Free 156-315.80 Sample Questions — Check Point Certified Security Expert - R80

Free 156-315.80 sample questions for the Check Point Certified Security Expert - R80 exam. No account required: study at your own pace.

Want an interactive quiz? Take the full 156-315.80 practice test

Looking for more? Click here to get the full PDF with 296+ practice questions for $10 for offline study and deeper preparation.

Question 1

The SmartEvent R80 Web application for real-time event monitoring is called:

  • A. SmartView Monitor
  • B. SmartEventWeb
  • C. There is no Web application for SmartEvent
  • D. SmartView
Show Answer
Correct Answer:
D. SmartView
Question 2

Your manager asked you to check the status of SecureXL, and its enabled templates and features. What command will you use to provide such information to manager?

  • A. fw accel stat
  • B. fwaccel stat
  • C. fw acces stats
  • D. fwaccel stats
Show Answer
Correct Answer:
B. fwaccel stat
Question 3

Which Check Point software blade provides Application Security and identity control?

  • A. Identity Awareness
  • B. Data Loss Prevention
  • C. URL Filtering
  • D. Application Control
Show Answer
Correct Answer:
D. Application Control
Question 4

Which SmartConsole tab is used to monitor network and security performance?

  • A. Manage Setting
  • B. Security Policies
  • C. Gateway and Servers
  • D. Logs and Monitor
Show Answer
Correct Answer:
C. Gateway and Servers
Question 5

Which process is used mainly for backward compatibility of gateways in R80.X? It provides communication with GUI-client, database manipulation, policy compilation and Management HA synchronization.

  • A. cpm
  • B. fwd
  • C. cpd
  • D. fwm
Show Answer
Correct Answer:
D. fwm
Question 6

What solution is Multi-queue intended to provide?

  • A. Improve the efficiency of traffic handling by SecureXL SNDs
  • B. Reduce the confusion for traffic capturing in FW Monitor
  • C. Improve the efficiency of CoreXL Kernel Instances
  • D. Reduce the performance of network interfaces
Show Answer
Correct Answer:
C. Improve the efficiency of CoreXL Kernel Instances
Question 7

Which Remote Access Client does not provide an Office-Mode Address?

  • A. SecuRemote
  • B. Endpoint Security Suite
  • C. Endpoint Security VPN
  • D. Check Point Mobile
Show Answer
Correct Answer:
A. SecuRemote
Question 8

There are 4 ways to use the Management API for creating host object with R80 Management API. Which one is NOT correct?

  • A. Using Web Services
  • B. Using cpconfig
  • C. Using CLISH
  • D. Using SmartConsole GUI console
Show Answer
Correct Answer:
B. Using cpconfig
Question 9

Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?

  • A. Check Point Remote User
  • B. Check Point Capsule Workspace
  • C. Check Point Mobile Web Portal
  • D. Check Point Capsule Remote
Show Answer
Correct Answer:
B. Check Point Capsule Workspace
Question 10

When installing a dedicated R80 SmartEvent server. What is the recommended size of the root partition?

  • A. Any size
  • B. Less than 20GB
  • C. More than 10GB and less than 20GB
  • D. At least 20GB
Show Answer
Correct Answer:
D. At least 20GB
Question 11

During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?

  • A. Host having a Critical event found by Threat Emulation
  • B. Host having a Critical event found by IPS
  • C. Host having a Critical event found by Antivirus
  • D. Host having a Critical event found by Anti-Bot
Show Answer
Correct Answer:
D. Host having a Critical event found by Anti-Bot
Question 12

SandBlast has several functional components that work together to ensure that attacks are prevented in real-time. Which the following is NOT part of the SandBlast component?

  • A. Threat Emulation
  • B. Mobile Access
  • C. Mail Transfer Agent
  • D. Threat Cloud
Show Answer
Correct Answer:
B. Mobile Access
Question 13

What is the correct order of the default `fw monitor` inspection points?

  • A. i, I, o, O
  • B. 1, 2, 3, 4
  • C. i, o, I, O
  • D. I, i, O, o
Show Answer
Correct Answer:
A. i, I, o, O
Question 14

Which of the following links will take you to the SmartView web application?

  • A. https://<Security Management Server host name>/smartviewweb/
  • B. https://<Security Management Server IP Address>/smartview/
  • C. https://<Security Management Server host name>smartviewweb
  • D. https://<Security Management Server IP Address>/smartviewapp
Show Answer
Correct Answer:
B. https://<Security Management Server IP Address>/smartview/
Question 15

John detected high load on sync interface. Which is most recommended solution?

  • A. For FTP connections "" do not sync
  • B. Add a second interface to handle sync traffic
  • C. For short connections like http service "" do not sync
  • D. For short connections like icmp service "" delay sync for 2 seconds
Show Answer
Correct Answer:
C. For short connections like http service "" do not sync
Question 16

The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?

  • A. fwd via cpm
  • B. fwm via fwd
  • C. cpm via cpd
  • D. fwd via cpd
Show Answer
Correct Answer:
C. cpm via cpd
Question 17

To accelerate the rate of connection establishment, SecureXL groups all connection that match a particular service and whose sole differentiating element is the source port. The type of grouping enables even the very first packets of a TCP handshake to be accelerated. The first packets of the first connection on the same service will be forwarded to the Firewall kernel which will then create a template of the connection. Which of the these is NOT a SecureXL template?

  • A. Accept Template
  • B. Deny Template
  • C. Drop Template
  • D. NAT Template
Show Answer
Correct Answer:
B. Deny Template
Question 18

You can access the ThreatCloud Repository from:

  • A. R80.10 SmartConsole and Application Wiki
  • B. Threat Prevention and Threat Tools
  • C. Threat Wiki and Check Point Website
  • D. R80.10 SmartConsole and Threat Prevention
Show Answer
Correct Answer:
C. Threat Wiki and Check Point Website
Question 19

When an encrypted packet is decrypted, where does this happen?

  • A. Security policy
  • B. Inbound chain
  • C. Outbound chain
  • D. Decryption is not supported
Show Answer
Correct Answer:
B. Inbound chain
Question 20

What is mandatory for ClusterXL to work properly?

  • A. The number of cores must be the same on every participating cluster node
  • B. The Magic MAC number must be unique per cluster node
  • C. The Sync interface must not have an IP address configured
  • D. If you have "Non-monitored Private" interfaces, the number of those interfaces must be the same on all cluster members
Show Answer
Correct Answer:
A. The number of cores must be the same on every participating cluster node

Aced these? Get the Full Exam

Download the complete 156-315.80 study bundle with 296+ questions in a single printable PDF.