Checkpoint 156-915.80 Exam Questions
Check Point Certified Security Expert Update - R80.10 (Page 18 )

Updated On: 17-Feb-2026

Tom has been tasked to install Check Point R80 in a distributed deployment. Before Tom installs the systems this way, how many machines will be need if he does NOT include a SmartConsole machine in his calculations?

  1. One machine, but it needs to be installed using SecurePlatform for compatibility purposes.
  2. One machine
  3. Two machines
  4. Three machines

Answer(s): C



Fill in the blank: The command _______________ provides the most complete restoration of a R80 configuration.

  1. upgrade_import
  2. cpconfig
  3. fwm dbimport ­p <export file>
  4. cpinfo ­recover

Answer(s): A



Which of the following statements is TRUE about R80 management plug-ins?

  1. The plug-in is a package installed on the Security Gateway.
  2. Installing a management plug-in requires a Snapshot, just like any upgrade process.
  3. A management plug-in interacts with a Security Management Server to provide new features and support for new products.
  4. Using a plug-in offers full central management only if special licensing is applied to specific features of the plug-in.

Answer(s): C



Fill in the blank: The R80 feature ________ permits blocking specific IP addresses for a specified time period.

  1. Block Port Overflow
  2. Local Interface Spoofing
  3. Suspicious Activity Monitoring
  4. Adaptive Threat Prevention

Answer(s): C



In R80 spoofing is defined as a method of:

  1. Disguising an illegal IP address behind an authorized IP address through Port Address Translation.
  2. Hiding your firewall from unauthorized users.
  3. Detecting people using false or wrong authentication logins
  4. Making packets appear as if they come from an authorized IP address.

Answer(s): D

Explanation:

IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack connections to your network. Attackers use IP spoofing to send malware and bots to your protected network, to execute DoS attacks, or to gain unauthorized access.






Post your Comments and Discuss Checkpoint 156-915.80 exam dumps with other Community members:

Join the 156-915.80 Discussion