security Gateway is chosen. An organization would choose this option if, for example, the organization has two Security Gateways in a MEP configuration - one in London, the other in New York. It makes sense for VPN-1 peers located in England to try the London Security Gateway first and the NY Security Gateway second. Being geographically closer to VPN peers in England, the London Security Gateway is the first to respond, and becomes the entry point to the internal network. See: First to Respond.
  • Primary-Backup, in which one or multiple backup Security Gateways provide "high availability" for a primary Security Gateway. The remote peer is configured to work with the primary Security Gateway, but switches to the backup Security Gateway if the primary goes down. An organization might decide to use this configuration if it has two machines in a MEP environment, one of which is stronger than the other. It makes sense to configure the stronger machine as the primary. Or perhaps both machines are the same in terms of strength of performance, but one has a cheaper or faster connection to the Internet. In this case, the machine with the better Internet connection should be configured as the primary. See: Primary-Backup Security Gateways.
  • Load Distribution, in which the remote VPN peer randomly selects a Security Gateway with which to open a connection. For each IP source/destination address pair, a new Security Gateway is randomly selected. An organization might have a number of machines with equal performance abilities. In this case, it makes sense to enable load distribution. The machines are used in a random and equal way. See: Random Selection.
Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/13812.htm
Question 9
John detected high load on sync interface. Which is most recommended solution?
  1. For short connections like http service – delay sync for 2 seconds
  2. Add a second interface to handle sync traffic
  3. For short connections like http service – do not sync
  4. For short connections like icmp service – delay sync for 2 seconds
Correct answer: A
Question 10
What is the SOLR database for?
  1. Used for full text search and enables powerful matching capabilities
  2. Writes data to the database and full text search
  3. Serves GUI responsible to transfer request to the DLEserver
  4. Enables powerful matching capabilities and writes data to the database
Correct answer: A
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!