Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Checkpoint 156-215.81 Practice Exam with Questions & Answers | Set: 8

Questions 71

What are the Threat Prevention software components available on the Check Point Security Gateway?

Options:
A.

IPS, Threat Emulation and Threat Extraction

B.

IPS, Anti-Bot, Anti-Virus, SandBlast and Macro Extraction

C.

IPS, Anti-Bot, Anti-Virus, Threat Emulation and Threat Extraction

D.

IDS, Forensics, Anti-Virus, Sandboxing

Checkpoint 156-215.81 Premium Access
Questions 72

Which tool allows you to monitor the top bandwidth on smart console?

Options:
A.

Logs & Monitoring

B.

Smart Event

C.

Gateways & Severs Tab

D.

SmartView Monitor

Questions 73

How do logs change when the "Accounting" tracking option is enabled on a traffic rule?

Options:
A.

Involved traffic logs will be forwarded to a log server.

B.

Provides log details view email to the Administrator.

C.

Involved traffic logs are updated every 10 minutes to show how much data has passed on the connection.

D.

Provides additional information to the connected user.

Questions 74

In order for changes made to policy to be enforced by a Security Gateway, what action must an administrator perform?

Options:
A.

Publish changes

B.

Save changes

C.

Install policy

D.

Install database

Questions 75

Core Protections are installed as part of what Policy?

Options:
A.

Access Control Policy.

B.

Desktop Firewall Policy

C.

Mobile Access Policy.

D.

Threat Prevention Policy.

Questions 76

You are asked to check the status of several user-mode processes on the management server and gateway. Which of the following processes can only be seen on a Management Server?

Options:
A.

fwd

B.

fwm

C.

cpd

D.

cpwd

Questions 77

To provide updated malicious data signatures to all Threat Prevention blades, the Threat Prevention gateway does what with the data?

Options:
A.

Cache the data to speed up its own function.

B.

Share the data to the ThreatCloud for use by other Threat Prevention blades.

C.

Log the traffic for Administrator viewing.

D.

Delete the data to ensure an analysis of the data is done each time.

Questions 78

URL Filtering cannot be used to:

Options:
A.

Control Bandwidth issues

B.

Control Data Security

C.

Improve organizational security

D.

Decrease legal liability

Questions 79

Which of the following is NOT a valid deployment option for R80?

Options:
A.

All-in-one (stand-alone)

B.

CloudGuard

C.

Distributed

D.

Bridge Mode

Questions 80

What are the steps to configure the HTTPS Inspection Policy?

Options:
A.

Go to Manage&Settings > Blades > HTTPS Inspection > Configure in SmartDashboard

B.

Go to Application&url filtering blade > Advanced > Https Inspection > Policy

C.

Go to Manage&Settings > Blades > HTTPS Inspection > Policy

D.

Go to Application&url filtering blade > Https Inspection > Policy