Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

CCSE Update 156-915.80 Full Course Free

Page: 7 / 19
Total 502 questions

Check Point Certified Security Expert Update - R80.10 Questions and Answers

Question 25

Paul has just joined the MegaCorp security administration team. Natalie, the administrator, creates a newadministrator account for Paul in SmartDashboard and installs the policy. When Paul tries to login it fails. How can Natalie verify whether Paul’s IP address is predefined on the security management server?

Options:

A.

Login to Smart Dashboard, access Properties of the SMS, and verify whether Paul’s IP address is listed.

B.

Type cpconfig on the Management Server and select the option “GUI client List” to see if Paul’s IP address is listed.

C.

Login in to Smart Dashboard, access Global Properties, and select Security Management, to verify whether Paul’s IP address is listed.

D.

Access the WEBUI on the Security Gateway, and verify whether Paul’s IP address is listed as a GUI client.

Question 26

Which of the following are authentication methods that Security Gateway R80 uses to validate connection attempts? Select the response below that includes the MOST complete list of valid authentication methods.

Options:

A.

Proxied, User, Dynamic, Session

B.

Connection, User, Client

C.

User, Client, Session

D.

User, Proxied, Session

Question 27

Which of the following statements accurately describes the command upgrade_export?

Options:

A.

upgrade_export stores network-configuration data, objects, global properties, and the database revisions prior to upgrading the Security Management Server.

B.

Used primarily when upgrading the Security Management Server, upgrade_export stores all object databases and the /conf directories for importing to a newer Security Gateway version.

C.

upgrade_export is used when upgrading the Security Gateway, and allows certain files to be included or excluded before exporting.

D.

This command is no longer supported in GAiA.

Question 28

Users with Identity Awareness Agent installed on their machines login with __________, so that when the user logs into thedomain, that information is also used to meet Identity Awareness credential requests.

Options:

A.

Key-logging

B.

ICA Certificates

C.

SecureClient

D.

Single Sign-On

Page: 7 / 19
Total 502 questions