Free 156-315.80 Exam Braindumps (page: 18)

Page 17 of 103

What is the least amount of CPU cores required to enable CoreXL?

  1. 2
  2. 1
  3. 4
  4. 6

Answer(s): B


Reference:

https://sc1.checkpoint.com/documents/R76/CP_R76_PerformanceTuning_WebAdmin/6731.htm



You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?

  1. Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.
  2. Create a separate Security Policy package for each remote Security Gateway.
  3. Create network objects that restricts all applicable rules to only certain networks.
  4. Run separate SmartConsole instances to login and configure each Security Gateway directly.

Answer(s): B



Which of the following authentication methods ARE NOT used for Mobile Access?

  1. RADIUS server
  2. Username and password (internal, LDAP)
  3. SecurID
  4. TACACS+

Answer(s): D


Reference:

https://sc1.checkpoint.com/documents/R77/CP_R77_Mobile_Access_WebAdmin/41587.htm



What is the correct command to observe the Sync traffic in a VRRP environment?

  1. fw monitor –e “accept[12:4,b]=224.0.0.18;”
  2. fw monitor –e “accept port(6118;”
  3. fw monitor –e “accept proto=mcVRRP;”
  4. fw monitor –e “accept dst=224.0.0.18;”

Answer(s): D






Post your Comments and Discuss Checkpoint 156-315.80 exam with other Community members:

156-315.80 Discussions & Posts