Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Checkpoint 156-315.81 - Check Point Certified Security Expert R81.20

Page: 1 / 13
Total 628 questions

What is the purpose of Priority Delta in VRRP?

A.

When a box up, Effective Priority = Priority + Priority Delta

B.

When an Interface is up, Effective Priority = Priority + Priority Delta

C.

When an Interface fail, Effective Priority = Priority – Priority Delta

D.

When a box fail, Effective Priority = Priority – Priority Delta

With Mobile Access enabled, administrators select the web-based and native applications that can be accessed by remote users and define the actions that users can perform the applications. Mobile Access encrypts all traffic using:

A.

HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, they need to install the SSL Network Extender.

B.

HTTPS for web-based applications and AES or RSA algorithm for native applications. For end users to access the native application, they need to install the SSL Network Extender.

C.

HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, no additional software is required.

D.

HTTPS for web-based applications and AES or RSA algorithm for native applications. For end users to access the native application, no additional software is required.

When simulating a problem on ClusterXL cluster with cphaprob –d STOP -s problem -t 0 register, to initiate a failover on an active cluster member, what command allows you remove the problematic state?

A.

cphaprob –d STOP unregister

B.

cphaprob STOP unregister

C.

cphaprob unregister STOP

D.

cphaprob –d unregister STOP

Which Remote Access Client does not provide an Office-Mode Address?

A.

SecuRemote

B.

Endpoint Security Suite

C.

Endpoint Security VPN

D.

Check Point Mobile

Please choose correct command to add an “emailserver1” host with IP address 10.50.23.90 using GAiA management CLI?

A.

host name myHost12 ip-address 10.50.23.90

B.

mgmt: add host name ip-address 10.50.23.90

C.

add host name emailserver1 ip-address 10.50.23.90

D.

mgmt: add host name emailserver1 ip-address 10.50.23.90

Under which file is the proxy arp configuration stored?

A.

$FWDIR/state/proxy_arp.conf on the management server

B.

$FWDIR/conf/local.arp on the management server

C.

$FWDIR/state/_tmp/proxy.arp on the security gateway

D.

$FWDIR/conf/local.arp on the gateway

You have existing dbedit scripts from R77. Can you use them with R81.20?

A.

dbedit is not supported in R81.20

B.

dbedit is fully supported in R81.20

C.

You can use dbedit to modify threat prevention or access policies, but not create or modify layers

D.

dbedit scripts are being replaced by mgmt_cli in R81.20

When an encrypted packet is decrypted, where does this happen?

A.

Security policy

B.

Inbound chain

C.

Outbound chain

D.

Decryption is not supported

Which Check Point daemon monitors the other daemons?

A.

fwm

B.

cpd

C.

cpwd

D.

fwssd

When setting up an externally managed log server, what is one item that will not be configured on the R81 Security Management Server?

A.

IP

B.

SIC

C.

NAT

D.

FQDN

Automation and Orchestration differ in that:

A.

Automation relates to codifying tasks, whereas orchestration relates to codifying processes.

B.

Automation involves the process of coordinating an exchange of information through web service interactions such as XML and JSON, but orchestration does not involve processes.

C.

Orchestration is concerned with executing a single task, whereas automation takes a series of tasks and puts them all together into a process workflow.

D.

Orchestration relates to codifying tasks, whereas automation relates to codifying processes.

As a valid Mobile Access Method, what feature provides Capsule Connect/VPN?

A.

That is used to deploy the mobile device as a generator of one-time passwords for authenticating to an RSA Authentication Manager.

B.

Fill Layer4 VPN –SSL VPN that gives users network access to all mobile applications.

C.

Full Layer3 VPN –IPSec VPN that gives users network access to all mobile applications.

D.

You can make sure that documents are sent to the intended recipients only.

What are the blades of Threat Prevention?

A.

IPS, DLP, AntiVirus, AntiBot, Sandblast Threat Emulation/Extraction

B.

DLP, AntiVirus, QoS, AntiBot, Sandblast Threat Emulation/Extraction

C.

IPS, AntiVirus, AntiBot

D.

IPS, AntiVirus, AntiBot, Sandblast Threat Emulation/Extraction

What is the protocol and port used for Health Check and State Synchronization in ClusterXL?

A.

CCP and 18190

B.

CCP and 257

C.

CCP and 8116

D.

CPC and 8116

What is mandatory for ClusterXL to work properly?

A.

The number of cores must be the same on every participating cluster node

B.

The Magic MAC number must be unique per cluster node

C.

The Sync interface must not have an IP address configured

D.

If you have “Non-monitored Private” interfaces, the number of those interfaces must be the same on all cluster members