Free 156-315.80 Exam Braindumps (page: 26)

Page 25 of 103

Which features are only supported with R80.10 Gateways but not R77.x?

  1. Access Control policy unifies the Firewall, Application Control & URL Filtering, Data Awareness, and Mobile Access Software Blade policies
  2. Limits the upload and download throughput for streaming media in the company to 1 Gbps.
  3. The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.
  4. Time object to a rule to make the rule active only during specified times.

Answer(s): C


Reference:

http://slideplayer.com/slide/12183998/



Which CLI command will reset the IPS pattern matcher statistics?

  1. ips reset pmstat
  2. ips pstats reset
  3. ips pmstats refresh
  4. ips pmstats reset

Answer(s): D


Reference:

https://sc1.checkpoint.com/documents/R76/CP_R76_CLI_WebAdmin/84627.htm



When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or .

  1. SecureID
  2. SecurID
  3. Complexity
  4. TacAcs

Answer(s): B


Reference:

https://sc1.checkpoint.com/documents/R77/CP_R77_Mobile_Access_WebAdmin/41587.htm



Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is less than or equal to?

  1. 50%
  2. 75%
  3. 80%
  4. 15%

Answer(s): D






Post your Comments and Discuss Checkpoint 156-315.80 exam with other Community members:

156-315.80 Discussions & Posts