Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Complete 156-915.80 Checkpoint Materials

Page: 13 / 19
Total 502 questions

Check Point Certified Security Expert Update - R80.10 Questions and Answers

Question 49

You have three servers located in a DMZ, using private IP addresses. You wantinternal users from 10.10.10.x to access the DMZ servers by public IP addresses. Internal_net 10.10.10.x is configured for Hide NAT behind the Security Gateway’s external interface.

What is the best configuration for 10.10.10.x users to access the DMZservers, using the DMZ servers’ public IP addresses?

Options:

A.

When connecting to internal network 10.10.10.x, configure Hide NAT for the DMZ network behind the Security Gateway DMZ interface.

B.

When the source is the internal network 10.10.10.x, configure manual static NAT rules to translate the DMZ servers.

C.

When connecting to the Internet, configure manual Static NAT rules to translate the DMZ servers.

D.

When trying to access DMZ servers, configure Hide NAT for 10.10.10.x behind the DMZ’sinterface.

Question 50

You are MegaCorp’s Security Administrator. There are various network objects which must be NATed. Some ofthem use the Automatic Hide NAT method, while others use the Automatic Static NAT method. What is the rule order if both methods are used together? Give the BEST answer.

Options:

A.

The Administrator decides the rule order by shifting the corresponding rules up and down.

B.

The Static NAT rules have priority over the Hide NAT rules and the NAT on a node has priority over the NAT on a network or an address range.

C.

The Hide NAT rules have priority over the Static NAT rules and the NAT on a node has priorityover the NAT on a network or an address range.

D.

The rule position depends on the time of their creation. The rules created first are placed at the top; rules created later are placed successively below the others.

Question 51

Which of the following process pulls applications monitoring status?

Options:

A.

fwd

B.

fwm

C.

cpwd

D.

cpd

Question 52

To findrecords in the logs that shows log records from the Application & URL Filtering Software Blade where traffic was blocked, what would be the query syntax?

Options:

A.

blade: application control AND action:block

B.

blade; “application control” AND action;block

C.

(blade: application control AND action;block)

D.

blade: “application control” AND action:block

Page: 13 / 19
Total 502 questions