How many images are included with Check Point TE appliance in Recommended Mode?
A. 2 (OS) images
B. Images are chosen by administrator during installation
C. as many as licensed for
D. the most new image
Which deployment methods can an administrator choose when deploying the Sandblast agent?
A. Manually installing the deployment agent on each workstation
B. Use GPO and SCCM to deploy the deployment agent.
C. Use both SCCM and GPO for the deployment agent and End Point Management to push the Agent.
D. Use the Configure SandBlast Agent to push the Agent.
Which Check Point software blades could be enforced under Threat Prevention profile using Check Point R80.10 SmartConsole application?
A. IPS, Anti-Bot, URL Filtering, Application Control, Threat Emulation
B. Firewall, IPS, Threat Emulation, Application Control
C. IPS, Anti-Bot, Anti-Virus, Threat Emulation, Threat Extraction
D. Firewall, IPS, Anti-Bot, Anti-Virus, Threat Emulation
What's true about Troubleshooting option in the IPS profile properties?
A. Temporarily change the active protection profile to "Default_Protection"
B. Temporarily set all protections to track (log) in SmartView Tracker
C. Temporarily will disable IPS kernel engine
D. Temporarily set all active protections to Detect
What is the mechanism behind Threat Extraction?
A. This is a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender
B. This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy it prior to sending it to the intended recipient
C. This is a new mechanism to identify the IP address of the sender of malicious codes and to put it into the SAM database (Suspicious Activity Monitoring).
D. Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast.
On R80.10 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:
A. 18210
B. 18184
C. 257
D. 18191
Mobile Access supports all of the following methods of Link Translation EXCEPT:
A. Hostname Translation (HT)
B. Path Translation (PT)
C. URL Translation (UT)
D. Identity Translation (IT)
CPD is a core Check Point process that does all of the following EXCEPT:
A. AMON status pull from the Gateway
B. Management High Availability (HA) sync
C. SIC (Secure Internal Communication) functions
D. Policy installation
What processes does CPM control?
A. Object-Store, Database changes, CPM Process and web-services
B. web-services, CPMI process, DLEserver, CPM process
C. DLEServer, Object-Store, CP Process and database changes
D. web_services, dle_server and object_Store
Please choose correct command syntax to add an "emailserver1" host with IP address 10.50.23.90 using GAiA management CLI?
A. host name myHost12 ip-address 10.50.23.90
B. mgmt. add host name ip-address 10.50.23.90
C. add host name emailserver1 ip-address 10.50.23.90
D. mgmt. add host name emailserver1 ip-address 10.50.23.90
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CheckPoint exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 156-915.80 exam preparations and CheckPoint certification application, do not hesitate to visit our Vcedump.com to find your solutions here.