Which one of the following is true about Threat Emulation?
A . Takes less than a second to complete
B . Works on MS Office and PDF files only
C . Always delivers a file
D . Takes minutes to complete (less than 3 minutes)
Answer: D
156-315.80 Check Point Certified Security Expert – R80 exam is a hot Check Point certification exam, Exam4Training offers you the latest free online 156-315.80 dumps to practice. You can get online training in the following questions, all these questions are verified by Check Point experts. If this exam changed, we will share new update questions.
Which one of the following is true about Threat Emulation?
A . Takes less than a second to complete
B . Works on MS Office and PDF files only
C . Always delivers a file
D . Takes minutes to complete (less than 3 minutes)
Answer: D
Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is ____ all traffic. However, in the Application Control policy layer, the default action is ______ all traffic.
A . Accept; redirect
B . Accept; drop
C . Redirect; drop
D . Drop; accept
Answer: D
Which of the following is NOT a valid type of SecureXL template?
A . Accept Template
B . Deny template
C . Drop Template
D . NAT Template
Answer: B
Which 3 types of tracking are available for Threat Prevention Policy?
A . SMS Alert, Log, SNMP alert
B . Syslog, None, User-defined scripts
C . None, Log, Syslog
D . Alert, SNMP trap, Mail
Answer: B
What is the minimum amount of RAM needed for a Threat Prevention Appliance?
A . 6 GB
B . 8GB with Gaia in 64-bit mode
C . 4 GB
D . It depends on the number of software blades enabled
Answer: C
In Advanced Permanent Tunnel Configuration, to set the amount of time the tunnel test runs without a
response before the peer host is declared ‘down’, you would set the_________?
A . life sign polling interval
B . life sign timeout
C . life_sign_polling_interval
D . life_sign_timeout
Answer: D
Explanation:
Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/html_frameset.htm ?topic=documents/R77/CP_R77_VPN_AdminGuide/14018
You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.
A . Inspect/Bypass
B . Inspect/Prevent
C . Prevent/Bypass
D . Detect/Bypass
Answer: A
Which of the following is NOT a VPN routing option available in a star community?
A . To satellites through center only.
B . To center, or through the center to other satellites, to Internet and other VPN targets.
C . To center and to other satellites through center.
D . To center only.
Answer: A,D
What does it mean if Deyra sees the gateway status? (Choose the BEST answer.)
A . SmartCenter Server cannot reach this Security Gateway.
B . There is a blade reporting a problem.
C . VPN software blade is reporting a malfunction.
D . Security Gateway’s MGNT NIC card is disconnected.
Answer: B
Fill in the blanks: In the Network policy layer, the default action for the Implied last rule is ____ all traffic. However, in the Application Control policy layer, the default action is ______ all traffic.
A . Accept; redirect
B . Accept; drop
C . Redirect; drop
D . Drop; accept
Answer: D