Exam Details

  • Exam Code
    :156-915.80
  • Exam Name
    :Check Point Certified Security Expert Update - R80.10
  • Certification
    :Checkpoint Certifications
  • Vendor
    :CheckPoint
  • Total Questions
    :536 Q&As
  • Last Updated
    :Apr 25, 2025

CheckPoint Checkpoint Certifications 156-915.80 Questions & Answers

  • Question 111:

    If an administrator wants to add manual NAT for addresses not owned by the Check Point firewall, what else is necessary to be completed for it to function properly?

    A. Nothing the proxy ARP is automatically handled in the R80 version

    B. Add the proxy ARP configuration in a file called /etc/conf/local.arp

    C. Add the proxy ARP configuration in a file called $FWDIR/conf/local.arp

    D. Add the proxy ARP configurations in a file called $CPDIR/config/local.arp

  • Question 112:

    Which of the following commands shows the status of processes?

    A. cpwd_admin -l

    B. cpwd -l

    C. cpwd admin_list

    D. cpwd_admin list

  • Question 113:

    How many confidence levels are there for IPS?

    A. four

    B. two

    C. five

    D. three

  • Question 114:

    You have a Gateway is running with 2 cores. You plan to add a second gateway to build a cluster and used a device with 4 cores. How many cores can be used in a Cluster for Firewall-kernel on the new device?

    A. 3

    B. 2

    C. 1

    D. 4

  • Question 115:

    What is the main difference between Threat Extraction and Threat Emulation?

    A. Threat Emulation never delivers a file and takes more than 3minutes to complete

    B. Threat Extraction always delivers a file and takes less than a second to complete

    C. Threat Emulation never delivers a file that takes less than a second to complete

    D. Threat Extraction never delivers a file and takes more than 3 minutes to complete

  • Question 116:

    The concept of layers was introduced in R80. What is the biggest benefit of layers?

    A. To break one policy into several virtual policies.

    B. Policy Layers and Sub-Policies enable flexible control over the security policy.

    C. To include Threat Prevention as a sub policy for the firewall policy

    D. They improve the performance on OS kernel version 3.0

  • Question 117:

    What Factors preclude Secure XL Templating?

    A. Source Port Ranges/Encrypted Connections

    B. IPS

    C. ClusterXL in load sharing Mode

    D. CoreXL

  • Question 118:

    Automation and Orchestration differ in that:

    A. Automation relates to codifying tasks, whereas orchestration relates to codifying processes.

    B. Automation involves the process of coordinating and exchange of information through web service interactions such as XML and JSON, but orchestration does not involve processes.

    C. Orchestration is concerned with executing a single task, whereas automation takes a series of tasks and puts them all together into a process workflow.

    D. Orchestration relates to codifying tasks, whereas automation relates to codifying processes.

  • Question 119:

    What is the difference between an event and a log?

    A. Events are generated at gateway according to Event Policy

    B. A log entry becomes an event when it matches any rule defined in Event Policy

    C. Events are collected with SmartWorkflow from Trouble Ticket systems

    D. Logs and Events are synonyms

  • Question 120:

    Jack is using SmartEvent and does not see the identities of the users on the events. As an administrator with full access, what does he need to do to fix his issue?

    A. Open SmartDashboard and toggle the Show or Hide Identities Icon, then re-open SmartEvent

    B. Open SmartEvent, Click on Query Properties and select the User column

    C. Open SmartEvent, go to the Policy Tab, select General Settings from the left column > User Identities and check the box Show Identities

    D. Open SmartEvent and toggle the Show or Hide Identities icon

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CheckPoint exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 156-915.80 exam preparations and CheckPoint certification application, do not hesitate to visit our Vcedump.com to find your solutions here.