Checkpoint 156-315.80 Exam Questions
Check Point Certified Security Expert - R80 (Page 6 )

Updated On: 19-Feb-2026

Which command is used to set the CCP protocol to Multicast?

  1. cphaprob set_ccp multicast
  2. cphaconf set_ccp multicast
  3. cphaconf set_ccp no_broadcast
  4. cphaprob set_ccp no_broadcast

Answer(s): B



Which packet info is ignored with Session Rate Acceleration?

  1. source port ranges
  2. source ip
  3. source port
  4. same info from Packet Acceleration is used

Answer(s): C



Which is the least ideal Synchronization Status for Security Management Server High Availability deployment?

  1. Synchronized
  2. Never been synchronized
  3. Lagging
  4. Collision

Answer(s): D



During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity.
Which of those hosts should you try to remediate first?

  1. Host having a Critical event found by Threat Emulation
  2. Host having a Critical event found by IPS
  3. Host having a Critical event found by Antivirus
  4. Host having a Critical event found by Anti-Bot

Answer(s): D



In R80 spoofing is defined as a method of:

  1. Disguising an illegal IP address behind an authorized IP address through Port Address Translation.
  2. Hiding your firewall from unauthorized users.
  3. Detecting people using false or wrong authentication logins
  4. Making packets appear as if they come from an authorized IP address.

Answer(s): D

Explanation:

IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack connections to your network. Attackers use IP spoofing to send malware and bots to your protected network, to execute DoS attacks, or to gain unauthorized access.






Post your Comments and Discuss Checkpoint 156-315.80 exam dumps with other Community members:

Join the 156-315.80 Discussion