Free 156-915.80 Exam Braindumps (page: 14)

Page 13 of 76

In R80 spoofing is defined as a method of:

  1. Disguising an illegal IP address behind an authorized IP address through Port Address Translation.
  2. Hiding your firewall from unauthorized users.
  3. Detecting people using false or wrong authentication logins
  4. Making packets appear as if they come from an authorized IP address.

Answer(s): D

Explanation:

IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack connections to your network. Attackers use IP spoofing to send malware and bots to your protected network, to execute DoS attacks, or to gain unauthorized access.



When defining QoS global properties, which option below is not valid?

  1. Weight
  2. Authenticated timeout
  3. Schedule
  4. Rate

Answer(s): C



When synchronizing clusters, which of the following statements is FALSE?

  1. The state of connections using resources is maintained in a Security Server, so their connections cannot be synchronized.
  2. Only cluster members running on the same OS platform can be synchronized.
  3. In the case of a failover, accounting information on the failed member may be lost despite a properly working synchronization.
  4. Client Authentication or Session Authentication connections through a cluster member will be lost if the cluster member fails.

Answer(s): D



What is the valid range for VRID value in VRRP configuration?

  1. 1 ­ 254
  2. 1 ­ 255
  3. 0 ­ 254
  4. 0 ­ 255

Answer(s): B

Explanation:

Virtual Router ID - Enter a unique ID number for this virtual router. The range of valid values is 1 to 255.






Post your Comments and Discuss Checkpoint 156-915.80 exam with other Community members:

156-915.80 Discussions & Posts