Free 156-915.80 Exam Braindumps (page: 25)

Page 24 of 76

VPN Tunnel Sharing can be configured with any of the options below, EXCEPT One:

  1. Gateway-based
  2. Subnet-based
  3. IP range based
  4. Host-based

Answer(s): C

Explanation:

VPN Tunnel Sharing provides interoperability and scalability by controlling the number of VPN tunnels created between peer Security Gateways. There are three available settings:



Which one of the following is true about Threat Emulation?

  1. Takes less than a second to complete
  2. Works on MS Office and PDF files only
  3. Always delivers a file
  4. Takes minutes to complete (less than 3 minutes)

Answer(s): D



In which case is a Sticky Decision Function relevant?

  1. Load Sharing ­ Multicast
  2. Load Balancing ­ Forward
  3. High Availability
  4. Load Sharing ­ Unicast

Answer(s): C



The Correlation Unit performs all but which of the following actions:

  1. Marks logs that individually are not events, but may be part of a larger pattern to be identified later
  2. Generates an event based on the Event policy
  3. Assigns a severity level to the event
  4. Takes a new log entry that is part of a group of items that together make up an event, and adds it to an ongoing event

Answer(s): C






Post your Comments and Discuss Checkpoint 156-915.80 exam with other Community members:

156-915.80 Discussions & Posts