Checkpoint 156-915.80 Exam Questions
Check Point Certified Security Expert Update - R80.10 (Page 11 )

Updated On: 17-Feb-2026

Check Point APIs allow system engineers and developers to make changes to their organization's security policy with CLI tools and Web Services for all of the following except?

  1. Create new dashboards to manage 3rd party task
  2. Create products that use and enhance 3rd party solutions.
  3. Execute automated scripts to perform common tasks.
  4. Create products that use and enhance the Check Point Solution.

Answer(s): A

Explanation:

Check Point APIs let system administrators and developers make changes to the security policy with CLI tools and web-services. You can use an API to:
Use an automated script to perform common tasks
Integrate Check Point products with 3rd party solutions

Create products that use and enhance the Check Point solution



What happen when IPS profile is set in Detect-Only Mode for troubleshooting?

  1. It will generate Geo-Protection traffic
  2. Automatically uploads debugging logs to Check Point Support Center
  3. It will not block malicious traffic
  4. Bypass licenses requirement for Geo-Protection control

Answer(s): C

Explanation:

It is recommended to enable Detect-Only for Troubleshooting on the profile during the initial installation of IPS. This option overrides any protections that are set to Prevent so that they will not block any traffic. During this time you can analyze the alerts that IPS generates to see how IPS will handle network traffic, while avoiding any impact on the flow of traffic.



When simulating a problem on CLusterXL cluster with cphaprob ­d STOP ­s problem ­t 0 register, to initiate a failover on an active cluster member, what command allows you remove the problematic state?

  1. cphaprob ­d STOP unregister
  2. cphaprob STOP unregister
  3. cphaprob unregister STOP
  4. cphaprob ­d unregister STOP

Answer(s): A

Explanation:

esting a failover in a controlled manner using following command; # cphaprob -d STOP -s problem -t 0 register

This will register a problem state on the cluster member this was entered on;If you then run; # cphaprob list this will show an entry named STOP.
to remove this problematic register run following;
# cphaprob -d STOP unregister



You are investigating issues with two gateway cluster members that are not able to establish the first initial cluster synchronization.
What service is used by the FWD daemon to do a Full Synchronization?

  1. TCP port 443
  2. TCP port 257
  3. TCP port 256
  4. UDP port 8116

Answer(s): C

Explanation:

Synchronization works in two modes:
Full sync transfers all Security Gateway kernel table information from one cluster member to another. It is handled by the fwd daemon using an encrypted TCP connection. Delta sync transfers changes in the kernel tables between cluster members. Delta sync is handled by the Security Gateway kernel using UDP multicast or broadcast on port 8116. Full sync is used for initial transfers of state information, for many thousands of connections. If a cluster member is brought up after being down, it will perform full sync. After all members are synchronized, only updates are transferred via delta sync. Delta sync is quicker than full sync.



Which command shows the current connections distributed by CoreXL FW instances?

  1. fw ctl multik stat
  2. fw ctl affinity ­l
  3. fw ctl instances ­v
  4. fw ctl iflist

Answer(s): A

Explanation:

The fw ctl multik stat and fw6ctl multik stat (multi-kernel statistics) commands show information for each kernel instance. The state and processing core number of each instance is displayed, along with:
The number of connections currently being handled.
The peak number of concurrent connections the instance has handled since its inception.






Post your Comments and Discuss Checkpoint 156-915.80 exam dumps with other Community members:

Join the 156-915.80 Discussion