Course Hero Logo

Check-Point-Certified-Security-Expert-Update--R80-156-915-80-(156-915-80).pdf

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 4 out of 8 pages.

156-915-80CheckpointCheck Point Certified Security Expert Update - R80
QUESTION:241Which of the following CLISH commands would you use to set the admin user's shell tobash?B
QUESTION:242The connection to the ClusterXL member ‘A’ breaks. The ClusterXL member ‘A’ statusis now ‘down’. Afterwards the switch admin set a port to ClusterXL member ‘B’ to‘down’. What will happen?B
QUESTION:243CORRECT TEXTFill in the blank. To verify SecureXL statistics, you would use the command”________
QUESTION:244You enable Hide NAT on the network object, 10.1.1.0 behind the Security Gateway’sexternal interface. You browse to the Google Website from host, 10.1.1.10 successfully.You enable a log on the rule that allows 10.1.1.0 to exit the network. How many logentries do you see for that connection in SmartView Tracker?
A. Two, one for outbound, one for inboundB. Only one, outboundC. Two, both outbound, one for the real IP connection and one for the NAT IPconnectionD. Only one, inboundAnswer:B

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 8 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
Mohammad Alizadeh
Tags
John Adams, IP address, Network address translation, Dynamic Host Configuration Protocol, A John

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture