Checkpoint 156-915.80 Exam Questions
Check Point Certified Security Expert Update - R80.10 (Page 19 )

Updated On: 17-Feb-2026

Which features are only supported with R80.10 Gateways but not R77.x?

  1. Access Control policy unifies the Firewall, Application Control & URL Filtering, Data Awareness, and Mobile Access Software Blade policies.
  2. Limits the upload and download throughput for streaming media in the company to 1 Gbps.
  3. The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.
  4. Time object to a rule to make the rule active only during specified times.

Answer(s): C



For best practices, what is the recommended time for automatic unlocking of locked admin accounts?

  1. 20 minutes
  2. 15 minutes
  3. Admin account cannot be unlocked automatically
  4. 30 minutes at least

Answer(s): D



What scenario indicates that SecureXL is enabled?

  1. Dynamic objects are available in the Object Explorer
  2. SecureXL can be disabled in cpconfig
  3. fwaccel commands can be used in clish
  4. Only one packet in a stream is seen in a fw monitor packet capture

Answer(s): C



What is the command to show SecureXL status?

  1. fwaccel status
  2. fwaccel stats ­m
  3. fwaccel ­s
  4. fwaccel stat

Answer(s): D

Explanation:

To check overall SecureXL status:
[Expert@HostName]# fwaccel stat



Which web services protocol is used to communicate to the Check Point R80 identity Awareness Web APi?

  1. SOAP
  2. REST
  3. XLANG
  4. XML-RPC

Answer(s): B

Explanation:

The Identity Web API uses the REST protocol over SSL. The requests and responses are HTTP and in JSON format.






Post your Comments and Discuss Checkpoint 156-915.80 exam dumps with other Community members:

Join the 156-915.80 Discussion