exam questions

Exam 156-315.80 All Questions

View all questions & answers for the 156-315.80 exam

Exam 156-315.80 topic 1 question 48 discussion

Actual exam question from Checkpoint's 156-315.80
Question #: 48
Topic #: 1
[All 156-315.80 Questions]

Which of the following is a new R80.10 Gateway feature that had not been available in R77.X and older?

  • A. The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.
  • B. Limits the upload and download throughput for streaming media in the company to 1 Gbps.
  • C. Time object to a rule to make the rule active only during specified times.
  • D. Sub Policies ae sets of rules that can be created and attached to specific rules. If the rule is matched, inspection will continue in the sub policy attached to it rather than in the next rule.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️
Reference:
http://dl3.checkpoint.com/paid/1f/1f850d1640792cf885336cc6ae8b2743/CP_R80_ReleaseNotes.pdf?
HashKey=1517092603_dd917544d92dccc060e5b25d28a46f79&xtn=.pdf

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Xnovan
Highly Voted 2 years, 5 months ago
silly, sub policies is fancy jargon to say inline layers, thank me later~
upvoted 11 times
...
kambata
Highly Voted 2 years, 1 month ago
Indeed, correct answer is "D", although "A" also sounds correct. This is just checkpoint retarded language....
upvoted 8 times
...
JNyquist
Most Recent 5 months ago
Actually, in the release notes of R80, the exact wording of both A and D are expressed under the section of “What’s New in R80” and then specifically said it needs both FW and Mgmt to be R80.10. So for me, I think both A and D are correct. Policy Layers & Sub Policies R80 introduces Policy Layers, enabling flexible control over the security policy behavior, and Sub Policies which enable seamless network segmentation within the security policy. Note - Supported only with R80.10 Security Gateways and Management. • The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence. If an “Accept” action was done in a layer, inspection will continue in the next layer. • Sub Policies are sets of rules that can be created and attached to specific rules. If the rule is matched, inspection will continue in the sub policy attached to it rather than in the next rule. For example, a sub policy can manage a network segment or branch office.
upvoted 1 times
...
wongex23
3 years, 2 months ago
Can someone tell me why A is not correct?
upvoted 2 times
pfunkylol
3 years ago
Maybe cuz of this: Under Security Policy New Architecture https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_ReleaseNotes/html_frameset.htm?topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_ReleaseNotes/195189
upvoted 1 times
...
FedoLFS
2 years, 9 months ago
Because in R77 each blade got its own policy and are checked one after the other (first FW, then IPS, then URLF, etc = ordered layer in R80 wording) which makes A true for R77 and older.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago