Free 156-315.80 Exam Braindumps (page: 8)

Page 7 of 103

In R80 spoofing is defined as a method of:

  1. Disguising an illegal IP address behind an authorized IP address through Port Address Translation.
  2. Hiding your firewall from unauthorized users.
  3. Detecting people using false or wrong authentication logins
  4. Making packets appear as if they come from an authorized IP address.

Answer(s): D

Explanation:

IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack connections to your network. Attackers use IP spoofing to send malware and bots to your protected network, to execute DoS attacks, or to gain unauthorized access.


Reference:

http://dl3.checkpoint.com/paid/74/74d596decb6071a4ee642fbdaae7238f/CP_R80_SecurityManagement_AdminGuide.pdf?HashKey=1479584563_6f823c8ea1514609148aa4fec5425db2&xtn=.pdf



Connections to the Check Point R80 Web API use what protocol?

  1. HTTPS
  2. RPC
  3. VPN
  4. SIC

Answer(s): A



Which command lists all tables in Gaia?

  1. fw tab –t
  2. fw tab –list
  3. fw-tab –s
  4. fw tab -1

Answer(s): C


Reference:

http://dl3.checkpoint.com/paid/c7/c76b823d81bab77e1e40ac086fa81411/CP_R77_versions_CLI_ReferenceGuide.pdf?HashKey=1538418170_96def40f213f24a8b273cc77b408dd3f&xtn=.pdf



What is true about the IPS-Blade?

  1. In R80, IPS is managed by the Threat Prevention Policy
  2. In R80, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict
  3. In R80, IPS Exceptions cannot be attached to “all rules”
  4. In R80, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same

Answer(s): A






Post your Comments and Discuss Checkpoint 156-315.80 exam with other Community members:

156-315.80 Discussions & Posts