Free 156-315.80 Exam Braindumps (page: 17)

Page 16 of 103

You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) ________or__________ action for the file types.

  1. Inspect/Bypass
  2. Inspect/Prevent
  3. Prevent/Bypass
  4. Detect/Bypass

Answer(s): A


Reference:

https://sc1.checkpoint.com/documents/R77/CP_R77_ThreatPrevention_WebAdmin/101703.htm



When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?

  1. None, Security Management Server would be installed by itself.
  2. SmartConsole
  3. SecureClient
  4. Security Gateway
  5. SmartEvent

Answer(s): D


Reference:

https://sc1.checkpoint.com/documents/R76/CP_R76_Installation_and_Upgrade_Guide-webAdmin/89230.htm



On R80.10 when configuring Third-Party devices to read the logs using the LEA (Log Export API) the default Log Server uses port:

  1. 18210
  2. 18184
  3. 257
  4. 18191

Answer(s): B



How many images are included with Check Point TE appliance in Recommended Mode?

  1. 2(OS) images
  2. images are chosen by administrator during installation
  3. as many as licensed for
  4. the most new image

Answer(s): A






Post your Comments and Discuss Checkpoint 156-315.80 exam with other Community members:

156-315.80 Discussions & Posts