Checkpoint 156-315.81 - Check Point Certified Security Expert R81.20
Due to high CPU workload on the Security Gateway, the security administrator decided to purchase a new multicore CPU to replace the existing single core CPU. After installation, is the administrator required to perform any additional tasks?
If there are two administration logged in at the same time to the SmartConsole, and there are objects locked for editing, what must be done to make them available or other administrators? (Choose the BEST answer.)
Secure Configuration Verification (SCV), makes sure that remote access client computers are configured in accordance with the enterprise Security Policy. Bob was asked by Alice to implement a specific SCV configuration but therefore Bob needs to edit and configure a specific Check Point file. Which location file and directory is true?
After some changes in the firewall policy you run into some issues. You want to test if the policy from two weeks ago have the same issue. You don't want to lose the changes from the last weeks. What is the best way to do it?
The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?
Tom has been tasked to install Check Point R81 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?
Fill in the blank: The tool _____ generates a R81 Security Gateway configuration report.
Which is NOT an example of a Check Point API?
The Event List within the Event tab contains:
Which TCP-port does CPM process listen to?
You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
Which of the following type of authentication on Mobile Access can NOT be used as the first authentication method?
Where you can see and search records of action done by R81 SmartConsole administrators?
What are the attributes that SecureXL will check after the connection is allowed by Security Policy?