156-915.80: Check Point Certified Security Expert Update - R80.10
Free Practice Exam Questions (page: 15)
Updated On: 2-Jan-2026

What is the valid range for VRID value in VRRP configuration?

  1. 1 ­ 254
  2. 1 ­ 255
  3. 0 ­ 254
  4. 0 ­ 255

Answer(s): B

Explanation:

Virtual Router ID - Enter a unique ID number for this virtual router. The range of valid values is 1 to 255.



Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?

  1. Detects and blocks malware by correlating multiple detection engines before users are affected.
  2. Configure rules to limit the available network bandwidth for specified users or groups.
  3. Use UserCheck to help users understand that certain websites are against the company's security policy.
  4. Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.

Answer(s): A

Explanation:

Use the URL Filtering and Application Control Software Blades to:
Create a Granular Policy - Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels. You can also create an HTTPS policy that enables Security Gateways to inspect HTTPS traffic and prevent security risks related to the SSL protocol. Manage Bandwidth Consumption - Configure rules to limit the available network bandwidth for specified users or groups. You can define separate limits for uploading and downloading. Keep Your Policies Updated - The Application Database is updated regularly, which helps you makes sure that your Internet security policy has the newest applications and website categories. Security Gateways connect to the Check Point Online Web Service to identify new social networking widgets and website categories.
Communicate with Users - UserCheck objects add flexibility to URL Filtering and Application Control and let the Security Gateways communicate with users. UserCheck helps users understand that certain websites are against the company's security policy. It also tells users about the changes in Internet policy related to websites and applications.



Which command will reset the kernel debug options to default settings?

  1. fw ctl dbg ­a 0
  2. fw ctl dbg resetall
  3. fw ctl debug 0
  4. fw ctl debug set 0

Answer(s): C

Explanation:

Reset the debugs to the default.
In case someone changed the setting in the past and since then the firewall was not rebooted we should set all back to the defaults.



You need to change the number of firewall instances used by CoreXL. How can you achieve this goal?

  1. edit fwaffinity.conf; reboot required
  2. cpconfig; reboot required
  3. edit fwaffinity.conf; reboot not required
  4. cpconfig: reboot not required

Answer(s): B



Viewing page 15 of 127
Viewing questions 57 - 60 out of 503 questions



Post your Comments and Discuss Checkpoint 156-915.80 exam prep with other Community members:

156-915.80 Exam Discussions & Posts