Free Checkpoint 156-315.80 Exam Braindumps (page: 18)

What is the least amount of CPU cores required to enable CoreXL?

  1. 2
  2. 1
  3. 4
  4. 6

Answer(s): B



You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?

  1. Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.
  2. Create a separate Security Policy package for each remote Security Gateway.
  3. Create network objects that restricts all applicable rules to only certain networks.
  4. Run separate SmartConsole instances to login and configure each Security Gateway directly.

Answer(s): B



Which of the following authentication methods ARE NOT used for Mobile Access?

  1. RADIUS server
  2. Username and password (internal, LDAP)
  3. SecurID
  4. TACACS+

Answer(s): D



What is the correct command to observe the Sync traffic in a VRRP environment?

  1. fw monitor ­e "accept[12:4,b]=224.0.0.18;"
  2. fw monitor ­e "accept port(6118;"
  3. fw monitor ­e "accept proto=mcVRRP;"
  4. fw monitor ­e "accept dst=224.0.0.18;"

Answer(s): D



Viewing page 18 of 117
Viewing questions 69 - 72 out of 479 questions



Post your Comments and Discuss Checkpoint 156-315.80 exam prep with other Community members:

156-315.80 Exam Discussions & Posts