Weekend Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

156-315.81 Check Point Certified Security Expert R81.20 Questions and Answers

Questions 4

Which Check Point feature enables application scanning and the detection?

Options:

A.

Application Dictionary

B.

AppWiki

C.

Application Library

D.

CPApp

Buy Now
Questions 5

Which of the following is NOT an alert option?

Options:

A.

SNMP

B.

High alert

C.

Mail

D.

User defined alert

Buy Now
Questions 6

Which of the following Windows Security Events will not map a username to an IP address in Identity Awareness?

Options:

A.

Kerberos Ticket Renewed

B.

Kerberos Ticket Requested

C.

Account Logon

D.

Kerberos Ticket Timed Out

Buy Now
Questions 7

When SecureXL is enabled, all packets should be accelerated, except packets that match the following conditions:

Options:

A.

All UDP packets

B.

All IPv6 Traffic

C.

All packets that match a rule whose source or destination is the Outside Corporate Network

D.

CIFS packets

Buy Now
Questions 8

Which of the following is NOT an option to calculate the traffic direction?

Options:

A.

Incoming

B.

Internal

C.

External

D.

Outgoing

Buy Now
Questions 9

What is the command to show SecureXL status?

Options:

A.

fwaccel status

B.

fwaccel stats -m

C.

fwaccel -s

D.

fwaccel stat

Buy Now
Questions 10

You can access the ThreatCloud Repository from:

Options:

A.

R81.20 SmartConsole and Application Wiki

B.

Threat Prevention and Threat Tools

C.

Threat Wiki and Check Point Website

D.

R81.20 SmartConsole and Threat Prevention

Buy Now
Questions 11

Which is NOT an example of a Check Point API?

Options:

A.

Gateway API

B.

Management API

C.

OPSEC SDK

D.

Threat Prevention API

Buy Now
Questions 12

The system administrator of a company is trying to find out why acceleration is not working for the traffic. The traffic is allowed according to the rule base and checked for viruses. But it is not accelerated.

What is the most likely reason that the traffic is not accelerated?

Options:

A.

There is a virus found. Traffic is still allowed but not accelerated.

B.

The connection required a Security server.

C.

Acceleration is not enabled.

D.

The traffic is originating from the gateway itself.

Buy Now
Questions 13

In which formats can Threat Emulation forensics reports be viewed in?

Options:

A.

TXT, XML and CSV

B.

PDF and TXT

C.

PDF, HTML, and XML

D.

PDF and HTML

Buy Now
Questions 14

Which file contains the host address to be published, the MAC address that needs to be associated with the IP Address, and the unique IP of the interface that responds to ARP request?

Options:

A.

/opt/CPshrd-R81/conf/local.arp

B.

/var/opt/CPshrd-R81/conf/local.arp

C.

$CPDIR/conf/local.arp

D.

$FWDIR/conf/local.arp

Buy Now
Questions 15

After the initial installation on Check Point appliance, you notice that the Management-interface and default gateway are incorrect.

Which commands could you use to set the IP to 192.168.80.200/24 and default gateway to 192.168.80.1.

Options:

A.

set interface Mgmt ipv4-address 192.168.80.200 mask-length 24set static-route default nexthop gateway address 192.168.80.1 onsave config

B.

set interface Mgmt ipv4-address 192.168.80.200 255.255.255.0add static-route 0.0.0.0. 0.0.0.0 gw 192.168.80.1 onsave config

C.

set interface Mgmt ipv4-address 192.168.80.200 255.255.255.0set static-route 0.0.0.0. 0.0.0.0 gw 192.168.80.1 onsave config

D.

set interface Mgmt ipv4-address 192.168.80.200 mask-length 24add static-route default nexthop gateway address 192.168.80.1 onsave config

Buy Now
Questions 16

SmartEvent provides a convenient way to run common command line executables that can assist in investigating events. Right-clicking the IP address, source or destination, in an event provides a list of default and customized commands. They appear only on cells that refer to IP addresses because the IP address of the active cell is used as the destination of the command when run. The default commands are:

Options:

A.

ping, traceroute, netstat, and route

B.

ping, nslookup, Telnet, and route

C.

ping, whois, nslookup, and Telnet

D.

ping, traceroute, netstat, and nslookup

Buy Now
Questions 17

For best practices, what is the recommended time for automatic unlocking of locked admin accounts?

Options:

A.

20 minutes

B.

15 minutes

C.

Admin account cannot be unlocked automatically

D.

30 minutes at least

Buy Now
Questions 18

Tom has connected to the R81 Management Server remotely using SmartConsole and is in the process of making some Rule Base changes, when he suddenly loses connectivity. Connectivity is restored shortly afterward.

What will happen to the changes already made?

Options:

A.

Tom’s changes will have been stored on the Management when he reconnects and he will not lose any of his work.

B.

Tom will have to reboot his SmartConsole computer, and access the Management cache store on that computer, which is only accessible after a reboot.

C.

Tom’s changes will be lost since he lost connectivity and he will have to start again.

D.

Tom will have to reboot his SmartConsole computer, clear to cache, and restore changes.

Buy Now
Questions 19

Which of the following describes how Threat Extraction functions?

Options:

A.

Detect threats and provides a detailed report of discovered threats.

B.

Proactively detects threats.

C.

Delivers file with original content.

D.

Delivers PDF versions of original files with active content removed.

Buy Now
Questions 20

You need to change the number of firewall Instances used by CoreXL. How can you achieve this goal?

Options:

A.

edit fwaffinity.conf; reboot required

B.

cpconfig; reboot required

C.

edit fwaffinity.conf; reboot not required

D.

cpconfig; reboot not required

Buy Now
Questions 21

Please choose the path to monitor the compliance status of the Check Point R81.20 based management.

Options:

A.

Gateways & Servers --> Compliance View

B.

Compliance blade not available under R81.20

C.

Logs & Monitor --> New Tab --> Open compliance View

D.

Security & Policies --> New Tab --> Compliance View

Buy Now
Questions 22

You notice that your firewall is under a DDoS attack and would like to enable the Penalty Box feature, which command you use?

Options:

A.

sim erdos –e 1

B.

sim erdos – m 1

C.

sim erdos –v 1

D.

sim erdos –x 1

Buy Now
Questions 23

Which of the following technologies extracts detailed information from packets and stores that information in state tables?

Options:

A.

INSPECT Engine

B.

Stateful Inspection

C.

Packet Filtering

D.

Application Layer Firewall

Buy Now
Questions 24

Which is NOT a SmartEvent component?

Options:

A.

SmartEvent Server

B.

Correlation Unit

C.

Log Consolidator

D.

Log Server

Buy Now
Questions 25

Vanessa is firewall administrator in her company. Her company is using Check Point firewall on a central and several remote locations which are managed centrally by R77.30 Security Management Server. On central location is installed R77.30 Gateway on Open server. Remote locations are using Check Point UTM-1570 series appliances with R75.30 and some of them are using a UTM-1-Edge-X or Edge-W with latest available firmware. She is in process of migrating to R81.

What can cause Vanessa unnecessary problems, if she didn’t check all requirements for migration to R81?

Options:

A.

Missing an installed R77.20 Add-on on Security Management Server

B.

Unsupported firmware on UTM-1 Edge-W appliance

C.

Unsupported version on UTM-1 570 series appliance

D.

Unsupported appliances on remote locations

Buy Now
Questions 26

In what way are SSL VPN and IPSec VPN different?

Options:

A.

SSL VPN is using HTTPS in addition to IKE, whereas IPSec VPN is clientless

B.

SSL VPN adds an extra VPN header to the packet, IPSec VPN does not

C.

IPSec VPN does not support two factor authentication, SSL VPN does support this

D.

IPSec VPN uses an additional virtual adapter; SSL VPN uses the client network adapter only.

Buy Now
Questions 27

You have a Gateway is running with 2 cores. You plan to add a second gateway to build a cluster and used a device with 4 cores.

How many cores can be used in a Cluster for Firewall-kernel on the new device?

Options:

A.

3

B.

2

C.

1

D.

4

Buy Now
Questions 28

With SecureXL enabled, accelerated packets will pass through the following:

Options:

A.

Network Interface Card, OSI Network Layer, OS IP Stack, and the Acceleration Device

B.

Network Interface Card, Check Point Firewall Kernal, and the Acceleration Device

C.

Network Interface Card and the Acceleration Device

D.

Network Interface Card, OSI Network Layer, and the Acceleration Device

Buy Now
Questions 29

Fill in the blank: The R81 SmartConsole, SmartEvent GUI client, and _______ consolidate billions of logs and shows then as prioritized security events.

Options:

A.

SmartMonitor

B.

SmartView Web Application

C.

SmartReporter

D.

SmartTracker

Buy Now
Questions 30

On what port does the CPM process run?

Options:

A.

TCP 857

B.

TCP 18192

C.

TCP 900

D.

TCP 19009

Buy Now
Questions 31

After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?

Options:

A.

Security Gateway IP-address cannot be changed without re-establishing the trust.

B.

The Security Gateway name cannot be changed in command line without re-establishing trust.

C.

The Security Management Server name cannot be changed in SmartConsole without re-establishing trust.

D.

The Security Management Server IP-address cannot be changed without re-establishing the trust.

Buy Now
Questions 32

Which statement is most correct regarding about “CoreXL Dynamic Dispatcher”?

Options:

A.

The CoreXL FW instanxces assignment mechanism is based on Source MAC addresses, Destination MAC addresses

B.

The CoreXL FW instances assignment mechanism is based on the utilization of CPU cores

C.

The CoreXL FW instances assignment mechanism is based on IP Protocol type

D.

The CoreXl FW instances assignment mechanism is based on Source IP addresses, Destination IP addresses, and the IP ‘Protocol’ type

Buy Now
Questions 33

GAiA Software update packages can be imported and installed offline in situation where:

Options:

A.

Security Gateway with GAiA does NOT have SFTP access to Internet

B.

Security Gateway with GAiA does NOT have access to Internet.

C.

Security Gateway with GAiA does NOT have SSH access to Internet.

D.

The desired CPUSE package is ONLY available in the Check Point CLOUD.

Buy Now
Questions 34

When using CPSTAT, what is the default port used by the AMON server?

Options:

A.

18191

B.

18192

C.

18194

D.

18190

Buy Now
Questions 35

Which configuration file contains the structure of the Security Server showing the port numbers, corresponding protocol name, and status?

Options:

A.

$FWDIR/database/fwauthd.conf

B.

$FWDIR/conf/fwauth.conf

C.

$FWDIR/conf/fwauthd.conf

D.

$FWDIR/state/fwauthd.conf

Buy Now
Questions 36

What is a best practice before starting to troubleshoot using the “fw monitor” tool?

Options:

A.

Run the command: fw monitor debug on

B.

Clear the connections table

C.

Disable CoreXL

D.

Disable SecureXL

Buy Now
Questions 37

SmartEvent does NOT use which of the following procedures to identify events:

Options:

A.

Matching a log against each event definition

B.

Create an event candidate

C.

Matching a log against local exclusions

D.

Matching a log against global exclusions

Buy Now
Questions 38

What is the protocol and port used for Health Check and State Synchronization in ClusterXL?

Options:

A.

CCP and 18190

B.

CCP and 257

C.

CCP and 8116

D.

CPC and 8116

Buy Now
Questions 39

Where do you create and modify the Mobile Access policy in R81?

Options:

A.

SmartConsole

B.

SmartMonitor

C.

SmartEndpoint

D.

SmartDashboard

Buy Now
Questions 40

In the Firewall chain mode FFF refers to:

Options:

A.

Stateful Packets

B.

No Match

C.

All Packets

D.

Stateless Packets

Buy Now
Questions 41

Security Checkup Summary can be easily conducted within:

Options:

A.

Summary

B.

Views

C.

Reports

D.

Checkups

Buy Now
Questions 42

What CLI command compiles and installs a Security Policy on the target’s Security Gateways?

Options:

A.

fwm compile

B.

fwm load

C.

fwm fetch

D.

fwm install

Buy Now
Questions 43

How do you enable virtual mac (VMAC) on-the-fly on a cluster member?

Options:

A.

cphaprob set int fwha_vmac_global_param_enabled 1

B.

clusterXL set int fwha_vmac_global_param_enabled 1

C.

fw ctl set int fwha_vmac_global_param_enabled 1

D.

cphaconf set int fwha_vmac_global_param_enabled 1

Buy Now
Questions 44

Which command gives us a perspective of the number of kernel tables?

Options:

A.

fw tab -t

B.

fw tab -s

C.

fw tab -n

D.

fw tab -k

Buy Now
Questions 45

When installing a dedicated R81 SmartEvent server. What is the recommended size of the root partition?

Options:

A.

Any size

B.

Less than 20GB

C.

More than 10GB and less than 20GB

D.

At least 20GB

Buy Now
Questions 46

For Management High Availability, which of the following is NOT a valid synchronization status?

Options:

A.

Collision

B.

Down

C.

Lagging

D.

Never been synchronized

Buy Now
Questions 47

Which web services protocol is used to communicate to the Check Point R81 Identity Awareness Web API?

Options:

A.

SOAP

B.

REST

C.

XLANG

D.

XML-RPC

Buy Now
Questions 48

What is the most recommended way to install patches and hotfixes?

Options:

A.

CPUSE Check Point Update Service Engine

B.

rpm -Uv

C.

Software Update Service

D.

UnixinstallScript

Buy Now
Questions 49

When Dynamic Dispatcher is enabled, connections are assigned dynamically with the exception of:

Options:

A.

Threat Emulation

B.

HTTPS

C.

QOS

D.

VoIP

Buy Now
Questions 50

John is using Management HA. Which Smartcenter should be connected to for making changes?

Options:

A.

secondary Smartcenter

B.

active Smartenter

C.

connect virtual IP of Smartcenter HA

D.

primary Smartcenter

Buy Now
Questions 51

What information is NOT collected from a Security Gateway in a Cpinfo?

Options:

A.

Firewall logs

B.

Configuration and database files

C.

System message logs

D.

OS and network statistics

Buy Now
Questions 52

How would you deploy TE250X Check Point appliance just for email traffic and in-line mode without a Check Point Security Gateway?

Options:

A.

Install appliance TE250X on SpanPort on LAN switch in MTA mode.

B.

Install appliance TE250X in standalone mode and setup MTA.

C.

You can utilize only Check Point Cloud Services for this scenario.

D.

It is not possible, always Check Point SGW is needed to forward emails to SandBlast appliance.

Buy Now
Questions 53

SandBlast appliances can be deployed in the following modes:

Options:

A.

using a SPAN port to receive a copy of the traffic only

B.

detect only

C.

inline/prevent or detect

D.

as a Mail Transfer Agent and as part of the traffic flow only

Buy Now
Questions 54

As a valid Mobile Access Method, what feature provides Capsule Connect/VPN?

Options:

A.

That is used to deploy the mobile device as a generator of one-time passwords for authenticating to an RSA Authentication Manager.

B.

Fill Layer4 VPN –SSL VPN that gives users network access to all mobile applications.

C.

Full Layer3 VPN –IPSec VPN that gives users network access to all mobile applications.

D.

You can make sure that documents are sent to the intended recipients only.

Buy Now
Questions 55

John detected high load on sync interface. Which is most recommended solution?

Options:

A.

For short connections like http service – delay sync for 2 seconds

B.

Add a second interface to handle sync traffic

C.

For short connections like http service – do not sync

D.

For short connections like icmp service – delay sync for 2 seconds

Buy Now
Questions 56

What does it mean if Deyra sees the gateway status? (Choose the BEST answer.)

156-315.81 Question 56

Options:

A.

SmartCenter Server cannot reach this Security Gateway.

B.

There is a blade reporting a problem.

C.

VPN software blade is reporting a malfunction.

D.

Security Gateway’s MGNT NIC card is disconnected.

Buy Now
Questions 57

To add a file to the Threat Prevention Whitelist, what two items are needed?

Options:

A.

File name and Gateway

B.

Object Name and MD5 signature

C.

MD5 signature and Gateway

D.

IP address of Management Server and Gateway

Buy Now
Questions 58

Can multiple administrators connect to a Security Management Server at the same time?

Options:

A.

No, only one can be connected

B.

Yes, all administrators can modify a network object at the same time

C.

Yes, every administrator has their own username, and works in a session that is independent of other administrators.

D.

Yes, but only one has the right to write.

Buy Now
Questions 59

You find one of your cluster gateways showing “Down” when you run the “cphaprob stat” command. You then run the “clusterXL_admin up” on the down member but unfortunately the member continues to show down. What command do you run to determine the cause?

Options:

A.

cphaprob –f register

B.

cphaprob –d –s report

C.

cpstat –f all

D.

cphaprob –a list

Buy Now
Questions 60

In the Check Point Firewall Kernel Module, each Kernel is associated with a key, which specifies the type of traffic applicable to the chain module. For Wire Mode configuration, chain modules marked with ____________ will not apply.

Options:

A.

ffff

B.

1

C.

2

D.

3

Buy Now
Questions 61

Which of the following is NOT a component of Check Point Capsule?

Options:

A.

Capsule Docs

B.

Capsule Cloud

C.

Capsule Enterprise

D.

Capsule Workspace

Buy Now
Questions 62

What is the main difference between Threat Extraction and Threat Emulation?

Options:

A.

Threat Emulation never delivers a file and takes more than 3 minutes to complete.

B.

Threat Extraction always delivers a file and takes less than a second to complete.

C.

Threat Emulation never delivers a file that takes less than a second to complete.

D.

Threat Extraction never delivers a file and takes more than 3 minutes to complete.

Buy Now
Questions 63

Under which file is the proxy arp configuration stored?

Options:

A.

$FWDIR/state/proxy_arp.conf on the management server

B.

$FWDIR/conf/local.arp on the management server

C.

$FWDIR/state/_tmp/proxy.arp on the security gateway

D.

$FWDIR/conf/local.arp on the gateway

Buy Now
Questions 64

SmartConsole R81 requires the following ports to be open for SmartEvent R81 management:

Options:

A.

19090,22

B.

19190,22

C.

18190,80

D.

19009,443

Buy Now
Questions 65

You are asked to check the status of several user-mode processes on the management server and gateway. Which of the following processes can only be seen on a Management Server?

Options:

A.

fwd

B.

fwm

C.

cpd

D.

cpwd

Buy Now
Questions 66

What are the steps to configure the HTTPS Inspection Policy?

Options:

A.

Go to Manage&Settings > Blades > HTTPS Inspection > Configure in SmartDashboard

B.

Go to Application&url filtering blade > Advanced > Https Inspection > Policy

C.

Go to Manage&Settings > Blades > HTTPS Inspection > Policy

D.

Go to Application&url filtering blade > Https Inspection > Policy

Buy Now
Questions 67

Traffic from source 192.168.1.1 is going to www.google.com. The Application Control Blade on the gateway is inspecting the traffic. Assuming acceleration is enabled which path is handling the traffic?

Options:

A.

Slow Path

B.

Medium Path

C.

Fast Path

D.

Accelerated Path

Buy Now
Questions 68

Which command shows the current connections distributed by CoreXL FW instances?

Options:

A.

fw ctl multik stat

B.

fw ctl affinity -l

C.

fw ctl instances -v

D.

fw ctl iflist

Buy Now
Questions 69

You are investigating issues with to gateway cluster members are not able to establish the first initial cluster synchronization. What service is used by the FWD daemon to do a Full Synchronization?

Options:

A.

TCP port 443

B.

TCP port 257

C.

TCP port 256

D.

UDP port 8116

Buy Now
Questions 70

What API command below creates a new host with the name “New Host” and IP address of “192.168.0.10”?

Options:

A.

new host name “New Host” ip-address “192.168.0.10”

B.

set host name “New Host” ip-address “192.168.0.10”

C.

create host name “New Host” ip-address “192.168.0.10”

D.

add host name “New Host” ip-address “192.168.0.10”

Buy Now
Questions 71

What component of R81 Management is used for indexing?

Options:

A.

DBSync

B.

API Server

C.

fwm

D.

SOLR

Buy Now
Questions 72

You need to see which hotfixes are installed on your gateway, which command would you use?

Options:

A.

cpinfo –h all

B.

cpinfo –o hotfix

C.

cpinfo –l hotfix

D.

cpinfo –y all

Buy Now
Questions 73

How do Capsule Connect and Capsule Workspace differ?

Options:

A.

Capsule Connect provides a Layer3 VPN. Capsule Workspace provides a Desktop with usable applications.

B.

Capsule Workspace can provide access to any application.

C.

Capsule Connect provides Business data isolation.

D.

Capsule Connect does not require an installed application at client.

Buy Now
Questions 74

What is mandatory for ClusterXL to work properly?

Options:

A.

The number of cores must be the same on every participating cluster node

B.

The Magic MAC number must be unique per cluster node

C.

The Sync interface must not have an IP address configured

D.

If you have “Non-monitored Private” interfaces, the number of those interfaces must be the same on all cluster members

Buy Now
Questions 75

The Correlation Unit performs all but the following actions:

Options:

A.

Marks logs that individually are not events, but may be part of a larger pattern to be identified later.

B.

Generates an event based on the Event policy.

C.

Assigns a severity level to the event.

D.

Takes a new log entry that is part of a group of items that together make up an event, and adds it to an ongoing event.

Buy Now
Questions 76

Which Check Point daemon monitors the other daemons?

Options:

A.

fwm

B.

cpd

C.

cpwd

D.

fwssd

Buy Now
Questions 77

Which one of the following is true about Capsule Connect?

Options:

A.

It is a full layer 3 VPN client

B.

It offers full enterprise mobility management

C.

It is supported only on iOS phones and Windows PCs

D.

It does not support all VPN authentication methods

Buy Now
Questions 78

After making modifications to the $CVPNDIR/conf/cvpnd.C file, how would you restart the daemon?

Options:

A.

cvpnd_restart

B.

cvpnd_restart

C.

cvpnd restart

D.

cvpnrestart

Buy Now
Questions 79

Which of the following will NOT affect acceleration?

Options:

A.

Connections destined to or originated from the Security gateway

B.

A 5-tuple match

C.

Multicast packets

D.

Connections that have a Handler (ICMP, FTP, H.323, etc.)

Buy Now
Questions 80

SandBlast has several functional components that work together to ensure that attacks are prevented in real-time. Which the following is NOT part of the SandBlast component?

Options:

A.

Threat Emulation

B.

Mobile Access

C.

Mail Transfer Agent

D.

Threat Cloud

Buy Now
Questions 81

You want to store the GAIA configuration in a file for later reference. What command should you use?

Options:

A.

write mem

B.

show config –f

C.

save config –o

D.

save configuration

Buy Now
Questions 82

What is considered Hybrid Emulation Mode?

Options:

A.

Manual configuration of file types on emulation location.

B.

Load sharing of emulation between an on premise appliance and the cloud.

C.

Load sharing between OS behavior and CPU Level emulation.

D.

High availability between the local SandBlast appliance and the cloud.

Buy Now
Questions 83

Which directory below contains log files?

Options:

A.

/opt/CPSmartlog-R81/log

B.

/opt/CPshrd-R81/log

C.

/opt/CPsuite-R81/fw1/log

D.

/opt/CPsuite-R81/log

Buy Now
Questions 84

What ports are used for SmartConsole to connect to the Security Management Server?

Options:

A.

CPMI (18190)

B.

ICA_Pull (18210), CPMI (18190) https (443)

C.

CPM (19009), CPMI (18190) https (443)

D.

CPM (19009), CPMI (18190) CPD (18191)

Buy Now
Questions 85

What is the default shell for the command line interface?

Options:

A.

Expert

B.

Clish

C.

Admin

D.

Normal

Buy Now
Questions 86

You pushed a policy to your gateway and you cannot access the gateway remotely any more. What command should you use to remove the policy from the gateway by logging in through console access?

Options:

A.

"fw cpstop"

B.

"fw unloadlocal"

C.

"fwundo"

D.

"fw unloadpolicy''

Buy Now
Questions 87

How can you switch the active log file?

Options:

A.

Run fw logswitch on the gateway

B.

Run fwm logswitch on the Management Server

C.

Run fwm logswitch on the gateway

D.

Run fw logswitch on the Management Server

Buy Now
Questions 88

What is the minimum number of CPU cores required to enable CoreXL?

Options:

A.

1

B.

6

C.

2

D.

4

Buy Now
Questions 89

IF the first packet of an UDP session is rejected by a rule definition from within a security policy (not including the clean up rule), what message is sent back through the kernel?

Options:

A.

Nothing

B.

TCP FIN

C.

TCP RST

D.

ICMP unreachable

Buy Now
Questions 90

An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office. Both offices are protected by Check Point Security Gateway managed by the same Security Management Server. While configuring the VPN community to specify the pre-shared secret the administrator found that the check box to enable pre-shared secret and cannot be enabled.

Why does it not allow him to specify the pre-shared secret?

Options:

A.

IPsec VPN blade should be enabled on both Security Gateway.

B.

Pre-shared can only be used while creating a VPN between a third party vendor and Check Point Security Gateway.

C.

Certificate based Authentication is the only authentication method available between two Security Gateway managed by the same SMS.

D.

The Security Gateways are pre-R75.40.

Buy Now
Questions 91

UserCheck objects in the Application Control and URL Filtering rules allow the gateway to communicate with the users. Which action is not supported in UserCheck objects?

Options:

A.

Ask

B.

Drop

C.

Inform

D.

Reject

Buy Now
Questions 92

How many policy layers do Access Control policy support?

Options:

A.

2

B.

4

C.

1

D.

3

Buy Now
Questions 93

Which of the following is NOT an internal/native Check Point command?

Options:

A.

fwaccel on

B.

fw ct1 debug

C.

tcpdump

D.

cphaprob

Buy Now
Questions 94

After some changes in the firewall policy you run into some issues. You want to test if the policy from two weeks ago have the same issue. You don't want to lose the changes from the last weeks. What is the best way to do it?

Options:

A.

Use the Gaia WebUI to take a backup of the Gateway. In SmartConsole under Security Policies go to the Installation History view of the Gateway, select the policy version

from two weeks ago and press the 'Install specific version' button

B.

Use the Gaia WebUI to take a snapshot of management. In the In SmartConsole under Manage & Settlings go to Sessions -> Revisions and select the revision from two

weeks ago. Run the action 'Revert to this revision...' Restore the management snapshot.

C.

In SmartConsole under Manage & Settings go to Sessions -> Revisions and select the revision from two weeks ago. Run the action 'Revert to this revision...'.

D.

In SmartConsole under Security Policies go to the Installation History view of the Gateway, select the policy version from two weeks ago and press the 'Install specific

version' button

Buy Now
Questions 95

Which path below is available only when CoreXL is enabled?

Options:

A.

Slow path

B.

Firewall path

C.

Medium path

D.

Accelerated path

Buy Now
Questions 96

What is the Implicit Clean-up Rule?

Options:

A.

A setting is defined in the Global Properties for all policies.

B.

A setting that is configured per Policy Layer.

C.

Another name for the Clean-up Rule.

D.

Automatically created when the Clean-up Rule is defined.

Buy Now
Questions 97

How can you grant GAiAAPI Permissions for a newly created user?

Options:

A.

Assign the user a permission profile in SmartConsole

B.

Assign the user the admin RBAC role in dish

C.

No need to grant access since every user has access by default.

D.

In bash, use the following command: "gaia_api access --user Tom -enable true"

Buy Now
Questions 98

Which command lists firewall chain?

Options:

A.

fwctl chain

B.

fw list chain

C.

fw chain module

D.

fw tab -t chainmod

Buy Now
Questions 99

What are the main stages of a policy installation?

Options:

A.

Initiation, Conversion and FWD REXEC

B.

Verification, Commit, Installation

C.

Initiation, Conversion and Save

D.

Verification Compilation, Transfer and Commit

Buy Now
Questions 100

Besides fw monitor, what is another command that can be used to capture packets?

Options:

A.

arp

B.

traceroute

C.

tcpdump

D.

ping

Buy Now
Questions 101

Where is the license for Check Point Mobile users installed?

Options:

A.

The Primary Gateway

B.

The Standby Gateway

C.

The Endpoint Server

D.

The Security Management Server

Buy Now
Questions 102

By default, which port does the WebUI listen on?

Options:

A.

80

B.

4434

C.

443

D.

8080

Buy Now
Questions 103

By default, how often does Threat Emulation update the engine on the Security Gateway?

Options:

A.

Once per day

B.

Once an hour

C.

Once a week

D.

Twice per day

Buy Now
Questions 104

What CLI utility runs connectivity tests from a Security Gateway to an AD domain controller?

Options:

A.

test_connectivity_ad –d

B.

test_ldap_connectivity –d

C.

test_ad_connectivity –d

D.

ad_connectivity_test –d

Buy Now
Questions 105

If a “ping”-packet is dropped by FW1 Policy –on how many inspection Points do you see this packet in “fw monitor”?

Options:

A.

“i", “l” and “o”

B.

I don’t see it in fw monitor

C.

“i" only

D.

“i" and “l”

Buy Now
Questions 106

From SecureXL perspective, what are the three paths of traffic flow:

Options:

A.

Initial Path; Medium Path; Accelerated Path

B.

Layer Path; Blade Path; Rule Path

C.

Firewall Path; Accelerated Path; Medium Path

D.

Firewall Path; Accept Path; Drop Path

Buy Now
Questions 107

What statement best describes the Proxy ARP feature for Manual NAT in R81.20?

Options:

A.

Automatic proxy ARP configuration can be enabled

B.

Translate Destination on Client Side should be configured

C.

fw ctl proxy should be configured

D.

local.arp file must always be configured

Buy Now
Questions 108

Capsule Connect and Capsule Workspace both offer secured connection for remote users who are using their mobile devices. However, there are differences between the two.

Which of the following statements correctly identify each product's capabilities?

Options:

A.

Workspace supports ios operating system, Android, and WP8, whereas Connect supports ios operating system and Android only

B.

For compliance/host checking, Workspace offers the MDM cooperative enforcement, whereas Connect offers both jailbreak/root detection and MDM cooperative enforcement.

C.

For credential protection, Connect uses One-time Password login support and has no SSO support, whereas Workspace offers both One-Time Password and certain SSO login support.

D.

Workspace can support any application, whereas Connect has a limited number of application types which it will support.

Buy Now
Questions 109

The SmartEvent R81 Web application for real-time event monitoring is called:

Options:

A.

SmartView Monitor

B.

SmartEventWeb

C.

There is no Web application for SmartEvent

D.

SmartView

Buy Now
Questions 110

Check Point APIs allow system engineers and developers to make changes to their organization’s security policy with CLI tools and Web Services for all the following except:

Options:

A.

Create new dashboards to manage 3rd party task

B.

Create products that use and enhance 3rd party solutions

C.

Execute automated scripts to perform common tasks

D.

Create products that use and enhance the Check Point Solution

Buy Now
Questions 111

Which file gives you a list of all security servers in use, including port number?

Options:

A.

$FWDIR/conf/conf.conf

B.

$FWDIR/conf/servers.conf

C.

$FWDIR/conf/fwauthd.conf

D.

$FWDIR/conf/serversd.conf

Buy Now
Questions 112

What are valid authentication methods for mutual authenticating the VPN gateways?

Options:

A.

PKI Certificates and Kerberos Tickets

B.

PKI Certificates and DynamicID OTP

C.

Pre-Shared Secrets and Kerberos Ticket

D.

Pre-shared Secret and PKI Certificates

Buy Now
Questions 113

Which of the following processes pulls the application monitoring status from gateways?

Options:

A.

cpd

B.

cpwd

C.

cpm

D.

fwm

Buy Now
Questions 114

In R81.20 a new feature dynamic log distribution was added. What is this for?

  • Configure the Security Gateway to distribute logs between multiple active Log Servers to support a better rate of Logs and Log Servers redundancy

  • In case of a Management High Availability the management server stores the logs dynamically on the member with the most available disk space in /var/log

  • Synchronize the log between the primary and secondary management server in case of a Management High Availability

Options:

A.

To save disk space in case of a firewall cluster local logs are distributed between the cluster members.

Buy Now
Questions 115

Return oriented programming (ROP) exploits are detected by which security blade?

Options:

A.

Data Loss Prevention

B.

Check Point Anti-Virus / Threat Emulation

C.

Application control

D.

Intrusion Prevention Software

Buy Now
Questions 116

Which 3 types of tracking are available for Threat Prevention Policy?

Options:

A.

SMS Alert, Log, SNMP alert

B.

Syslog, None, User-defined scripts

C.

None, Log, Syslog

D.

Alert, SNMP trap, Mail

Buy Now
Questions 117

What is Dynamic Balancing?

Options:

A.

It is a ClusterXL feature that switches an HA cluster into an LS cluster if required to maximize throughput

B.

It is a feature that uses a daemon to balance the required number of firewall instances and SNDs based on the current load

C.

It is a new feature that is capable of dynamically reserve the amount of Hash kernel memory to reflect the resource usage necessary for maximizing the session rate.

D.

It is a CoreXL feature that assigns the SND to network interfaces to balance the RX Cache of the interfaces

Buy Now
Questions 118

What API command below creates a new host object with the name "My Host" and IP address of "192 168 0 10"?

Options:

A.

set host name "My Host" ip-address "192.168.0.10"

B.

new host name "My Host" ip-address "192 168.0.10"

C.

create host name "My Host" ip-address "192.168 0.10"

D.

mgmt.cli -m add host name "My Host" ip-address "192.168.0 10"

Buy Now
Questions 119

You have used the SmartEvent GUI to create a custom Event policy. What is the best way to display the correlated Events generated by SmartEvent Policies?

Options:

A.

Open SmartView Monitor and select the SmartEvent Window from the main menu.

B.

In the SmartConsole / Logs & Monitor --> open the Logs View and use type:Correlated as query filter.

C.

In the SmartConsole / Logs & Monitor -> open a new Tab and select External Apps / SmartEvent.

D.

Select the Events tab in the SmartEvent GUI or use the Events tab in the SmartView web interface.

Buy Now
Questions 120

Name the authentication method that requires token authenticator.

Options:

A.

SecurelD

B.

DynamiclD

C.

Radius

D.

TACACS

Buy Now
Questions 121

Which type of Endpoint Identity Agent includes packet tagging and computer authentication?

Options:

A.

Full

B.

Custom

C.

Light

D.

Complete

Buy Now
Questions 122

Which of the following is true regarding the Proxy ARP feature for Manual NAT?

Options:

A.

The local.arp file must always be configured

B.

Automatic proxy ARP configuration can be enabled

C.

fw ctl proxy should be configured

D.

Translate Destination on Client Side should be configured

Buy Now
Questions 123

Which statement is false in respect of the SmartConsole after upgrading the management server to R81.20?

Options:

A.

Yes. You can download the SmartConsole directly from the Download Center

B.

As far as you use version R80.40, no upgrade is needed due to compatibility mode

C.

Yes, using CPUSE you can make the installer available in the Web Portal of the Management Server

D.

Yes, the SmartConsole Upgrade package can be installed using CPUSE

Buy Now
Questions 124

Fill in the blanks: A _______ license requires an administrator to designate a gateway for attachment whereas a ________ license is automatically attached to a Security Gateway.

Options:

A.

Formal; corporate

B.

Local; formal

C.

Local; central

D.

Central; local

Buy Now
Questions 125

The Compliance Blade allows you to search for text strings in many windows and panes, to search for a value in a field, what would your syntax be?

Options:

A.

field_name:string

B.

name field:string

C.

name_field:string

D.

field name:string

Buy Now
Questions 126

What does the Log "Views" tab show when SmartEvent is Correlating events?

Options:

A.

A list of common reports

B.

Reports for customization

C.

Top events with charts and graphs

D.

Details of a selected logs

Buy Now
Questions 127

What is false regarding prerequisites for the Central Deployment usage?

Options:

A.

The administrator must have write permission on SmartUpdate

B.

Security Gateway must have the latest CPUSE Deployment Agent

C.

No need to establish SIC between gateways and the management server, since the CDT tool will take care about SIC automatically.

D.

The Security Gateway must have a policy installed

Buy Now
Questions 128

Bob works for a big security outsourcing provider company and as he receives a lot of change requests per day he wants to use for scripting daily tasks the API services (torn Check Point for the GAIA API. Firstly he needs to be aware if the API services are running for the GAIA operating system. Which of the following Check Point Command is true:

Options:

A.

gala_dlish status

B.

status gaiaapi

C.

api_gala status

D.

gala_api status

Buy Now
Questions 129

What is the best sync method in the ClusterXL deployment?

Options:

A.

Use 1 cluster + 1st sync

B.

Use 1 dedicated sync interface

C.

Use 3 clusters + 1st sync + 2nd sync + 3rd sync

D.

Use 2 clusters +1st sync + 2nd sync

Buy Now
Questions 130

On the following picture an administrator configures Identity Awareness:

156-315.81 Question 130

After clicking “Next” the above configuration is supported by:

Options:

A.

Kerberos SSO which will be working for Active Directory integration

B.

Based on Active Directory integration which allows the Security Gateway to correlate Active Directory users and machines to IP addresses in a method that is completely transparent to the user.

C.

Obligatory usage of Captive Portal.

D.

The ports 443 or 80 what will be used by Browser-Based and configured Authentication.

Buy Now
Questions 131

Alice & Bob are concurrently logged In via SSH on the same Check Point Security Gateway as user "admin* however Bob was first logged in and acquired the lock Alice Is not aware that Bob is also togged in to the same Security Management Server as she is but she needs to perform very urgent configuration changes - which of the following GAlAclish command is true for overriding Bobs configuration database lock:

Options:

A.

lock database override

B.

unlock override database

C.

unlock database override

D.

database unlock override

Buy Now
Questions 132

While enabling the Identity Awareness blade the Identity Awareness wizard does not automatically detect the windows domain. Why does it not detect the windows domain?

Options:

A.

Security Gateway is not part of the Domain

B.

SmartConsole machine is not part of the domain

C.

Identity Awareness is not enabled on Global properties

D.

Security Management Server is not part of the domain

Buy Now
Questions 133

A user complains that some Internet resources are not available. The Administrator is having issues seeing it packets are being dropped at the firewall (not seeing drops in logs). What is the solution to troubleshoot the issue?

Options:

A.

run fw unloadlocal" on the relevant gateway and check the ping again

B.

run "cpstop" on the relevant gateway and check the ping again

C.

run ‘’fw log" on the relevant gateway

D.

run ‘’fw ctl zdebug drop" on the relevant gateway

Buy Now
Questions 134

What is the valid range for Virtual Router Identifier (VRID) value in a Virtual Routing Redundancy Protocol (VRRP) configuration?

Options:

A.

1-254

B.

1-255

C.

0-254

D.

0 – 255

Buy Now
Questions 135

Which upgrade method you should use upgrading from R80.40 to R81.20 to avoid any downtime?

Options:

A.

Zero Downtime Upgrade (ZDU)

B.

Connectivity Upgrade (CU)

C.

Minimal Effort Upgrade (ME)

D.

Multi-Version Cluster Upgrade (MVC)

Buy Now
Questions 136

What is the amount of Priority Queues by default?

Options:

A.

There are 8 priority queues and this number cannot be changed.

B.

There is no distinct number of queues since it will be changed in a regular basis based on its system requirements.

C.

There are 7 priority queues by default and this number cannot be changed.

D.

There are 8 priority queues by default, and up to 8 additional queues can be manually configured

Buy Now
Questions 137

Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidates management console. CPM allows the GUI client and management server to communicate via web services using ___________.

Options:

A.

TCP port 19009

B.

TCP Port 18190

C.

TCP Port 18191

D.

TCP Port 18209

Buy Now
Questions 138

What are valid Policy Types in R81.X?

Options:

A.

Access Control, Threat Prevention, QoS, Desktop Security

B.

Access Control, IPS, Threat Emulation, NAT

C.

Access Control, IPS, QoS, DLP

D.

Access Control, RemoteAccess VPN, NAT, IPS

Buy Now
Questions 139

Check Point ClusterXL Active/Active deployment is used when:

Options:

A.

Only when there is Multicast solution set up.

B.

There is Load Sharing solution set up.

C.

Only when there is Unicast solution set up.

D.

There is High Availability solution set up.

Buy Now
Questions 140

fwssd is a child process of which of the following Check Point daemons?

Options:

A.

fwd

B.

cpwd

C.

fwm

D.

cpd

Buy Now
Questions 141

Which of the following process pulls application monitoring status?

Options:

A.

fwd

B.

fwm

C.

cpwd

D.

cpd

Buy Now
Questions 142

What is the order of NAT priorities?

Options:

A.

Static NAT, IP pool NAT, hide NAT

B.

IP pool NAT, static NAT, hide NAT

C.

Static NAT, automatic NAT, hide NAT

D.

Static NAT, hide NAT, IP pool NAT

Buy Now
Questions 143

What is UserCheck?

Options:

A.

Messaging tool used to verify a user’s credentials.

B.

Communication tool used to inform a user about a website or application they are trying to access.

C.

Administrator tool used to monitor users on their network.

D.

Communication tool used to notify an administrator when a new user is created.

Buy Now
Questions 144

Vanessa is a Firewall administrator. She wants to test a backup of her company’s production Firewall cluster Dallas_GW. She has a lab environment that is identical to her production environment. She decided to restore production backup via SmartConsole in lab environment.

Which details she need to fill in System Restore window before she can click OK button and test the backup?

Options:

A.

Server, SCP, Username, Password, Path, Comment, Member

B.

Server, TFTP, Username, Password, Path, Comment, All Members

C.

Server, Protocol, Username, Password, Path, Comment, All Members

D.

Server, Protocol, username Password, Path, Comment, Member

Buy Now
Questions 145

Connections to the Check Point R81 Web API use what protocol?

Options:

A.

HTTPS

B.

RPC

C.

VPN

D.

SIC

Buy Now
Questions 146

CoreXL is supported when one of the following features is enabled:

Options:

A.

Route-based VPN

B.

IPS

C.

IPv6

D.

Overlapping NAT

Buy Now
Questions 147

You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.

Options:

A.

Inspect/Bypass

B.

Inspect/Prevent

C.

Prevent/Bypass

D.

Detect/Bypass

Buy Now
Questions 148

The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?

Options:

A.

fwd via cpm

B.

fwm via fwd

C.

cpm via cpd

D.

fwd via cpd

Buy Now
Questions 149

When requiring certificates for mobile devices, make sure the authentication method is set to one of the following, Username and Password, RADIUS or ________.

Options:

A.

SecureID

B.

SecurID

C.

Complexity

D.

TacAcs

Buy Now
Questions 150

What is the correct command to observe the Sync traffic in a VRRP environment?

Options:

A.

fw monitor –e “accept[12:4,b]=224.0.0.18;”

B.

fw monitor –e “accept port(6118;”

C.

fw monitor –e “accept proto=mcVRRP;”

D.

fw monitor –e “accept dst=224.0.0.18;”

Buy Now
Questions 151

Identify the API that is not supported by Check Point currently.

Options:

A.

R81 Management API-

B.

Identity Awareness Web Services API

C.

Open REST API

D.

OPSEC SDK

Buy Now
Questions 152

What are the three components for Check Point Capsule?

Options:

A.

Capsule Docs, Capsule Cloud, Capsule Connect

B.

Capsule Workspace, Capsule Cloud, Capsule Connect

C.

Capsule Workspace, Capsule Docs, Capsule Connect

D.

Capsule Workspace, Capsule Docs, Capsule Cloud

Buy Now
Questions 153

R81.20 management server can manage gateways with which versions installed?

Options:

A.

Versions R77 and higher

B.

Versions R76 and higher

C.

Versions R75.20 and higher

D.

Versions R75 and higher

Buy Now
Questions 154

Which packet info is ignored with Session Rate Acceleration?

Options:

A.

source port ranges

B.

source ip

C.

source port

D.

same info from Packet Acceleration is used

Buy Now
Questions 155

How can SmartView application accessed?

Options:

A.

https:// /smartview

B.

https:// :4434/smartview/

C.

https:// /smartview/

D.

https:// :4434/smartview/

Buy Now
Questions 156

SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is installed on the remote user’s machine via the web browser. What are the two modes of SNX?

Options:

A.

Application and Client Service

B.

Network and Application

C.

Network and Layers

D.

Virtual Adapter and Mobile App

Buy Now
Questions 157

Which command would disable a Cluster Member permanently?

Options:

A.

clusterXL_admin down

B.

cphaprob_admin down

C.

clusterXL_admin down-p

D.

set clusterXL down-p

Buy Now
Questions 158

When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?

Options:

A.

None, Security Management Server would be installed by itself.

B.

SmartConsole

C.

SecureClient

D.

Security Gateway

E.

SmartEvent

Buy Now
Questions 159

During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?

Options:

A.

Host having a Critical event found by Threat Emulation

B.

Host having a Critical event found by IPS

C.

Host having a Critical event found by Antivirus

D.

Host having a Critical event found by Anti-Bot

Buy Now
Questions 160

To help SmartEvent determine whether events originated internally or externally you must define using the Initial Settings under General Settings in the Policy Tab. How many options are available to calculate the traffic direction?

Options:

A.

5 Network; Host; Objects; Services; API

B.

3 Incoming; Outgoing; Network

C.

2 Internal; External

D.

4 Incoming; Outgoing; Internal; Other

Buy Now
Questions 161

Which of the following statements is TRUE about R81 management plug-ins?

Options:

A.

The plug-in is a package installed on the Security Gateway.

B.

Installing a management plug-in requires a Snapshot, just like any upgrade process.

C.

A management plug-in interacts with a Security Management Server to provide new features and support for new products.

D.

Using a plug-in offers full central management only if special licensing is applied to specific features of the plug-in.

Buy Now
Questions 162

Which command lists all tables in Gaia?

Options:

A.

fw tab –t

B.

fw tab –list

C.

fw-tab –s

D.

fw tab -1

Buy Now
Questions 163

Which of the following authentication methods ARE NOT used for Mobile Access?

Options:

A.

RADIUS server

B.

Username and password (internal, LDAP)

C.

SecurID

D.

TACACS+

Buy Now
Questions 164

NAT rules are prioritized in which order?

1. Automatic Static NAT

2. Automatic Hide NAT

3. Manual/Pre-Automatic NAT

4. Post-Automatic/Manual NAT rules

Options:

A.

1, 2, 3, 4

B.

1, 4, 2, 3

C.

3, 1, 2, 4

D.

4, 3, 1, 2

Buy Now
Questions 165

Which method below is NOT one of the ways to communicate using the Management API’s?

Options:

A.

Typing API commands using the “mgmt_cli” command

B.

Typing API commands from a dialog box inside the SmartConsole GUI application

C.

Typing API commands using Gaia’s secure shell(clish)19+

D.

Sending API commands over an http connection using web-services

Buy Now
Questions 166

Fill in the blank: The R81 utility fw monitor is used to troubleshoot ______________________.

Options:

A.

User data base corruption

B.

LDAP conflicts

C.

Traffic issues

D.

Phase two key negotiations

Buy Now
Questions 167

Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?

Options:

A.

Detects and blocks malware by correlating multiple detection engines before users are affected.

B.

Configure rules to limit the available network bandwidth for specified users or groups.

C.

Use UserCheck to help users understand that certain websites are against the company’s security policy.

D.

Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.

Buy Now
Questions 168

Which Mobile Access Application allows a secure container on Mobile devices to give users access to internal website, file share and emails?

Options:

A.

Check Point Remote User

B.

Check Point Capsule Workspace

C.

Check Point Mobile Web Portal

D.

Check Point Capsule Remote

Buy Now
Questions 169

If you needed the Multicast MAC address of a cluster, what command would you run?

Options:

A.

cphaprob –a if

B.

cphaconf ccp multicast

C.

cphaconf debug data

D.

cphaprob igmp

Buy Now
Questions 170

In R81, how do you manage your Mobile Access Policy?

Options:

A.

Through the Unified Policy

B.

Through the Mobile Console

C.

From SmartDashboard

D.

From the Dedicated Mobility Tab

Buy Now
Questions 171

You want to gather and analyze threats to your mobile device. It has to be a lightweight app. Which application would you use?

Options:

A.

SmartEvent Client Info

B.

SecuRemote

C.

Check Point Protect

D.

Check Point Capsule Cloud

Buy Now
Questions 172

Which features are only supported with R81.20 Gateways but not R77.x?

Options:

A.

Access Control policy unifies the Firewall, Application Control & URL Filtering, Data Awareness, and Mobile Access Software Blade policies.

B.

Limits the upload and download throughput for streaming media in the company to 1 Gbps.

C.

The rule base can be built of layers, each containing a set of the security rules. Layers are inspected in the order in which they are defined, allowing control over the rule base flow and which security functionalities take precedence.

D.

Time object to a rule to make the rule active only during specified times.

Buy Now
Questions 173

What is not a component of Check Point SandBlast?

Options:

A.

Threat Emulation

B.

Threat Simulator

C.

Threat Extraction

D.

Threat Cloud

Buy Now
Questions 174

You are working with multiple Security Gateways enforcing an extensive number of rules. To simplify security administration, which action would you choose?

Options:

A.

Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.

B.

Create a separate Security Policy package for each remote Security Gateway.

C.

Create network objects that restricts all applicable rules to only certain networks.

D.

Run separate SmartConsole instances to login and configure each Security Gateway directly.

Buy Now
Questions 175

Your manager asked you to check the status of SecureXL, and its enabled templates and features. What command will you use to provide such information to manager?

Options:

A.

fw accel stat

B.

fwaccel stat

C.

fw acces stats

D.

fwaccel stats

Buy Now
Questions 176

What is the least amount of CPU cores required to enable CoreXL?

Options:

A.

2

B.

1

C.

4

D.

6

Buy Now
Questions 177

You noticed that CPU cores on the Security Gateway are usually 100% utilized and many packets were dropped. You don’t have a budget to perform a hardware upgrade at this time. To optimize drops you decide to use Priority Queues and fully enable Dynamic Dispatcher. How can you enable them?

Options:

A.

fw ctl multik dynamic_dispatching on

B.

fw ctl multik dynamic_dispatching set_mode 9

C.

fw ctl multik set_mode 9

D.

fw ctl multik pq enable

Buy Now
Questions 178

What are the attributes that SecureXL will check after the connection is allowed by Security Policy?

Options:

A.

Source address, Destination address, Source port, Destination port, Protocol

B.

Source MAC address, Destination MAC address, Source port, Destination port, Protocol

C.

Source address, Destination address, Source port, Destination port

D.

Source address, Destination address, Destination port, Protocol

Buy Now
Questions 179

Which command will allow you to see the interface status?

Options:

A.

cphaprob interface

B.

cphaprob –I interface

C.

cphaprob –a if

D.

cphaprob stat

Buy Now
Questions 180

What is true about VRRP implementations?

Options:

A.

VRRP membership is enabled in cpconfig

B.

VRRP can be used together with ClusterXL, but with degraded performance

C.

You cannot have a standalone deployment

D.

You cannot have different VRIDs in the same physical network

Buy Now
Questions 181

What are the different command sources that allow you to communicate with the API server?

Options:

A.

SmartView Monitor, API_cli Tool, Gaia CLI, Web Services

B.

SmartConsole GUI Console, mgmt_cli Tool, Gaia CLI, Web Services

C.

SmartConsole GUI Console, API_cli Tool, Gaia CLI, Web Services

D.

API_cli Tool, Gaia CLI, Web Services

Buy Now
Questions 182

Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.

Options:

A.

Symmetric routing

B.

Failovers

C.

Asymmetric routing

D.

Anti-Spoofing

Buy Now
Questions 183

Which command shows actual allowed connections in state table?

Options:

A.

fw tab –t StateTable

B.

fw tab –t connections

C.

fw tab –t connection

D.

fw tab connections

Buy Now
Questions 184

Fill in the blank: The tool _____ generates a R81 Security Gateway configuration report.

Options:

A.

infoCP

B.

infoview

C.

cpinfo

D.

fw cpinfo

Buy Now
Questions 185

Which is NOT an example of a Check Point API?

Options:

A.

Gateway API

B.

Management API

C.

OPSC SDK

D.

Threat Prevention API

Buy Now
Questions 186

Which of the SecureXL templates are enabled by default on Security Gateway?

Options:

A.

Accept

B.

Drop

C.

NAT

D.

None

Buy Now
Questions 187

You have successfully backed up Check Point configurations without the OS information. What command would you use to restore this backup?

Options:

A.

restore_backup

B.

import backup

C.

cp_merge

D.

migrate import

Buy Now
Questions 188

Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?

Options:

A.

UDP port 265

B.

TCP port 265

C.

UDP port 256

D.

TCP port 256

Buy Now
Exam Code: 156-315.81
Exam Name: Check Point Certified Security Expert R81.20
Last Update: May 20, 2024
Questions: 628

PDF + Testing Engine

$56  $159.99

Testing Engine

$42  $119.99
buy now 156-315.81 testing engine

PDF (Q&A)

$35  $99.99
buy now 156-315.81 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 20 May 2024