Checkpoint 156-315.81 - Check Point Certified Security Expert R81.20
As an administrator, you may be required to add the company logo to reports. To do this, you would save the logo as a PNG file with the name ‘cover-company-logo.png’ and then copy that image file to which directory on the SmartEvent server?
From SecureXL perspective, what are the tree paths of traffic flow:
SandBlast appliances can be deployed in the following modes:
The following command is used to verify the CPUSE version:
Which of the following is NOT a type of Check Point API available in R81.x?
Which of the following will NOT affect acceleration?
Which of these is an implicit MEP option?
SecureXL improves non-encrypted firewall traffic throughput and encrypted VPN traffic throughput.
You find one of your cluster gateways showing “Down†when you run the “cphaprob stat†command. You then run the “clusterXL_admin up†on the down member but unfortunately the member continues to show down. What command do you run to determine the cause?
When installing a dedicated R81 SmartEvent server. What is the recommended size of the root partition?
Which encryption algorithm is the least secured?
In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies the type of traffic applicable to the chain module. For Wire Mode configuration, chain modules marked with ____________ will not apply.
Which GUI client is supported in R81?
What is the main difference between Threat Extraction and Threat Emulation?
SmartEvent does NOT use which of the following procedures to identify events: