Checkpoint 156-315.80 Exam Questions
Check Point Certified Security Expert - R80 (Page 20 )

Updated On: 10-Mar-2026

How can SmartView application accessed?

  1. Error! Hyperlink reference not valid. Management IP Address>/smartview
  2. Error! Hyperlink reference not valid. Management IP Address>:4434/smartview/
  3. Error! Hyperlink reference not valid. Management IP Address>/smartview/
  4. Error! Hyperlink reference not valid. Management host name>:4434/smartview/

Answer(s): C



What command verifies that the API server is responding?

  1. api stat
  2. api status
  3. show api_status
  4. app_get_status

Answer(s): B



Where you can see and search records of action done by R80 SmartConsole administrators?

  1. In SmartView Tracker, open active log
  2. In the Logs & Monitor view, select "Open Audit Log View"
  3. In SmartAuditLog View
  4. In Smartlog, all logs

Answer(s): B



Fill in the blank: The R80 utility fw monitor is used to troubleshoot ______________________.

  1. User data base corruption
  2. LDAP conflicts
  3. Traffic issues
  4. Phase two key negotiations

Answer(s): C

Explanation:

Check Point's FW Monitor is a powerful built-in tool for capturing network traffic at the packet level. The FW Monitor utility captures network packets at multiple capture points along the FireWall inspection chains. These captured packets can be inspected later using the WireShark.



The Firewall kernel is replicated multiple times, therefore:

  1. The Firewall kernel only touches the packet if the connection is accelerated
  2. The Firewall can run different policies per core
  3. The Firewall kernel is replicated only with new connections and deletes itself once the connection times out
  4. The Firewall can run the same policy on all cores.

Answer(s): D

Explanation:

On a Security Gateway with CoreXL enabled, the Firewall kernel is replicated multiple times. Each replicated copy, or instance, runs on one processing core. These instances handle traffic concurrently, and each instance is a complete and independent inspection kernel.
When CoreXL is enabled, all the kernel instances in the Security Gateway process traffic through the same interfaces and apply the same security policy.



Viewing page 20 of 94
Viewing questions 96 - 100 out of 479 questions



Post your Comments and Discuss Checkpoint 156-315.80 exam dumps with other Community members:

156-315.80 Exam Discussions & Posts

AI Tutor