あなたを必ず合格させる156-315.80問題集PDF 2022年最新のに更新されたのは465問あります [Q262-Q281]

Share

あなたを必ず合格させる156-315.80問題集PDF 2022年最新のに更新されたのは465問あります

CheckPoint 156-315.80リアル試験問題と解答を無料で提供いたします


CheckPoint 156-315.80 認定試験の出題範囲:

トピック出題範囲
トピック 1
  • 企業VPNトンネルの管理、テスト、最適化
トピック 2
  • 管理サーバーのアップグレードとトラブルシューティング
トピック 3
  • インサイダーのヒントを適用するトラブルシューティングチェックポイントセキュリティシステムの実践
トピック 4
  • コンプライアンスレポートの人
  • テストおよびトラブルシューティングのためのイベントを作成する多数の展開シナリオ
トピック 5
  • 高度なアップグレード手法をクラスタリングセキュリティソリューションに移行

 

質問 262
The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?

  • A. add hostname <New HostName> ip-address <ip address>
  • B. add host name <New HostName> ip-address <ip address>
  • C. set host name <New HostName> ip-address <ip address>
  • D. set hostname <New HostName> ip-address <ip address>

正解: B

解説:
References:

 

質問 263
Fill in the blank: Identity Awareness AD-Query is using the Microsoft _______________ API to learn users from AD.

  • A. Services.msc
  • B. Eventvwr
  • C. WMI
  • D. XML

正解: C

解説:
Explanation/Reference: http://dl3.checkpoint.com/paid/e0/e01d7daa665096a4941f930f2567d29e/ CP_R80.10_IdentityAwareness_AdminGuide.pdf?
HashKey=1553448919_104b8593c2a2087ec2ffe8e86b314d66&xtn=.pdf page 17

 

質問 264
Fill in the blank: The R80 utility fw monitor is used to troubleshoot ______________________.

  • A. Phase two key negotiations
  • B. LDAP conflicts
  • C. Traffic issues
  • D. User data base corruption

正解: C

解説:
Check Point's FW Monitor is a powerful built-in tool for capturing network traffic at the packet level. The FW Monitor utility captures network packets at multiple capture points along the FireWall inspection chains. These captured packets can be inspected later using the WireShark.
References:

 

質問 265
Installations and upgrades with CPUSE require that the CPUSE agent is up-to-date. Usually the latest build is downloaded automatically. How can you verify the CPUSE agent build?

  • A. In WebUI Status and Actions page or by running the following command in CLISH: show installer status version
  • B. In the Management Server or Gateway object in SmartConsole or by running the following command in CLISH: show installer agent version
  • C. In the Management Server or Gateway object in SmartConsole or by running the following command in CLISH: show installer status build
  • D. In WebUI Status and Actions page or by running the following command in CLISH: show installer status build

正解: D

 

質問 266
Which of the following authentication methods ARE NOT used for Mobile Access?

  • A. RADIUS server
  • B. SecurID
  • C. TACACS+
  • D. Username and password (internal, LDAP)

正解: C

 

質問 267
What is the command to check the status of Check Point processes?

  • A. cpwd_admin list
  • B. cphaprob list
  • C. top
  • D. cptop

正解: A

 

質問 268
Fill in the blank: Permanent VPN tunnels can be set on all tunnels in the community, on all tunnels for specific gateways, or ______ .

  • A. On specific tunnels for specific gateways
  • B. On specific satellite gateway to central gateway tunnels
  • C. On specific tunnels in the community
  • D. On all satellite gateway to satellite gateway tunnels

正解: C

解説:
Explanation/Reference:
https://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/html_frameset.htm?topic=documents/ R77/CP_R77_VPN_AdminGuide/14018

 

質問 269
If you needed the Multicast MAC address of a cluster, what command would you run?

  • A. cphaprob -a if
  • B. cphaconf debug data
  • C. cphaprob igmp
  • D. cphaconf ccp multicast

正解: C

解説:
Explanation/Reference:

 

質問 270
Which statement is NOT TRUE about Delta synchronization?

  • A. Transfers changes in the Kernel tables between cluster members.
  • B. Quicker than Full sync
  • C. Using UDP Multicast or Broadcast on port 8161
  • D. Using UDP Multicast or Broadcast on port 8116

正解: C

解説:
Explanation/Reference:
Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7288.htm

 

質問 271
You select the file type that are sent for emulation for all the Threat prevention profiles. Each profile defines a (n) _____ or ________ action for the file types.

  • A. Prevent/Bypass
  • B. Detect/Bypass
  • C. inspection/Bypass
  • D. Inspection/prevent

正解: C

 

質問 272
The Check Point history feature in R80 provides the following:

  • A. View install changes and install specific version
  • B. Policy Installation Date only
  • C. View install changes
  • D. Policy Installation Date, view install changes and install specific version

正解: D

解説:
Explanation/Reference:
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/
CP_R80.10_SecurityManagement_AdminGuide/html_frameset.htm?topic=documents/R80.10/ WebAdminGuides/EN/CP_R80.10_SecurityManagement_AdminGuide/159917

 

質問 273
Steve is a Cyber Security Engineer working for Global Bank with large scale deployment of Check point
Enterprise Appliances. Steve's Manager-Diana asks him to provide ecommerce Firewall Connection
Table details to Bank's SOC Team as well as Check Point Support Team. Which command will trigger
heavy impact on the ecommerce Firewall performance and should be avoided by Steve?

  • A. Fw tab -t connections
  • B. Fw tab -t connections -c
  • C. Fw tab -t connections -s
  • D. Fw tab -t connections -f

正解: A

 

質問 274
Joey wants to upgrade from R75.40 to R80 version of Security management. He will use Advanced Upgrade with Database Migration method to achieve this.
What is one of the requirements for his success?

  • A. Size of the /var/log folder of the source machine must be at least 25% of the size of the /var/log directory on the target machine
  • B. Size of the /var/log folder of the target machine must be at least 25% of the size of the /var/log directory on the source machine
  • C. Size of the $FWDIR/log folder of the target machine must be at least 30% of the size of the $FWDIR/log directory on the source machine
  • D. Size of the /var/log folder of the target machine must be at least 25GB or more

正解: B

 

質問 275
Kofi, the administrator of the ALPHA Corp network wishes to change the default Gaia WebUI Portal port number currently set on the default HTTPS port. Which CLISH commands are required to be able to change this TCP port?

  • A. set Gaia-portal https-port <new port number>
  • B. set web https-port <new port number>
  • C. set Gaia-portal port <new port number>
  • D. set web ssl-port <new port number>

正解: D

 

質問 276
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or ______ action for the file types.

  • A. Prevent/Bypass
  • B. Detect/Bypass
  • C. Inspect/Bypass
  • D. Inspect/Prevent

正解: C

解説:
Reference:
https://sc1.checkpoint.com/documents/R77/CP_R77_ThreatPrevention_WebAdmin/101703
.htm

 

質問 277
On R80.10 the IPS Blade is managed by:

  • A. Threat Prevention policy
  • B. Threat Protection policy
  • C. Layers on Firewall policy
  • D. Anti-Bot Blade

正解: A

解説:
Explanation/Reference: https://www.checkpoint.com/downloads/product-related/r80.10-mgmt-architecture-overview.pdf

 

質問 278
Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?

  • A. UDP port 256
  • B. UDP port 265
  • C. TCP port 265
  • D. TCP port 256

正解: D

解説:
Synchronization works in two modes:
Full Sync transfers all Security Gateway kernel table information from one cluster member to another. It is handled by the fwd daemon using an encrypted TCP connection on port 256.
Delta Sync transfers changes in the kernel tables between cluster members. Delta sync is handled by the Security Gateway kernel using UDP connections on port 8116.
References:

 

質問 279
What must you do first if "fwm sic_reset" could not be completed?

  • A. Change internal CA via cpconfig
  • B. Reset SIC from Smart Dashboard
  • C. Reinitialize SIC on the security gateway then run "fw unloadlocal"
  • D. Cpstop then find keyword "certificate" in objects_5_0.C and delete the section

正解: A

 

質問 280
Which Check Point software blade provides Application Security and identity control?

  • A. Application Control
  • B. Data Loss Prevention
  • C. Identity Awareness
  • D. URL Filtering

正解: A

 

質問 281
......

合格できるCheckPoint 156-315.80試験情報と無料練習テスト:https://www.jpntest.com/shiken/156-315.80-mondaishu

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡