What is the most ideal Synchronization Status for Security Management Server High Availability deployment?
Answer(s): B
The possible synchronization statuses are:Never been synchronized - immediately after the Secondary Security Management server has been installed, it has not yet undergone the first manual synchronization that brings it up to date with thePrimary Security Management server.Synchronized - the peer is properly synchronized and has the same database information and installed Security Policy.Lagging - the peer SMS has not been synchronized properly. For instance, on account of the fact that the Active SMS has undergone changes since the previous synchronization (objects have been edited, or the Security Policy has been newly installed), the information on the Standby SMS is lagging.Advanced - the peer SMS is more up-to-date.For instance, in the above figure, if a system administrators logs into Security Management server B before it has been synchronized with the Security Management server A, the status of the Security Management server A is Advanced, since it contains more up-to-date information which the former does not have.In this case, manual synchronization must be initiated by the system administrator by changing the Active SMS to a Standby SMS. Perform a synch me operation from the more advanced server to the Standby SMS. Change the Standby SMS to the Active SMS. Collision - the Active SMS and its peer have different installed policies and databases. The administrator must perform manual synchronization and decide which of the SMSs to overwrite.
What GUI client would you use to view an IPS packet capture?
What is the valid range for VRID value in VRRP configuration?
Virtual Router ID - Enter a unique ID number for this virtual router. The range of valid values is 1 to 255.
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
Answer(s): A
Use the URL Filtering and Application Control Software Blades to:Create a Granular Policy - Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels. You can also create an HTTPS policy that enables Security Gateways to inspect HTTPS traffic and prevent security risks related to the SSL protocol. Manage Bandwidth Consumption - Configure rules to limit the available network bandwidth for specified users or groups. You can define separate limits for uploading and downloading. Keep Your Policies Updated - The Application Database is updated regularly, which helps you makes sure that your Internet security policy has the newest applications and website categories. Security Gateways connect to the Check Point Online Web Service to identify new social networking widgets and website categories.Communicate with Users - UserCheck objects add flexibility to URL Filtering and Application Control and let the Security Gateways communicate with users. UserCheck helps users understand that certain websites are against the company's security policy. It also tells users about the changes in Internet policy related to websites and applications.
Which command will reset the kernel debug options to default settings?
Answer(s): C
Reset the debugs to the default.In case someone changed the setting in the past and since then the firewall was not rebooted we should set all back to the defaults.
Post your Comments and Discuss Checkpoint 156-915.80 exam dumps with other Community members:
No discussions yet for this exam. Be the first to share your experience and help others prepare!
💬 Did you find this helpful?
Thank you for sharing! Your feedback helps the community.