Free 156-215.80 Exam Braindumps (page: 32)

Page 32 of 134

The Application Layer Firewalls inspect traffic through the ___________layer(s) of the TCP/IP model and up to and including the_____________ layer.

  1. Lower; Application
  2. First two; Internet
  3. First two; Transport
  4. Upper; Application

Answer(s): A



There are two R80.X0 Security Gateways in the Firewall Cluster. They are named FW_A and FW_B. The cluster is configured to work as HA (High availability) with default cluster configuration. FW_A is configured to have higher priority than FW_B. FW_A was active and processing the traffic in the morning. FW_B was standby. Around 1100 am, its interfaces went down and this caused a failover. FW_B became active. After an hour, FW_A’s interface issues were resolved and it became operational. When it re-joins the cluster, will it become active automatically?

  1. No, since “maintain current active cluster member” option on the cluster object properties is enabled by default
  2. No, since “maintain current active cluster member” option is enabled by default on the Global Properties
  3. Yes, since “Switch to higher priority cluster member” option on the cluster object properties is enabled by default
  4. Yes, since “Switch to higher priority cluster member” option is enabled by default on the Global Properties

Answer(s): A

Explanation:

What Happens When a Security Gateway Recovers?

In a Load Sharing configuration, when the failed Security Gateway in a cluster recovers, all connections are redistributed among all active members. High Availability and Load Sharing in ClusterXL ClusterXL Administration Guide R77 Versions | 31 In a High Availability configuration, when the failed Security Gateway in a cluster recovers, the recovery method depends on the configured cluster setting. The options are:
• Maintain Current Active Security Gateway means that if one member passes on control to a lower priority member, control will be returned to the higher priority member only if the lower priority member fails. This mode is recommended if all members are equally capable of processing traffic, in order to minimize the number of failover events.
• Switch to Higher Priority Security Gateway means that if the lower priority member has control and the higher priority member is restored, then control will be returned to the higher priority member. This mode is recommended if one member is better equipped for handling connections, so it will be the default Security Gateway.


Reference:

http://dl3.checkpoint.com/paid/7e/7ef174cf00762ceaf228384ea20ea64a/CP_R77_ClusterXL_AdminGuide.pdf?HashKey=1479822138_31410b1f8360074be87fd8f1ab682464&xtn=.pdf



After the initial installation the First Time Configuration Wizard should be run.

  1. First Time Configuration Wizard can be run from the Unified SmartConsole.
  2. First Time Configuration Wizard can be run from the command line or from the WebUI.
  3. First time Configuration Wizard can only be run from the WebUI.
  4. Connection to the internet is required before running the First Time Configuration wizard.

Answer(s): B

Explanation:

Check Point Security Gateway and Check Point Security Management require running the First Time Configuration Wizard in order to be configured correctly. The First Time Configuration Wizard is available in Gaia Portal and also through CLI.
To invoke the First Time Configuration Wizard through CLI, run the config_system command from the Expert shell.


Reference:

https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk111119



In order to modify Security Policies the administrator can use which of the following tools?

  1. Command line of the Security Management Server or mgmt_cli.exe on any Windows computer.
  2. SmartConsole and WebUI on the Security Management Server.
  3. mgmt_cli or WebUI on Security Gateway and SmartConsole on the Security Management Server.
  4. SmartConsole or mgmt_cli on any computer where SmartConsole is installed.

Answer(s): D



Page 32 of 134



Post your Comments and Discuss Checkpoint 156-215.80 exam with other Community members:

andreito commented on May 13, 2019
very cool test, im very very ver very cool!
CHILE
upvote

Carlos commented on May 13, 2019
This is a well formatted and clean brain dumps. I had tried other sites and the images were all full of watermarks stolen from other sites. This one looks pretty original and authentic.
CHILE
upvote