Checkpoint 156-315.81 - Check Point Certified Security Expert R81.20
SmartEvent provides a convenient way to run common command line executables that can assist in investigating events. Right-clicking the IP address, source or destination, in an event provides a list of default and customized commands. They appear only on cells that refer to IP addresses because the IP address of the active cell is used as the destination of the command when run. The default commands are:
The essential means by which state synchronization works to provide failover in the event an active member goes down, ____________ is used specifically for clustered environments to allow gateways to report their own state and learn about the states of other members in the cluster.
SandBlast agent extends 0 day prevention to what part of the network?
Which is NOT an example of a Check Point API?
Which file contains the host address to be published, the MAC address that needs to be associated with the IP Address, and the unique IP of the interface that responds to ARP request?
What is true of the API server on R81.20?
Please choose the path to monitor the compliance status of the Check Point R81.20 based management.
With MTA (Mail Transfer Agent) enabled the gateways manages SMTP traffic and holds external email with potentially malicious attachments. What is required in order to enable MTA (Mail Transfer Agent) functionality in the Security Gateway?
In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?
What key is used to save the current CPView page in a filename format cpview_â€cpview process IDâ€.capâ€number of capturesâ€?
Which of the following technologies extracts detailed information from packets and stores that information in state tables?
When attempting to start a VPN tunnel, in the logs the error “no proposal chosen†is seen numerous times. No other VPN-related entries are present.
Which phase of the VPN negotiations has failed?
With SecureXL enabled, accelerated packets will pass through the following:
In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies the type of traffic applicable to the chain module. For Stateful Mode configuration, chain modules marked with __________________ will not apply.
What is the most ideal Synchronization Status for Security Management Server High Availability deployment?