Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Checkpoint 156-315.81 - Check Point Certified Security Expert R81.20

Page: 11 / 13
Total 628 questions

You have a Geo-Protection policy blocking Australia and a number of other countries. Your network now requires a Check Point Firewall to be installed in Sydney, Australia.

What must you do to get SIC to work?

A.

Remove Geo-Protection, as the IP-to-country database is updated externally, and you have no control of this.

B.

Create a rule at the top in the Sydney firewall to allow control traffic from your network

C.

Nothing - Check Point control connections function regardless of Geo-Protection policy

D.

Create a rule at the top in your Check Point firewall to bypass the Geo-Protection

In which formats can Threat Emulation forensics reports be viewed in?

A.

TXT, XML and CSV

B.

PDF and TXT

C.

PDF, HTML, and XML

D.

PDF and HTML

Which is NOT a SmartEvent component?

A.

SmartEvent Server

B.

Correlation Unit

C.

Log Consolidator

D.

Log Server

Which tool is used to enable ClusterXL?

A.

SmartUpdate

B.

cpconfig

C.

SmartConsole

D.

sysconfig

What command lists all interfaces using Multi-Queue?

A.

cpmq get

B.

show interface all

C.

cpmq set

D.

show multiqueue all

Fill in the blank: The R81 SmartConsole, SmartEvent GUI client, and _______ consolidate billions of logs and shows then as prioritized security events.

A.

SmartMonitor

B.

SmartView Web Application

C.

SmartReporter

D.

SmartTracker

You need to change the number of firewall Instances used by CoreXL. How can you achieve this goal?

A.

edit fwaffinity.conf; reboot required

B.

cpconfig; reboot required

C.

edit fwaffinity.conf; reboot not required

D.

cpconfig; reboot not required

What will SmartEvent automatically define as events?

A.

Firewall

B.

VPN

C.

IPS

D.

HTTPS

What is the recommended number of physical network interfaces in a Mobile Access cluster deployment?

A.

4 Interfaces – an interface leading to the organization, a second interface leading to the internet, a third interface for synchronization, a fourth interface leading to the Security Management Server.

B.

3 Interfaces – an interface leading to the organization, a second interface leading to the Internet, a third interface for synchronization.

C.

1 Interface – an interface leading to the organization and the Internet, and configure for synchronization.

D.

2 Interfaces – a data interface leading to the organization and the Internet, a second interface for synchronization.

In Logging and Monitoring, the tracking options are Log, Detailed Log and Extended Log. Which of the following options can you add to each Log, Detailed Log and Extended Log?

A.

Accounting

B.

Suppression

C.

Accounting/Suppression

D.

Accounting/Extended

Which NAT rules are prioritized first?

A.

Post-Automatic/Manual NAT rules

B.

Manual/Pre-Automatic NAT

C.

Automatic Hide NAT

D.

Automatic Static NAT

What does it mean if Deyra sees the gateway status? (Choose the BEST answer.)

A.

SmartCenter Server cannot reach this Security Gateway.

B.

There is a blade reporting a problem.

C.

VPN software blade is reporting a malfunction.

D.

Security Gateway’s MGNT NIC card is disconnected.

Which Check Point feature enables application scanning and the detection?

A.

Application Dictionary

B.

AppWiki

C.

Application Library

D.

CPApp

Office mode means that:

A.

SecurID client assigns a routable MAC address. After the user authenticates for a tunnel, the VPN gateway assigns a routable IP address to the remote client.

B.

Users authenticate with an Internet browser and use secure HTTPS connection.

C.

Local ISP (Internet service Provider) assigns a non-routable IP address to the remote user.

D.

Allows a security gateway to assign a remote client an IP address. After the user authenticates for a tunnel, the VPN gateway assigns a routable IP address to the remote client.

You can access the ThreatCloud Repository from:

A.

R81.20 SmartConsole and Application Wiki

B.

Threat Prevention and Threat Tools

C.

Threat Wiki and Check Point Website

D.

R81.20 SmartConsole and Threat Prevention