Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Checkpoint 156-315.81 - Check Point Certified Security Expert R81.20

Page: 4 / 13
Total 628 questions

Which command shows the current connections distributed by CoreXL FW instances?

A.

fw ctl multik stat

B.

fw ctl affinity -l

C.

fw ctl instances -v

D.

fw ctl iflist

: 156

VPN Link Selection will perform the following when the primary VPN link goes down?

A.

The Firewall will drop the packets.

B.

The Firewall can update the Link Selection entries to start using a different link for the same tunnel.

C.

The Firewall will send out the packet on all interfaces.

D.

The Firewall will inform the client that the tunnel is down.

In terms of Order Rule Enforcement, when a packet arrives at the gateway, the gateway checks it against the rules in the top Policy Layer, sequentially from top to bottom Which of the following statements is correct?

A.

If the Action of the matching rule is Accept the gateway will drop the packet

B.

If the Action of the matching rule is Drop, the gateway continues to check rules in the next Policy Layer down

C.

If the Action of the matching rule is Drop the gateway stops matching against later rules in the Policy Rule Base and drops the packet

D.

If the rule does not match in the Network policy it will continue to other enabled polices

Which Identity Source(s) should be selected in Identity Awareness Tot when there is a requirement for a higher level of security for sensitive servers?

A.

Endpoint identity Agent and Browser Based Authentication

B.

AD Query

C.

Terminal Servers Endpoint Identity Agent

D.

RADIUS and Account Logon

What object type would you use to grant network access to an LDAP user group?

A.

Access Role

B.

Group Template

C.

SmartDirectory Group

D.

User Group

Which of the following is true regarding the Proxy ARP feature for Manual NAT?

A.

The local.arp file must always be configured

B.

Automatic proxy ARP configuration can be enabled

C.

fw ctl proxy should be configured

D.

Translate Destination on Client Side should be configured

What is the SOLR database for?

A.

Used for full text search and enables powerful matching capabilities

B.

Writes data to the database and full text search

C.

Serves GUI responsible to transfer request to the DLE server

D.

Enables powerful matching capabilities and writes data to the database

What are scenarios supported by the Central Deployment in SmartConsole?

A.

Installation of Jumbo Hotfix on a ClusterXL environment in High Availability Mode

B.

Upgrading a Dedicated SmartEvent Server

C.

Upgrading a Dedicated Log Server to R81

D.

Upgrading a Standalone environment

On R81.20 the IPS Blade is managed by:

A.

Threat Protection policy

B.

Anti-Bot Blade

C.

Threat Prevention policy

D.

Layers on Firewall policy

What technologies are used to deny or permit network traffic?

A.

Stateful Inspection, Firewall Blade, and URL/Application Blade

B.

Packet Filtering, Stateful Inspection, and Application Layer Firewall

C.

Firewall Blade, URL/Application Blade, and IPS

D.

Stateful Inspection, URL/Application Blade, and Threat Prevention

In which VPN community is a satellite VPN gateway not allowed to create a VPN tunnel with another satellite VPN gateway?

A.

Pentagon

B.

Combined

C.

Meshed

D.

Star

Using Web Services to access the API, which Header Name-Value had to be in the HTTP Post request after the login?

A.

X-chkp-sid Session Unique Identifier

B.

API-Key

C.

user-uid

D.

uuid Universally Unique Identifier

Which command will reset the kernel debug options to default settings?

A.

fw ctl dbg -a 0

B.

fw ctl dbg resetall

C.

fw ctl debug 0

D.

fw ctl debug set 0

Which of the following Check Point commands is true to enable Multi-Version Cluster (MVC)?

A.

Check Point Security Management HA (Secondary): set cluster member mvc on

B.

Check Point Security Gateway Only: set cluster member mvc on

C.

Check Point Security Management HA (Primary): set cluster member mvc on

D.

Check Point Security Gateway Cluster Member: set cluster member mvc on

Sieve is a Cyber Security Engineer working for Global Bank with a large scale deployment of Check Point Enterprise Appliances Steve's manager. Diana asks him to provide firewall connection table details from one of the firewalls for which he is responsible. Which of these commands may impact performance briefly and should not be used during heavy traffic times of day?

A.

fw tab -t connections -s

B.

fw tab -t connections

C.

fw tab -t connections -c

D.

fw tab -t connections -f